System Tools User Guide
System Tools User Guide
Intel Confidential
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT
AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY
WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL
PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY,
OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY
APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR
DEATH MAY OCCUR.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the
absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future
definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The
information here is subject to change without notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may cause the product to
deviate from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
All products, platforms, dates, and figures specified are preliminary based on current expectations, and are subject to change
without notice. All dates specified are target dates, are provided for planning purposes only and are subject to change.
This document contains information on products in the design phase of development. Do not finalize a design with this
information. Revised information will be published when the product is available. Verify with your local sales office that you have
the latest datasheet before finalizing a design.
Intel Active Management Technology (Intel AMT) requires activation and a system with a corporate network connection, an
Intel AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a
host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent
upon hardware, setup and configuration. For more information, visit http://www.intel.com/technology/platform-technology/intelamt.
No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software, and a
subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and
functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more
information, visit http://www.intel.com/go/anti-theft.
KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel Core i5 vPro and Core i7 vPro processors with
Intel Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not
supported.
Systems using Client Initiated Remote Access require wired LAN connectivity and may not be available in public hot spots or
"click to accept" locations.
Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced
for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion
or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user.
Intel, Intel vPro, and the Intel logo are trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Copyright 2012, Intel Corporation. All rights reserved.
Intel Confidential
Contents
1
Introduction .......................................................................................................9
1.1
1.2
Preface ............................................................................................................ 17
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
Terminology ............................................................................................9
Reference Documents............................................................................. 15
Overview .............................................................................................. 17
ME8 System Tools Changes ..................................................................... 17
Image Editing Tools ............................................................................... 18
Manufacturing Line Validation Tools ......................................................... 18
Intel ME Setting Checker Tool ................................................................ 18
Operating System Support ...................................................................... 19
Generic System Requirements ................................................................. 19
Error Return .......................................................................................... 20
Usage of the Double-Quote Character (") .................................................. 20
PMX Driver Limitation ............................................................................. 21
3.6
3.6.20
3.6.21
3.6.22
3.6.23
3.6.24
3.6.25
3.6.26
3.6.27
3.6.28
3.6.29
3.6.30
3.6.31
3.6.32
3.6.33
3.6.34
3.6.35
3.6.36
3.6.37
3.6.38
3.6.39
3.6.40
3.6.41
3.6.42
3.6.43
3.6.44
4
5.2
5.3
5.4
5.5
6
Appendix A
Appendix B
B.1
B.2
B.3
B.4
B.5
B.6
Appendix C
Figures
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
6
Figure
Figure
Figure
Figure
Figure
Figure
Figure
Figure
43:
44:
45:
46:
47:
48:
49:
50:
Tables
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Table
Intel Confidential
Revision History
Revision
Description
0.7
Initial Release
03/07/2011
0.8
Alpha Release
05/16/2011
0.9
Alpha 2 Release
07/13/2011
1.0
Beta Release
09/26/2011
8.0.0.1240
10/26/2011
8.0.0.1340
PC Candidate Release
12/14/2011
8.0.0.1351
12/19/2011
8.0.0.1351
PV Release
12/21/2011
8.0.1.1399
01/24/2012
8.0.2.1410
02/14/2012
8.0.3.1427
02/23/2012
8.0.4.1441
03/14/2012
1.1
Final revision
04/02/2012
1.2
06/26/2012
1.3
Correction
07/xx/2012
Date
Intel Confidential
Introduction
Introduction
The purpose of this document is to describe the tools that are used in the platform
design, manufacturing, testing, and validation process.
1.1
Terminology
Acronym/Term
Definition
3PDS
AC
Alternating Current
Agent
API
ASCII
BBBS
BIN
Binary file
BIOS
BIOS-FW
BIST
CCM
CLI
CPT
Cougar Point
CPU
CRB
DHCP
DIMM
DLL
DNS
EC
Embedded Controller
EEPROM
EFI
EHCI
EID
Endpoint ID
Intel Confidential
Introduction
Acronym/Term
End User
Definition
The person who uses the computer (either Desktop or Mobile). In
corporate, the user usually does not have administrator privileges.
The end user may not be aware to the fact that the platform is managed
by Intel AMT.
10
EOP
End Of Post
FCIM
FCSS
FDI
FITC
FLOCKDN
FMBA
FOV
FPSBA
FPT
FPTW
FQDN
FRBA
FW
Firmware
FWUpdate
Firmware Update
G3
A system state of Mechanical Off where all power is disconnected from the
system. A G3 power state does not necessarily indicate that RTC power is
removed.
GbE
Gigabit Ethernet
GMCH
GPIO
GUI
GUID
HECI
(deprecated)
The processor running the operating system. This is different than the
management processor running the Intel ME FW.
Host Service/
Application
HostIF
Host Interface
HTTP
HW
Hardware
AMT
Intel AMT
Intel Confidential
Introduction
Acronym/Term
Definition
IBEN
IBV
ICC
ID
Identification
IDER
INF
Intel AMT
Intel AT
Intel DAL
Intel ME
Intel MEBx
Intel AMT host driver that runs on the host and interfaces between ISV
Agent and the Intel AMT HW.
Intel MEINFO
Intel MEInfoWin
Intel MEManuf
Intel
MEManufWin
ISV
IT User
JEDECID
JTAG
KVM
LAN
LED
LMS
LPC
M0
Intel ME power state where all HW power planes are activated. Host
power state is S0.
Intel Confidential
11
Introduction
Acronym/Term
Definition
M1
Intel ME power state where all HW power planes are activated but the
host power state is different than S0. (Some host power planes are not
activated.) The Host PCI-E* interface is unavailable to the host SW. This
power state is not available in Cougar Point.
M3
Intel ME power state where all HW power planes are activated but the
host power state is different than S0. (Some host power planes are not
activated.) The Host PCI-E* interface is unavailable to the host SW. The
main memory is not available for Intel ME use.
M-Off
MAC address
NM
Number of Masters
NVAR
Named Variable
NVM
Non-Volatile Memory
NVRAM
OCKEN
ODM
OEM
OEM ID
OOB
Out Of Band
OOB interface.
OS
Operating System
OS Hibernate
OS not Functional
12
OVR
Override
PAVP
PC
Personal Computer
PCH
PCI
PCIe*
PDR
PHY
Physical Layer
Intel Confidential
Introduction
Acronym/Term
Definition
PID
Provisioning ID
PKI
PM
Power Management
PRTC
PSK
Pre-Shared Key
PSL
RCS
RCFG
Remote Configuration
RNG
ROM
RPAS
RSA
RTC
S0
A system state where power is applied to all HW devices and the system is
running normally.
S1, S2, S3
A system state where the host CPU is not running but power is connected
to the memory system (memory is in self refresh).
S4
A system state where the host CPU and memory are not active.
S5
A system state where all power to the host system is off but the power
cord is still connected.
SDK
SEBP
SHA
SMB
SMBus
Snooze mode
SOAP
SOL
SPI
SPI Flash
Standby
OS state where the OS state is saved in memory and resumed from the
memory when the mouse/keyboard is clicked.
Sx
Intel Confidential
13
Introduction
Acronym/Term
Definition
SW
Software
System States
Operating System power states such as S0, S1, S2, S3, S4, and S5.
TCP/IP
TLS
UI
User Interface
UIM
UMA
Un-configured
state
The state of the Intel ME FW when it leaves the OEM factory. At this
stage the Intel ME FW is not functional and must be configured.
UNS
UPDPARAM
USB
USBr
UUID
VE
Virtualization Engine
VLAN
VSCC
Windows* PE
WIP
Work in Progress
WLAN
XML
ZTC
14
Intel Confidential
Introduction
1.2
Reference Documents
Document
Document No./Location
FW Bring Up Guide
Release kit
ANACAPA document
PCH EDS
CDI
Release kit
Intel Confidential
15
Introduction
16
Intel Confidential
Preface
Preface
2.1
Overview
This document covers the system tools used for creating, modifying, and writing
binary image files, manufacturing testing, Intel ME setting information gathering,
and Intel ME FW updating. The tools are located in Kit directory\Tools\System
tools. For information about other tools, see the tool's user guides in the other
directories in the FW release.
The system tools described in this document are platform specific in the following
ways:
Panther Point platform All tools in the Panther Point FW release kit are designed
for Panther Point platforms only. These tools do not work properly on any other
legacy platforms (Santa Rosa, Weybridge, vPro, McCreary, and Capella/Piketon).
Tools designed for other platforms also do not work properly on the Panther Point
platform.
Intel vPro platform All features listed in this document are available for Intel
vPro platforms with Intel ME FW 8.0. There are some features that are
specifically designed for the Intel vPro platform and only work on it.
Intel ME Firmware 8.0 SKU A common set of tools are provided for the following
Intel ME FW 8.0 SKUs: 1.5MB Intel ME FW SKU and 5MB Intel ME FW SKU. The
following features are only available for 5MB Intel ME FW SKUs and 1.5MB Intel
ME FW SKU users should generally ignore them:
Intel AMT
Intel ME BIOS Extension (Intel MEBx)
The description of each tool command or option that is not available for
1.5MB Intel ME FW SKU contains a note indicating this.
Intel Upgrade Service has been discontinued. Although this feature has been
discontinued there are still references contained in the Intel ME8 tools.
These
references will be removed in ME9.
NOTE:
2.2
17
Preface
2.3
2.4
2.5
18
Intel Confidential
Preface
2.6
Win* 7 64
Win 8 64
Win* 7 32
Win* Server
2003/2008 32 With
the latest SP
Win* Server
2003/2008 64 With
the latest SP
Win 8 32
Win* XP 64
FITC
Win* XP 32
Win* PE 64
Win* PE 32
EFI
Free DOS
Tools
DRMK DOS
and
Manufacturing
MS DOS
Intel ME
Win* 98 DOS
FPT
MEMANUF
MEINFO
FWUPDLCL
UpdParam
NOTES:
1.
64 bit support does NOT mean that a tool is compiled as a 64 bit application but that
it can run as a 32 bit application on a 64 bit platform.
2.
The Windows 64 bit tools will not function when the OS is configured to use EFI / GPT
boot capabilities.
2.7
Intel Confidential
19
Preface
2.8
Feature Tested
Runs on
Intel ME
device
FPT
FWUpdate
Error Return
Tools always return 0/1 for the error level (0 = success, 1= error). A detail error code
is displayed on the screen and stored on an error.log file in the same directory as the
tools. (See Appendix B for a list of these error codes.)
2.9
this is an example^.
The command shell used to invoke the tools in EFI, DOS and Windows has a built-in
CLI.
The command shell was intended to be used for invoking applications as well as
running in batch mode and performing basic system and file operations. For this
reason, the CLI has special characters that perform additional processing upon
command.
The double-quote is the only character which needs special consideration as input. The
various quoting mechanisms are the backslash escape character (/), single-quotes ('),
and double-quotes ("). A common issue encountered with this is the need to have a
double-quote as part of the input string rather than using a double-quote to define the
beginning and end of a string with spaces.
For example, the user may want these words one two to be entered as a single
string for a vector instead of dividing it into two strings ("one", "two"). In that case,
the entry including the space between the words must begin and end with doublequotes ("one two") in order to define this as a single string.
20
Intel Confidential
Preface
When double-quotes are used in this way in the CLI, they define the string to be
passed to a vector, but are NOT included as part of the vector. The issue encountered
with this is how to have the double-quote character included as part of the vector as
well as bypassed during the initial processing of the string by the CLI. This can be
resolved by preceding the double-quote character with a backslash (\").
For example, if the user wants these words to be input input"string the command
line is: input\"string.
2.10
Intel Confidential
21
3.1
System Requirements
FITC runs on Windows* XP, Windows* Vista, Windows* 7 and Windows* 8. The tool
does not have to run on an Intel ME-enabled system.
3.2
22
Intel Confidential
Intel ME
Descriptor
GbE
PDR
BIOS
Intel ME Applications
Description
This region contains information such as the space allocated for each region
of the flash image, read-write permissions for each region, and a space
which can be used for vendor-specific data. It takes up a fixed amount of
space at the beginning of the flash memory.
Note: This region MUST be locked before the serial flash device is shipped
to end users. Please see 3.6.11 below for more information. Failure to lock
the Descriptor Region leaves the Intel ME device vulnerable to security
attacks.
3.2.1
Intel ME
This region contains code and configuration data for Intel ME applications,
such as Intel AMT technology and Intel AT. It takes up a variable amount
of space at the end of the Descriptor.
GbE
This region contains code and configuration data for an Intel Integrated LAN
(Gigabit Ethernet). It takes up a variable amount of space at the end of the
Intel ME region.
BIOS
This region contains code and configuration data for the entire computer.
PDR
This region lets system manufacturers describe custom features for the
platform.
Intel Confidential
23
3.3
Required Files
The FITC main executable is fitc.exe. The following files must be in the same
directory as fitc.exe:
fitctmpl.xml
newfiletmpl.xml
vsccommn.bin
fitcwizardhelp.chm
fitc.ini
FITC does not run correctly if any of the .xml and .bin files listed above are missing.
FITC creates a blank fitc.ini file if there is no fitc.ini file in the folder.
Note: When using a Newfiletmp.xml from previous kit releases FITc will display a message
to the user that the file being used is older than the version FITc expecting (See example
below).
After the user selects the OK radio button FITc will automatically update the
Newfiletmp.xml with any missing / new or changed variables and pre-populates
those variables with the firmware defaults. Once this is completed the user can then
re-save this new Newfiletmp.xml back in order to retain the updates made by FITc.
24
Intel Confidential
3.4
3.5
3.5.1
3.5.1.1.1
The Goto combo box dropdown allows immediate navigation to any permitted screen
(grayed out means not permitted). When the proper options are enabled, it also
allows the user to build a flash image immediately by navigating to the build screen
and pressing the Build button. Figure 2 below shows the initial Wizard Mode screen
with only two permitted goto options.
Intel Confidential
25
26
Intel Confidential
Figure 3 shows the second Wizard Mode screen, again with only two permitted
options.
Figure 3: Second Wizard Screen Goto Options Invalid Images
Once the proper images are selected, however, as in Figure 4 below, more Goto
options are permitted.
Intel Confidential
27
28
Intel Confidential
The following table indicates permitted pages depending on the options that have
been selected.
Page
N/A
Image Sources
N/A
VSCC Configuration
LAN Configuration
ME Region Disabled
ME Region Disabled
Manageability Application
ME Region Disabled
ME Region Disabled
Anti-Theft Permanently Disabled
DMI/PCIe* Configuration
Thermal Reporting
ME Region Disabled
ICC Profile X
ME Region Disabled
Number of Profiles < X+1
Intel Confidential
29
3.5.1.1.2
Back
This button will allow the user to go back to the previous screen. If the user is looking
at the first screen there will be no previous screen so this button would not be visible.
3.5.1.1.3
Next
This button when selected will progress the wizard to the next screen. If the user is
looking at the last screen there will not be any further progression so this button will
not be visible.
3.5.1.1.4
Finish
This button will exit Wizard Mode and switch to the FITC Advanced mode with the
settings from the Wizard. This button will only appear on the last page of the Wizard.
Everything changed in the Wizard will be saved when switching to the FITC Advanced
mode. To abort changes, select the Cancel button. See section 3.5.1.1.5.
3.5.1.1.5
Cancel
This button will exit the wizard. The settings setup during the wizard will not be saved
and will be lost. Once the build button is selected all the data up-to the build button
being selected will have been saved. For more information regarding the Build button
see Page 49.
3.5.1.1.6
Help
This button displays help text relevant to the screen. An example help screen is
shown in Figure 5
30
Intel Confidential
3.5.2
Screen Progression
3.5.2.1.1
Intel Confidential
31
32
Intel Confidential
3.5.2.1.2
Intel Confidential
33
3.5.2.1.3
34
Intel Confidential
3.5.2.1.4
Intel Confidential
35
3.5.2.1.5
36
Intel Confidential
Intel Confidential
37
3.5.2.1.6
38
Intel Confidential
3.5.2.1.7
Intel Confidential
39
3.5.2.1.8
40
Intel Confidential
3.5.2.1.9
Intel Confidential
41
42
Intel Confidential
Intel Confidential
43
44
Intel Confidential
Intel Confidential
45
46
Intel Confidential
Intel Confidential
47
48
Intel Confidential
Build Button
This button will build the final image that gets generated in the output path indicated
by the user. This will do what FITC Advanced mode does when building. After
completion of the build one of two messages will appear; success or failure (see
Figure 24: Build Completion Notice - Success and Figure 25: Build Completion
Notice - Failure).
Intel Confidential
49
50
Intel Confidential
3.6
3.6.1
Configuration Files
The flash image can be configured in many different ways, depending on the target
hardware and the required FW options. FITC lets the user change this configuration in
a graphical manner (via the GUI). Each configuration can be saved to an XML file.
These XML files can be loaded at a later time and used to build subsequent flash
images.
3.6.2
3.6.3
Note: The user can also open a file by dragging and dropping a configuration file into the
main window of the application.
3.6.4
Saving a Configuration
To save the current configuration in an XML file:
Choose File > Save or File > Save As; the Save File dialog appears if the
configuration has not been given a name or if File > Save As was chosen.
4. Select the path and enter the file name for the configuration.
5. Click Save.
3.6.5
Environment Variables
A set of environment variables is provided to make the image configuration files more
portable. The configuration is not tied to a particular root directory structure because
all of the paths in the configuration are relative to environment variables. The user
can set the environment variables appropriate for the platform being used, or override
the variables with command line options.
It is recommended that the environment variables be the first thing that the user sets
when working with a new configuration. This ensures that FITC can properly substitute
environment variables into paths to keep them relative. Doing this also speeds up
configuration because many of the Open File dialogs default to particular
environment variable paths.
Intel Confidential
51
52
Intel Confidential
2. Click the
button next to an environment variable and select the directory
where that variable's files will be stored; the name and relative path of that
directory appears in the field next to the variable's name.
3. Repeat Step 2 until the directories of all relevant environment variables have been
defined.
4. Click OK.
Note: The environment variables are saved in the application's INI file, not the XML
configuration file. This allows the configuration files to be portable across different computers
and directory structures.
Intel Confidential
53
3.6.6
Build Settings
FITC lets the user set several options that control how the image is built. The options
that can be modified are described in Table 4.
To modify the build setting:
1. Choose Build > Build Settings; a dialog appears showing the current build
settings.
2. Modify the relevant settings in the Build Settings dialog.
3. Click OK; the modified build settings are saved in the XML configuration file.
54
Description
Output path
The path and filename where the final image should be saved after it is
built. (Note: Using the $DestDir environment variable makes the
configuration more portable.)
Generate intermediate
build files
Creates the smallest flash image possible. (By default, the application
uses the flash component sizes in the Descriptor to determine the
image length.)
Flash Block/Sector
Erase Size
All regions in the flash conform to the 4KB sector erase size. It is
critical that this option is set correctly to ensure that the flash regions
can be properly updated at runtime.
Asymmetric Flash
Lets the user specify a different sector erase size for the upper and
lower flash block. Only 4KB erase is supported for Intel ME FW.
This option also lets user modify the flash partition boundary address.
Intel Confidential
End of manufacturing bit is simply a byte in the image. This is not an NVAR, or FOV.
In previous generation, when creating an image, the user can set the global valid bit
automatically based on BIOS being set to production Master Access section, but to
allow some customers not to set it, we show this checkbox. This checkbox only does
something if:
Intel ME manufacturing done bit is not set, BIOS is not set to production FITc will
not set Intel ME manufacturing done bit independent of this checkbox
Intel ME manufacturing done bit is not set, BIOS is set to production, checkbox is
unchecked FITc will set Intel ME manufacturing done bit
Intel ME manufacturing done bit is not set, BIOS is set to production, checkbox is
checked FITc will not set Intel ME manufacturing done bit
Intel ME manufacturing done bit set will stay set
A dumped image is never reflected in this checkbox it does not show the actual
value of Intel ME manufacturing done bit. It shows what should be done in the next
build. But if Intel ME manufacturing done bit is set, this checkbox will never uncheck
it.
Intel Confidential
55
3.6.7
56
Intel Confidential
3.6.8
3.6.9
3.6.10
Intel Confidential
57
3. Double-click Number of Flash Components in the right pane (see Figure 31);
the Flash Components dialog appears.
4. Enter the number of flash components (valid values are 0, 1 or 2).
5. Click OK; the parameter is updated.
58
Intel Confidential
3.6.11
PDR
Intel ME
GbE
BIOS
Descriptor
Intel ME
None/Read/Write
None/Read/Write
None/Read/Write
None/Read/Write
GbE
None/Read/Write
None/Read/Write
None/Read/Write
None/Read/Write
BIOS
None/Read/Write
None/Read/Write
None/Read/Write
None/Read/Write
There are three parameters in the Descriptor that specify access for each chipset. The
bit structure of these parameters is shown below.
Key:
0 denied access
1 allowed access
Intel Confidential
59
PDR
GbE
Intel
ME
BIOS
Desc
Bit Number
Bit Value
0/1
0/1
0/1
NC
0/1
Write Access
Unused
PDR
GbE
Intel
ME
BIOS
Desc
Bit Number
Bit Value
0/1
0/1
0/1
NC
0/1
Example:
If the CPU/BIOS needs read access to the GbE and Intel ME and write access to
Intel ME, then the bits are set to:
Read Access 0b 0000 1110 (0x 0E in hexadecimal)
Write Access 0b 0000 0110 (0x 06 in hexadecimal)
To set these access values in FITC:
1. Select Descriptor Region > Master Access, Manageability Engine and GBE
> CPU/BIOS in the left pane; the access parameters are listed in the right pane
(see Figure 33).
2. Double-click on each parameter and set its access value in one of the following
ways:
To generate an image for debug purposes or to leave the SPI region open:
select 0xFF for both read and write access in all three sections.
To generate a production image with BIOS access to the PDR region select
read access 0x0B and write access 0x0A.
Note: These settings should only be used if the PDR region is
implemented.
To lock the SPI in the image creation phase: select the recommended
setting for production (e.g., select 0x0D for Intel ME read access and
0x0C for Intel ME write access).
Note: If all Read/Write Master access settings for Intel ME are set to production platform
values, then the Intel ME manufacturing mode done(Global Lock) bit is automatically set. If
the Intel ME manufacturing mode done (Global Lock) bit is set, the FOV mechanism is not
available.
60
Intel Confidential
3.6.12
Intel Confidential
61
3.6.13
VSCC Table
This section is used to store information to setup flash access for Intel ME. This does
not have any effect on the usage of the FPT. If the information in this section is
incorrect, Intel ME FW may not communicate with the flash device. The
information provided is dependent on the flash device used on the system. (For more
information, see the Intel 7 Series Express Chipset SPI Programming Guide, Section
6.4.)
3.6.14
3. Enter a name into the Entry Name field. (Note: To avoid confusion it is
recommended that each table entry name be unique. There is no checking
mechanism in FITC to prevent table entries that have the same name and no error
message is displayed in such cases.)
4. Click OK; the new table is listed in the left pane under VSCC Table and user can
enter into it the values for the flash device. (See Figure 36, which shows the
parameters of a new VSCC table.)
Note: The VSCC register value will be automatically populated by FITc using the
vscccommn.bin file the appropriate information for the Vendor and Device ID.
Note: If the descriptor region is being built manually the user will need to reference the
VSCC table information for the parts being supported from the manufacturers serial flash
data sheet. The Panther Point SPI Programming Guide should be used to calculate the VSSC
values.
62
Intel Confidential
3.6.15
3.6.16
3.6.17
Note: If the user specifies in the PCH Strap Section (0) that Intel ME must boot from flash,
the loaded FW must contain a ROM Bypass section. If the FW does not contain a ROM bypass
section this field is set as read-only and cannot be changed.
3.6.18
Configuration
The Configuration parameters are visible and editable after a valid Intel ME FW
image has been loaded.
If any of the parameters do not have the Intel-recommended value, the offending row
is highlighted yellow but no errors are reported. The highlighted yellow is designed to
draw attention to these values to ensure these parameters are set correctly.
3.6.19
Intel ME Section
This section describes Intel ME FW Kernel parameters. (See the FW Bringup guide for
general information and see Appendix for more details.)
Intel Confidential
63
The Intel ME section lets the user define the computer's manageability features. The
parameter values can be found in the Help Text next to the parameter value as shown
in Figure 37.
Figure 37: Intel ME Section
3.6.20
64
Intel Confidential
3.6.21
If the Power Package Supported value is set to false, that specific power package
cannot be selected and is not visible to the end user.
The selected Default Power Package must be supported. This is the value that is
selected when the system is shipped. This value affects energy star compliance it is if
not set correctly.
3.6.22
Features Supported
The Features Supported section determines which features are supported by the
system. If a system does not meet the minimum hardware requirements, no error
message is given when programming the image. (See the FW Bringup guide for
general information and see Appendix E for more details.)
65
66
Intel Confidential
No
No
No
No
No
No
No
Enabled
B65
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
Yes
No
Enabled
QM67
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
No
No
No
No
No
No
No
Enabled
Intel Confidential
67
No
No
No
No
No
No
No
68
Enabled
Intel Confidential
3.6.23
H67
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
Yes
No
Enabled
Z68
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
No
Yes
Yes
No
Disabled
P67
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
Yes
Yes
Intel Confidential
Yes
69
No
Disabled
H61
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
No
Yes
Yes
No
Disabled
HM65
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
No
70
Enabled
Intel Confidential
3.6.24
Q77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
No
No
No
No
No
No
No
Enabled
Q75
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
No
Enabled
B75
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
No
Intel Confidential
71
Enabled
QM77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
No
No
No
No
No
No
No
Enabled
QS77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
No
No
No
No
No
No
No
Enabled
HM77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
No
No
No
No
No
No
Enabled
UM77
72
Intel Confidential
Yes
No
No
No
No
No
Enabled
C216
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
No
No
No
No
No
No
No
Enabled
Intel Confidential
73
3.6.25
H77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
No
Enabled
Z77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
No
Yes
No
No
Disabled
Z75
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
No
Yes
No
No
74
Disabled
Intel Confidential
H71
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
No
Yes
No
No
Disabled
UM77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
Yes
No
Yes
No
No
Disabled
HM77
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
No
Enabled
HM76
Intel Confidential
75
Yes
No
No
No
No
No
Enabled
HM75
Enable Intel (R) Standard Manageability; Disable Intel(R) AMT
Yes
No
No
No
No
No
76
Enabled
Intel Confidential
3.6.26
3.6.27
Intel Confidential
77
3.6.28
3.6.29
3.6.30
3.6.31
78
Intel Confidential
3.6.32
3.6.33
3.6.34
Intel Confidential
79
3.6.35
3.6.36
3.6.37
3.6.38
80
Intel Confidential
3.6.39
3.6.40
Each region is added to the full SPI image in the order in which they appear in the list.
The order of the regions in the full SPI image created from the regions listed in Figure
45 in order immediately after the Descriptor Region:
1. BIOS Region
2. GbE Region
3. ME Region.
Intel Confidential
81
This can be useful when programming a system with two SPI devices. It is possible to
change the order of the PDR, GbE, ME and BIOS regions by clicking and dragging the
region to the required location. Figure 45 shows that the BIOS is placed on the first
SPI device and the Intel ME Region is placed on the second SPI device. The length of
each region and the order determines if that region is on the first or second SPI
device.
3.6.41
Note: It is also possible to decompose an image by simply dragging and dropping the file
into the main window. When decomposing an image, there are some NVARs will not be able
to be decomposed by FITC. FITC will use Intel default value instead. User might want to
check the log file to find out which NVARs were not parsed.
3.6.42
82
Description
<XML_file>
Used when generating a flash image file. A sample xml file is provided
along with the FITC. When an xml file is used with the /b option, the flash
image file is built automatically.
<Bin File>
Decomposes the BIN file. The individual regions are separated and placed in
a folder with the same name as the BIN file.
-H or -?
Intel Confidential
Option
-B
Description
Automatically builds the flash image. The GUI does not appear if this flag is
specified. This option causes the program to run in auto-build mode. If
there is an error, a valid message is displayed and the image is not built.
If a BIN file is included in the command line, this option decomposes it.
-O <file>
Path and filename where the image is saved. This command overrides the
output file path in the XML file.
-ROMBYPASS
-ME <file>
Overrides the binary source file for the Intel ME Region with the specified
binary file.
-GBE <file>
Overrides the binary source file for the GbE Region with the specified binary
file.
-BIOS <file>
Overrides the binary source file for the BIOS Region with the specified
binary file.
-PDR <file>
Overrides the binary source file for the PDR Region with the specified binary
file.
-I
<enable|disable>
-W <path>
-S <path>
-D <path>
-U1 <value>
Overrides the $UserVar1 environment variable with the value specified. Can
be any value required.
-U2 <value>
Overrides the $UserVar2 environment variable with the value specified. Can
be any value required.
-U3 <value>
Overrides the $UserVar3 environment variable with the value specified. Can
be any value required.
-FLASHCOUNT
<0, 1 or 2>
-FLASHSIZE1 <0,
1, 2, 3, 4 or 5>
Overrides the size of the first flash component with the size of the option
selected as follows:
0 = 512KB
1 = 1MB
2 = 2MB
3 = 4MB
4 = 8MB
5 = 16MB.
Intel Confidential
83
Option
-FLASHSIZE2 <0,
1, 2, 3, 4 or 5>
Description
Overrides the size of the first flash component with the size of the option
selected as follows:
0 = 512KB
1 = 1MB
2 = 2MB
3 = 4MB
4 = 8MB
5 = 16MB.
3.6.43
-SKU <value>
This option is used to change the SKU configuration being built. Use the
words Q77, QM77, etc. as a reference to a SKU from the drop-down menu
(e.g., /sku Q77).
-save
3.6.44
Note: If using paths defined in the KIT, be sure to put "" around the path as the spaces
cause issues.
Take an existing (dt_ori.bin) image and put in a new BIOS binary:
Fitc.exe /b /bios "..\..\..\Image Components\BIOS\BIOS.ROM" <file.bin or
file.xml>
84
Intel Confidential
Intel Confidential
85
4.1
System Requirements
The DOS version of FPT (fpt.exe) runs on MS DOS 6.22, DRMKDOS, and FreeDOS.
The EFI version of FPT (fpt.efi) runs on a 64-bit EFI environment.
The Windows version (fptw.exe) requires administrator privileges to run under
Windows OS. The user needs to use the Run as Administrator option to open the
CLI in Windows* Vista 64/32 bit, Windows* 7 64/32 bit and Windows* 8 64/32 bit.
The Windows 64 bit version (fpt64.exe) is designed for running in native 64 bit OS
environment which does not have 32 bit compatible mode available for example
Win*PE 64.
FPT requires that the platform is bootable (i.e. working BIOS) and an operating
system to run on. It is designed to deliver a custom image to a computer that is
already able to boot and is not a means to get a blank system up and running. FPT
must be run on the system with the flash memory to be programmed.
One possible workflow for using FPT is:
1. A pre-programmed flash with a bootable BIOS image is plugged into a new
computer.
2. The computer boots.
3. FPT is run and a new BIOS/Intel ME/GbE image is written to flash.
4. The computer powers down.
5. The computer powers up, boots, and is able to access its Intel ME/GbE
capabilities as well as any new custom BIOS features.
86
Intel Confidential
4.2
Descriptor
Intel ME
GbE
PDR
BIOS
Intel ME Applications
Description
Region that takes up a fixed amount of space at the beginning of the flash
memory. Contains information such as:
Space allocated for each region of the flash image.
Read/write permissions for each region.
A space that can be used for vendor-specific data.
4.3
Intel ME
GbE
BIOS
PDR
Intel Confidential
87
In order for tools to work under the Windows* PE environment, you must manually
load the driver with the .inf file in the Intel MEI driver installation files. Once you
locate the .inf file you must use the Windows* PE cmd drvload HECI.inf to load it
into the running system each time Windows* PE reboots. Failure to do so causes
errors for some features.
Table 10: FPT OS requirements
FPT version
Target OS
Support Drivers
FPT.EXE
DOS
None
FPTw.EXE
idrvdll.dll, pmxdll.dll
FPTW64.EXE
idrvdll32e.dll, pmxdll32e.dll
Note: In the Windows environment for operations involving global reset you should add a
pause or delay when running FPTW using a batch or script file.
4.4
4.5
4.6
88
Intel Confidential
4.6.1
Note: Pulling out DIMM from slot 0 or leaving the Intel ME region empty to stop Intel ME
are not valid options for current generation platforms.
4.7
Description
Displays a list of the supported variables.
Creates an empty text file that lets the user update multiple fixed offset
variables. The variables have the following format in the text file:
<Parameter name> = <Value>
In the created text file:
fpt.exe U IN
<Text file>
Updates the fixed offset variables with the values as they are entered in the
text file.
See Appendix A for a description of all the Fixed Offset Variable parameters.
4.8
Usage
The EFI, DOS and Windows versions of the FPT can run with command line options.
To view all of the supported commands: Run the application with the -? option.
Intel Confidential
89
The commands in EFI, DOS and Windows versions have the same syntax. The
command line syntax for fpt.efi, fpt.exe and fptw.exe is:
FPT.exe [-H|?] [-VER] [-EXP] [-VERBOSE] [-Y] [-P] [-LIST] [-I] [-F]
[-ERASE] [-VERIFY] [-D] [-DESC] [-BIOS] [-ME] [-GBE] [-PDR] [-SAVEMAC]
[-SAVESXID] [-C] [-B] [-E] [-ADDRESS|A] [-LENGTH|L] [-FOVS] [-CFGGEN]
[-U] [-O][-IN] [-N] [-ID] [-V] [-LOCK] [-DUMPLOCK] [-PSKFILE]
[-CLOSEMNF][-GRESET] [-PAGE] [-SPIBAR] [-R] [-VARS] [-COMMIT]
[-COMPARE][-HASHED]
Table 12: Command Line Options for fpt.efi, fpt.exe and fptw.exe
Option
Description
-VER
-EXP
-VERBOSE
[<file>]
-Y
Bypasses Prompt. FPT does not prompt user for input. This confirmation will
automatically be answered with "y".
-P <file>
Flash parts file. Specifies the alternate flash definition file which contains the
flash parts description that FPT has to read. By default, FPT reads the flash
parts definitions from fparts.txt.
-LIST
Supported Flash Parts. Displays all supported flash parts. This option reads
the contents of the flash parts definition file and displays the contents on the
screen.
-I
Info. Displays information about the image currently used in the flash.
-F <file>
<NOVERIFY>
Flash. Programs a binary file into an SPI flash. The user needs to specify the
binary file to be flashed. FPT reads the binary, erases the flash, and then
programs the binary into the flash. After a successful flash, FPT verifies that
the SPI flash matches the provided image. Without specify the length with L
option, FPT will use the total SPI size instead of an image size.
The NOVERFY sub-option *must* follow the file name. This will allow flashing
the SPI without verifying the programming was done correctly. The user will
be prompted before proceeding unless -y is used.
90
-ERASE:
Block Erase. Erases all the blocks in a flash. This option does not use the chip
erase command but instead erases the SPI flash block by block. This option
can be used with a specific region argument to erase that region. This option
cannot be used with the f, -b, -c, -d or verify options.
-VERIFY <file>:
Verify. Compares a binary to the SPI flash. The image file name has to be
passed as a command line argument if this flag is specified.
-D <file> :
Dump. Reads the SPI flash and dumps the flash contents to a file or to the
screen using the STDOUT option. The flash device must be written in 4KB
sections. The total size of the flash device must also be in increments of 4KB.
-DESC:
-BIOS:
Read/Write BIOS region. Specifies that the BIOS region is to be read, written,
or verified. Start address is the beginning of the region.
Intel Confidential
Option
Description
-ME:
-GBE:
Read/Write GbE region. Specifies that the GbE region is to be read, written,
or verified. The start address is the beginning of the region.
-PDR:
Read/Write PDR region. Specifies that the PDR region is to be read, written,
or verified. The start address is the beginning of the region.
-C:
Chip erase. Erases the contents of SPI flash device(s). This function does NOT
erase block by block.
-B:
Blank Check. Checks whether the SPI flash is erased. If the SPI flash is not
empty, the application halts as soon as contents are detected. The tool
reports the address at which data was found.
-E:
Skip Erase. Does not erase blocks before writing. This option skips the erase
operation before writing and should be used if the part being flashed is a
blank SPI flash device.
-A<value>, ADDRESS
<value>
-L <value>,
LENGTH
<value>
-FOVS:
-U:
Update. Updates the FOVs in the flash. The user can update the multiple
FOVs by specifying their names and values in the parameter file. The
parameter file must be in an INI file format (the same format generated by
the cfggen command). The -in <file> option is used to specify the
input file.
-O <file>
-IN <file>
Input File. The file used by FPT for FOV input. This option flag must be
followed by a text file (i.e., fpt u in FPT.cfg). The tool updates the
FOVs contained in the text file with the values provided in the input file.
User can also use FPT cfggen to generate this file.
-N <value>
Name. Specifies the name of the FOV that the user wants to update in the
image file or flash. The name flag must be used with Value (-v).
-ID <value>
ID. The names of certain FOVs are quite lengthy. This option lets the user
update the FOV by providing its unique identification number instead of its
name. The ID for each FOV is specified in the configuration file.
-V <value>
Value. Specifies the value for the FOV variable. The name of variable is
specified in the Name flag. The Value flag must follow the Name flag.
-LOCK:
Region Lock. Sets the SPI flash region access to the Intel recommended
values (see Table 14)
-DUMPLOCK:
Dump Lock Settings. Displays the current lock settings on the screen. The
lock settings are read from the descriptor region.
Intel Confidential
91
Option
-PSKFILE
<file>
Description
PID/PPS/Password pair file. Specifies the input file that contains the one or
more PID/PPS/Password key value pairs. This option is used to update the
PID, PPS, and Password FOVs whose values are read from the input file.
This option only support version 1 FiletypeHeader UUID
-CLOSEMNF
<NO> <PDR>:
-GRESET <NO>
:
Global Reset. FPT performs a global reset. On mobile platforms this includes
driving GPIO30 low. Mobile platforms require a SUS Well power-down
acknowledge-driven low before the global reset occurs or the platform may
not boot up from the reset.
The "NO" afterwards disables the driving of GPIO30 for mobile SKUs.
92
-SAVEMAC
This option is used to save the Intel GBE MAC address when re-flashing the
SPI image.
-SAVESXID
-CFGGEN
FOV Input file generation option. This creates a file which can be used to
update the FOVs. If no file name is specified the default name FPT.CFG will
be used.
-SPIBAR:
Display SPI BAR. FPT uses this option to display the SPI BAR.
-R <name>
NVAR Read. FPT uses this option to read a variable stored as a NVAR in the
FW. The value of the variable is displayed. By default, all non- secure
variables are displayed in clear-text and secure NVAR will be displayed in
HASH. The -hashed option can be used to display the hash of a value
instead of the clear-text value.
-VARS:
Display Supported Variables. FPT uses this option to display all variables
supported for the -R and -COMPARE commands.
Intel Confidential
Option
Description
-COMMIT:
Commit. FPT uses this option to commit FOVs changes to NVAR and cause
relevant reset accordingly If no pending variable changes are present, Intel
ME does not reset and the tool displays the status of the commit operation.
-COMPARE
<file>
NVAR Compare. FPT uses this option to compare a NVAR with the expected
value filled in a text file. The compare entry should have the following
format: "<name>" = <value>
Note: <value> should have the form "xx ", where xx is a hexadecimal value.
Each byte must be separated by a space and start with the least significant
followed by the next significant byte.
-PAGE
Pauses the screen when a page of text has been reached. Hit any key to
continue.
-HASHED:
Hash Variable Output. FPT uses this option to distinguish whether the
displayed output is hashed by the FW. For variables that can only be returned
in hashed form (such as the Intel MEBx password), this option has no effect
the data displayed is hashed regardless.
Other FPT
Action
ME
Mfg
Done
bit set
Flash
Access
set to
Intel rec
values
ME Mfg
Mode
ME
Mfg
Done
bit set
Flash
Access set
to Intel
rec
values?
ME Mfg
Mode
FPT
return
value
**
Global
Reset
No
No
Enabled
Yes
Yes
Disabled
Yes
No
Yes
Enabled
No
Yes
Enabled
No
Yes
No
Enabled
Yes
Yes
Disabled
Yes
Yes
Yes
Disabled
Yes
Yes
Disabled
No
** Return value 0 indicates successful completion. In the second case, FPT closemnf returns
1 (= error) because it is unable to set the ME Mfg Done bit, because flash permissions are
already set to Intel recommended values (host cannot access ME Region).
Intel Confidential
93
GbE
BIOS
0b 0000 0011 = 0x0B
0b 0001 1011 = 0x1B
BIOS access to PDR
Write
4.9
94
Intel Confidential
; OEMCustomCert1 Certificate
; All data is required to update the certificate.
; See the Tools Users Guide for detailed explanation
; of required data and format.
OEMCustomCert1 IsActive
= 0x01
OEMCustomCert1 FriendlyName = MyCert
OEMCustomCert1 RawHashFile
= 23f6c781c37cbce320ec16835f43adfdaae79fa
Intel Confidential
95
4.10
Fparts.txt File
The fparts.txt file contains a list of all flash devices that are supported by FPT. The
flash devices listed in this file must contain a 4KB erase block size. If the flash device
is not listed, the user will receive the following error:
Intel (R)
Copyright
Platform:
Error 75:
If the device is not located in fparts.txt, the user is expected to provide information
about the device, inserting the values into fparts.txt in same format as is used for
the rest of the devices. Detailed information on how to derive the values in fparts.txt
is found in the Intel 7 Series Chipset SPI Programming Guide. The device must have
a 4KB erase sector and the total size of the SPI Flash device must be a multiple of
4KB. The values are listed in columns in the following order:
Display name
Device ID (2 or 3 bytes)
Device Size (in bits)
Block Erase Size (in bytes - 256, 4K, 64K)
Block Erase Command
Write Granularity (1 or 64)
Unused
Chip Erase Command.
4.11
Examples
The following examples illustrate the usage of the EFI and DOS versions of the tool
(fpt.efi and fpt.exe respectively). The Windows version of the tool (Fptw.exe) behaves
in the same manner apart from running in a Windows environment.
96
Intel Confidential
4.11.1
4.11.2
x.x.x.xxxx
Intel Confidential
97
4.11.3
4.11.4
x.x.x.xxxx
4.11.5
x.x.x.xxxx
Intel Confidential
Intel Confidential
99
4.11.6
x.x.x.xxxx
4.11.7
x.x.x.xxxx
100
Intel Confidential
4.11.8
x.x.x.xxxx
4.11.9
x.x.x.xxxx
Intel Confidential
101
ID:0xEF4017
Please note that only r (get command) supports the hashed optional command
argument. When hashed is used, variable value will be returned in hashed format,
otherwise it will be returned in clear txt. There are a few exceptions in the case of
variables MEBxPassword, PID and PPS, their value will be always returned in hashed
format regardless hashed is used or not. This is primarily because of security
concern.
102
Intel Confidential
4.11.10
FPT verbose compare vars.txt compares variables with suggested values in vars.txt,
and report result on the screen. Vars.txt can have the following data with verbose
information: FPT VARS can be used to get the VAR list for the platform and get the
value/format from FITC advanced mode. There are settings in the ME which are
stored encrypted. Users will not be able to compare them using clear text values.
Please use FPT R option to read the hash value of those settings and use them as
baseline for the expected value.
"MEBxPassword" = 76 3C BE 3E B5 75 5F 6D 2D 5D 94 43 FD 79 A1 9D
9C 87 F8 FF 0E 6C 59 6F D2 17 37 13 5B
"OEMSkuRule" = EF DC EE 0F
"FeatureShipState" = EF FF EE 03
"OEM_TAG" = 78 56 34 12
"PID" = 8F DE B9 92 C3 88 03 71 12 A9 A7 3D FC 18 80 78 64 58 0A
19 54 EF 6A 9F 33 F9 74 93 8C
"PPS" = 1A D3 16 1B A1 84 9A 7E 65 9E FB 67 1D 39 8E C0 06 92 81
FB E4 09 1F 73 27 85 20 84 88
"USBrSettings" = 0B
"LAN Well Power Config" = SLP_LAN#(MGPIO3)
"WLAN Well Power Config" = Disabled
"Debug Si Features" = 00 00 00 00
"Prod Si Features" = 00 00 00 00
"M3 Power Rails Availability" = True
"HECI ME Region Unlockable" = True
"Sub System Vendor ID" = 00 00
"FW Update OEM ID" = 12345678-AABB-CCDD-EEFF-55AA11223344
"PROC_MISSING" = No onboard glue logic
"Power Package 1" = True
"Power Package 2" = True
"Default Power Package" = Power Package 2
"Enable Intel(R) Standard Manageability; Disable Intel(R) AMT" =
"Manageability Application Permanently Disabled?" = No
"PAVP Permanently Disabled?" = No
"KVM Permanently Disabled?" = No
"TLS Permanently Disabled?" = No
"Intel(R) Anti-Theft Technology Permanently Disabled?" = No
"Manageability Application Enable/Disable" = Enabled
"BIOS Reflash Capable" = False
"Boot into BIOS Setup Capable" = False
"Pause during BIOS Boot Capable" = False
"USBr EHCI 1 Enabled" = 11b Enabled
"USBr EHCI 2 Enabled" = 10b Disabled
"PrivacyLevel" = Default
"Host Based Setup and Configuration" = True
"Allow Unsigned Assert Stolen" = False
"Intel(R) Anti-Theft BIOS Recovery Timer" = Disabled
"MEBx Password Policy" = 00
"Hash 0 Active" = True
"Hash 0 Friendly Name" = VeriSign Class 3 Primary CA-G1
Intel Confidential
54 D2 D5
E1 D9 E4
67 4D 76
No
103
"Hash 0 Stream" = 74 2C 31 92 E6 07 E4 24 EB 45 49 54 2B E1 BB C5 3E 61
74 E2
"ODM ID used by Intel(R) Service" = <hashed value>
4.11.11
;
;
;
;
;
;
on the line.
104
Intel Confidential
;
;
;
MEBxPassword =
DefPwrPackage =
OEMSkuRule:
;
below and bit-wise entries are mutually exclusive.
for
Entering a value
;
the complete FOV will cause the program to ignore any bit-wise
entries.
;
;
"NoChange", or no value at all (i.e. blank). The values are not case
;
sensitive. Invalid bit-wise values will cause FPT to display a
warning
;
;
OEMSkuRule =
Enable Intel (R) Standard Manageability; Disable Intel (R) AMT =
Manageability Application =
Intel (R) Anti-Theft Technology =
PAVP
Intel Confidential
105
TLS
FeatureShipState:
;
below and bit-wise entries are mutually exclusive.
for
Entering a value
;
the complete FOV will cause the program to ignore any bit-wise
entries.
;
;
"NoChange", or no value at all (i.e. blank). The values are not case
;
sensitive. Invalid bit-wise values will cause FPT to display a
warning
;
;
FeatureShipState =
Manageability Application =
SetWLANPowerWell =
OEM_TAG =
PID =
PPS =
MEIdleTimeout =
;
106
OEMCustomCert1 Certificate
Intel Confidential
OEMCustomCert1 IsActive
OEMCustomCert1 FriendlyName
OEMCustomCert1 RawHashFile
OEMCustomCert2 Certificate
OEMCustomCert2 IsActive
OEMCustomCert2 FriendlyName
OEMCustomCert2 RawHashFile
OEMCustomCert3 Certificate
OEMCustomCert3 IsActive
OEMCustomCert3 FriendlyName
OEMCustomCert3 RawHashFile
USBrSettings =
Privacy/SecurityLevel =
ODM_ID =
Intel Confidential
107
SystemIntegratorId =
ReservedId =
ATFPOPHard =
ATFPOPSoft =
108
Intel Confidential
5.1
Windows* PE Requirements
In order for tools to work under the Windows* PE environment, you must manually
load the driver with the .inf file in the Intel MEI driver installation files. Once you
locate the .inf file you must use the Windows* PE cmd drvload HECI.inf to load it
into the running system each time Windows* PE reboots. Failure to do so causes
errors for some features.
5.2
Intel Confidential
109
5.3
Usage
The DOS version of the tool can be operated using the same syntax as the Windows
version. The Windows version of the tool can be executed by:
MEMANUF [-EXP] [-H|?] [-VER] [-S0] [-F] [-TEST] [-NETON]
[-NETOFF] [-NOWLAN][-WLAN] [-EOL] [-CFGGEN] [-VERBOSE] [-PAGE] [NO3G][-3G]
[-NOGFX][-GFX] [-NOLAN][-LAN]
Description
There are differences depending on the firmware SKU type the system is
running on:
If BIST is disabled in the Intel ME Boot: The first time running Intel
MEManuf, since there is no M3 test result stored in SPI, the tool will request
the FW to run a complete BIST which includes a power reset at the end of the
test for the DOS version and a Hibernation for the Windows version. This
power reset is only host side power cycle that triggered by Intel ME. When
host resets, Intel ME FW will transition from M0 to M3, and then attempt
automatically transition back from M3 to M0 along bringing host back to S0.
Once host is booted back into OS, user needs to run the tool again in order to
run runtime BIST and retrieve the test result.
If BIST is enabled in the Intel ME Boot: If there is no M3 test result, the tool
will report error and request user to use test to run a full BIST. If there is
M3 test result, the tool will execute the runtime BIST and report the result.
If running on a 1.5MB SKU image, the tool will request the FW to run a
complete BIST which doesnt involve any power transition at the end of the
test. Test result will be reported back right after the test is done and cleared.
If BIST test result isnt displayed after BIST test is done, the tool needs to be
run again (with or without any BIST related argument combinations) to
retrieve the result, once test result is displayed, it will be cleared.
Tool is capable of remembering whether/what tests (including host based
tests) have been run from previous invocation. Host based tests will be run
for all cases (whether its retrieving test result or run the actual BIST).
Currently there are two host based tests; they are VSCC Table validation
check and ICC data check.
110
-EXP
-H or -?
-VER
-S0
-F <filename>
-TEST
Intel Confidential
Option
-NETON
Description
Note: This option is not applicable for 1.5MB Intel ME FW SKU.
This option re-enables the integrated GbE wired/wireless LAN interface so
that network traffic can go in/out of it. If Intel AMT is disabled, "Error 9257:
Cannot run the command since Intel AMT is not available" is returned.
-NETOFF
-NOWLAN
-S0 can only be used on the platform which Intel AMT is present and can be
enabled in the field.
-WLAN
Intel Confidential
111
Option
-EOL
<Var|Config>
-F <filename>
Description
This option runs several checks for the use of OEMs to ensure that all settings
and configurations have been made according to Intel requirements before
the system leaves the manufacturing process. The check can be configured
by the customer to select which test items to run and their expected value
(only applicable for Variable Values, FW Version, BIOS Version, and Gbe
Version). The sub option config or var is optional. Using -EOL without a
sub option is equivalent to the EOL config. VSCC test and ICC data check
are performed for all options.
Intel MEMANUF Sx test will require system is capable to enter sleep state,
keep pinging the platform with network package and keep the system up will
make the test failed.
Host based tests
ME/BIOS VSCC validation, Intel MEManuf verifies that flash SPI ID on the
system is described in VSCC table. If found, VSCC entry for relevant SPI part
should match the known good values that pre-populated in the file.
Intel ME state check, Intel MEManuf verifies Intel ME is in normal state.
This is done by checking the value of 4 fields (initialization state, mode of
operation, current operation state, and error state) in FW status register1. If
any of these fields indicates Intel ME is in abnormal state, Intel MEManuf
will report error without running BIST test.
ICC data check, Intel MEManuf verifies that valid OEM ICC data is present
and programmed accordingly. This is done by checking FW status register2
ICC bits (which are bit 1 and 2 equal to 3).
Intel MEMANUF EOL Check.)
When f flag is used along with a file name, the tool will load the file as the
configuration file, instead of using MEManuf.cfg.
112
-CFGGEN
<filename>
Use this option along with a filename to generate a default configuration file.
This file (with or without modification) can be used for the -EOL option.
Rename it MEManuf.cfg before using it. It is highly recommended to use
this option to generate a new MEManuf.cfg with an up-to-date variable
names list before using the Intel MEManuf End-Of-Line check feature.
-VERBOSE
<file>
PAGE
When it takes more than one screen to display all the information, this option
lets the user pause the display and then press any key to continue on to the
next screen.
-NO3G
-3G
-NOGFX
-GFX
Intel Confidential
Option
-NOLAN
Description
Note: This option is not applicable for 1.5MB Intel ME FW SKU.
This option only applies to the AMT test so that the user can skip the wired
LAN NIC test if there is no wired LAN NIC attached to the hardware.
Note:
-S0 can only be used on the platform which Intel AMT is present and can be
enabled in the field.
-LAN
Note: The KVM test will be skipped if the platform being tested contains both internal
and external GFX and BIOS has disabled internal GFX.
Note: When running Intel MEManuf without the no3G switch on platforms with 3G
cards populated the user needs to wait 15 seconds after the system restarts before
attempting to retrieve the testing results otherwise the 3G test may fail.
Intel Confidential
113
No
option
Consumer
SKU
Run runtime
BIST test
(with no
reset)
Run runtime
BIST test
(with no
reset)
Same as M3
Supported
SKU
No
option
Run runtime
BIST test
(with no
reset)
-Test
Run runtime
BIST test
(with no
reset)
Same as M3
Supported
SKU
Note: VSCC test and ICC data check are performed for all options.
Intel MEMANUF Sx test will require system is capable to enter sleep state, keep
pinging the platform with network package and keep the system up will make the test
failed.
114
Intel Confidential
5.3.1
5.4
5.4.1
MEMANUF.cfg File
The MEMANUF.cfg file includes all the test configurations for MEMANUF EOL check. It
needs to be at the same folder that MEMANUF is run. If there is no MEMANUF.cfg file
on that folder, MEMANUF EOL config runs the Intel recommended default check only.
Note: Only MAC address, Wireless MAC address and System UUID tests allow the user
to set the ReqVal option.
Here is an example of the MEMANUF.cfg file:
//
//
//
//
//
//
//
//
//
//
//
//
//
115
//
//
//
//
//
//
//
ErrorStop - report error and stop any check after the current one
WarnContinue - report warning and continue on to the next check
//
//
//
//
//
//
//
//
//
//
//
//
//
//
////////////////////////////////////////////////////////////////////////
/////
// Intel recommands default end-of-line checks includes the following
// list. If a user chooses to use his/her own version of MEManuf.cfg
// to skip or modify the error action of these checks as WarnContinue,
// MEManuf will report failure with warnings when these checks are
skipped,
// or have errors. It's suggested that a user should perform these
Intel(R)
// recommanded check on all type of SKUs.
SubTestName="EOP status check"
SubTestName="ME VSCC check"
SubTestName="BIOS VSCC check"
SubTestName="ME Manufacturing Mode status"
SubTestName="Flash Region Access Permissions"
SubTestName="Security Descriptor Override (SDO) check"
SubTestName="CF9GR lock check"
SubTestName="MAC address"
SubTestName="Wireless MAC address"
SubTestName="System UUID"
////////////////////////////////////////////////////////////////////////
/////
// Please note that MAC address check will be skipped if Intel Gbe
region
// is not present in SPI image. Wireless MAC address check will be
skipped
// if Intel wireless device is not found on the PCI bus. System UUID
check
// will be skipped if platform is not vPro platform.
//
// MAC address check, Wireless MAC address check and UUID check
// will be skipped if Intel(R) AMT is permanently disabled or not
present.
116
Intel Confidential
//
// MAC address and System UUID Checks can work with an optional ReqVal
field,
// which allows a user to specify his/her custom values to compare
against.
//
// For example, the test shown here checks the current wired LAN MAC
address
// against user provided value of 01-02-03-04-05-06:
//
//
SubTestName="MAC address", ReqVal="01-02-03-04-05-06"
//
// Here is the default values MEManuf uses if ReqVal field if obmitted:
//
// System UUID - all zeros and 0xff are considered as errors
// MAC address - all zeros and 0xff are considered as errors
// Wireless MAC address - all zeros and 0xff are considered as errors
//
// MAC address takes the format as XX-XX-XX-XX-XX-XX
// System UUID takes the format as XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
////////////////////////////////////////////////////////////////////////
/////
////////////////////////////////////////////////////////////////////////
////////
// The following Configuration Check requires a user to enter an
expected
// value after ReqVal=, otherwise the lines without ReqVal field values
will
// be ignored.
//
// Please note that GBE version check will be skipped if Intel Gbe
region
// is not present in SPI image.
//
// ME FW version is a string as <major ver>.<minor ver>.<hotfix
ver>.<build num>
// GBE version is a string as <major ver>.<minor ver>.<revision ver>
// BIOS version is string that vendor specific
////////////////////////////////////////////////////////////////////////
////////
//
//
//
//
///////////////////////////////////////////////////////////////////////
// Variable Check - user needs to put an expected value after ReqVal,
// otherwise the lines without ReqVal field values will be ignored
//
// There are variables that stored in encrypted format. When comparing
// with these variables, ReqVal can only specified as numeric values
// (in encrypted form) in byte order as mentioned aboved. ReqVal needs
// to be surrounded by double quotation marks if they are string input.
//
// To get a up-to-dated MEManuf.cfg with a complete variable names list,
Intel Confidential
117
//
//
//
//
//
//
//
//
//
//
//
Lines which start with // are comments. They are also used to inform users of the
available test group names and the names of specific checks that are included in each
test that Intel MEManuf recognizes.
To select which test items to run: Create a line that begins with
SubTestName="<specific sub test name>".
Here are some other examples that explain how to use this feature:
To run a GbE version check defined under "Platform Configuration Checkings", a
valid GbE version should be equal to string 1.2.3:
SubTestName="GBE version", Reqval="1.2.3"
To run the Variable check defined for "Remote Connectivity Service Enabler ID", a
valid ID should be equal to string 550e8400-e29b-41d4-a716-446655440000:
SubTestName="Remote Connectivity Service Enabler ID", Reqval="
550e8400-e29b-41d4-a716-446655440000"
5.4.2
5.4.3
Intel Confidential
119
Expected Configuration
Enabled
Disabled
Disabled
MAC address
None, all 0, or f
None, all 0, or f
System UUID
None, all 0
Note: EOL Config check. If the system is in Intel ME manufacturing mode when EOL
Config check is run there will be an error report or No EOP Message Sent.
5.4.4
Output/Result
The following test results can be displayed at the end-of-line checking:
Pass all tests passed
Pass with warning all tests passed except the tests that were modified by the
customer to give a warning on failure. (This modification does not apply to Intelrecommended tests
Fail with warning - all tests passed except some Intel-recommended tests that were
modified by the customer to give a warning on failure.
Fail - any customer-defined error occurred in the test.
5.5
Examples
5.5.1
Example 1
5.5.1.1
120
Normal
Enabled
Intel Confidential
FlashPartition:
OperationalState:
InitComplete:
BUPLoadState:
ErrorCode:
ModeOfOperation:
ICC:
programmed
Valid
M0 with UMA
Complete
Success
No Error
Normal
Valid OEM data, ICC
121
5.5.1.2
Normal
Enabled
Valid
M0 with UMA
Complete
Success
No Error
Normal
Valid OEM data, ICC programmed
Intel Confidential
Kernel
Kernel
Kernel
Kernel
Kernel
Kernel
Kernel
Kernel
Common
Common
Common
Common
Common
Passed
Common
Services
Services
Services
Services
Services
123
124
Intel Confidential
MEInfo
MEInfo
MEInfoWin and Intel MEInfo provide a simple test to check whether the Intel ME FW
is alive or not. Both tools perform the same test; query the Intel ME FW including
Intel AMT and retrieve data.
Table 19 contains a list of the data that each tool returns.
The Windows version of MEInfo (MEInfoWin) requires administrator privileges to run
under Windows OS. The user needs to use the Run as Administrator option to open
the CLI in Windows* Vista 64/32 bit, Windows* 7 64/32 bit and Windows* 8 64/32
bit.
6.1
Windows* PE Requirements
In order for tools to work under the Windows* PE environment, you must manually
load the driver with the .inf file in the Intel MEI driver installation files. Once you
locate the .inf file you must use the Windows* PE cmd drvload HECI.inf to load it
into the running system each time Windows* PE reboots. Failure to do so causes
errors for some features.
MEInfo reports an LMS error. This behavior is expected as the LMS driver cannot be
installed on Windows* PE.
6.2
Usage
The executable can be invoked by:
MEInfo.exe [-EXP] [-H|?] [-VER] [-FEAT] [-VALUE] [-FWSTS]
[-VERBOSE] [-PAGE][-PID <filename>] [-DUMPIDLM <filename>]
MEInfo.efi [-EXP] [-H|?] [-VER] [-FEAT] [-VALUE] [-FWSTS]
[-VERBOSE] [-PAGE][-PID <filename>] [-DUMPIDLM <filename>]
Description
Compares the value of the given feature name with the value in the
command line. If the feature name or value is more than one word,
the entire name or value must be enclosed in quotation marks. If the
values are identical, a message indicating success appears. If the
values are not identical, the actual value of the feature is returned.
Only one feature may be requested in a command line.
Intel Confidential
125
MEInfo
Option
-FEAT <name>
Description
Retrieves the current value for the specified feature. If the feature
name is more than one word, the entire feature name must be
enclosed in quotation marks. The feature name entered must be the
same as the feature name displayed by Intel MEInfo.
Intel MEInfo can retrieve all of the information detailed below.
However, depending on the SKU selected, some information may not
appear.
Decodes the Intel ME FW status register value field and breaks it
down into the following bit definitions for easy readability:
FWSTS
-H or -?:
-VER
-PAGE
When it takes more than one screen to display all the information,
this option lets the user pause the display and then press any key to
continue on to the next screen.
-EXP
-PID <filename>
-DUMPIDLM<filename>
No option:
Tools Version
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
SW (MEInfo)
N/A
Field Value
Version string
Example:
126
Intel Confidential
MEInfo
Feature
Name
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Field Value
8.x.y.ZZZZ; where
x=minor, y =
HF/MR, ZZZZ =
Build Number.
PCH Version
Intel ME
Kernel
N/A
Version string
FW Version
Intel ME
Kernel
N/A
Version string
BIOS Version
Intel ME
Kernel
MEBx needs
to be present.
Not available
on 4M Sku
Version string
GbE Version
Other (Directly
reading from
SPI)
GbE Region to
be present in
the image
A version string
MEBx Version
Intel ME
Kernel
MEBx needs
to be present.
Not available
on 4M Sku
Version string
VendorID
Intel ME
Kernel
N/A
Wireless
Driver/
Hardware
Version*
Other
(Reading
Windows
registry
entries)
Only when
wireless HW
is present,
and wireless
windows
driver is
installed
A version string
Link Status
Intel AMT
AMT CEM
(a.k.a
Common
Service) is
used. Not
available on
4M Sku
Link up/down
8.x.y.ZZZZ; where
x=minor, y =
HF/MR, ZZZZ =
Build Number.
Intel Confidential
8.x.y.ZZZZ; where
x=minor, y =
HF/MR, ZZZZ =
Build Number.
127
MEInfo
Feature
Name
FW
Capabilities
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Intel ME
Kernel
N/A
Field Value
Combination of
feature name
list breakdown
(with a
Hexadecimal
value)
*This is a display
of the Feature
State for the
Intel ME. Is
enabled / disabled
on the
system. Each bit
in the value
represents a
feature
state. Intel ME
features including
Full manageability,
standard
manageability,
Anti-theft
technology etc.
Cryptography
Support
Intel ME
Kernel
N/A
Enabled/Disabled
BIOS Config
Lock
Other (Directly
reading from
SPI)
N/A
Enabled/Disabled/
Unknown
If shown as
enabled, FLOCKDN
for BIOS is set.
If shown as
disabled,
FLOCKDN for BIOS
is not set.
GbE Config
Lock
Other (Directly
reading from
SPI)
N/A
Enabled/Disabled/
Unknown
If shown as
enabled, FLOCKDN
for Gbe is set.
If shown as
disabled,
FLOCKDN for Gbe
is not set.
128
Host Read
Access to
Intel ME
Other (Directly
reading from
SPI)
N/A
Enabled/Disabled/
Unknown
Host Write
Access to
Intel ME
Other (Directly
reading from
SPI)
N/A
Enabled/Disabled/
Unknown
Intel Confidential
MEInfo
Feature
Name
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Last Intel ME
Reset Reason
Intel ME
Kernel
N/A
Power up/
Firmware reset/
Global system
reset/
Unknown
Intel AMT
State
Intel ME
Kernel
N/A
Both Full
Manageability
and
Manageability
Application
has to be
PRESENT
(Capable)
Enabled/Disabled
Intel
Standard
Manageability
State
Intel ME
Kernel
N/A
Full
Manageability
should not be
PRESENT
(Capable),
but
Manageability
Application
has to be
PRESENT
Enabled/Disabled
BIOS Boot
State
Intel ME
Kernel
N/A
Pre Boot/
In Boot/
Post Boot
System UUID
Intel AMT
N/A
AMT CEM
(a.k.a.
Common
Service) is
used. Not
available on
4M Sku
UUID of the
system
OEM Id
Intel ME
Kernel
Only if fw
image
supports OEM
Id
Configuration
State
Intel AMT
N/A
AMT CEM
(a.k.a.
Common
Service) is
used. Not
available on
1.5M Sku
Not started/
In process/
Completed/
Unknown
Intel Confidential
Field Value
129
MEInfo
Feature
Name
130
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Provisioning
Mode
Intel AMT
N/A
AMT CEM
(a.k.a.
Common
Service) is
used. Not
available on
1.5M Sku
PKI/PSK/
Unknown
MAC Address
Intel AMT
AMT CEM
(a.k.a.
Common
Service) is
used only
when wired
Hw is present.
Not available
on 1.5M Sku
Wireless MAC
Address
Intel AMT
AMT CEM
(a.k.a.
Common
Service) is
used only
when wireless
HW is
present. Not
available on
1.5M Sku
IPv4 Address
(Wired and
Wireless)
Intel AMT
AMT CEM
(a.k.a.
Common
Service) is
used only
when
wired/wireless
Hw is present.
Not available
on 1.5M Sku
IPv6 Address
(Wired and
Wireless)
Intel AMT
N/A
AMT CEM
(a.k.a.
Common
Service) is
used only
when
wired/wireless
Hw is present.
Not available
on 1.5M Sku
All IPv6 IP
addresses
IPv6 enabled
(Wired and
Wireless)
Intel AMT
N/A
AMT CEM
(a.k.a.
Common
Service) is
used only
Enabled/Disabled
Intel Confidential
Field Value
MEInfo
Feature
Name
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Field Value
when
wired/wireless
Hw is present.
Not available
on 1.5M Sku
Local
FWUpdate
Intel ME
Kernel
N/A
Enabled/Disabled/
Password
Protected
MEI Driver
version*
Other
(Reading
Windows
registry
entries)
Only when
Windows MEI
driver is
installed
A version string
LMS version*
Other
(Reading
Windows
registry
entries)
Only when
Windows LMS
driver is
installed
A version string
UNS version*
Other
(Reading
Windows
registry
entries)
Only when
Windows UNS
driver is
installed
A version string
SPI Flash ID
Other (Directly
reading from
SPI)
Only when
there are
flash parts
HW installed
A JEDEC ID
number (in Hex)
ME/BIOS VSCC
register values
Other (Directly
reading from
SPI)
Only when
there are
flash parts
HW installed
A 32bit VSCC
number (in Hex)
Capability
Licensing
Service
Intel ME
Kernel
Not available
on 4M Sku.
Not shown
unless Fw
feature
capability
supports it
Enabled/Disabled
Intel Confidential
131
MEInfo
Feature
Name
132
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Field Value
Capability
Licensing
Service Status
Intel ME
Kernel
Not available
on 4M Sku.
Not shown
unless FW
feature
capability
supports it.
This feature is
only shown if
there is a
Level III PCH
devices, or
the feature is
enabled
CPU Upgrade
State
Intel ME
Kernel (ICLS)
N/A
H65, H67,
H61, HM65,
HM67
Not available
on 4M SKU.
Not shown
unless Fw
feature
capability
supports it
Upgraded/
Upgrade Capable/
Not Upgradable
Privacy /
Security Level
Intel AMT
Not available
on 4M SKU.
Only shown
when AMT is
enabled
Default/Enhanced/
Extreme/Unknown
OEM Tag
Intel ME
Kernel
N/A
A 32bit
Hexadecimal
number
Report on
Revenue
Sharing ID
Fields
Intel ME
Kernel
Firmware Host
Interface
Both
All
N/A
3 slot of 32-bit
integer values (in
Hex)
FWSTS
Intel ME
Kernel
N/A
Two 32bit
Hexadecimal
numbers and their
bit definition
breakdown
M3 Autotest
Intel ME
Kernel
FITc M3
Autotest
Enabled set to
true
Enabled/Disabled
Platform ID
Intel ME
Kernel
All
N/a
Both, but
not
available
when out of
Manuf
mode
Intel Confidential
MEInfo
Feature
Name
Feature Data
Source (ME
Kernel/AMT
/SW/Other)
Consumer
SKU
Corporate
SKU
Specific
Feature
Dependency
Slot 1 Board
Manufacturer
Intel ME
Kernel
N/A
32-bit integer
values (in Hex)
Slot 2 System
Assembler
Intel ME
Kernel
N/A
32-bit integer
values (in Hex)
Slot 3
Reserved
Intel ME
Kernel
N/A
32-bit integer
values (in Hex)
Wireless
Micro-code
Mismatch
FWU
Corporate
All
N/A
Yes: FW has
detected a ucode
mismatch, and
partial FWUpdate
needs to be
performed
Wireless LAN
in Firmware
FWU
Corporate
All
N/A
The friendly
name matching
the WLAN ucode in
FW
Wireless
Micro-code ID
in Firmware
FWU
Corporate
All
N/A
Wireless LAN
Hardware
PCI address
Corporate
All
N/A
The friendly
name of the
Wireless LAN
hardware installed
on the system
Wireless
Hardware ID
PCI address
Corporate
All
N/A
The WLAN
DeviceID read
from PCI space of
the installed WLAN
on the system
Localized
Language
FWU
All
All
N/A
Displaying the
language installed
in the flash in
English
Independent
Firmware
Recovery
FWU
All
All
Only when
Windows IFR
Agent is
installed and
the FW image
has IFR set to
true
Enabled/Disabled
Intel Confidential
Field Value
133
MEInfo
6.3
Examples
This is a simple test that indicates whether the FW is alive. If the FW is alive, the test
returns device-specific parameters. The output is from the Windows version. The DOS
version does not display the UNS version, Intel Management Engine Interface, or
LMS version numbers.
6.3.1
ACRVMBY1.86C.0038.B00.1103291453
8.0.0.0047
1.3
8086
2
8.0.0.1178
FW Capabilities:
0x00101C60
134
Enabled
Not Upgradable
Enabled
Power up
Enabled
Disabled
Enabled
Enabled
C22017
20052005
20052005
Post Boot
00000000-0000-0000-0000-000000000000
Enabled
Permit info not available
0x00000001
0x0000203B
Unused
Unused
Disabled
Disabled
Intel Confidential
MEInfo
6.3.2
ACRVMBY1.86C.0038.B00.1103291453
8.0.0.0047
1.3
8086
2
8.0.0.1178
FW Capabilities:
0x0CFE5C47
Enabled
Not Upgradable
Enabled
Power up
Enabled
Disabled
Enabled
Enabled
C22017
20052005
20052005
Post Boot
00000000-0000-0000-0000-000000000000
Link up
24580e80-ff1d-11e0-96c0-3cd92b79c328
3c-d9-2b-79-c3-28
192.168.0.100
Disabled
Default
Completed
PKI
Enabled
Permit info not available
0x00000001
0x0000203B
Unused
Unused
Disabled
No
0x0082
Intel(R) Centrino(R) Ultimate-N 6205
No Intel WLAN card installed
No Intel WLAN card installed
English
Disabled
Intel Confidential
135
MEInfo
6.3.3
6.3.4
136
Intel Confidential
The image file that the tool uses for the update is the same image file that is used
by the FITC tool to create a firmware image for use in the SPI. A sample FW image
file for updating would be ME8_5M_Production.bin. These files are located in the
Image Components\ME sub-folder of the firmware kit.
FWUpdate takes approximately 1-4 minutes to complete depending on the flash
device on the system.
After FWUpdate a host reset is needed to complete FW update. The user can also use
the FORCERESET option to do this automatically.
Note: In previous generations there were two tools: Intel ME Local Firmware Update and
Intel ME Remote Firmware Update. Now there is just a local firmware update tool that is
called Intel ME Firmware Update (FWUpdate).
7.1
Requirements
FWUpdLcl.exe is a command line executable that can be run on an Intel ME-enabled
system that needs updated FW.
FW can only be updated when the system is in an S0 state. FW updates are NOT
supported in the S3/S4/S5 state.
If Intel Anti-theft technology is enabled, a system restart must occur to complete the
FW update process.
Intel ME FWUpdate must be enabled in the Intel MEBx or through BIOS.
The Intel ME Interface driver must be installed for running this tool in a Windows
environment.
Intel Confidential
137
7.2
Windows* PE Requirements
In order for tools to work under Windows* PE environment, the user will need to
manually load a driver by using the .inf file in the Intel MEI driver installation files.
Once the .inf file located, the user will need to use Windows* PE command drvload
*.inf to load it into the running system each time Windows* PE reboots. Failure to do
so causes a tools reporting error.
7.3
7.4
Usage
Note: In this section, <Image File> refers to an Intel-provided image file of the section of
the FW to be updated, not the image file used in FITC to program the entire flash memory.
FWUpdLcl.exe [-H|?] [-VER] [-EXP] [-VERBOSE] [-F] [-Y]
[-SAVE] [-FWVER] [-PARTID] [-ALLOWSV] [-FORCERESET]
[-OEMID] [-PASS] [-HALTRCFG]
138
Intel Confidential
Description
-VERBOSE
[<FILE>]
-Y
Ignore warning. If the warning asks for input "Y/N", this flag makes the tool
automatically take "y" as the input.
-F <FILE>
-SAVE <file>
-ALLOWSV
Allow Same Version. Allows the version of the input FW (based on the file
input) to be the same as the version of the FW currently on the platform.
Without this option, an attempt to perform an update on the same version
will not proceed.
-FORCERESET
Force Reset. The tool automatically reboots the system after the update
process with FW is complete. The system reboot is necessary for the new
FW to take effect. An attempt to update the FW without this option will end
with a message telling the user to reset the platform for the changes to
take effect.
-OEMID <UUID>
OEM ID. The tool uses the specified OEM ID during the transaction of the
new FW image with the Manageability Engine. The purpose of the OEM ID is
for manufacturers to have an identifier for their system. Using any other
OEM ID value other than what is on the FW running on the target platform
results in a failure of the FWUpdate process. The full image (including all
necessary flash partitions) flashed to the system can be configured with the
Flash Image Tool to specify the OEM ID (this tool specifies a default of zeros
for the OEM ID.) If this command line option is not used, the default OEM
ID used for the update is zeros. The OEM ID is configured in the existing FW
image running on the platform. The OEM ID value is specified in the UUID
format (8-4-4-4-12).
-HALTRCFG
Intel Confidential
139
Option
PARTID <wcod
or locl>
Description
This option is always used along with the F option.
The partition ID is requested using the partid option, which takes in wcod
or locl string as input. If the requested partition is expected by the
Firmware the tool will search for the expected partition in the image
provided, extract it and send it to the FW to perform the update. If the
expected partition is not found in the image and invalid file error will be
returned by the tool. Also, if the requested partition is not expected by the
firmware and error will be returned to the user.
Note: For partial fw update the image provided must either be a Full or
Partial image. A full image starts with a FPT and contains FTP and NFTP
partitions.
Note: For partial fw update the image provided must either be a Full or
Partial image. A full image starts with a FPT and contains FTP and NFTP
partitions. A partial image starts with either WCOD or LOCL partitions.
The WCOD option designates the Wireless LAN uCodec partition.
FWUPDLCL will automatically determine the correct Wireless LAN
uCode.
The LOCL option designates the Secure Output Localization
partition.
-PASS
<PASSWORD>
This is used to specify the Intel MEBx password to perform the update. A
valid password is required to perform the update especially when FW
Update setting in Intel Mebx is set to password protected.
-GENERIC
Intel MEI. Specifies that the tool performs the update over the Intel MEI
interface. Intel MEI is used even if the FW supports a network-based
update.
Note: This option is only supported in the Windows version of the tool.
-FWVER
-H or -?
Display FW version
Displays the list of command line options supported by the Intel MEInfo
tool.
-EXP
-VER
7.5
Examples
7.5.1
140
Intel Confidential
FWUpdLcl.exe f FW.BIN
EFI:
FWUpdLcl.efi f FW.BIN
7.5.2
Intel Confidential
141
7.5.3
FW Update:
[ COMPLETE ]
Verbose Mode
[ COMPLETE ]
142
Intel Confidential
7.5.4
Intel Confidential
143
8.1
8.2
Description
-H|?
-F <filename>
-V <MeBXCurrPwd>
-R
Global reset
-U
-S
-C
144
-EXP
-VERBOSE <FILE>
Intel Confidential
Required Reset
FW Update Local
Intel ME Reset
Intel ME Reset
Intel ME Reset
Intel ME Reset
Power package
Intel ME Reset
PID
Intel ME Reset
PPS
Intel ME Reset
PKIDNSSuffix
Intel ME Reset
ConfiServerFQDN
Intel ME Reset
ZeroTouchSetupEnabled
Intel ME Reset
PreInstalledCertEnabled
Intel ME Reset
UserDefinedCertEnabled
Intel ME Reset
UserDefinedCertAdd
Intel ME Reset
SolIderConfig
Intel ME Reset
HostName
Intel ME Reset
DomainName
Intel ME Reset
DHCP
Intel ME Reset
Idle Timeout
Intel ME Reset
StaticIPv4Parameters
Intel ME Reset
Intel ME Reset
KVM Remote IT
Intel ME Reset
KVM User
Intel ME Reset
Intel ME Reset
8.3
USB Utility
Intel UPDParam uses as an input a binary file that is created with a USB Utility
(USBfile.exe).
Intel Confidential
145
8.3.1
Syntax
The following parameters can be set in USBfile.exe to generate the binary file.
146
Intel Confidential
Option
Description
-v 1|2|2.1
-amt
-ztc 0|1
-dhcp 0|1
Disables/enables DHCP
-fwu 0|1
-pm 0|1
-pp <GUID>
-gen <n>
Computes and adds the hash of the given root certificate file.
Up to three certificate hashes may be specified.
-redir <n>:
-s4p
<localHost:SubnetMask:Gatew
ayAddr:DNSaddr:SecondaryDN
Saddr>
E.g., 10.0.0.1:255.255.255.0:10.0.0.2:10.0.0.3:10.0.0.4
-hostname <hostname>
-vlan <0|1-VlanTag(1-4096)>
-passPolicyFlag <0|1|2>
Intel Confidential
147
For more details on how to use USBfile.exe, use the help command in the USB file
utility. Once all parameter modifications have been completed (along with the current
Intel MEBx password) USBfile.exe creates a binary file.
For example, the user could enter the command Usbkey.exe create test.bin
Admin Admin@98 (supposing the System current Intel MEBx password is Admin).
When the user runs USBfile.exe, this command creates a binary file named test.bin
that sets the new password for Intel MEBx to Admin@98.
Once the binary file is created it is used by the UpdateParam tool as an input.
To use the binary file created by USBfile.exe:
The binary file must contain the current Intel MEBx password.
This tool (UpdateParam) must be in either pre-boot or in-boot mode in order to run:
Pre boot the platform has just been flashed with an image but default
Intel MEBx password has not been changed yet.
In-boot The Intel MEBx password has been changed and the user has
entered the Intel MEBx interface.
BIOS does not send an EOP to Intel ME
8.4
Output
If the binary file contains the right Intel MEBx password, it proceeds to make the
appropriate changes to the settings. It either returns a Success/Fail status for each of
the parameters that are in the binary file or the tool returns an error code and error
message and exits.
Once the password validation is successfully completed, Intel UPDParam changes the
rest of the parameters as listed in the .bin file. If there is a failure changing/updating
any of the parameters, Intel UPDParam returns the error code and error message
associated with the failure.
148
Intel Confidential
Note: Error messages are displayed in red and warning messages are displayed in yellow.
Since Intel UpdParam uses Intel MEI to communicate with different components of
the Intel ME it also returns the Intel MEI status.
A log file is also created that contains details about all the steps executed. The log file
can be found in the same folder as the executable.
8.5
149
SolIderConfig
HostName
DomainName
DHCP
Idle Timeout
Provisioning Server Address
Provisioning server port
StaticIPv4Parameters
KVM
Configuration Mode
User Consent Policy
User Consent Option
8.6
Examples
UpdParam f <filename>
Inputs the binary file and updates the parameters.
UpdParam f <filename> -v <CurrentMebxPwd>
Inputs a binary file containing the MEBX current password entered at the command
prompt.
UpdParam f <filename> -v <CurrentMebxPwd> -u
Inputs a binary file containing the following:
MEBX current password entered at the command prompt.
An option to do partial unprovisioning.
Updparam r
Performs a global reset.
Updparam h
Displays the help screen.
150
Intel Confidential
Intel Confidential
151
FPT
ID
Fixed
Offset
ID
Data
Length
(in
Bytes)
Description
Expected Value
Reset Type
Fixed Offset
Name
Secure
0x0003
8<=N<=32
Password
No
ME
Package 1: 0x01
No
ME
0x0005
152
Intel Confidential
Package 2: 0x02
FPT
ID
Fixed
Offset
ID
0x000A
Data
Length
(in
Bytes)
Description
Expected Value
Feature Capable: 1
Feature Permanently disabled: 0
Description
31:22
Reserved
21
19:20
Notes:
There are reserved bits that must not be
changed for proper platform operation.
The user should only modify the bit(s)
for the feature(s) they wish to change.
There is NO ability to change features
one at a time. This FOV sets OEM
Permanent Disable for ALL features. In
addition prior updating or changing any
of available settings it is highly
recommended that the user first
retrieves the current OEM Sku Rule and
toggling only the desired bits, and then
resave them.
Bit
17
Reserved
16
ME Network
Disable
PAVP
Reserved
Intel AT
4:3
Reserved
1
0
Reserved
11:6
1.
Reserved
KVM
12
Note
s
TLS
18
15:13
No
Manageability
and Security
Application
Reserved
Manageability
Full
Intel Confidential
153
Reset Type
Fixed Offset
Name
Secure
Global
Feature
Shipment Time
State
FPT
ID
Fixed
Offset
ID
0x000B
Data
Length
(in Bytes)
Description
Expected Value
Feature Enabled: 1
Reset Type
Fixed Offset
Name
Secure
No
Global
No
ME
Feature Disabled: 0
Bit
Description
31:3
Reserved
Manageability
and Security
Application
1:0
Reserved
Note
s
Notes:
There are reserved bits that must not be
changed for proper platform operation.
The user should only modify the bit(s)
for the feature(s) they wish to change.
There is NO ability to change features
one at a time. This FOV sets OEM
Permanent Disable for ALL features. In
addition prior updating or changing any
of available settings it is highly
recommended that the user first
retrieves the current Feature Shipment
Time State and toggling only the desired
bits, and then resave them.
Examples:
SetWLANPower
Well
35
0x000E
0x80 = Disabled
0x82 = Sus Well
0x83 = ME Well
154
Intel Confidential
FPT
ID
Fixed
Offset
ID
Data
Length
(in Bytes)
Description
Expected Value
Reset Type
Fixed Offset
Name
Secure
34
0x000F
No
ME
MEBx Password
0x0003
8<=N<=32
Password
No
ME
Package 1: 0x01
No
ME
0x0005
Package 2: 0x02
Pkg1 - ON in S0
Pkg2 - ON in S0, ME Wake in S3, S4-5
Default Power Package (Mobile):
Pkg1 - ON in S0
Pkg2 - ON in S0, ME Wake in S3, S4-5 (ACOnly)
Intel Confidential
155
FPT
ID
Fixed
Offset
ID
Data
Length
(in Bytes)
Description
Expected Value
Reset Type
Fixed Offset
Name
Secure
0x2001
No
ME
PPS
10
0x2002
32
No
ME
0x2008
No
ME
0x200B
55 => n >=
83
No
ME
55 => n >=
83
No
ME
55 => n >=
83
No
ME
Policy 0: 0x00
No
ME
No
Global
Idle Timeout
ME
OEM
Customizable
Certificate 1
14
OEM
Customizable
Certificate 2
15
OEM
Customizable
Certificate 3
16
MEBx Password
Change Policy
17
0x200D
0x200E
Policy 1: 0x01
Policy 2: 0x02
24
0x2017
b11 Enabled
b10 - Disabled
156
Intel Confidential
Privacy/Security
Level
FPT
ID
33
Fixed
Offset
ID
0x2019
Data
Length
(in Bytes)
Description
Expected Value
Default 0x01
Reset Type
Fixed Offset
Name
Secure
No
ME
No
ME
Enhanced 0x02
Extreme 0x03
Default:
SOL enabled = true
IDER enabled = true
KVM enabled = true
Opt-in can be disabled= true
KVM opt-in configurable remotely =
true
RCFG and CCM = true
Enhanced:
SOL enabled = true
IDER enabled = true
KVM enabled = true
Opt-in can be disabled= false
Opt-in configurable remotely = true
RCFG and CCM = true
Extreme
SOL enabled = false
IDER enabled = false
KVM enabled = false
Opt-in can be disabled= false
KVM opt-in configurable remotely =
N/A
RCFG and CCM = false
PID
0x2001
0x5003
Intel Confidential
32-bit value
ME
157
FPT
ID
SystemIntegrato
rId
Fixed
Offset
ID
0x5004
Data
Length
(in Bytes)
Description
0x5005
32-bit value
ME
Expected Value
Reset Type
Fixed Offset
Name
Secure
32-bit value
ME
27
AT FW Flash
Protection
Override Policy
Soft HMRPFO
28
0x6001
0x6002
ME
No
ME
Note: All Fixed Offset Variables (FOVs) have corresponding Named Variables
(NVARs) however not all Named Variables (NVARs) have Firmware Offset
Variables (FOVs) associated with them.
Additionally some Fixed Offset Variables (FOVs) have different name
designations than Named Variable (NVARs) counterparts.
FPT NVAR Retrieve command:
fpt.exe r <name> | all [-f <file>] [options]
Required Parameters
<name> Name of NVAR OR All retrieves all the NVARs
158
No
MEBxPassword
MEBxPassword
DefPwrPackage
OEMSkuRule
OEMSkuRule
FeatureShipState
FeatureShipState
Intel Confidential
SetWLANPowerWell
OEM_TAG
OEM_TAG
PID
PID
PPS
PPS
MEIdleTimeout
OEMCustomCert1
OEMCustomCert2
OEMCustomCert3
USBrSettings
USBrSettings
Privacy/Security Level
Privacy/SecurityLevel
ODM_ID
SystemIntegratorId
ReservedId
ATFPOPHard
ATFPOPSoft
Intel Confidential
159
160
Error Message
Response
Success
Check region to be
programmed
Contact Intel
Contact Intel
10
11
12
25
26
27
Intel Confidential
Error Code
28
Error Message
Response
Assert Flash Descriptor
Override Strap (GPIO33) to
Low, Power Cycle, and
Retry.
If Protected Range Registers
(memory location: SPIBAR +
74h -> 8Fh) are still set,
contact the target BIOS
vendor.
50
51
Check address
52
Check address
53
Check address
54
Check address
55
Internal Error
Contact Intel
56
57
75
76
77
78
79
80
100
Intel Confidential
161
Error Code
162
Error Message
Response
101
102
103
104
105
202
203
204
205
207
208
Intel ME is disabled
209
210
211
212
213
214
215
216
217
240
241
242
243
244
245
246
247
Intel Confidential
Error Code
Error Message
248
249
250
251
252
253
Response
254
255
256
280
281
282
283
284
320
321
360
361
362
363
360
361
362
363
360
361
362
Intel Confidential
163
Error Code
164
Error Message
363
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
480
481
482
483
484
485
486
Intel Confidential
Response
Error Code
Error Message
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
Intel Confidential
Response
165
Error Code
B.2
166
Error Message
513
514
515
1000
1001
Unsupported OS
8192
General error
8193
8194
8195
8196
8197
8198
8199
8200
8201
8202
8203
8204
8205
8206
8207
8208
8209
Illegal parameter
8210
8211
No message
8212
8213
8214
Response
Contact Intel
Contact Intel
Error
Code
Error Message
Success
8193
8704
8705
8706
8707
8708
8710
8713
8714
8716
Invalid usage
8718
8719
8722
8723
8724
8725
8727
8728
This version of the Intel l FW Update Tool is not compatible with the current
platform.
8741
FW Update Failed.
8743
8744
8745
8746
8747
8748
8754
Intel Confidential
167
Error
Code
B.3
Error Message
8757
8758
8759
Internal Error.
8760
8761
8762
8763
8764
8765
8766
8768
8769
8772
Invalid usage, -allowsv switch required to update the same version firmware
8778
Unable to read FW version from file. Please verify the update image used.
8787
Error Messages
9248
9249
9250
9251
168
9252
9254
9255
9256
9257
Internal error
9261
9262
9263
Intel Confidential
Error
Codes
Error Messages
9264
9265
9266
9267
9268
9269
9270
9271
9272
9273
9275
9276
9277
9278
9279
9280
9281
9282
9283
9284
9285
169
Error
Codes
Error Messages
9286
9287
9288
9289
9290
9291
9292
9295
9296
9297
9298
9299
9300
9301
9302
9303
9304
9305
Intel NAND needs to be enabled to perform the test, not used by ME8
Used by IBX, not used by CPT
Single flash part found, Flash Partition Boundary Address must be zero
Flash Partition Boundary Address should be in between flash parts
The two flash parts on this platform require different BIOS VSCC values
Intel NAND module test failed (feature not enabled), not used by ME8
Memory allocation failed for checking variable <Variable Name>
Variable <Variable Name> mismatch, actual value is - <Variable Value>
Intel ME firmware version mismatch, actual value is - <Version String>
Intel Gbe version mismatch, actual value is - <Version String>
BIOS version mismatch, actual value is - <Version String>
9306
9307
170
Intel Confidential
Error
Codes
Error Messages
9311
9312
9313
9314
9315
9316
9317
9318
9319
9320
9321
9322
9324
9325
9326
9327
9328
9329
9330
9331
171
Error
Codes
9332
9333
9334
9335
9336
9337
9338
9339
9340
9341
9342
9343
9344
9345
9346
9347
9348
9349
9350
9351
9352
9353
9354
9355
9356
9357
172
Error Messages
Internal error
SMBus encountered time-out
Failed to retrieve password from SPI
Internal error
Internal error
Internal error
Failed to retrieve test result from SPI
Failed to retrieve power rule from SPI
Failed to retrieve power source
Failed to retrieve PROC_MISSING_NVAR setting
PROC_MISSING_NVAR setting is set incorrectly
Internal error
Failed to retrieve power package setting
Failed to retrieve M3Power Rails Availability setting
M3 Power Rails Availability setting is set incorrectly
Power source is not AC
Internal error
Internal error
Internal error
Length of OEM Customizable Certificate Friendly Name setting is set
incorrectly
OEM Customizable Certificate Stream setting is set incorrectly
OEM Customizable Certificate Hash Algorithm setting is set incorrectly
Length of OEM Customizable Certificate Stream is set incorrectly
Current WLAN does not match micro-code
Communication with WLAN device failed
WLAN power well setting is set incorrectly
Intel Confidential
Error
Codes
9358
9359
9360
9361
9362
9363
9364
9365
9366
9367
9368
9369
9370
9371
9372
B.4
Error Messages
9400
9401
9402
9403
Error Messages
9450
9451
Communication error between application and Intel AMT module (PTHI client)
9452
9455
9457
Intel Confidential
173
Error
Code
Error Messages
Where %s is the log file name user specified
9458
9459
9460
9461
9462
9467
9468
9469
9470
9471
9472
9473
174
9474
9475
9476
Intel Confidential
B.5
FPT Errors
Error
Code
Error
Invalid Parameters
200
Invalid parameter value specified by the user. Use -? Option to see help.
Invalid Verbose File
254
201
9254
Unsupported OS
Commit FOVs Operation
517
518
519
520
8193
8199
8204
8213
518
519
520
8193
8199
8204
8213
518
519
Intel Confidential
175
Error
Code
Error
520
8193
8199
8204
8213
176
493
506
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3054
3055
3056
3057
Intel Confidential
B.6
UPDPARAM Errors:
Description
Success
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
A record has been encountered that does not contain an entry with the Current
Intel MEBx Password
3022
3023
The header chunk count cannot contain all of the setup file header data
3024
The record chunk count cannot contain all of the setup file record data
3025
3026
The setup file header indicates that there are no valid records
3027
Intel Confidential
177
Error
Codes
Description
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
178
Intel Confidential
Intel ME manufacturing
mode donebit
1
End of post
Yes
CF9GR locking
No
Yes
No
FPT -Greset
Not related
Not related
Not related
N/A Not
related
FPT R
Depends on
End of post
status
Work
Depends on
Intel ME
manufacturing
mode donebit
status
Work
Work
Depends on
Intel ME
manufacturing
mode donebit
status
Work
Not related
Fail
Work
Not related
Intel Confidential
179