1.5MB FW Release Notes 8 1 30 1350 (MR)
1.5MB FW Release Notes 8 1 30 1350 (MR)
7 Series/C216 Chipset
Family
Intel
Management Engine
Firmware 8.1 SKU
1.5MB Readme / Release Notes - NDA
January 2013
Revision 8.1.30.1350 Maintenance Release (MR)
Intel Confidential
2 Intel Confidential
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS
PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER
AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS
INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR
INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in
personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION,
YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS,
OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE
ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR
DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS
SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS
PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the
absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future
definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The
information here is subject to change without notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may cause the product to
deviate from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained
by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm%20
All products, platforms, dates, and figures specified are preliminary based on current expectations, and are subject to change
without notice. All dates specified are target dates, are provided for planning purposes only and are subject to change.
Do not finalize a design with this information. Revised information will be published when the product is available. Verify with
your local sales office that you have the latest datasheet before finalizing a design.
Intel
Active Management Technology requires the computer system to have an Intel AMT-enabled chipset, network hardware
and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by
the purchaser and may require scripting with the management console or further integration into existing security frameworks to
enable certain functionality. It may also require modifications of implementation of new business processes. With regard to
notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting
wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see
http://www.intel.com/technology/manage/iamt/
Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced
for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion
or marketing of any product or services and any such use of Intels internal code names is at the sole risk of the user.
*Other names and brands may be claimed as the property of others.
Copyright 2011-2013, Intel Corporation. All rights reserved.
Intel Confidential 3
Contents
1 Introduction ...................................................................................................... 6
1.1 Scope of Document ................................................................................. 6
1.2 Acronyms .............................................................................................. 6
2 Release Kit Summary ......................................................................................... 8
2.1 Release Kit Details .................................................................................. 8
2.2 Kit Overview .......................................................................................... 9
2.3 Contents of Downloaded Kit ..................................................................... 9
2.3.1 Intel
SW Components ............................................................... 9
2.3.2 Image Components ................................................................... 11
2.3.3 System Tools ........................................................................... 12
2.3.4 ICC Tools ................................................................................. 14
2.4 Release Version Numbering Information ................................................... 15
2.5 Firmware Update Information .................................................................. 15
2.5.1 Firmware Update Terminology .................................................... 15
2.5.2 VCN Firmware Upgrade / Downgrade Table .................................. 16
3 Important Notes ............................................................................................... 18
3.1 Hardware Configurations ......................................................................... 18
3.2 Important Issues / Notes ........................................................................ 18
3.3 Software / Tools .................................................................................... 18
3.4 Intel METS ......................................................................................... 19
3.5 Best Known Configuration ....................................................................... 19
3.6 Windows 8 Compatibility / Best Known Configuration ................................. 19
4 Kit Details ........................................................................................................ 20
4.1 Build Details .......................................................................................... 20
4.2 FITC XML Compare ................................................................................ 21
5 Intel
ME Kernel ....................................................................... 28
7.2 Closed Integrated Clock Control (ICC) ................................................... 32
7.3 Closed Software / Tools ....................................................................... 33
7.4 Closed Intel Upgrade Service ............................................................. 41
7.5 Closed Not Firmware Issue ................................................................... 42
7.6 Closed - No Plans to Fix .......................................................................... 44
7.7 Closed Documentation Change .............................................................. 46
8 Known Issues ................................................................................................... 47
8.1 Open ME Kernel .................................................................................. 47
8.2 Open - Integrated Clock Control (ICC) ...................................................... 47
8.3 Open Software / Tools ......................................................................... 47
8.4 Open Intel
DAL Intel
DAL)
FITC Flash Image Tool
FOV Fixed Offset Variable
FW Firmware
GbE Gigabit Ethernet
HECI Host Embedded Controller Interface. Same as Intel
MEI.
ICC Integrated Clock Control
Intel
AT Intel
Anti-Theft Technology
Intel
IPT Intel
PDA Intel
Anti-Theft Technology.
VCN Version Control Number. Used in Firmware Upgrade /
Downgrade capabilities
WMI Windows Management Instrumentation
WSI Web Services Interoperability Organization
Release Kit Summary
8 Intel Confidential
2 Release Kit Summary
This document covers the following Intel
IPT
* Release : Intel
Management Engine Firmware 8.1 Intel
7 Series
Express Chipset MR Release 8.1.30.1350
Intel
Management Engine Firmware 8.1 Intel
6 Series
Express Chipset MR Release 8.1.30.1350
* Target Platform : Ivy Bridge or Sandy Bridge & Intel Series 7/C216
Chipset Family
Ivy Bridge or Sandy Bridge & Cougar Point Chipset Family
* .zip name : ME8_1.5M_8.1.30.1350 .zip
Contents:
Intel
Management Engine Firmware (for Intel
7 and 6 Series Express
Chipset Family / PCH platform)
GbE PCH SPI components
Intel Reference System BIOS
Release Kit Summary
Intel Confidential 9
2.2 Kit Overview
The kit can be downloaded from VIP (https://platformsw.intel.com/)
Note: A username and password are required to access the website and to log in. User must
have an account created for access.
1. After logging in, click on the link View All Kits on the left side of the web page.
2. Click on the corresponding kit number that is to be downloaded.
3. Select and open the appropriate kit component
4. The Supporting Documentation folder under the selected component contains the
following supporting documentation:
a. 5MB FW Release Notes This document gives an overview of the contents of
the entire downloaded component. Also provides the details on closed and
open Sightings and bugs with this kit release.
b. BIOS Release Notes This document provides details of BIOS issues resolved
with the kit.
5. Click on the Installation Files folder under the selected component and extract the
.zip kit into a folder (Example: C:\)
2.3 Contents of Downloaded Kit
Download the kit, as previously specified, into the directory (C:\). The details of the
contents and directory structure are listed below:
Drivers are included in:
o ME8_1.5M_8.1.30.1350 .zip
2.3.1 Intel
SW Components
Installers Description
ME_SW
Intel
MEI is the interface between the host and the Intel
Management Engine firmware.
Drivers and applications on the host that wish to interact
with Intel
Management Engine through the host interface
use the Intel
MEI host Windows* driver.
Intel
MEI driver is installed by running:
C:\[skuName_x.x.xxxx]\Installers\ME_SW\Setup.exe
The Intel
MEI driver can also be installed using the Have
Disk method in Device Manager, as follows:
o Right click My Computer and select Properties.
o Select the Hardware tab and click Device
Manager.
o Scan for hardware changes.
o Update the particular device driver by pointing to the
INF file:
C:\[skuName_x.x.xxxx]\ME_SW\Installers\Drivers\
\MEI\HECI.inf.
Release Kit Summary
10 Intel Confidential
Installers Description
ME_SW_IS
The ME_SW_IS installer will install the same components as
ME_SW but using an InstallShield wrapper.
Release Kit Summary
Intel Confidential 11
2.3.2 Image Components
NVM Images are included in:
o ME8_1.5M_8.1.30.1350.zip
This folder contains the component images (BIOS image, Intel
Management Engine
image and GbE image) that are integrated to form the final flash image. The table
below lists the different images and briefly describes them.
Image Description
BIOS
Contains Intel Reference System BIOS
Supported devices: Intel
7
Series/C216 Chipset Family and Cougar Point based platforms
x represents point releases such as 8.1 where new features or changes to
existing features may be added
y refers to Maintenance and Hot Fix release designations
z refers to firmware release revision
2.5 Firmware Update Information
Intel ME Firmware Update (either upgrade or downgrade) is evaluated based on the
SVN value, the VCN value, or the PV values. These values work in unison and can
impose restrictions at the same time.
2.5.1 Firmware Update Terminology
SVN (Security Version Number): will be incremented if there is a high or critical
security fix in Intel ME Firmware. A downgrade to a lower SVN value will be
prohibited.
VCN (Version Control Number): will be incremented if there is a security fix, a
significant firmware change or a new feature addition. A downgrade to lower VCN
value will be prohibited.
PV (Production Version): Intel ME Firmware will have a PV bit set. Upgrade to a
non-PV firmware is not allowed. An update from non-PV version to a PV is allowed.
Update rules:
If the system is at PV (Production Version) quality firmware that has PV bit set,
update to non-PV firmware is not allowed. Only Non-PV to PV is allowed.
o Example: 8.0.0.1351 PV cannot upgrade to 8.1.0.1035 Beta
Update to firmware that has lower SVN (Security Version Number) is not
allowed.
Update to firmware that has lower VCN (Version control number) is not
allowed.
Update across major point release is not allowed for example 8.x to 9.x.
Release Kit Summary
16 Intel Confidential
If firmware update setting in Intel MEBX is password protected, Intel MEBX
password must be supplied during the update.
2.5.2 VCN Firmware Upgrade / Downgrade Table
Intel ME FW
Version
SVN # VCN # PV (1 or 0)
8.1.30.1350
(8.1 MR)
1 2 1
8.1.20.1336
(8.1 MR)
1 2 1
8.1.3.1325
(8.1 HF3)
1 2 1
8.1.2.1318
(8.1 HF2)
1 2 1
8.1.0.1265
(8.1 PV)
1 2 1
8.1.0.1265
(8.1 PC2)
1 2 1
8.1.0.1265
(8.1 PC)
1 2 1
8.0.13.1502
(MR1 HF3)
1 2 1
8.0.10.1464
(MR1)
1 2 1
8.0.4.1441
(HF4)
1 2 1
8.1.0.1143
(Beta)
1 2 0
8.0.3.1427
(HF3)
1 2 1
8.0.2.1410
(HF2)
1 2 1
8.0.1.1399
(HF1)
1 2 1
8.0.0.1351
(PV Release)
1 2 1
Release Kit Summary
Intel Confidential 17
8.1.0.1035
(8.1 Alpha)
1 0 0
Important Notes
18 Intel Confidential
3 Important Notes
This MR Release firmware supports 1.5MB Corporate and Consumer SKU platforms.
o Basic Moff Power flows (PP1) Supported
o Intel
ME New Features
5.1 RCR Update
RCR # Description / Background Build
CCG0100010197
Description:
Expand Intel
IPT on Intel
ME 8.1 allows running Intel
IPT applets on
Ultrabook
TM
or Intel
vPro or Intel
Core
TM
Desktop, but not on mobile or AIP (All-In-One
Innovation Program) mobile systems.
8.1.30.1350
CCG100010162
Description:
Intel ME FW support for the UM77 PCH / i3-
2365M and i3-2375M Core processors
combination.
Background:
Amendment to CCG0100010084 RCR.
8.1.3.1325
CCG0100010084
Description:
Intel ME FW support for the UM77 PCH / Intel
Y Series 3
rd
Generation Core Processors
combination.
Background:
A new ULX processor for low TDP designs and
has been added to the Intel 3
rd
Generation
Core Processor product roadmap.
8.1.2.1318
CCG0100009956
Description:
Add Microsoft* Windows 8 uEFI native boot mode
support for Intel ME MEInfowin and
MEManufwin manufacturing tools.
Background:
Intel ME 8 Tools PRD did not specifically include
Windows 8 uEFI native boot mode support for
MEInfowin and MEManuf. This is needed for
Microsofts Logo requirement with Windows 8
Secure Boot.
8.1.0.1248
Intel ME New Features
Intel Confidential 23
RCR # Description / Background Build
CCG0100190265
Description:
Change IFR service to automatically start during
IFR flow.
Background:
Improves the user experience of IFR by reducing
the delay while an IFR is in progress.
8.1.0.1248
CCG0100009844
Description:
Intel is changing the implementation of Code 10
violation of the Ethernet controller after G3->S5-
>WoL bug fix.
ME FW automatically detects impacted
platforms
On impacted platforms, FW adds a 50ms
delay in FW
Impacted platforms include those that:
o Do not support ME operation in
M3 (APWROK and PCH_PWROK
are tied together)
o Using Intel LAN
LAN MAC Delay Timer (ME soft strap 10
bit 26) configuration option has been
removed from FITC
Background:
This implementation change was made in Intel
ME FW 8.0.10.1464 MR and carries over to
8.1.0.1248. Intel had observed a Code 10
violation of the Ethernet controller on ME 8.0
platforms during the G3-S5 state followed by
WOL. Symptom is no LAN connectivity during
WOL (inoperable LAN connection) operation.
8.1.0.1248
CCG0100009815
Description:
Add CPU model Intel Corei3-2377M processor
to Intel microarchitecture code name Sandy
Bridge Ultrabook CPU list to allow Intel IPT
availability with this model.
Background:
CPU model did not have Intel IPT support; a
requirement for Ultrabook.
8.1.0.1248
CCG0100009823
Description:
MEManuf EOL support for systems with Intel
Integrated LAN disabled.
Background:
Add a check to MEManuf EOL in cases where
Intel Integrated LAN Enable is set to False in
FITC.
8.1.0.1248
Intel ME New Features
24 Intel Confidential
RCR # Description / Background Build
CCG0100009760
Description:
Updates the FPT tool to retain MAC/SSID/SVID
when flashing image.
Background:
FPT failure to recognize the correct
MAC/SSID/SVID and overwriting them.
8.1.0.1143
CCG0100009719
Description:
Implement Recovery Mode check in MEManuf.
Background:
MEManuf passed while system is in recovery
mode and ME not fully functioning.
8.1.0.1143
1024025
Description:
Add current version of Microsoft Visual Studio
VC++ redistributables to ME_SW Installer.
Background:
Installer does not complete the installation of all
ME SW components when trying to install newer
version of Microsoft Visual Studio VC++
redistributables than exists on system.
8.1.0.1143
CCG0100125704
Description:
FW BIST Integrated in the ME early boot
Background:
In the manufacturing line, the BIST result is not
available until software tool requests FW to run
the BIST. In order to perform BIST, OEM has to
(a) boot to OS (b) run MEMANUF test (c) incur
power cycle reset (d) boot to OS after Power
cycle reset (e) run MEMANUF again to retrieve
results.
If ME were to automate the BIST process itself
then in the aforementioned sequence, steps a)
and b) can be avoided saving many seconds in
the flow.
8.1.0.1035
CCG0100009277
Description:
ME FW mechanism to check MFS status
Background:
Improve robustness of MFS and ME stability so
that ME doesnt get into a bad state and if it
does, identify cause for customers.
8.1.0.1035
Intel ME New Features
Intel Confidential 25
RCR # Description / Background Build
CCG0100115620
Description:
OEM option to OPT-OUT from IFR Updates
Background:
Having hard OPT OUT option from IFR will allow
customers to validate and expedite critical FW
updates instead of utilizing Intels Firmware
Recovery.
8.1.0.1035
CCG0100134301
Description:
Request for an Anti-Theft option to prevent PBA
Logon Timer restart on warm reset
Background:
Client systems using Self Encrypted Drives
(SEDs) shutdown unless a command is sent to
stop PBALogon timer after the disk is unlocked
and the data partition is revealed.
8.1.0.1035
CCG0100128347
Description:
FITC VSCC cleanup.
Background:
VSCC cleanup Removal of parts no longer used
in current generation platforms (i.e.
AT26DF321), and simplifying the VSCC register
value to one universal value for all SPI parts
(0x20052005).
8.1.0.1035
CCG0100129713
Description:
Support diagnostic PET over PLDM
Background:
Ability for ME to translate platform monitoring
events sent from EC/SIO to WSMan Events and
send them to the management station.
8.1.0.1035
CCG0100103738
Description:
Support for SIGMA spec 0.88
Background:
Adds SIGMA support for multiple clients e.g. CLS,
JOM, PAVP and others.
8.1.0.1035
CCG0100009226
Description:
Certification for Platform Embedded Asymmetric
Token (PEAT)
Background:
The purpose of Platform Embedded Asymmetric
Token is to enable embedded asymmetric key
(private key) based tokens within the secure
processing element of Intel platforms.
8.1.0.1035
Intel ME New Features
26 Intel Confidential
RCR # Description / Background Build
CCG0100009168
Description:
ME 8.0 support for XP on workstation and client
platforms
Background:
Adds full feature support for Windows* XP SP3
workstation and client platforms with exception
of USB3 and wireless display features.
8.1.0.1035
CCG0100008852
Description:
FOV support to configure ODM ID and System
integrator ID NVARs during manufacturing (post
image flash) and addition to MEInfo to present
these NVARs.
Background:
In order to address OEM request (HP) to be able
to configure ODM ID (used by Intel Services) in
manufacturing and verify by MEInfo
8.1.0.1035
Issue Status Definitions
Intel Confidential 27
6 Issue Status Definitions
This document provides sightings and bugs report for Intel
Management Engine
Firmware 8.0 SKU, Software and Tools for Intel
ME Kernel
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
197134 /
3708793
Integrated graphic adapter
VGA/HDMI/DVI cannot display and
system may not boot under temperature
sensitive conditions.
Affected Component FW.Bringup
Impact: No display from integrated
graphics adapter and system may not
boot.
Notes: Affects Intel
6 Series and
Intel
7
Series and Intel
FW Recovery Agent.
3. Check for and start an IFR update.
4. Interrupt IFR update (e.g. power
loss in FW update step).
5. Continue the update or perform
second power loss to initiate
rollback operation.
6. Open the Intel
ME FW Recovery
Agent window.
7. View the Intel
FW Recovery
Agent log. Failed is reported
instead of update successful or
update failed and rollback
completed successfully.
8.1.0.1248
196670 IFR update fails with "Error 8787: Verify
that Intel ME Service is installed and
running" due to a delay during startup of
IntelMEFWService.
Affected Component:
SW.IFR.Windowservice
Impact: IFR update failure.
Workaround: Manually start
IntelMEFWService after every phase of
IFR reboots.
Notes: Fixed in 8.0.10.1464v2
Reproduction Steps:
1. Flash SPI image with IFR Enabled.
2. Boot to host OS.
3. Start IntelMeFwService.exe
4. Reboot system.
5. Run the following command:
IntelMeFwService.exe query.
8.1.0.1248
Closed Issues
36 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
196540 "Intel ME Service" is shown to be
"unknown" in System configuration.
Affected Component:
SW.IFR.Windowservice
Impact: After installing the driver, the
"ME Service" in the Windows* System
Configuration utility is displayed as
"unknown" in the "Manufacturer" field.
Workaround: None.
Notes: Fixed in 8.0.10.1464v2
Reproduction Steps:
8.1.0.1248
196502
SKU manager in all FPTW tool
commands fail on HM67, QS67 and
UM67 SKUs.
Affected Component:
SW.Tools.FlashProgrammingTool
Impact: Support for QS67, HM67, and
UM67 had been incorrectly removed.
Workaround: N/A
Notes:
8.1.0.1248
196495
MAC address becomes corrupt after
updating SPI using FPT savemac
command.
Affected Component:
SW.Tools.FlashProgrammingTool
Impact: Invalid MAC address (all 00)
after update SPI by using FPT
savemac command.
Workaround: N/A
Notes: Fixed in 8.0.10.1464v2
Reproduction Steps:
1. Set MAC address to
001122334455.
2. Perform Global Reset.
3. Flash SPI image with -savemac
parameter.
4. Perform Global Reset.
5. Check current MAC address setting
(may display as 0x00000000).
8.1.0.1248
196454
System cannot execute FwUpdLcl.efi
under EFI shell in x64 environment.
Affected Component:
SW.Tools.FwUpdLcl
Impact: FwUpdLcl.efi tool execution
failure.
Workaround: N/A
Notes: Fixed in 8.0.10.1464v2
Reproduction Steps:
1. Boot to EFI shell.
2. Execute Fwupdlcl.efi -f ME.bin
3. FwUpdLcl.efi returns Failed: file
"\..\Common\Port\Efi64\Efiwrap.c,
line93.
8.1.0.1248
Closed Issues
Intel Confidential 37
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
196415
FPT from Intel ME 8.0.3.1427 release
fails to complete SPI flash operation if
the image does not contain a GbE
region.
Affected Component: Installer
Impact: FPT cannot update full SPI
flash image when SPI image does not
contain a GbE region.
Workaround: N/A
Notes: Fixed in 8.0.10.1464v2
Issue occurs with all OS versions of
FPT in HF3.
Reproduction Steps:
1. Flash SPI image which does not
contain a GbE region using FPT
from earlier kit.
2. Perform a global reset.
3. Flash a new SPI image with FPT
from Intel ME8 HF3.
4. FPT will display GbE Region does
not exist.. Windows version of
FPT will display an Intel Flash
Programming Tool error message
that FPT has stopped working and
a prompt to Check online or Close
the program.
8.1.0.1248
196056
FWUpdLcl does not display warning
message Warning: Do not exit the
process or power off the machine before
the firmware update process ends.
Affected Component
SW.Tools.FWUpdLcl
Impact: When performing FW update,
FW update tool does not display
warning message Warning: Do not
exit the process or power off the
machine before the firmware update
process ends
Workaround: N/A
Notes:
8.1.0.1248
Closed Issues
38 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
196415 FPT fails to complete SPI flash operation
if the image does not contain a GbE
region.
Affected Component: Installer
Impact: FPT cannot update full SPI
flash image when SPI image does not
contain a GbE region.
Workaround: Use FPT from Intel ME
8.0.2.1410 HF2 as a temporary
solution. Note: Intels normal
guidance is to use the version from the
kit release.
Notes: Issue occurs with all OS
versions of FPT in HF3 and has been
fixed in a future release.
Reproduction Steps:
1. Flash SPI image which does not
contain a GbE region using FPT
from earlier kit.
2. Perform a global reset.
3. Flash a new SPI image with FPT
from Intel ME8 HF3.
4. FPT will display GbE Region does
not exist.. Windows versions of
FPT will display an Intel Flash
Programming Tool error message
that FPT has stopped working and
a prompt to Check online or Close
the program.
8.1.0.1248
196394 FITC build error with Flash Part:
PM25LQ032C is added to VSCC table
Affected Component
SW.Tools.FlashProgrammingTool
Impact: The image cannot build
successfully.
Workaround: None.
Notes:
8.1.0.1248
196048 Management Engine Interface (Intel
MEI) driver installation fails.
Affected Component Installer
Impact: Unsuccessful Intel MEI
driver installation installation
Workaround: Install using novc
switch.
Notes: When re-installing Intel MEI
driver using swsetup.exe from Intel
MEFW 8.0.0.1351 kit, installation
process gets to vcredist_x86.exe when
an error message appears "The
program failed to start...will exit".
8.1.0.1248
195788 FW Update tool does not decode
UPDATE_IMAGE_BLACKLISTED status
returned from the FW
Affected Component
SW.Tools.FwUpdLcl
Impact: Tool displays error message
when attempting to downgrade
firmware instead of expected message
that downgrade to blacklisted FW is not
supported.
Notes:
8.1.0.1248
Closed Issues
Intel Confidential 39
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
195596 UNS creates excessive number of empty
folders in registry on Windows XP
systems.
Affected Component
SW.AMT.Services
Impact: Unnecessary empty folders
are created in Windows XP registry for
each USB insert or WS-MAN operation.
Notes:
Reproduction Steps
8.1.0.1143
195532 IMSS in Windows 8 presents the LAN
and WLAN drivers as disabled.
Affected Component SW.AMT.Icon
Impact: LAN and WLAN driver
information is not displayed in IMSS
Extended System Details.
Notes:
Reproduction Steps
8.1.0.1143
195020 START and EXIT buttons are not shown
in IFR GUI when using low resolution
screen (800x600/1024x768)
Affected Component
SW.IFR.FWupdate
Impact: When using resolutions lower
than 1280x960 , "START" and "EXIT"
buttons will not be shown in IFR GUI
Workaround: Change screen
resolution to a higher value.
Notes: Fixed in future merge.
Reproduction Steps:
8.1.0.1143
194995 UNS service hangs after performing
partial FWUpdate and immediately
exiting IMSS.
Affected Component
SW.AMT.Services
Impact: UNS process hangs; IMSS will
not open after performing Partial FW
Update and immediately exiting IMSS.
Notes: Fixed in future merge.
Reproduction Steps:
8.1.0.1143
193241 /
195818
If the computer name contains non-Latin
symbols (e.g. Cyrillic), then all UNS's
local WS-MAN calls fail.
WebUI and VisualCIM over local are
working.
Affected Component
SW.AMT.Services
Impact: Privacy issue. User will not
be able to cancel redirection sessions.
Workaround: N/A
Notes:
Reproduction Steps: N/A
8.1.0.1143
Closed Issues
40 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
193805 KVM session closes with Protocol
Violation during reset from Windows to
DOS.
Affected Component
SW.AMT.SDK.KVM.RealVNC
Impact: Intel KVM Viewer disconnects
session due to error.
Workaround: Does not occur with
KVMTray or UltraVNC.
Notes:
Reproduction Steps:
1. Boot system to Windows.
2. Open KVM session.
3. Reset remote system through RCO
or local reset to moved system to
ODS mode (need to run chkdsk or
create BSOD).
4. KVM session should remain
connected however closes session
with Connection to remote
machine stopped. Reason: Error:
0x80862602: KVM protocol
violation
8.1.0.1143
193820 /
193950
IMSS hung when pressing extended
system details immediately after loading
the application on Windows 8.
Affected Component SW.AMT.Icon
Impact: IMSS application is
unresponsive.
Workaround: Recovery by killing
process.
Notes: Only seen on Windows 8 32-
bit.
Reproduction Steps:
1. Burn image.
2. Do not provision Windows 8
system.
3. Start IMSS (If already started,
open icon and select Exit and
restart IMSS again).
4. Go to the advanced tab in IMSS.
Press Extended System Details.
5. Application hangs.
8.1.0.1143
194631 /
194715
EFI and Windows 64-bit versions of FPT
fail to consume values for
MEIdleTimeout FOV
Affected Component
SW.Tools.FlashProgrammingTool
Impact:
Workaround: Reopen application
reset the strings changes and the
strings return to the localized
language.
Notes:
8.0.0.1240 eng drop
Closed Issues
Intel Confidential 41
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
193704 IFR Update Agent will not install on
Windows XP 32-bit or Windows XP 64-bit
system
Affected Component Installer
Impact: Unable to install IFR Update
Agent on Windows XP 32 and 64 bit
systems.
Workaround: N/A
Notes:
8.0.0.1240 eng drop
193488 After flashing image, FWUPDLCL returns
Error 8769: Polling for FW Update
Failed. And Error 8707: Firmware
update failed due to an internal error.
Affected Component
SW.Tools.FwUpdLcl
Impact: Intermittent failures to
upgrade FW images using FWUpdLcl.
Workaround: N/A
Notes:
8.0.0.1240 eng drop
7.4 Closed Intel Upgrade Service
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
Affected Component
Impact:
Workaround:
Notes:
Reproduction Steps:
Closed Issues
42 Intel Confidential
7.5 Closed Not Firmware Issue
Issue # Description Affected Component/Impact /
Workaround/Notes
196554 HECI failures with Microsoft* Windows 8
Build 8250.
Affected Component SW.HECI
Driver
Impact: Unable to use tools
dependent on HECI such as MEINFO
with Windows 8 Build 8250.
Workaround: N/A
Notes: Expected behavior in
Microsoft* Windows. Error does not
occur when installation while logged in
as Administrator user account or by
invoking Run as Administrator when
launching MEInfo utility.
Reproduction Steps:
1. Run MEInfo
2. Instead of displaying information
requested, the following error
occurs: MeInfowin Error: 9470:
Fail to load driver <PCI access for
windows>'.
194427 Alarm Clock fails to wake the system
from S3.
Affected Component
FW.Kernel.AlarmClock
Impact: System may not wake from
S3 by Alarm Clock.
Workaround: none
Notes:
Reproduction Steps:
1. Flash image on system under test.
2. Provision SUT.
3. Add Alarm for >4 minutes.
4. Move SUT to S3.
5. Wait approximately 6 minutes.
6. SUT should wake to S0 but
remains in S3 6 of 10 tests.
Closed Issues
Intel Confidential 43
Issue # Description Affected Component/Impact /
Workaround/Notes
191570 FPTW.exe -ERASE fails at 69% if system
has been previously resumed from S3.
Affected Component ClientBIOS
Impact:
Workaround: DOS version (FPT.exe)
is not affected and can be used.
Notes:
Reproduction Steps:
1. Boot system to Windows
2. Place system in S3
3. Resume system from S3
4. Run FPTW.exe ERASE from a
Windows command line
Command should successfully
complete however, will fail with
following message
-Erasing Flash Block [0x580000] -
69% complete.
Error 8: Software sequencing
failed. Make sure that you have
access to target flash area!
194722 Machine restart and stuck in 009A code
when try to wake ME after the first time
entered to Moff with current NIC
Affected Component ClientBIOS
Impact: When trying to wake ME from
Moff after the first time, SUT reset and
stuck in post code 009A
Workaround: Recovery by G3
Notes:
Reproduction Steps:
1. Boot SUT with different network
adapter.
2. Add a valid profile to ME store
3. Move SUT to Sx and ensure WiAMT
connectivity.
4. Wait for ME to enter Moff state
(idle timeout =1).
5. When ME is in Moff, wake ME vy
ARP, NDP, ping etc.
6. ME should move to M3 in Sx state
but instead SUT resets and hangs
at 009A code.
194680 AMT on Wireless is not available in
Level 3 Upgrade.
Affected Component ClientBIOS
Impact: After making Level 3 Upgrade
on B75 machine and provisioning, the
Wireless submenu is missing from
WebUI. The user cannot create a new
wireless profile.
Workaround: none
Notes:
Closed Issues
44 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
194001 FWUPDLCL failed to update using restore
point bin file after flashing
previous_oem_image
Affected Component
FW.Kernel.FwUpdLcl
Impact: MEFW Updates using restore
points fail.
Workaround: N/A
Notes:
Reproduction Steps:
1. Flash image.
2. Execute fwupdlcl.exe -save
store.bin
3. Flash previous kit image.
4. Execute fwupdlcl.exe f store.bin
forcereset
5. System displays Error 8741: FW
Update Failed and Error 8707:
Firmware update failed due to an
internal error.
7.6 Closed - No Plans to Fix
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
193574 During Intel Firmware Recovery (IFR) at
Stage 2 of 2, if system is allowed to go
to S3/S4, upon system resume, the
Firmware Update (FWU) tool displays
error A general FW issue has occurred.
Please try reinstalling the Intel ME FW
Tool.
Affected Component
SW.Tools.FwUpdLcl
Impact: IFR firmware update is
unsuccessful if system is allowed to go
to S3/S4 state during update.
Workaround: N/A
Notes:
Reproduction Steps:
1. Run MEFWR.exe and then when
process gets to Stage 2 of 2, put
the system to S3 or S4.
2. Resume system
3. An error will be displayed A
general FW issue has occurred.
Please try reinstalling the Intel ME
FW Tool.
Not a current
requirement
Closed Issues
Intel Confidential 45
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
193573 During Intel Firmware Recovery (IFR) at
Stage 1 of 2, if system is allowed to go
to S3/S4, upon system resume, the
Firmware Update (FWU) tool displays
error A general FW issue has occurred.
Please try reinstalling the Intel ME FW
Tool.
ffected Component
SW.Tools.FwUpdLcl
Impact: IFR firmware update is
unsuccessful if system is allowed to go
to S3/S4 state during update.
Workaround: N/A
Notes:
Reproduction Steps:
1. Run MEFWR.exe and then when
process gets to Stage 1 of 2, put
the system to S3 or S4.
2. Resume system
3. An error will be displayed A
general FW issue has occurred.
Please try reinstalling the Intel ME
FW Tool.
Not a current
requirement
191185 When running client application (e.g.
MEInfo) over MEI and then aborting it
after connection has been established,
the MEI driver resets.
Affected Component SW.HECI
Driver
Impact: May affect operation of other
software including customers which
makes calls to MEI driver and suddenly
stop the application.
Workaround: N/A
Notes:
Reproduction Steps: N/A
N/A
193914 ME Debug viewer displays
[EVT_GRP_CHECKPOINT] &
[EVT_GRP_PWRMGMT] error messages
while running Intel
ME Test Suite,
ME_PM_20.1, 20.4, 20.5, 20.6 and 20.7.
Affected Component
SW.Tools.MEDebug
Impact:
Workaround: N/A
Notes:
Reproduction Steps:
1. Boot system and activate AMT.
2. Boot to OS.
3. Configure ME Debug viewer to
collect log information from SUT.
4. Run Intel
Upgrade Service
Issue # Description Affected Component/Impact / Workaround/Notes
Affected Component
Impact:
Workaround:
Notes:
Reproduction Steps
8.6 Open Not Firmware Related
Issue # Description Affected Component/Impact / Workaround/Notes
Affected Component
Impact:
Workaround:
Notes:
Reproduction Steps
8.7 Open Documentation
Issue # Description Affected Component/Impact / Workaround/Notes
Affected Component
Impact:
Workaround:
Notes:
Reproduction Steps