TGL-LP Consumer Bring Up Guide
TGL-LP Consumer Bring Up Guide
September 2020
Revision 1.37
Intel Confidential
By using this document, in addition to any agreements you have with Intel, you accept the terms set forth below. You may not use
or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products
described herein. You agree to grant Intel a non-exclusive, royalty-free lTigernse to any patent claim thereafter drafted which
includes subject matter disclosed herein.
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH Intel® PRODUCTS. NO LTigerNSE, EXPRESS OR
IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS
PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER,
AND INTL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING
LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY
PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal
injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU
SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS,
OFFTigerRS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE
ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR
DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR
WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
Intel may make changes to specifications and product descriptions at any time, without notTiger. Designers must not rely on the
absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future
definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The
information here is subject to change without notTiger.
The Tiger Lake Platform and Tiger Lake PCH products may contain design defects or errors known as errata which may cause the
product to deviate from published specifications. Current characterized errata are available on request.
Intel® AMT should be used by a knowledgeable IT administrator and requires enabled systems, software, activation, and
connection to a corporate network. Intel AMT functionality on mobile systems may be limited in some situations. Your results will
depend on your specific implementation. Learn more by visiting Intel® Active Management Technology.
Intel® Small Business Technology (Intel® SBT) requires an Intel® Small Business Technology enabled system and proper
configuration. Availability of features will depend upon the setup and configuration by your PC manufacturer. Consult your system
manufacturer.
Intel® vPro™ Technology requires setup and activation by a knowledgeable IT administrator. Availability of features and results
will depend upon the setup and configuration of your hardware, software and IT environment. Learn more at: http://
www.intel.com/technology/vpro.
Any software source code reprinted in this document is furnished under a software lTigernse and may only be used or copied in
accordance with the terms of that lTigernse.
64-bit computing on Intel architecture requires a computer system with a processor, chipset, BIOS, operating system, device
drivers and applications enabled for Intel® 64 architecture. Processors will not operate (including 32-bit operation) without an
Intel® 64 architecture-enabled BIOS. Performance will vary depending on your hardware and software configurations. Consult
with your system vendor for more information.
Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family,
not across different processor families. See http://www.intel.com/products/processor_number for details. I2C is a two-wire
communications bus/protocol developed by Philips. SMBus is a subset of the I2C bus/protocol and was developed by Intel.
Implementations of the I2C bus/protocol may require lTigernses from various entities, including Philips Electronics N.V. and North
American Philips Corporation.
Microsoft*, Windows* and the Windows* logo are trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries.
Intel, Celeron, Pentium, Intel Xeon, Intel Core, Intel vPro™, and the Intel logo are trademarks of Intel Corporation in the United
States and/or other countries. *Other names and brands may be claimed as the property of others.
KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with
integrated graphics and Intel® Active Management technology activated. Discrete graphics are not supported.
2 Intel Confidential
Contents
1 Introduction .............................................................................................................. 6
1.1 Related Documentation ........................................................................................ 6
1.2 Prerequisites....................................................................................................... 6
1.3 Acronyms and Definitions ..................................................................................... 7
1.3.1 General................................................................................................... 7
1.3.2 Intel® Converged Security and Management Engine...................................... 8
1.3.3 System States and Power Management ....................................................... 9
1.4 Reference Documents ........................................................................................ 10
1.5 Format and Notation.......................................................................................... 10
1.6 Kit Contents ..................................................................................................... 11
1.7 External Hardware Requirements for Bring Up ....................................................... 20
2 Image Creation: Intel® Flash Image Tool ............................................................... 21
2.1 Start Intel®FIT ................................................................................................. 21
2.2 Step-by-Step Guide to Build SPI Flash Image with Intel® FIT Interface..................... 21
3 Programming SPI Flash Devices and Checking Firmware Status ............................ 143
3.1 Flash Burner/Programmer ................................................................................ 143
3.1.1 In-Circuit SPI Flash Programming for CRB................................................ 143
3.2 Flash Programming Tool (Intel® FPT) ................................................................. 143
3.2.1 Intel® FPT Windows* Version................................................................. 144
3.3 Checking Intel® ME Firmware Status.................................................................. 144
3.4 Common Bring Up Issues and Troubleshooting Table............................................ 146
A Appendix — Flash Configurations........................................................................... 147
B Appendix — Intel® ICCS SKU Support Matrix ......................................................... 148
C Appendix — Boot Guard Configuration ................................................................... 149
D Appendix — Intel® Platform Trust Technology ....................................................... 151
E Appendix — Integrated Sensor Hub (ISH) Public Key Settings............................... 152
F Appendix — RVP Platform Specific Settings ........................................................... 154
Intel Confidential 3
Figures
Tables
1-1 Number Format Notation........................................................................................... 10
1-2 Data Format Notation ............................................................................................... 10
1-3 Kit Contents ............................................................................................................ 11
2-1 - Initial Screen Layout .............................................................................................. 22
2-2 - Build Settings........................................................................................................ 31
2-3 - Flash Layout ......................................................................................................... 33
2-4 - Flash Settings ....................................................................................................... 39
2-5 - Intel® ME Kernel ................................................................................................... 49
2-6 - Intel® AMT ........................................................................................................... 54
2-7 - Platform Protection ................................................................................................ 62
2-8 - Integrated Clock Controller ..................................................................................... 71
2-9 - Networking & Connectivity ...................................................................................... 78
2-10- Internal PCH Buses ................................................................................................ 82
2-11- Power .................................................................................................................. 87
2-12- Integrated Sensor Hub ........................................................................................... 89
2-13- Camera ................................................................................................................ 91
2-14- Debug .................................................................................................................. 92
2-15- CPU Straps ........................................................................................................... 97
2-16- Flex I/O Straps...................................................................................................... 99
2-17- GPIO.................................................................................................................. 115
2-18- Download and Execute ......................................................................................... 134
2-19- Intel® Unique Platform ID ..................................................................................... 136
2-20- FW Update Image Build ........................................................................................ 137
2-21- Intel® FIT - Build Image ....................................................................................... 142
3-1 Common Bring Up Issues and Troubleshooting Table .................................................. 146
Intel Confidential 4
Revision History
Document Revision
Description Revision Date
Number Number
§§
Intel Confidential 5
Introduction
1 Introduction
This document covers the Intel® Converged Security and Management Engine
Firmware (Intel® ME) 15.0 - Consumer / Consumer Firmware bring up procedure.
Intel® ME is tied to essential platform functionality — this dependency cannot be
avoided for engineering reasons.
The bring up procedure primarily involves building a Serial Peripheral Interface (SPI)
Flash image that will contain:
• [required] Descriptor region — Contains sizing information for all other SPI Flash
image regions, SPI settings (including Vendor Specific Configuration - or VSCC -
tables, SPI device parameters), and region access permissions.
• [required] BIOS region — Contains firmware for the processor (or host) and/or
Embedded Controller (EC).
• [required] Intel® CSME FW region — Contains firmware for the Intel® Converged
Security and Management Engine.
• [optional] GbE region — Contains firmware for Intel LAN solution.
For more details on SPI Flash layout, see the document Tiger Lake-H / LP SPI
Programming Guide SPI Programming Guide and Appendix A. Once the SPI Flash
image is built, it will be programmed to the target based platform and the platform will
be booted. This document also covers any tests and checks required to ensure that this
boot process is successful and that Intel® ME Consumer FW is operating as expected.
1.2 Prerequisites
Before this document is read and utilized, it is essential that the reader first review the
Consumer FW Release Notes (included with this Intel® ME Consumer FW kit).
Intel Confidential 6
Introduction
This document is constructed so that the reader can complete the bring up steps as
given for the Intel Customer Reference Board (CRB). However, in the case that bring up
is being performed on a different Intel® x based platform, this document will highlight
any changes that must be imposed onto the bring up steps accordingly.
This document makes only the following limited assumptions regarding hardware:
• The platform is Tiger Lake LP/H based
• The platform is equipped with one or more SPI Flash devices with a total capacity
sufficient for storing all relevant firmware images.
EC Embedded Controller
FW Firmware
OOB Out-of-Band
OS Operating System
Intel Confidential 7
Introduction
End User The person who uses the computer (either Desktop or Mobile). In
corporate, the user usually does not have administrator privileges.
Host or Host CPU The processor that is running the operating system. This is different
than the management processor running the Intel® Converged Security
and Management Engine Firmware.
Intel® Converged Security and Interface between the Converged Security and Management Engine and
Management Engine the Host system
Interface (Intel® MEI)
Intel® MEI driver Intel® ME host driver that runs on the host and interfaces between ISV
Agents and the Intel® ME HW.
NVM Non-Volatile Memory: A type of memory that will retain its contents
even if power is removed. In the Intel® AMT current implementation,
this is achieved using a FLASH memory device.
OOB Interface Out Of Band interface: This is WSMAN interface over secure or non-
secure TCP protocol.
OS not Functional The Host OS is considered non-functional in Sx power state and any one
of the following cases when system is in S0 power state:
• OS is hung
• After PCI reset
• OS watch dog expires
• OS is not present
System States Operating System power states such as S0. See detailed definitions in
System States and Power Management section.
Intel Confidential 8
Introduction
CM3 Intel® Converged Security and Management Engine power state where
the host is in Sx. The processor DRAM Controller is turned off and DRAM
power stays in off/self refresh mode. There is no UMA usage in CM3
state. Less than 1MB of SRAM used for code and data. Code is executed
off of flash takes ~1mS.
CM0-PG Core Well Powered; Intel® ME Well Powered; (Intel® ME core not
consuming power) DRAM available.
OS Hibernate System state where the OS state is saved on the hard drive.
S0 A system state where power is applied to all HW devices and the system
is running normally.
S1, S2, S3 A system state where the host CPU is halted but power remains
available to the memory system (memory is in self-refresh mode).
S4 A system state where the host CPU and memory are not active.
S5 A system state where all power to the host system is off, however the
power cord (and/or battery in mobile designs) is still connected.
Snooze Mode Intel® Converged Security and Management Engine activities are
mostly suspended to save power. The Intel® Converged Security and
Management Engine monitors HW activities and can restore its activities
depending on the HW event.
Standby System state where the OS state is saved in memory and resumed from
the memory when mouse/keyboard is clicked.
Tiger Lake Intel® Converged Security and Management Engine (Intel® CSME) and 549024 / CDI
Embedded Controller Interaction Product Specification Revision 0.5
Intel® Converged Security and Management Engine BIOS Writers Guide TBD / *
®
Intel Converged Security and Management Engine (Intel® CSME) 15 SKU Firmware TBD / CDI
Consumer Compliance Guide for Tiger Lake PCH-H/LP Chipset Family - Tiger Lake Platform
Compliancy and Testing Guide - Revision x.x
Note: * Unless specified otherwise, a document can be ordered by providing its reference number to your
Intel Field Applications Engineer.
Intel Confidential 9
Introduction
Decimal (default) d 14d. Note that any number without an explicit suffix can be
assumed to be decimal.
Binary b 1110b
Hex h 0Eh
Hex 0x 0x0E
Byte B 8 bits
Gigabyte GB 1024 MB
Intel Confidential 10
Introduction
[Installers]
[ME_SW_DCH]
[ME_SW_MSI]
[WindowsDriverPackages]
[JHI]
[IotCorePackages]
[Win10]
Intel Confidential 11
Introduction
[LMS]
[Certificates]
BBAF7E023DFAA6F13C848EADEE3898ECD93232D4.cer
BF4E419CC0A20D33947C2A04867B27DE63A2174F.cer
[Templates]
Intel Confidential 12
Introduction
1200_PP_PFU.BIN
1300_PP_PFU.BIN
1400_PP_PFU.BIN
1500_PP_PFU.BIN
[MEI]
[Win7]
[x64]
[x86]
Intel Confidential 13
Introduction
[Win8]
[x64]
[x86]
[Win10]
[x64]
[x86]
[MEI_iCLS]
[SOL]
[TGP-LP]
Apache Harmony Apache Version 2.0, January 2004 w header.txt Apache Harmony Apache Version 2.0 License
Microsoft TPM 2.0 BSD Two Clause License.txt TPM 2.0 BSD Two Clause Microsoft License
Synopsys UFS Host Controller OS.pdf Synopsys UFS Host Controller OS License
[FWU_Prestitched]
Intel Confidential 14
Introduction
[Image Components]
[CSME]
[Silicon]
[LP]
[A0]
[PreProduction]
[PCHC]
[PMC]
[TCSS]
[IOM]
[PHY]
[Retimer]
[TBT]
[Tools]
[ICC Tools]
[ICC SDK]
[Windows64]
[WDT Driver]
[ICCWDT_11.7.0.1000_19H1_Cert]
[Win7]
[ICCWDT.Dev.Install]
Intel Confidential 15
Introduction
[ICCWDT_Driver]
[x64]
iccwdt.sys
WdfCoInstaller01009.dll
iccwdt.cat
iccwdt.inf
iccwdt.sys
WdfCoInstaller01009.dll
[x64]
Drv64.exe
[ICCWDT.Install]
[Win10]
[ICCWDT.Dev.Install]
[ICCWDT.Install]
Intel(R) ME Firmware ICC Tools User Guide.pdf Integrated Clock Controller Tools User guide
[System Tools]
[Documentation]
Signing and Manifesting User Guide.pdf Signing and Manifest Users Guide
[FIT]
Windows32]
[FPT]
[Efi64]
[Windows64]
Intel Confidential 16
Introduction
[FWUpdate]
[Efi64]
fwudef.h
FwUpdateEfiLib.lib
fwupdatelib.h
fwupdatelibdeprecated.h
[Windows64]
fwudef.h
FwUpdateEfiLib.lib
fwupdatelib.h
fwupdatelibdeprecated.h
FWUpdateSample.c
[FWUpdate_RS]
[Efi64]
fwudef.h
FwUpdateEfiLib.lib
fwupdatelib.h
fwupdatelibdeprecated.h
[MEInfo]
[Efi64]
[Windows64]
Pmxdll32e.dll
[MEManuf]
[Efi64]
Intel Confidential 17
Introduction
[Windows64]
Pmxdll32e.dll
[MEU]
[Windows32]
Intel Confidential 18
Introduction
§§
Intel Confidential 19
Image Creation: Intel® Flash Image Tool
Intel® Flash Image Tool (Intel® FIT) can be used to generate either a full SPI Flash
binary image with Descriptor, GbE, BIOS, and Intel® ME Regions. Additionally, it can be
used to create a simple image containing only the Intel® ME Region only for use with
custom SPI Flash binary image assembly solutions. Use the steps shown in following
sections.
After this image has been created, it will need to be burned onto the target platform’s
SPI Flash device(s). Section 3, “Programming SPI Flash Devices and Checking
Firmware Status”later in this document provides steps to do this.
Note: The Flash Image Tool may be updated throughout the release cycles. As a general rule,
please ensure you use the tools, images and other content from the same kit and
refrain from using different version tools.
Intel Confidential 20
Image Creation: Intel® Flash Image Tool
This button labeled ‘New’ on rollover allows opening of a new session with default
1 New
values
2 Open This button labeled ‘Open’ on rollover allows opening of an xml or bin file
3 Save This button labeled ‘Save’ on rollover allows saving of xml file
4 Clear Console This button labeled ‘Clear Console’ clears the console area (see page 23)
This button labeled ‘Build Settings’ brings up the build settings popup Window
5 Build Settings
see (Table 2-2)
6 Build Image This button labeled ‘Build Image’ on rollover allows build of the image
This button labeled ‘Build Image For FWUpdate’ allows the user to build separate
7 Build Image For FWUpdate
firmware update binaries.
Intel Confidential 21
Image Creation: Intel® Flash Image Tool
8 9 10
9 Drop Down Selector This drop down allows selection of SKU within platform selected
10 Indicator This displays the type of Boot Media Target based on FW being used
Intel Confidential 22
Image Creation: Intel® Flash Image Tool
Intel Confidential 23
Image Creation: Intel® Flash Image Tool
Intel Confidential 24
Image Creation: Intel® Flash Image Tool
Intel Confidential 25
Image Creation: Intel® Flash Image Tool
Intel Confidential 26
Image Creation: Intel® Flash Image Tool
21 Camera
Intel Confidential 27
Image Creation: Intel® Flash Image Tool
Intel Confidential 28
Image Creation: Intel® Flash Image Tool
Intel Confidential 29
Image Creation: Intel® Flash Image Tool
10
11
12
13
14
15
FWUpdate Output Path Double click to the right of FWUpdate.bin and click to get browse button to
specify path and name of file to create for the build - default is
2 FWUpdate.bin in the same folder as Intel® FIT tool
Intel Confidential 30
Image Creation: Intel® Flash Image Tool
7
Yes 32-bit value to use as the IFWI build version number.
Yes This setting enabled Redundancy support for critical layout components.
9 Redundancy Enabled
Yes
Intel® Manifest
12 Extension Utility Path
Yes
Yes
14 Signing Tool
Click on Build Button in the top menu bar> Build Settings window pop up is displayed:
Intel Confidential 31
Image Creation: Intel® Flash Image Tool
Click on Flash Layout in the left tabs menu> Descriptor Region is expanded by default:
Click on Flash Layout in the left tabs menu> BIOS Region is expanded by default:
2
BIOS Region - Length -This displays the length of the BIOS binary.
Note: This value will be automatically populated by Intel® FIT during image
build.
BIOS Binary File UP4 biosimage.bin
Navigate to path to load bios.rom file. This loads the BIOS binary that will be UP3 biosimage.bin
merged into the output image generated by the Intel® FIT tool.
Click on Flash Layout in the left tabs menu> Ifiw: Intel® ME and PMC Region is expanded by default:
Intel Confidential 32
Image Creation: Intel® Flash Image Tool
3
Intel® CSME Binary File UP4 meimage.bin
Navigate to your Source Directory (as specified in Table 2-2) and switch to the UP3 meimage.bin
Intel® CSME subdirectory. Choose the appropriate Intel® CSME Firmware binary
image. This loads the Intel® CSME binary that will be merged into the into the
output image generated by the Intel® FIT tool.
Note: You may choose to build the Intel® CSME Region only. To do so, the Number
of Flash Components in Flash Settings> Flash Components must be set to 0.
Note: If loading meimage.bin file, check that the ME region is enabled in tool
before building image.
Major Version - This displays Major revision number of the currently loaded Intel®
CSME binary.
Minor Version - This displays Minor revision number of the currently loaded Intel®
CSME binary.
Hotfix Version - This displays Hot-Fix revision number of the currently loaded
Intel® CSME binary.
Build Version - This displays Build version number of the currently loaded Intel®
CSME binary.
Chipset Initialization Version - This displays the current Chipset Initialization
version contained in the currently loaded Intel® CSME binary.
Intel Confidential 33
Image Creation: Intel® Flash Image Tool
Chipset Initialization Binary - This loads the Chipset Initialization binary that will UP4 Chipset.bin
be merged into the output image generated by the Intel® FIT. If specified, this will UP3 (Optional)
override the version contained in the Intel® CSME binary to align with the values Chipset.bin
programmed by BIOS. (Optional)
Note: When BIOS passes new Chipset Initialization settings to ME, a Global Reset
is initiated (only required on the first boot, subsequent boots will not incur
a global reset). This allows for the new settings to be stored in the ME
Region and programmed into the PCH. This global reset can be avoided by
loading the proper chipset initialization binary in to the ME Region when
building the image that aligns with the values in BIOS. The Chipset
Initialization Binary will be included in BIOS RC package. If BIOS contains
an older version of Chipset Initialization settings ME will be updated at boot
with the older settings regardless of any newer settings being present in
firmware. In order to avoid this problem and the additional Global Reset
customers should ensure that both BIOS and ME are updated with same
Chipset Initialization binary.
ChipsetInit Override Version - This displays the version of the Chipset
Initialization Binary override if specified.
PMC Binary File - This loads the PMC binary that will be merged into the output UP4 PMC.bin
image generated by the Intel® FIT tool. UP3 PMC.bin
Note: Disable for SKUs and platforms with limited image size, without planned
firmware update support only.
Click on Flash Layout in the left tabs menu> EC Region is expanded by default:
Intel Confidential 34
Image Creation: Intel® Flash Image Tool
Intel Confidential 35
Image Creation: Intel® Flash Image Tool
7
This loads the PCH Configuration binary that will be merged in the output image
generated by the Intel® FIT tool.
Intel Confidential 36
Image Creation: Intel® Flash Image Tool
Note: The GBST sub-partition is used for FuSa safety standards and are
not applicable for client platforms.
GBST Configuration File UP4 GBST.bin
Navigate to path to load GBST.bin file. This loads the GBST Configuration binary. UP3 (Optional)
Version - This displays the version number of the GBST Configuration Sub-
Partition
Length - This displays the length of the GBST Configuration Sub-Partition.
Note: This value will be automatically populated by Intel® FIT during image
build.
Click on Flash Layout in the left tabs menu> PDR Region is expanded by default:
Intel Confidential 37
Image Creation: Intel® Flash Image Tool
Click on Flash Settings in the left tabs menu> Flash Components is expanded by default:
1
Number of Components UP4 1
Values: 0, 1, 2 - This setting configures the total number of flash components for UP3 1
the platform. Note: Choosing a selection of '0' part will cause the Intel® FIT tool to
build an output image containing only the Intel® ME region.
Flash component 1 Size UP4 32MB
Values: 512KB, 1MB, 2MB, 4MB, 8MB, 16MB, 32MB, 64MB - This setting UP3 32MB
determines the size of Flash component 1 for the platform image.
Flash component 2 Size UP4 Greyed Out
Values: 512KB, 1MB, 2MB, 4MB, 8MB, 16MB, 32MB, 64MB - This setting UP3 Greyed Out
determines the size of Flash component 2 for the platform image. Note: This
setting is only applicable when the Number of Flash Components option is set to '2'.
SPI Global Protected Range - This sets the default value of the Global Protected UP4 0x0
Range register in the SPI Flash Controller. UP3 0x0
SPI Idle to Deep Power Down Timeout - This sets SPI Idle to Deep Power Down UP4 0x5
Timeout Default Specifies the time in microseconds that the Flash Controller waits UP3 0x5
after all activity is idle before commanding the flash devices to Deep Power down,
time = 2^N microseconds.
SPI Out of Order operation Enabled - When this setting is enabled priority UP4 Yes
operations may be issued while waiting for write / erase operations to complete on UP3 Yes
the flash device. When this setting is disabled all write / erase type operations in
order.
SPI Resume Hold-off Delay - This specifies the time after the completion of a UP4 4us
pri_op before the flash controller sends the resume instruction. If a new pri_op is UP3 4us
eligible to be issued prior to the end of this delay time then the pri_op is issued
and the timer is reinitialized to tRHD. 3-bit field encodes count with range 0-7.
tRHD = count * 2us.
Intel Confidential 38
Image Creation: Intel® Flash Image Tool
SPI Max write / erase Resume to Suspend intervals - This setting specifies UP4 No Ceiling
the maximum value for the write and erase Resume to Suspend intervals. UP3 No Ceiling
SPI Suspend / Resume Enabled - When this setting is enabled writes and erases UP4 Yes
may be suspended to allow a read to be issued on the flash device. When this UP3 Yes
setting is disabled no transaction will be allowed to the busy flash device.
Software Re-Binding Enabled UP4 No
Values: Yes / No UP3 No
When enabled this settings will allow for SPI re-binding to a new PCH during
manufacturing and re-manufacturing flows prior to platform EOM.
2
Host CPU / BIOS Write Access Intel Recommended UP4 0xFFFF
Values: 0xFfFF, 0x000A, 0x001A, 0x010A, 0x011A - This setting determines UP3 0xFFFF
write access control for the BIOS region.
0xFfFF = Debug/Manufacturing
0x000A = Production
0x001A = Production with access to PDR (should ONLY be used if PDR region is
implemented).
0x010A = Production with access to EC
0x011A = Production with access to EC and PDR
Custom = User custom Host / BIOS Write Access values
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
Host CPU / BIOS Write Access Custom - This setting allows free form user UP4 Hex Input
customized Host CPU / BIOS Write Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the Host CPU /
BIOS Write Access Intel Recommended drop down menu.
Intel Confidential 39
Image Creation: Intel® Flash Image Tool
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide.
Host CPU / BIOS Read Access Custom - This setting allows free form user UP4 Hex Input
customized Host CPU / BIOS Read Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the Host CPU /
BIOS Read Access Intel Recommended drop down menu.
3
Intel® ME Write Access Intel Recommended UP4 0xFFFF
Values: 0xFFFF, 0x0004- This setting determines write access control for the ME UP3 0xFFFF
region.
0xFFFF = Debug/Manufacturing
0x0004 = Production
Custom = User custom Intel® ME Write Access values
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
Intel® ME Write Access Custom - This setting allows free form user customized UP4 Hex Input
Intel® ME Write Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the Intel® ME
Write Access Intel Recommended drop down menu.
Intel Confidential 40
Image Creation: Intel® Flash Image Tool
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
Intel® ME Read Access Custom - This setting allows free form user customized UP4 Hex Input
Intel® ME Read Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the Intel® ME
Read Access Intel Recommended drop down menu.
4
GbE Write Access Intel Recommended UP4 0xFFFF
Values: 0xFFFF, 0x0008 - This setting determines write access control for the UP3 0xFFFF
Gigabit Ethernet Region.
0xFFFF = Debug/Manufacturing
0x0008 = Production
Custom = User custom GbE Write Access values
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
GbE Write Access Custom - This setting allows free form user customized GbE UP4 Hex Input
Write Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the GbE Write
Access Intel Recommended drop down menu.
Intel Confidential 41
Image Creation: Intel® Flash Image Tool
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
GbE Read Access Custom - This setting allows free form user customized GbE UP4 Hex Input
Read Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the GbE Read
Access Intel Recommended drop down menu.
5
EC Write Access Intel Recommended UP4 0xFFFF
Values: 0xFFFF, 0x0100 - This setting determines write access control for the UP3 0xFFFF
Embedded Controller Region.
0xFFFF = Debug/Manufacturing
0x0100 = Production
Custom = User custom EC Write Access values
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
EC Write Access Custom - This setting allows free form user customized EC Write UP4 Hex Input
Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the EC Write
Access Intel Recommended drop down menu.
Intel Confidential 42
Image Creation: Intel® Flash Image Tool
For further details on Region Access Control see Tiger Lake LP SPI Programming
guide further details.
EC Read Access Custom - This setting allows free form user customized EC Read UP4 Hex Input
Access regions permissions UP3
Note: This setting is grayed out unless Custom is selected under the EC Read
Access Intel Recommended drop down menu.
Intel Confidential 43
Image Creation: Intel® Flash Image Tool
Intel Confidential 44
Image Creation: Intel® Flash Image Tool
7
VSCC Entries
W25Q128BV
VSCC Entries UP4
UP3
8
Name - This setting allow the OEM input a name designation for each flash UP4 Winbond
component being used. Note: This is a free form entry field it does not affect actual UP3 Winbond
flash component operation.
Vendor ID - This configures the JEDEC vendor specific byte ID of the SPI flash UP4 0xEF
component. See Tiger Lake LP SPI Programming guide for further details. UP3 0xEF
device ID 0 - This configures the JEDEC device specific byte ID 0 of the SPI flash UP4 0x40
component. See Tiger Lake LP SPI Programming guide for further details. UP3 0x40
device ID 1 - This configures the JEDEC device specific byte ID 1 of the SPI flash UP4 0x19
component. See Tiger Lake LP SPI Programming guide for further details. UP3 0x19
+ Add VSCC Entry
9
Click on Flash Settings in the left tabs menu> BIOS Configuration is expanded by default:
Intel Confidential 45
Image Creation: Intel® Flash Image Tool
10
# Parameter Platform
BIOS Configuration
10
BIOS Redundancy Assistance UP4 Disabled
Values: Enabled, Disabled UP3 Disabled
In cases of BIOS boot failure, Intel®CSME will configure the platform to boot with
backup BIOS using Top Swap when this setting is enabled.
11
FPF Configuration
11
Hardware Binding Enabled UP4 Disabled
Values: Enabled / Disabled UP3 Disabled
This setting configures the FPF Hardware binding behavior for the platform image.
If this setting is enabled FPF Hardware binding will occur when platform close
manufacturing flow is executed with Intel® FPT. If this setting is disabled FPF
Hardware binding will not take place when close manufacturing flow is executed.
For Revenue parts this setting will be ignored and FPF Hardware binding will take
place when close manufacturing flow is executed.
Click on Flash Settings in the left tabs menu> RPMC Configuration is expanded by default:
Intel Confidential 46
Image Creation: Intel® Flash Image Tool
12
RPMC Configuration
12
RPMC Supported UP4 No
Values: Yes / No UP3 No
Intel Confidential 47
Image Creation: Intel® Flash Image Tool
Click on Intel® ME Kernel in the left tabs menu> Processor is expanded by default:
1
Processor Emulation UP4 EMULATE Intel®
Values: No Emulation UP3 Core (TM)
branded
EMULATE Intel® vPro (TM) capable Processor
Processor
EMULATE Intel® Core (TM) branded Processor
EMULATE Intel®
EMULATE Intel® Celeron (R) branded Processor Core (TM)
EMULATE Intel® Pentium (R) branded Processor branded
EMULATE Intel® Xeon (R) branded Processor Processor
EMULATE Intel® Xeon (R) Manageability capable Processor
This setting determines processor type to be emulated on pre-production silicon.
Set this parameter to the type of processor that the target system will use during
production. This field will emulate that processor class for pre-production silicon. It
is necessary to set this to Emulate Intel® vPro™ Processor in order to enable Intel®
AMT.
Click on Intel® ME Kernel in the left tabs menu> Intel® ME Firmware Update is expanded by default:
2
Firmware Update OEM ID - This setting allows configuration of an OEM unique ID UP4 0 string
to ensure that customers can only update their platform with images from the OEM UP3 0 string
of the platform.
Hide Intel® MEBx Firmware Update Control UP4 No
Values: Yes/No - This setting allows the customer to hide the Firmware Update UP3 No
option in the Intel® MEBx interface.
Intel® ME Region Flash Protection Override UP4 Yes
Values: Yes/No - This setting enables descriptor unlock of the Intel® CSME UP3 Yes
Region when the HMRFPO message is sent to firmware prior to BIOS End of POST.
Click on Intel® ME Kernel in the left tabs menu> Image Identification is expanded by default:
Intel Confidential 48
Image Creation: Intel® Flash Image Tool
3
OEM Tag - This is a free form 32bit field that allows the OEM to configure their own UP4 0x00000000
unique identifier in the firmware image. UP3 0x00000000
Click on Intel® ME Kernel in the left tabs menu> Firmware Diagnostics is expanded by default:
4
Automatic Built in Self Test UP4 Disabled
Values: Enabled/Disabled UP3 Disabled
This setting enables the firmware Automatic Built in Self Test which is executed
during first platform boot after initial image flashing.
Click on Intel® ME Kernel in the left tabs menu> End of Manufacturing Configuration is expanded by default:
5
EOM of First Boot Enabled UP4 No
Value: Yes/No UP3 No
This setting determines if End of Manufacturing will be triggered on first boot of the
platform after flashing. Note: When this setting is enabled Intel® CSME will enter
End of Manufacturing regardless of the descriptor settings.
Intel Confidential 49
Image Creation: Intel® Flash Image Tool
6
MCTP Stack Configuration UP4 0x920030
Defines the Intel® ME’s 8-bits MCTP Endpoint ID’s for each SMBus physical UP3 0x920030
interface (SMBus, SMLink0, and SMLink1). These values are needed for FW to
communicate with MCTP end points. For each of these 3 bytes, a value of 0x00
means not used, and values 0xFF or 0x01 - 0x07 or 0x20 - 0x2F are not allowed.
MctpdevicePortEc UP4 0x02
UP3 0x02
MctpdevicePortSio UP4 0x00
UP3 0x00
MctpdevicePortIsh UP4 0x00
UP3 0x00
MctpdevicePortBmc UP4 0x00
UP3 0x00
Click on Intel® ME Kernel in the left tabs menu> Intel® ME Boot Configuration is expanded by default:
Intel Confidential 50
Image Creation: Intel® Flash Image Tool
7
Persistent PRTC Backup Power UP4 Exists
Values: None / Exists UP3 Exists
FPF that indicates if the device is designed such that it may lose PRTC power more
than 10 times throughout the normal life-cycle of the product and hence has no
persistent time or AR protection. At EOM this value is burned to the FPF, and can
never be changed
Click on Intel® ME Kernel in the left tabs menu> Intel® ME Measured Boot Configuration is expanded by default:
8
Intel® ME Measured Boot State UP4 Disabled
Values: Disabled / EnabledIntel® UP3 Disabled
When measured boot is enabled firmware will use additional extended registers for
all IUPs and Key Manifests that firmware loads and verifies from flash. When
measured boot is enabled any IUPs or firmware updates will require a global reset.
9
Intel® ME Assisted BIOS Boot UP4 Normal
Values: Normal / Intel® ME Assisted UP3 Normal
This setting configures Intel® ME Assisted BIOS Boot capabilities.
Intel Confidential 51
Image Creation: Intel® Flash Image Tool
10
Reserved
10
Reserved UP4 No
Values: Yes/No UP3 No
Intel Confidential 52
Image Creation: Intel® Flash Image Tool
Click on Intel® AMT in the left tabs menu> Intel® AMT is expanded by default:
1
Intel® AMT Supported UP4 No
Values: Yes/No - This setting allows customers to disable Intel® AMT on the UP3 No
platform and force the platform into Standard Manageability mode.
Note: If this setting has been set to disabled Intel® AMT cannot be re-enabled
once the descriptor has been locked. This setting applies to Desktop and
Workstation only.
Manageability Application Hardware Status UP4 Enabled
Values: Enabled / Disabled - This setting will permanently disable Manageability UP3 Enabled
hardware through platform FPFs. At End-of-Manufacturing (EOM), enable/disable
policy value is committed to FPF and can never be changed. Permanently disabling
Manageability hardware with this setting requires “Manageability Application
Supported” and “Disabled” and “Intel® ME Network Services Supported” are set to
“No”.
Note: When “Manageability Application Hardware Status” is Enabled but
“Manageability Application Supported” and “Intel® ME Network Services
Supported” are set to “No”, Manageability Hardware will be disabled by the
Intel®CSME through CVAR.
Intel® ME Network Services Supported UP4 No
Values: Yes/No - This setting allows customers to enable / disable Intel® ME UP3 No
Network Services on the platform.
Note: This setting and TLS needs to be enabled for proper operation of Intel®
Authenticate (Corporate Only). In addition if this setting is disabled Intel®
AMT will also be disabled.
Intel® Manageability Application Supported UP4 No
Values: Yes/No - This setting allows customers to force Intel® AMT enabled UP3 No
platforms to operate in Standard Manageability mode.
Note: If this setting is disabled Intel® AMT or Standard Manageability can still be
re-enabled through the Intel® MEBx interface.
Intel Confidential 53
Image Creation: Intel® Flash Image Tool
Note: This feature only allows one reset at a time when the watchdog expires.
After this feature has triggered a reset, it must be re-armed for reuse via
management console.
Click on Intel® AMT in the left tabs menu> KVM Configuration is expanded by default:
2
Firmware KVM Screen Blanking UP4 No
Values: Yes/No - This setting enables KVM Screen blanking capabilities in the UP3 No
firmware image.
Note: If this setting has been set to disabled it cannot be re-enabled once the
descriptor has been locked.
Click on Intel® AMT in the left tabs menu> Provisioning Configuration is expanded by default:
# Parameter Platform
Provisioning Configuration
Intel Confidential 54
Image Creation: Intel® Flash Image Tool
Note: The Intel® FIT tool will not adjust the Redirection Privacy/Security value
based on selection here. Please set security level as needed.
PKI Domain Name Suffix - This setting allow OEMs to pre-configure the Domain UP4 -
Name Suffix used for PKI provisioning in their firmware image. UP3 -
Note: For normal out-of-box provisioning functionality this setting should be left
empty.
Click on Intel® AMT in the left tabs menu> OEM Customizable Certificate 1 is expanded by default:
4
Certificate Enabled UP4 No
Values: Yes/No - This setting allows customers to enable PKI provisioning Custom UP3 No
Certificate 1.
Certificate Friendly Name - This setting allows customers to assign a user UP4 -
friendly name for PKI provisioning Custom Certificate 1. Maximum of 32 characters. UP3 -
Certificate Stream - This setting allows customers to input hash stream for PKI UP4 -
provisioning Custom Certificate 1. If enabled the certificate will be used in addition UP3 -
to those already pre-loaded in base firmware during provisioning.
Intel Confidential 55
Image Creation: Intel® Flash Image Tool
6
Certificate Enabled UP4 No
Values: Yes/No - This setting allows customers to enable PKI provisioning Custom UP3 No
Certificate 3.
Certificate Friendly Name - This setting allows customers to assign a user UP4 -
friendly name for PKI provisioning Custom Certificate 3. Maximum 32 characters. UP3 -
Certificate Stream - This setting allows customers to input hash stream for PKI UP4 -
provisioning Custom Certificate 3. If enabled the certificate will be used in addition UP3 -
to those already pre-loaded in base firmware during provisioning.
Intel Confidential 56
Image Creation: Intel® Flash Image Tool
Note: Default Certificates if enabled will be used in addition to those already pre-
loaded in firmware during provisioning. Unlike Customizable Certificates
the Default Certificates are not deleted when the platform is un-
provisioned.
Click on Intel® AMT in the left tabs menu> OEM Default Certificate 2 is expanded by default:
8
Certificate Enabled UP4 No
Values: Yes/No - This setting allows customers to enable PKI provisioning Default UP3 No
certificate 2.
Certificate Friendly Name - This setting allows customers to assign a user UP4 -
friendly name for PKI provisioning Default Certificate 2. Maximum 32 characters. UP3 -
Certificate Stream - This setting allows customers to input hash stream for PKI UP4 -
provisioning custom certificate 2. UP3 -
Note: Default Certificates if enabled will be used in addition to those already pre-
loaded in firmware during provisioning. Unlike Customizable Certificates
the Default Certificates are not deleted when the platform is un-
provisioned.
Click on Intel® AMT in the left tabs menu> OEM Default Certificate 3 is expanded by default:
Intel Confidential 57
Image Creation: Intel® Flash Image Tool
9
Certificate Enabled UP4 No
Values: Yes/No - This setting allows customers to enable PKI provisioning Default UP3 No
certificate 3.
Certificate Friendly Name - This setting allows customers to assign a user UP4 -
friendly name for PKI provisioning Default Certificate 3. Maximum 32 characters. UP3 -
Certificate Stream - This setting allows customers to input hash stream for PKI UP4 -
provisioning custom certificate 3. UP3 -
Note: Default Certificates if enabled will be used in addition to those already pre-
loaded in firmware during provisioning. Unlike Customizable Certificates
the Default Certificates are not deleted when the platform is un-
provisioned.
Click on Intel® AMT in the left tabs menu> OEM Default Certificate 4 is expanded by default:
10
10
Certificate Enabled UP4 No
Values: Yes/No - This setting allows customers to enable PKI provisioning Default UP3 No
certificate 4.
Certificate Friendly Name - This setting allows customers to assign a user UP4 -
friendly name for PKI provisioning Default Certificate 4. UP3 -
Certificate Stream - This setting allows customers to input hash stream for PKI UP4 -
provisioning custom certificate 4. UP3 -
Note: Default Certificates if enabled will be used in addition to those already pre-
loaded in firmware during provisioning. Unlike Customizable Certificates
the Default Certificates are not deleted when the platform is un-
provisioned.
Click on Intel® AMT in the left tabs menu> OEM Default Certificate 5 is expanded by default:
11
Intel Confidential 58
Image Creation: Intel® Flash Image Tool
11
Certificate Enabled UP4 No
Values: Yes/No - This setting allows customers to enable PKI provisioning Default UP3 No
certificate 5.
Certificate Friendly Name - This setting allows customers to assign a user UP4 -
friendly name for PKI provisioning Default Certificate 5. UP3 -
Certificate Stream - This setting allows customers to input hash stream for PKI UP4 -
provisioning custom certificate 5. UP3 -
Note: Default Certificates if enabled will be used in addition to those already pre-
loaded in firmware during provisioning. Unlike Customizable Certificates
the Default Certificates are not deleted when the platform is un-
provisioned.
Click on Intel® AMT in the left tabs menu> Redirection Configuration is expanded by default:
12
12
Redirection Localized Language - This setting allows customers to configure UP4 English
which localized language will be used initially by firmware for user consent output UP3 English
information (Examples: May be displayed before SOL / KVM session starts).
Redirection Privacy / Security Level - This setting allows customers to UP4 Default
configure the Privacy and Security level for redirection operations. UP3 Default
Default enables all redirection ports (User consent is configurable).
Enhanced - Enables all redirection ports. (User consent is required and cannot be
disabled).
Extreme - Disables Redirection and Remote Configuration / Client Control Mode.
Note: The Intel® FIT tool will not adjust the Embedded Host Based Configuration
value based on selection here. Please set EHBC to yes or no as needed.
Click on Intel® AMT in the left tabs menu> TLS Configuration is expanded by default:
13
13
Intel Confidential 59
Image Creation: Intel® Flash Image Tool
Note: If this is disabled TLS will be permanently disabled in the firmware image.
This setting needs to be enabled along with along with the Intel® ME
Network Services Supported for proper operation of the Intel®
Authenticate (Corporate Only) feature.
Intel Confidential 60
Image Creation: Intel® Flash Image Tool
Click on Platform Protection in the left tabs menu> Content Protection is expanded by default:
1
PAVP Supported UP4 Yes
Values: Yes/No UP3 Yes
This setting determines if the Protected Audio Video Path (PAVP) feature will be
permanently disabled in the FW image.
HDCP Internal Display Port 1 - 5K UP4 PortA
Values: None, Port A, Port B, Port C, Port D UP3 PortA
This setting determines which port is connected for 5K output on the Internal
Display 1.
Note: Both Display Port 1 & 2 need to be configured for proper operation.
HDCP Internal Display Port 2 - 5K UP4 None
Values: None, Port A, Port B, Port C, Port D UP3 None
This setting determines which port is connected for 5K output on the Internal
Display 2.
Note: Both Display Port 1 & 2 need to be configured for proper operation.
Click on Platform Protection in the left tabs menu> Graphics uController is expanded by default:
2
GuC Encryption Key UP4 0x00000000
Values: This option is for entering the raw hash 256 bit string or certificate file for UP3 0x00000000
the Graphics uController.
Click on Platform Protection in the left tabs menu> Hash Key Configuration for Bootguard / ISH is expanded by
default:
Intel Confidential 61
Image Creation: Intel® Flash Image Tool
# Parameter Platform
Hash Key Configuration for Bootguard / ISH
3
OEM Public Key Hash UP4 0x00000000
Values: This option is for entering the raw hash string or certificate file for Boot UP3 0x00000000
Guard and ISH. This 384-bit field represents the SHA-384 hash of the OEM public
key corresponding to the private key used to sign the BIOS-SM or ISH image.
Please see Appendix E for further details.
OEM Key Manifest Binary UP4
Signed manifest file containing hashes of keys used for signing components of UP3
image. This setting is only configurable when OEM signing is enabled (See
PlatformIntegrity / OemPublicKeyHash).
Second OEM Key hash UP4 0x00000000
This option is for entering a secondary raw hash string or certificate file for Boot UP3 0x00000000
Guard and ISH used in instances of OEM Key Revocation. This 384-bit field
represents the SHA-384 hash of the OEM public key corresponding to the private
key used to sign the BIOS-SM or ISH image. Please see Appendix E for further
details.
Note: This setting is greyed out and not configurable until the Second OEM Key
Revocation Enable is set to Yes.
OEM Key Revocation Enabled UP4 No
Values: Yes/No UP3 No
This setting enables firmware OEM Key Revocation capabilities.
Note: This setting requires that both OEM Public Key Hash and Second OEM Key
Hash are configured.
Skip OEM Key Check UP3 No
Values: Yes/No UP4 No
This is meant for debugging purposes only. Enabling this parameter impacts image
creation procedure in FIT tool only.
Click on Platform Protection in the left tabs menu> Descriptor Configuration is expanded by default:
Intel Confidential 62
Image Creation: Intel® Flash Image Tool
# Parameter Platform
Descriptor Configuration
4 These settings are used for FuSa safety standards and are not applicable
for client platforms.
Flash Descriptor Verification Enabled UP4 No
Values: Yes/No UP3 No
This setting enables / disables Flash Descriptor Verification.
Descriptor Signing Key UP4 -
Values: Hex UP3 -
This is the path to the private key used to sign the Descriptor, while public key hash
of it is included in the OEM hash manifest. This setting is only configurable when
Flash Descriptor Verification is enabled (See PlatformIntegrity/FdvEnabled).
exclude master access in the signature UP4 No
Values: Yes/No UP3 No
Include/exclude master access in the signature.
Click on Platform Protection in the left tabs menu> Exclusion Ranges is expanded by default:
Intel Confidential 63
Image Creation: Intel® Flash Image Tool
# Parameter Platform
Exclusion Ranges
5 These settings are used for FuSa safety standards and are not applicable
for client platforms.
Range 1 offset UP4 0x800
Range 1 offset covers manifest, cannot be changed UP3 0x800
Range 1 size UP4 0x400
Range 1 size covers manifest, cannot be changed. UP3 0x400
Range 2 offset UP4 0x80
Range 2 offset covers manifest, cannot be changed UP3 0x80
Range 2 size UP4 0x20
Range 2 size covers manifest, cannot be changed. UP3 0x20
Range 3 offset UP4 0x0
Values: Hex UP3 0x0
Range 3 offset covers OEM defined unprotected range start.
Range 3 size UP4 0x0
Values: Hex UP3 0x0
Range 3 size covers OEM defined unprotected range length
Intel Confidential 64
Image Creation: Intel® Flash Image Tool
6
Key Manifest ID UP4 0x0
Values: This option is for entering the hash of another public key, used by the ACM UP3 0x0
to verify the Boot Policy Manifest.
Intel Confidential 65
Image Creation: Intel® Flash Image Tool
7
IO Manageability Engine Manifest Anti-Rollback Enabled UP4 Yes
Values: Yes/No UP3 Yes
This setting enables Anti-Rollback for the Type-C Subsystem I/O Manageability
Engine binary.
NPHY Manifest Anti-Rollback Enabled UP4 Yes
Values: Yes/No UP3 Yes
This setting enabled Anti-Rollback for the Type-C Subsystem NPHY binary.
ThunderboltTM Manifest Anti-Rollback Enabled UP4 Yes
Values: Yes/No UP3 Yes
This setting enabled Anti-Rollback for the Type-C Subsystem ThunderboltTM binary.
Click on Platform Protection in the left tabs menu> Intel® PTT Configuration is expanded by default:
Intel Confidential 66
Image Creation: Intel® Flash Image Tool
8
Intel® PTT Supported UP4 Yes
Values: Yes/No - This setting permanently disables Intel® PTT in the firmware UP3 Yes
image.
Intel® PTT initial power-up state UP4 Enabled
Values: Enabled/Disabled - This setting determines if Intel® PTT is enabled on UP3 Enabled
platform power-up.
Intel® PTT Supported [FPF] UP4 Yes
Values: Yes/No - This setting will permanently disable Intel® PTT through UP3 Yes
platform FPFs.
Caution: Setting this option to Yes will permanently disable Intel® PTT on
the platform hardware.
SMx Support state UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
This setting enables/disables SMx support.
Click on Platform Protection in the left tabs menu> TPM Over SPI Bus Configuration is expanded by default:
9
TPM Clock Frequency UP4 14MHz
Values: 14MHz, 25MHz, 48MHz - This setting determines the clock frequency UP3 14MHz
setting to be used for the TPM over SPI bus.
TPM Over SPI Bus Enabled UP4 No
Values: Yes/No - This setting determines if TPM over SPI bus is enabled on the UP3 No
platform.
Click on Platform Protection in the left tabs menu> BIOS Guard Configuration is expanded by default:
Intel Confidential 67
Image Creation: Intel® Flash Image Tool
10
10
BIOS Guard Protection Override Enabled UP4 No
This setting allows BIOS Guard to bypass SPI flash controller protections (i.e. UP3 No
Protected Range Registers and Top Swap).
Click on Platform Protection in the left tabs menu> TXT Configuration is expanded by default:
11
11
TXT Supported UP4 No
This setting determines if enabled for the platform. UP3 No
Click on Platform Protection in the left tabs menu> Crypto Hardware Support is expanded by default:
12
12
Crypto HW Support UP4 Yes
Values: Yes/No - This setting can be used to disable Intel® CSME cryptographic UP3 Yes
functionality.
Caution: Configuring this setting to “No” will disables all Intel® CSME
cryptographic related features.
Click on Platform Protection in the left tabs menu> Platform Trusted Device Setup Support is expanded by default:
Intel Confidential 68
Image Creation: Intel® Flash Image Tool
13
13
Enable TDS Capabilities UP4 No
Values: Yes/No - This setting enables Intel® Trusted Device Setup on the UP3 No
platform.
Click on Platform Protection in the left tabs menu> FuSa Configuration is expanded by default:
14
14 These settings are used for FuSa safety standards and are not applicable
for client platforms.
Intel Confidential 69
Image Creation: Intel® Flash Image Tool
Click on Integrated Clock Controller in the left tabs menu> Integrated Clock Controller Policies are expanded by
default:
1
Boot Profile UP4 Profile 0
UP3 Profile 0
This parameter allows user to select default profile to be used by the final
generated SPI Flash binary image for the target platform at boot time.
The ‘Record #’ refers to profile created under the “Integrated Clock Controller |
Profiles”.
Default boot profile for system is Profile 0.
Double click on value column of this parameter to choose from available options.
Failsafe Profile UP4 Profile 0
UP3 Profile 0
This parameter specifies the profile index of the fail-safe profile. On boot failure
detection or CMOS clear the Intel® ME Firmware will revert to this profile if
“Integrated Clock Controller |Integrated Clock Controller Policies - Profile
Changeable “ is set to True. If profile Changeable parameter is set to False, User
can not select Failsafe Boot Profile and profile 0 will be selected as a fail safe boot
profile by default.
The ‘Record #’ refers to profile created under the “Integrated Clock Controller |
Profiles”.
Default Failsafe boot profile for system is Profile 0.
Double click on value column of this parameter to choose from available options.
Profile Changeable UP4 True
UP3 True
Possible configuration: True/False.
This parameter controls if BIOS or 3rd party application can select boot profile or
not. When set to true, it allows user to change boot profile via BIOS or 3rd party
application. When set to false, Runtime change to boot profile is not allowed and
boot profile selected by “Integrated Clock Controller |Integrated Clock
Controller Policies - Boot Profile “ parameter will be used to boot platform.
Double click on value column of this parameter to choose from available options.
Click on Integrated Clock Controller in the left tabs menu> Profiles >Profile> Bclk Clock Configuration is
expanded by default:
Intel Confidential 70
Image Creation: Intel® Flash Image Tool
2
BCLK Clock Configuration Enabled UP4 Disabled
Values: Enabled / Disabled UP3 Disabled
This setting enables / disables BCLK Clock configuration values for Adaptive /
Overclocking profiles
Click on Integrated Clock Controller in the left tabs menu> Profiles are expanded by default:
4
3
Intel Confidential 71
Image Creation: Intel® Flash Image Tool
For UP3/UP4, Intel® FIT provides 2 pre-defined ICC profiles to choose from.
•Standard: This profile provides default settings for standard configuration, no
adaptive clocking is allowed. Platform clocks output internal and external are driven
from USB3PCIE clock. Default clock frequency is 100 MHz with 0.47%DownSpread.
BCLK clock source should be turned off in this case to save power.
•Adaptive: This profile provides Wimax/3G friendly configuration. This profile will
configure the platform based on the Adaptive profile allowing adaptive clocking
adjustment for BCLK clock source to reduce EMI interference. It supports default
clock frequency of 98.875 MHz with 0.48% Downspread.
For TGL UP3/UP4, Intel® FIT provides 5 pre-defined ICC profiles to choose from.
•Standard
•Adaptive
Note: User can select pre-defined profiles via “Integrated Clock Controller |
Profiles - Profile Type “ parameter
User can add up to maximum 16 profiles.To add new profile, please use
“Integrated Clock Controller | Profiles - + Add Profile Button”
Profile Name UP4 Profile 0
UP3 Profile 0
This parameter allows user to customize profile name for easy identification. By
default it uses pre-defined profile name like Profile 0.
Profile Type UP4 Standard
UP3 Standard
Available ICC profiles for TGL UP3/UP4 are Standard, Adaptive.
This parameter indicates which pre- defined profile selected for each profile#.
Double click on value column of this parameter to choose from available options.
+ Add Profile Button UP4
UP3
4 This button is used to add new ICC profile. User can add up to maximum 16
profiles. New profile will be added under “Integrated Clock Controller |
Profiles” tab.
Click on Integrated Clock Controller in the left tabs menu> Profiles >Profile> Clock Range Definition Record is
expanded by default:
Intel Confidential 72
Image Creation: Intel® Flash Image Tool
5
BCLK PLL Clock Source Maximum Frequency - This parameter allows user to UP4
specify the maximum frequency that can be applied to BCLK clock source when UP3
overclocking the platform. Value is limited by divider/frequency limits determined
by HW SKU, and cannot be less than 100 MHz.
Intel Confidential 73
Image Creation: Intel® Flash Image Tool
6
SRC0[6:15] UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
These parameters come under the Power Management section and they control
Enabling /Disabling of specific Output Clocks at boot time.
These settings should match with platform
hardware design.
Intel Confidential 74
Image Creation: Intel® Flash Image Tool
Click on Integrated Clock Controller in the left tabs menu> Profiles >Profile> Power Management Configuration is
expanded by default:
Intel Confidential 75
Image Creation: Intel® Flash Image Tool
Click on Integrated Clock Controller in the left tabs menu> Profiles >Profile> PCIe RefClock Configuration is
expanded by default:
8
SSCEN UP4 Enabled
Values: Enabled / Disabled UP3 Enabled
Intel Confidential 76
Image Creation: Intel® Flash Image Tool
Click on Networking & Connectivity in the left tabs menu> Discrete vPro NIC is expanded by default:
1
Platform vPro 2.5G Wired LAN Enabled UP4 No
Values: Yes / No UP3 No
This setting enables / disables Discrete Intel® vPro Network adapter support on the
platform.
Platform vPro 2.5G Wired LAN slave SMBus Address UP4 0x0
Values: Hex UP3 0x0
This setting configures the SMBus address for the Discrete Intel®vPro Network
adapter.
Click on Networking & Connectivity in the left tabs menu> Docking Station is expanded by default:
2
vPro Dock Enabled UP4 No
This setting enables Intel® vPro communication over supported NIC in a UP3 No
ThunderboltTM Dock.
vPro 2.5G Wired LAN on dock slave SMBus Address UP4 0x0
This setting configures the NIC SMBus slave address. UP3 0x0
Type-C Port1 Re-Timer SMBus Address UP4 0x20
This setting configures Intel® SMBus Address. UP3 0x20
Type-C Port2 Re-Timer SMBus Address UP4 0x21
This setting configures Intel® SMBus Address. UP3 0x21
Intel Confidential 77
Image Creation: Intel® Flash Image Tool
3
LAN Power Well UP4 SLP_LAN#
Values: Core Well, Sus Well, ME Well, SLP_LAN - This setting allows customers UP3 SLP_LAN#
to configure the power well that will be used by Intel® Integrated LAN.
Note: Recommended setting is SLP_LAN#.
LAN PHY Power Up Time UP4 100ms
Values: 50ms, 100ms UP3 100ms
Intel® Integrated Wired LAN Enable UP4 Enabled
Values: Enabled/Disabled - This setting enables or disables the Intel® UP3 Enabled
Integrated LAN.
GbE PCIe Port Select UP4 Port 7
Values: None, PORT7, PORT8, PORT9 - This setting allows customers to UP3 Port 7
configure the PCIe Port that will Intel® Integrated LAN will operate on.
GbE PHY SMBus Address UP4 0x64
This setting configures Intel® Integrated Wired LAN PHY SMBus address to accept UP3 0x64
SMBus cycles from the MAC. Note: Recommended setting is 64h.
GbE SMBus Address Enabled UP4 Yes
Values: Yes/No - This enables the Intel® Integrated Wired LAN MAC SMBus UP3 Yes
address. Note: This setting must be enabled if using Intel® Integrated LAN.
GbE MAC SMBus Address UP4 0x70
This setting configures Intel® Integrated Wired LAN MAC SMBus address to accept UP3 0x70
SMBus cycles from the PHY. Note: Recommended setting is 70h.
PHY Connection UP4 PHY on SMLink0
Values: No PHY connected, PHY on SMLink0 UP3 PHY on SMLink0
Intel Confidential 78
Image Creation: Intel® Flash Image Tool
4
CLINK Enabled UP4 No
Values: Yes/No UP3 No
This setting allows customers to enable / disable the Wireless LAN CLINK signal
through Intel® CSME firmware.
Note: For using Intel® vPro Wireless solutions this should be set to “Yes”.
WLAN Microcode UP4 0xA0F0
This setting allow OEMs to configure which Intel® Wireless LAN card microcode to UP3 0xA0F0
load into the firmware image.
WLAN Power Well UP4 SLP_WLAN#
Values: Disabled, Sus Well, ME Well, SLP_M#||SPDA, SLP_WLAN# UP3 SLP_WLAN#
This setting allows OEMs to configure the power well that will be used by Intel®
Wireless LAN.
Note: This setting should be enabled if the WLAN adapter on the platform is
CNVi.
SLP_WLAN# / GPD9 Signal Configuration UP4 Enable as
Values: SLP_WLAN#, GPD9 UP3 SLP_WLAN#
This setting allows the customer to assign the WLAN Power Control signal to WLAN Enabled as
or as GDP9. SLP_WLAN #
Note: If using Intel® Wireless LAN this setting should be set to “Enable as
SLP_WLAN#”.
Click on Networking & Connectivity in the left tabs menu> Time Sensitive Networking Configuration is expanded
by default:
Intel Confidential 79
Image Creation: Intel® Flash Image Tool
Note: Time Sensitive Networking and Wired LAN are mutually exclusive only one
of these features can enabled on the platform.
TSN GbE PCIe Port Select UP4 None
Values: None, TSN PORT6, TSN PORT 7 - This setting allows customers to UP3 None
configure the PCIe port that TSN will operate on.
Note: The Intel® Integrated LAN and TSN GbE are mutually exclusive.
Intel Confidential 80
Image Creation: Intel® Flash Image Tool
Click on Internal PCH Buses in the left tabs menu> PCH Timer Configuration is expanded by default:
1
PCH clock output stable to PROCPWRGD high (tPCH45) UP4 1ms
Values: 100ms, 50ms, 5ms, 1ms - This setting configures the minimum timing UP3 1ms
from XCK_PLL locked to CPUPWRGD high. For further details see Tiger Lake LP
Platform Controller Hub EDS.
PCIe Power Stable Timer (tPCH33) UP4 Disabled
Values: Enabled/Disabled - This setting configures the enables / disables the t36 UP3 Disabled
timer. When enabled PCH will count 99ms from PWROK assertion before PLTRST# is
de-asserted.
Intel Confidential 81
Image Creation: Intel® Flash Image Tool
2
Intel® SMLink0 MCTP Address UP4 0x0
This setting configures the Intel® SMLink0 MCTP Address. UP3 0x0
Note: This setting is only used for testing.
Intel® SMLink0 MCTP Address Enabled UP4 No
Value: Yes/No UP3 No
This setting configures the Intel® SMLink0b MCTP Address.
Note: This setting is only used for testing.
Intel® SMBus ASD Address - This setting configures the Intel® SMBus Alert UP4 0x0
Sending device Address. For details see Tiger Lake LP SPI Programming guide for UP3 0x0
further details.
Intel Confidential 82
Image Creation: Intel® Flash Image Tool
Intel Confidential 83
Image Creation: Intel® Flash Image Tool
3
DMI Lane Reversal UP4 No
Values: Yes/No - This setting allows the DMI Lane signals to be reversed. For UP3 No
further details see Tiger Lake LP Platform Controller Hub EDS.
DMI Port Staggering UP4 Yes
Values: Yes/No - This setting configures DMI for Port Staggering. For further UP3 Yes
details see Tiger Lake LP Platform Controller Hub EDS.
Click on Internal PCH Buses in the left tabs menu> OPI Configuration is expanded by default:
4
OPI Link Speed UP4 2 GT/s
Values: GT2/GT4 - This setting configures the OPI / DMI Link Speed. For further UP3 4 GT/s
details see Tiger Lake PCH EDS.
OPI Link Voltage UP4 0.85 Volts
Values: 0.85 Volts, 0.95 Volts, 1.05 Volts - This setting configures the OPI / UP3 0.95 Volts
DMI Link Voltage. For further details see Tiger Lake PCH EDS.
OPI Link Width UP4 8 Lanes
Values: 1 Lanes, 2 Lanes, 4 Lanes, 8 Lanes - This setting configures the OPI / UP3 8 Lanes
DMI Link Width. For further details see Tiger Lake PCH EDS.
Click on Internal PCH Buses in the left tabs menu> eSPI Configuration is expanded by default:
Intel Confidential 84
Image Creation: Intel® Flash Image Tool
5
eSPI / EC Bus Frequency UP4 20MHz
Value: 20MHz, 25MHz, 33MHz, 50MHz UP3 20MHz
Indicates the maximum frequency of the eSPI bus that is supported by the eSPI
Master and platform configuration (trace length, number of Slaves, etc.). The
actual frequency of the eSPI bus will be the minimum of this field and the Slave's
maximum frequency advertised in its General Capabilities register.
eSPI / EC Maximum I/O Mode UP4 Single
Values: Single, Single and Dual, Single and Quad, Single Dual and Quad UP3 Single
Indicates the maximum IO Mode (Single/Dual/Quad) of the eSPI bus that is
supported by the eSPI Master and specific platform configuration. The actual IO
Mode of the eSPI bus will be the minimum of this field and the Slave's maximum
IO Mode advertised in its General Capabilities register.
eSPI / EC CRC Check Enabled UP4 No
Values: Yes/No UP3 No
This setting enables CRC checking on eSPI Slave 0 channel.
eSPI / EC Max Outstanding Request for Master Attached Flash Channel UP4 2
Values: 1/2 UP3 2
This setting determines the Maximum outstanding requests on the eSPI / EC
Master Attached Flash Channel.
eSPI / EC Slave Attached Flash Multiple Outstanding Requests Enable UP4 Single
Values: Single Outstanding Request/Multiple Outstanding Requests UP3 Outstanding
Request
This setting enabled multiple outstanding requests for the eSPI / EC Slave Attached
Flash device. Single
Outstanding
Request
eSPI / EC Slave Attached Flash Channel OOO Enable UP4 In-Order SAF
Values: In-Order SAF Requests/Out-of-Order SAF Requests UP3 Requests
This setting enables Out or Order requests on the eSPI / EC Slave Attached Flash In-Order SAF
device. Requests
Intel Confidential 85
Image Creation: Intel® Flash Image Tool
Click on Power in the left tabs menu> Platform Power is expanded by default:
1
SLP_S3# / GPD4 Signal Configuration UP4 SLP_S3#
Values: SLP_S3#, GPD4 - This setting allows the customer to assign the UP3 SLP_S3#
SLP_S3# Power Control signal as SLP_S3# or as GDP4. For further details see Tiger
Lake LP Platform Controller Hub EDS.
SLP_S4# / GPD5 Signal Configuration UP4 SLP_S4#
Values: SLP_S4#, GPD5 - This setting allows the customer to assign the UP3 SLP_S4#
SLP_S4# Power Control signal as SLP_S4# or as GDP5. For further details see Tiger
Lake LP Platform Controller Hub EDS.
SLP_S5# / GPD10 Signal Configuration UP4 SLP_S5#
Values: SLP_S5#, GPD10 - This setting allows the customer to assign the UP3 SLP_S5#
SLP_S5# Power Control signal as SLP_S5# or as GDP10. For further details see
Tiger Lake LP Platform Controller Hub EDS.
SLP_A# / GPD6 Signal Configuration UP4 SLP_A#
Values: SLP_A#, GPD6 - This setting allows the customer to assign the SLP_A# UP3 SLP_A#
Power Control signal as SLP_A# or as GDP6. For further details see Tiger Lake LP
Platform Controller Hub EDS.
SLP_S0# Tunnel UP4 Disabled
This setting Enables / Disables the tunneling of the SLP_S0# pin over ESPI to the UP3 Disabled
EC when in ESPI mode.
Click on Power in the left tabs menu> Deep Sx is expanded by default:
2
Deep Sx Enabled UP4 Yes
Values: Yes/ No - This setting enables / disables support for Deep Sx operation. UP3 Yes
For further details see Tiger Lake LP Platform Controller Hub EDS. Note: Support
for Deep Sx is board design dependent.
Click on Power in the left tabs menu> PCH Thermal Reporting is expanded by default:
Intel Confidential 86
Image Creation: Intel® Flash Image Tool
3
Thermal Power Reporting Enabled UP4 Yes
This setting enabled a once-per-second timer interrupt is enabled which triggers UP3 Yes
firmware to report power and temperature information as enabled by configuration
registers. Note: When this setting is disabled ensure that the once-per-second
timer interrupt associated with this feature is also disabled.
Intel Confidential 87
Image Creation: Intel® Flash Image Tool
Click on Integrated Sensor Hub in the left tabs menu> Integrated Sensor Hub is expanded by default:
1
Integrated Sensor Hub Supported UP4 No
Values: Yes/No UP3 No
This setting allows customers to disable ISH on the platform.
Integrated Sensor Hub Power Up State UP4 Disabled
Values: Enabled/Disabled UP3 Disabled
Field is enabled for editing if “Integrated Sensor Hub Supported” field above is set
to “Yes”. This setting allows customers to determine the power up state for ISH.
Click on Integrated Sensor Hub in the left tabs menu> ISH Image is expanded by default:
2
Length - Total size (in bytes) of the ISH code partition including reserved space. It
is recommended to be at least 256kb.
Input File UP4 ISH Binary
UP3 (Optional)
Version - This displays the version of ISH
Click on Integrated Sensor Hub in the left tabs menu> ISH Data is expanded by default:
Intel Confidential 88
Image Creation: Intel® Flash Image Tool
3
PDT Binary File UP4 Path for PDT
UP3 Binary file
Path for PDT
Binary file
Intel Confidential 89
Image Creation: Intel® Flash Image Tool
Click on Camera in the left tabs menu> IPU Security is expanded by default:
1
Secure Touch UP4 Disabled
Values: Enabled / Disabled UP3 Disabled
When set, CAMERA_MASK register bits per CSI port are used to mask the data of
cameras. When cleared, camera data is not masked.
FW Secure Mode UP4 Enabled
Values: Enabled / Disabled UP3 Enabled
If enabled, access blockers in IS and PS are enabled, and FW is read from IMR.
Must be enabled for FW authentication flow and execution of authenticated FW.
Secure Touch Camera Mask UP4 0xFF
Values: Hex Input UP3 0xFF
Camera mask bits per CSI port. When SECURE_TOUCH is set each set bit masks a
CSI port for secure touch. When SECURE_TOUCH is cleared this register has no
impact on the CSI ports.
Intel Confidential 90
Image Creation: Intel® Flash Image Tool
Click on Debug in the left tabs menu> Intel® ME Firmware Debugging Overrides is expanded by default:
1
IDLM Binary UP4 IDLM Binary
This allows an IDLM binary to be merged into output image built by Intel® FIT. UP3 (Optional)
Click on Debug in the left tabs menu> Delayed Authentication Mode Configuration is expanded by default:
2
Delayed Authentication Mode Enabled UP4 No
Values: Yes/No - This setting enable / disables Delayed Authentication Mode on UP3 No
the platform.
Click on Debug in the left tabs menu> Intel® Trace Hub Technology is expanded by default:
Intel Confidential 91
Image Creation: Intel® Flash Image Tool
Intel® Trace Hub Binary - This loads the Intel® Trace Hub binary that will be UP4 Trace Hub
merged into the output image generated by the Intel® FIT tool. UP3 Binary
Trace Hub
Binary
Intel® Trace Hub Emergency Mode Enabled UP4 No
Values: Yes/No - This setting enable / disables Intel® Trace Hub in the firmware UP3 No
base image.
Intel® Trace Hub Filtering UP4 Trace Hub Filter
This setting allows a user input binary for filtering of output messages for Intel® UP3 Binary
Trace Hub (Optional)
Trace Hub Filter
Binary
(Optional)
PMC Debug Messages Enabled UP4 Yes
Values: Yes/No - This setting enables/disables the PMC debug messages. UP3 Yes
Unlock Token UP4 Unlock Token
This allows the OEM to input an Unlock Token binary file for closed chassis debug. UP3 Binary
(Optional)
Unlock Token
Binary
(Optional)
Click on Debug in the left tabs menu> Intel® ME Debugging Overrides is expanded by default:
4
Debug Override Pre-Production Silicon - Allows the OEM to control FW features UP4 0x00000000
to assist with pre-production platform debugging. This control has no effect if used UP3 0x00000000
on production silicon.
Bit 0: Disable DRAM_INIT_DONE (default timeout 60 seconds)
Bit 1: Disable Host Reset Timer
Bit 2: Disable CPU_RESET_DONE timeout
Bit 3: Reserved
Bit 4: Disable Intel® ME Power Gating
Bit 5: Reserved
Bit 6: Secure Boot debug hook. Used to shorten wait time before ENF shutdown.
Bit 7: Force real FPFs on preproduction (default is to use flash)
Bit 8: Secure Boot debug hook. Used to reduce S3 or FFS optimization tries.
Bit 9: Reserved
Bit 10: Override power package to always enter M3.
Note: Certain options do not work when the descriptor is locked.
Intel Confidential 92
Image Creation: Intel® Flash Image Tool
Debug Override Production Silicon - Allows the OEM to control FW features to UP4 0x00000000
assist with production platform debugging. UP3 0x00000000
Bit 0: Extend DRAM_INIT_DONE timeout to 30 minutes (default timeout 15
seconds)
Bit 1: Disable Host Reset Timer
Bit 2: Disable CPU_RESET_DONE timeout
Note: Certain options do not work when the descriptor is locked.
Intel® ME Reset Behavior UP4 Intel® Alternate
Values: Intel® ME will Halt / Intel® Alternate image boot UP3 image boot
This setting determines Intel® ME behavior when boot image errors are Intel® Alternate
encountered. Warning: This setting should be used for debug purposes only. image boot
Note: This may block normal Firmware functional flows.
Enable Intel® ME Reset Capture on CLR_RST# UP4 No
This setting configures Intel® ME behavior when it resets during CL_RST#1. Note: UP3 No
The recommended default for this setting is 'No'
Firmware ROM Bypass UP4 No
Values: Yes/No - This setting enables / disables firmware ROM bypass. Note: UP3 No
This setting only has affect when the firmware being used has ROM Bypass code
present.
ASF Idle Flash Reclaim Enabled UP4 Yes
Values: Yes / No UP3 Yes
This controls enabling / disable the Intel® AFS Idle flash reclaim capabilities.
5 Note: When any of the DCI BSSB USB3 Port interfaces are enabled the
associated USB3 port selection control will be greyed out under the USB3
Port Configuration settings section under the Flex I/O tab
Intel® DCI DbC Interface Enabled UP4 Yes
Values: Yes/No - This setting enables / disables the Intel® DCI DbC interface. UP3 Yes
DCI OOB over USB3 Port1 Enabled UP4 Yes
Values: Yes / No UP3 Yes
This setting determines if the USB port being enabled for DCI OOB. If disabled it
will block DCI OOB connection.
Note: When this setting is enabled the corresponding USB3 Combo Port in the
Flex I/O Tab will be Grayed out.
Intel Confidential 93
Image Creation: Intel® Flash Image Tool
Note: When this setting is enabled the corresponding USB3 Combo Port in the
Flex I/O Tab will be Grayed out.
DCI OOB over USB3 Port 3 Enabled UP4 No
Values: Yes / No UP3 No
This setting determines if the USB port being enabled for DCI OOB. If disabled it
will block DCI OOB connection.
Note: When this setting is enabled the corresponding USB3 Combo Port in the
Flex I/O Tab will be Grayed out.
DCI OOB over USB3 Port 4 Enabled UP4 No
Values: Yes / No UP3 No
This setting determines if the USB port being enabled for DCI OOB. If disabled it
will block DCI OOB connection.
Note: When this setting is enabled the corresponding USB3 Combo Port in the
Flex I/O Tab will be Grayed out.
Click on Debug in the left tabs menu> eSPI Feature Overrides is expanded by default:
6
eSPI / EC Low Frequency Debug Override UP4 No
When enabled this setting will divide eSPI clock frequency by 8. UP3 No
Note: This setting should only be used for debugging purposes. Leaving this set
to “Yes” will impact eSPI performance on the platform.
Click on Debug in the left tabs menu> Early USB DBC Type-A Configuration is expanded by default:
Intel Confidential 94
Image Creation: Intel® Flash Image Tool
8
TRC Enabled UP4 No
Values: Yes / No UP3 No
This setting enables TRC HIP and TRC Countermeasures used by Intel® CSME for
the detection of hardware glitches as a part of security hardening. The purpose of
this setting is to allow OEMs to enable TRC for testing prior to close of
manufacturing and FPF commit.
TRC Enabled (FPF) UP4 No
Values: Yes / No UP3 No
When enabled the TRC HIP and TRC Countermeasures are enabled. When
manufacture is completed, this value is burned into an FPF.
Intel Confidential 95
Image Creation: Intel® Flash Image Tool
Click on CPU Straps in the left tabs menu> CPU Straps are expanded by default:
1
Number of Active Cores UP4 All Cores Active
Values: All, 1, 2, 3, 4, 5, 6, 7, 8 UP3 All Cores Active
This setting controls the number of active processor cores.
Note: This strap is intended for debugging purposes only. See BIOS Spec for
more details on enabling or disabling processor cores.
Disable Hyperthreading UP4 No
Values: Yes/No UP3 No
This setting controls enabling or disabling of Hyper threading.
Note: This strap is intended for debugging purposes only. See BIOS Spec for
more details on enabling / disabling Hyperthreading.
BIST Initialization UP4 No
Values: Yes/No UP3 No
This setting determines if BIST will be run at platform reset after BIOS requested
actions.
Note: This strap is intended for debugging purposes only.
Flex Ratio UP4 0x0
This setting controls the maximum processor non-turbo ratio. UP3 0x0
Note: This strap is intended for debugging purposes only. See BIOS Spec for
more details on maximum processor non-turbo ratio configuration.
Intel Confidential 96
Image Creation: Intel® Flash Image Tool
Note: This setting should be set to “No”; if the platform configurations employs
EC or other mechanism to recover from CPU hangs.
VCCIN Aux Level LP UP4 1.65v or 1.8v
Values: 1.8v/1.65v UP3 1.8v
This setting determines the VCCIN Aux Level LP Voltage.
Note: On UP4 based MCP this setting can be configured to 1.65v. On the UP3
MCP types set to 1.8v
Intel Confidential 97
Image Creation: Intel® Flash Image Tool
Click on Flex I/O in the left tabs menu> PCIe Lane Reversal Configuration is expanded by default:
1
PCIe Controller 1 Lane Reversal Enabled UP4 No
Values: Yes/ No - This setting allows the PCIe lanes on Controller 1 to be UP3 No
reversed. Note: Refer to EDS for PCIe supported port
configurations.
PCIe Controller 2 Lane Reversal Enabled UP4 No
Values: Yes/ No - This setting allows the PCIe lanes on Controller 2 to be UP3 No
reversed. Note: Refer to EDS for PCIe supported port
configurations.
PCIe Controller 3 Lane Reversal Enabled UP4 Yes
Values: Yes/ No - This setting allows the PCIe lanes on Controller 3 to be UP3 Yes
reversed. Note: Refer to EDS for PCIe supported port
configurations.
Click on Flex I/O in the left tabs menu> PCIe Port Configuration is expanded by default:
2
PCIe Controller 1 (Port 1-4) UP4 4x1
Values: 4x1, (1x2, 2x1), 2x2, 1x4 - This setting controls PCIe Port UP3 4x1
configurations for PCIe Controller 1. For further details see Tiger Lake LP
Platform Controller Hub EDS.
Intel Confidential 98
Image Creation: Intel® Flash Image Tool
3
SATA / PCIe Combo Port 0 UP4 PCIe
Values: SATA, PCIe, GPIO Polarity PCIe, GPIO Polarity SATA - This setting UP3 PCIe
configures the PCIe port to operate as either:
PCIe Port 11 or SATA Port 0
For further details on Flex I/O see Tiger Lake LP Platform Controller Hub EDS.
SATA / PCIe Combo Port 1 UP4 GPIO Polarity PCIe
Values: SATA, PCIe, GPIO Polarity PCIe, GPIO Polarity SATA - This setting UP3 GPIO Polarity PCIe
configures the PCIe port to operate as either:
PCIe Port 12 or SATA Port 1
For further details on Flex I/O see Tiger Lake LP Platform Controller Hub EDS.
Click on Flex I/O in the left tabs menu> USB3 Port Configuration is expanded by default:
Intel Confidential 99
Image Creation: Intel® Flash Image Tool
4
USB3 / PCIe Combo Port 0 UP4 USB3
Values: PCIe (or GbE), USB3 - This setting configures the PCIe port to operate UP3 USB3
as either:
PCIe Port 1 or USB3 Port 1
For further details on Flex I/O see Tiger Lake LP Platform Controller Hub EDS.
Note: If DCI BSSB for this USB3 Combo port it will be Grayed out.
Note: If DCI BSSB for this USB3 Combo port it will be Grayed out.
USB3 / PCIe Combo Port 2 UP4 PCIe
Values: PCIe (or GbE), USB3 - This setting configures the PCIe port to operate UP3 PCIe
as either:
PCIe Port 3 or USB3 Port 3
For further details on Flex I/O see Tiger Lake LP Platform Controller Hub EDS.
Note: If DCI BSSB for this USB3 Combo port it will be Grayed out.
USB3 / PCIe Combo Port 3 UP4 PCIe
Values: PCIe (or GbE), USB3 - This setting configures the PCIe port to operate UP3 PCIe
as either:
PCIe 4 or USB3 Port 4
For further details on Flex I/O see Tiger Lake LP Platform Controller Hub EDS.
Note: If DCI BSSB for this USB3 Combo port it will be Grayed out.
USB3 Port 1 Connector Type Select UP4 Type-A
This setting configures the physical connector type to be used for USB 3.0 / 3.1 UP3 Type-A
Port 1.
USB3 Port 2 Connector Type Select UP4 Type-A
This setting configures the physical connector type to be used for USB 3.0 / 3.1 UP3 Type-A
Port 2.
USB3 Port 3 Connector Type Select UP4 Type-C
This setting configures the physical connector type to be used for USB 3.0 / 3.1 UP3 Type-C
Port 3.
USB3 Port 4 Connector Type Select UP4 Type-C
This setting configures the physical connector type to be used for USB 3.0 / 3.1 UP3 Type-C
Port 4.
USB3 Port 1 Initialization Speed Select UP4 USB3.1 Gen1 LBPM
This setting determines USB3 Port 1 speed during platform power-up. UP3 USB3.1 Gen1 LBPM
USB3 Port 2 Initialization Speed Select UP4 USB3.1 Gen1 LBPM
This setting determines USB3 Port 2 speed during platform power-up. UP3 USB3.1 Gen1 LBPM
USB3 Port 3 Initialization Speed Select UP4 USB3.1 Gen1 LBPM
This setting determines USB3 Port 3 speed during platform power-up. UP3 USB3.1 Gen1 LBPM
USB3 Port 4 Initialization Speed Select UP4 USB3.1 Gen1 LBPM
This setting determines USB3 Port 4 speed during platform power-up. UP3 USB3.1 Gen1 LBPM
USB3 Port 1 Speed Capability UP4 USB 3.1 Gen2
This setting determines the USB3 Port 1 speed capabilities. UP3 USB 3.1 Gen2
Note: When a USB 3.2 Gen 2x1 (10 Gb/s) capable port is configured to USB
3.2 Gen 1x1 (5 Gb/s) speed using the soft strap, the port may still send
10 Gb/s compliance patterns if the USB compliance test (TD1.4, and
TD1.7) is run on the port.
USB3 Port 2 Speed Capability UP4 USB 3.1 Gen2
This setting determines the USB3 Port 2 speed capabilities. UP3 USB 3.1 Gen2
Note: When a USB 3.2 Gen 2x1 (10 Gb/s) capable port is configured to USB
3.2 Gen 1x1 (5 Gb/s) speed using the soft strap, the port may still send
10 Gb/s compliance patterns if the USB compliance test (TD1.4, and
TD1.7) is run on the port.
Note: When a USB 3.2 Gen 2x1 (10 Gb/s) capable port is configured to USB
3.2 Gen 1x1 (5 Gb/s) speed using the soft strap, the port may still send
10 Gb/s compliance patterns if the USB compliance test (TD1.4, and
TD1.7) is run on the port.
USB3 Port 4 Speed Capability UP4 USB 3.1 Gen2
This setting determines the USB3 Port 4 speed capabilities. UP3 USB 3.1 Gen2
Note: When a USB 3.2 Gen 2x1 (10 Gb/s) capable port is configured to USB
3.2 Gen 1x1 (5 Gb/s) speed using the soft strap, the port may still send
10 Gb/s compliance patterns if the USB compliance test (TD1.4, and
TD1.7) is run on the port.
USB Type AB Mode Select UP4 USB Type AB SW
This setting determines how the USB Type AB connector switching is handled. UP3 Select
USB Type AB SW
Select
Click on Flex I/O in the left tabs menu> USB2 Port Configuration is expanded by default:
5
USB2 Port 1 Connector Type Select UP4 Type-C
This setting configures the physical connector type to be used for USB2 Port 1. UP3 Type-C
USB2 Port 2 Connector Type Select UP4 Type A / Type C
This setting configures the physical connector type to be used for USB2 Port 2. UP3 Express Card / M.2
S2
USB2 Port 3 Connector Type Select UP4 Type A / Type C
This setting configures the physical connector type to be used for USB2 Port 3. UP3 Type A / Type C
USB2 Port 4 Connector Type Select UP4 Type A / Type C
This setting configures the physical connector type to be used for USB2 Port 4. UP3 Type A / Type C
6
IO Manageability Engine Binary File - This loads the IO Manageability binary UP4 IOM Binary
that will be merged into the output image generated by the Intel® FIT. UP3 IOM Binary
IO Manageability Engine Enabled UP4 Yes
Values: Yes/No UP3 Yes
This setting enables / disables the Type-C Subsystem IO Manageability Engine on
the platform.
IO Manageability Engine Length - This displays the length of the IO
Manageability binary.
Note: This value will be automatically populated by Intel® FIT during image
build.
IO Manageability Engine Version - This displays the version of IO
Manageability binary.
PHY Binary File - This loads the MG PHY binary that will be merged into the UP4 PHY Binary
output image generated by the Intel® FIT. UP3 PHY Binary
PHY Manifest Enabled UP4 Yes
Values: Yes/No UP3 Yes
This setting enables / disables the NPHY on the platform.
PHY Length - This displays the length of the PHY binary.
Note: This value will be automatically populated by Intel® FIT during image
build.
PHY Version - This displays the version of PHY binary.
Thunderbolt(TM)/USB4(TM) Binary File UP4 TBT Binary
Values: Yes/No UP3 TBT Binary
This setting enables Anti-Roll back for the Type-C Subsystem Thunderbolt(TM)/
USB4(TM) binary.
Thunderbolt(TM)/USB4(TM) Length - This displays the length of the
Thunderbolt(TM)/USB4(TM) binary.
Note: This value will be automatically populated by Intel® FIT during image
build.
Thunderbolt(TM)/USB4(TM) Version - This displays the version of
Thunderbolt(TM)/USB4(TM) binary.
Tcss - Partial Update Enabled UP4 Disabled
Values: Enabled/Disabled UP3 Disabled
This setting enabled partial firmware update of the TCSS partitions.
Type-C Subsystem Port Enable Mask UP4 0xF
This setting determines the Type-C Subsystem Port Enable Mask UP3 0xF
Type-C Subsystem Authentication Enabled UP4 Yes
Values: Yes/No UP3 Yes
This setting enables / disables firmware authentication for the Type-C Subsystem
on power-up.
Type-C Port 1 Configuration UP4 No Restrictions
Value: No Restrictions/DP Fixed Connection/No Thunderbolt UP3 No Restrictions
This setting determines the configuration for Type-C Port 1
Type-C Port 2 Configuration UP4 No Restrictions
Value: No Restrictions/DP Fixed Connection/No Thunderbolt UP3 No Restrictions
This setting determines the configuration for Type-C Port 2
Type-C Port 3 Configuration UP4 No Restrictions
Value: No Restrictions/DP Fixed Connection/No Thunderbolt UP3 No Restrictions
This setting determines the configuration for Type-C Port 3
Type-C Port 4 Configuration UP4 No Restrictions
Value: No Restrictions/DP Fixed Connection/No Thunderbolt UP3 No Restrictions
This setting determines the configuration for Type-C Port 4
Note: This setting needs to be set to xDCI Split Die Enabled when using the
CPU side Type-C Subsystem.
Thunderbolt(TM)/USB4(TM) Port 2 Speed Capability UP4 Gen3
Values: Gen2 Only, Gen3 UP3 Gen3
This setting should be set to 'Gen2 Only' for Thunderbolt(TM)/USB4(TM) Port 1 if it
will only be supporting Gen2 speeds.
7
Thunderbolt(TM)/USB4(TM) Enable UP4 Yes
Values: Yes/No UP3 Yes
This setting determines if the Thunderbolt(tm)/USB4(TM) interface is enabled on
the platform.
Click on Flex I/O in the left tabs menu> Power Delivery PD Controller Configuration is expanded by default:
This bit defines how the PMC interfaces with the Type-C components on the
board.
Notes:
1. This setting is greyed and not configurable for LP based SKUs. for UP3/UP4
SKUs, PMC interfaces with PD chips/Re-timer via ALERT# pin.
2. if user selection is 0 where PMC interfaces with an eSPI connected agent, all
of the below parameters are N/A and will be grayed out.
Re-timer Power Gating Enabled UP4 No
Values: Yes / No UP3 No
This setting indicates whether platform Re-timer power gating is enabled.
Type-C port 1 Enabled UP4 Yes
Values: Yes / No UP3 Yes
This setting indicates whether the associated Type-C port1 is enabled.
Note: This setting is only available for configuration when PMC-PD controller
USB-C Mode Enabled parameter is set to 1.
USB2 Port Number associated for Type-C Port 1 UP4 USB2 Port 1
Values: USB2 Port 1,USB2 Port 2,USB2 Port 3,USB2 Port 4,USB2 Port UP3 USB2 Port 1
5,USB2 Port 6,USB2 Port 7,USB2 Port 8,USB2 Port 9,USB2 Port 10
This indicates the USB2 port number for the associated Type-C port1.
Notes:
1. This parameter is applicable only when Type-C port 1 Enabled is set to yes.
2. Once user selects USB2 port number associated with Type-C port1,the
respective USB2 port connector selection will be greyed out and auto set to
Type-C under the USB2 Port Configuration section. example: if USB2 Port
number associated for Type-C Port 1 is set to “USB2 Port 2” ,Parameter
under Flex I/O->USB2 Port Configuration->USB2 Port 2 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
USB3 Port number associated for Type-C Port 1 UP4 USB3 Port 1
Values: USB3 Port 1,USB3 Port 2,USB3 Port 3,USB3 Port 4 UP3 USB3 Port 1
This indicates the USB3 port number for the associated Type-C port1.
Notes:
1. This parameter is applicable only when Type-C port 1 Enabled is set to yes.
2. Once user selects USB3 port number associated with Type-C port1,the
respective USB3 port connector selection will be greyed out and auto set to
Type-C under the USB3 Port Configuration section. example: if USB Port
number associated for Type-C Port 1 is set to “USB3 Port 6” ,Parameter
under Flex I/O->USB3 Port Configuration->USB3 Port 6 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
Type-C Port 1 Re-timer Present UP4 Yes
Values: Yes / No UP3 Yes
This indicates whether a re-timer is present for the associated Type-C port.
Note: OEMs are recommended to set unique SMBus address allocation for
Type-C port and Re-timer associated.
Type-C port 2 Enabled UP4 Yes
Values: Yes / No UP3 Yes
This setting indicates whether the associated Type-C port is enabled.
Note: This setting is only available for configuration when PMC-PD controller
USB-C Mode Enabled parameter is set to 1.
USB2 Port Number associated for Type-C Port 2 UP4 USB2 Port 5
Values: USB2 Port 1,USB2 Port 2,USB2 Port 3,USB2 Port 4,USB2 Port UP3 USB2 Port 5
5,USB2 Port 6,USB2 Port 7,USB2 Port 8,USB2 Port 9,USB2 Port 10
This indicates the USB2 port number for the associated Type-C port.
Notes:
1. This parameter is applicable only when Type-C port 2 Enabled is set to yes.
2. Once user selects USB2 port number associated with Type-C port2,the
respective USB2 port connector selection will be greyed out and auto set to
Type-C under the USB2 Port Configuration section. example: if USB2 Port
number associated for Type-C Port 2 is set to “USB2 Port 2” ,Parameter
under Flex I/O->USB2 Port Configuration->USB2 Port 2 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
USB3 Port number associated for Type-C Port 2 UP4 USB3 Port 2
Values: USB3 Port 1,USB3 Port 2,USB3 Port 3,USB3 Port 4 UP3 USB3 Port 2
This indicates the USB3 port number for the associated Type-C port.
Notes:
1. This parameter is applicable only when Type-C port 2Enabled is set to yes.
2. Once user selects USB3 port number associated with Type-C port2,the
respective USB3 port connector selection will be greyed out and auto set to
Type-C under the USB3 Port Configuration section. example: if USB Port
number associated for Type-C Port 2is set to “USB3 Port 6” ,Parameter
under Flex I/O->USB3 Port Configuration->USB3 Port 6 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
Type-C Port 2 Re-timer Present UP4 Yes
Values: Yes / No UP3 Yes
This indicates whether a re-timer is present for the associated Type-C port.
Type-C Port 2 Re-timer Configuration Enabled UP4 No
Values: Yes / No UP3 No
Indicates whether the associated re-timer requires configuration. Yes =
configuration done via PMC; No = configuration done via PD Controller.
Note: OEMs are recommended to set unique SMBus address allocation for
Type-C port and Re-timer associated.
Type-C port 3 Enabled UP4 Yes
Values: Yes / No UP3 Yes
This setting indicates whether the associated Type-C port is enabled.
Note: This setting is only available for configuration when PMC-PD controller
USB-C Mode Enabled parameter is set to 1.
USB2 Port Number associated for Type-C Port 3 UP4 USB2 Port 6
Values: USB2 Port 1,USB2 Port 2,USB2 Port 3,USB2 Port 4,USB2 Port UP3 USB2 Port 6
5,USB2 Port 6,USB2 Port 7,USB2 Port 8,USB2 Port 9,USB2 Port 10
This indicates the USB2 port number for the associated Type-C port.
Notes:
1. This parameter is applicable only when Type-C port 3 Enabled is set to yes.
2. Once user selects USB2 port number associated with Type-C por3 ,the
respective USB2 port connector selection will be greyed out and auto set to
Type-C under the USB2 Port Configuration section. example: if USB2 Port
number associated for Type-C Port 3 is set to “USB2 Port 2” ,Parameter
under Flex I/O->USB2 Port Configuration->USB2 Port 2 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
USB3 Port number associated for Type-C Port 3 UP4 USB3 Port 3
Values: USB3 Port 1,USB3 Port 2,USB3 Port 3,USB3 Port 4 UP3 USB3 Port 3
This indicates the USB3 port number for the associated Type-C port.
Notes:
1. This parameter is applicable only when Type-C port 3 Enabled is set to yes.
2. Once user selects USB3 port number associated with Type-C port3,the
respective USB3 port connector selection will be greyed out and auto set to
Type-C under the USB3 Port Configuration section. example: if USB Port
number associated for Type-C Port 3 is set to “USB3 Port 6” ,Parameter
under Flex I/O->USB3 Port Configuration->USB3 Port 6 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
Type-C Port 3 Re-timer Present UP4 Yes
Values: Yes / No UP3 Yes
This indicates whether a re-timer is present for the associated Type-C port.
Type-C Port 3 Re-timer Configuration Enabled UP4 No
Values: Yes / No UP3 No
Indicates whether the associated re-timer requires configuration. Yes =
configuration done via PMC; No = configuration done via PD Controller.
Type-C Port 3 Re-timer SMBus Address UP4 0x42
Value: Hex UP3 0x42
This indicates the SMBus address for the associated re-timer.
Note: OEMs are recommended to set unique SMBus address allocation for
Type-C port and Re-timer associated.
Type-C port 4 Enabled UP4 No
Values: Yes / No UP3 Yes
This setting indicates whether the associated Type-C port is enabled.
Note: This setting is only available for configuration when PMC-PD controller
USB-C Mode Enabled parameter is set to 1.
USB2 Port Number associated for Type-C Port 4 UP4 USB2 Port 7
Values: USB2 Port 1,USB2 Port 2,USB2 Port 3,USB2 Port 4,USB2 Port UP3 USB2 Port 7
5,USB2 Port 6,USB2 Port 7,USB2 Port 8,USB2 Port 9,USB2 Port 10
This indicates the USB2 port number for the associated Type-C port.
Notes:
1. This parameter is applicable only when Type-C port 4 Enabled is set to yes.
2. Once user selects USB2 port number associated with Type-C port4,the
respective USB2 port connector selection will be greyed out and auto set to
Type-C under the USB2 Port Configuration section. example: if USB2 Port
number associated for Type-C Port 4 is set to “USB2 Port 2” ,Parameter
under Flex I/O->USB2 Port Configuration->USB2 Port 2 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
USB3 Port number associated for Type-C Port 4 UP4 USB3 Port 4
Values: USB3 Port 1,USB3 Port 2,USB3 Port 3,USB3 Port 4 UP3 USB3 Port 4
This indicates the USB3 port number for the associated Type-C port.
Notes:
1. This parameter is applicable only when Type-C port 4 Enabled is set to yes.
2. Once user selects USB3 port number associated with Type-C port4,the
respective USB3 port connector selection will be greyed out and auto set to
Type-C under the USB3 Port Configuration section. example: if USB Port
number associated for Type-C Port 4 is set to “USB3 Port 6” ,Parameter
under Flex I/O->USB3 Port Configuration->USB3 Port 6 Connector Type
Select will be grayed out and auto set to “Type C”.
3. OEMs are recommended to configure different USB-C connectors with
increasing port numbers (TCP0_*, TCP1_*, TCP2_*, TCP3_*), should be
paired with increasing number of USB2 ports from PCH. (this is needed to
make split xDCI controller work functionally)E.g. (TCP0_* , USB2*_1),
(TCP1_* , USB2*_3), (TCP2_* , USB2*_4), (TCP3_* , USB2*_5)
Type-C Port 4 Re-timer Present UP4 No
Values: Yes / No UP3 Yes
This indicates whether a re-timer is present for the associated Type-C port.
Type-C Port 4 Re-timer Configuration Enabled UP4 No
Values: Yes / No UP3 No
Indicates whether the associated re-timer requires configuration. Yes =
configuration done via PMC; No = configuration done via PD Controller.
Type-C Port 4 Re-timer SMBus Address UP4 0x0
Value: Hex UP3 0x43
This indicates the SMBus address for the associated re-timer.
Type-C Port 4 SMBus Address UP4 0x0
Value: Hex UP3 0x53
This indicates the SMBus address for the associated Type-C port.
Note: OEMs are recommended to set unique SMBus address allocation for
Type-C port and Re-timer associated.
Click on GPIO in the left tabs menu> GPIO VCCIO Voltage Control is expanded by default:
4
Thunderbolt LSx/BSSB-LS 0 VCCIO UP4 TX VCCIO
Values: TX VCCIO / Legacy VCCIO UP3 TX VCCIO
This setting configured Thunderbolt LSx/BSSB-LS 0 VCCIO.
Thunderbolt LSx/BSSB-LS 1 VCCIO UP4 TX VCCIO
Values: TX VCCIO / Legacy VCCIO UP3 TX VCCIO
This setting configured Thunderbolt LSx/BSSB-LS 0 VCCIO.
Thunderbolt LSx/BSSB-LS 2 VCCIO UP4 TX VCCIO
Values: TX VCCIO / Legacy VCCIO UP3 TX VCCIO
This setting configured Thunderbolt LSx/BSSB-LS 0 VCCIO.
Thunderbolt LSx/BSSB-LS 3 VCCIO UP4 TX VCCIO
Values: TX VCCIO / Legacy VCCIO UP3 TX VCCIO
This setting configured Thunderbolt LSx/BSSB-LS 0 VCCIO.
Click on Download and Execute in the left tabs menu> DnX Image is expanded by default:
1
Platform ID UP4 0
Value: Hex UP3 0
This configures the Platform ID that DnX uses to verify the image is correct for the
platform. Before FPFs are fused, this field is ignored and DnX will accept any image.
After FPS lock, only images with this Platform ID will be accepted by DnX.
2
DnX Enabled UP4 Yes
Value: Yes / No UP3 Yes
This setting enables / disables DnX.
Click on Intel® Unique Platform ID in the left tabs menu> Intel® Unique Platform ID Configuration is expanded by
default:
1
UPID Supported Feature RKL-S No
Values: Yes/No
Unique Platform ID RKL-S 0x0
Values: Hex
This setting allows OEMs to configure their Unique ID into the platform FPFs.
Click on FW Update Image Build in the left tabs menu> ME Image is expanded by default:
Intel® ME, PMC, OEM KM, IOM, MG, TBT, ISH, iUnit, PCHC and GBST
ME Image
1
ME Binary Image UP4 ME Binary
Values: Binary File UP3 ME Binary
This loads the Embedded Controller binary that will be merged into the FWUpdate
image generated by the Intel® FIT tool.
Click on FW Update Image Build in the left tabs menu> PMC Image is expanded by default:
2
PMC Max Length
PMC Binary Image UP4 PMC Binary
Values: Binary File UP3 PMC Binary
This loads the PMC binary that will be merged into the FWUpdate image generated
by the Intel® FIT tool.
Click on FW Update Image Build in the left tabs menu> OEM KM Image is expanded by default:
3
OEM KM UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
This setting Enables / Disables OEM KM in the FWUpdate image.
OEM KM Max Length
OEM Key Manifest Binary File UP4 OEM KM Binary
Values: Binary File UP3 OEM KM Binary
This loads the OEM Key manifest binary merged into the output image generated
by the Intel® FIT tool.
Click on FW Update Image Build in the left tabs menu> IOM Image is expanded by default:
4
IOM UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
This setting Enables / Disables IOM in the FWUpdate image.
IO Manageability Engine Max Length
IO Manageability Engine Binary File UP4 IOM Binary
Values: Binary File UP3 IOM Binary
This loads the IO Manageability binary merged into the output image generated by
the Intel® FIT tool.
Click on FW Update Image Build in the left tabs menu> MG Image is expanded by default:
PHY Image
5
PHY UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
This setting Enables / Disables NPHY in the FWUpdate image.
PHY Max Length
PHY Binary File UP4 NPHY Binary
Values: Binary File UP3 NPHY Binary
This loads the NPHY binary merged into the output image generated by the Intel®
FIT tool.
Click on FW Update Image Build in the left tabs menu> Thunderbolt(TM)/USB4(TM) Image is expanded by default:
6
Thunderbolt(TM)/USB4(TM) UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
This setting Enables / Disables Thunderbolt(TM)/USB4(TM) in the FWUpdate image.
Thunderbolt(TM)/USB4(TM) Max Length
Thunderbolt(TM)/USB4(TM) Binary File UP4 TBT Binary
Values: Binary File UP3 TBT Binary
This loads the Thunderbolt(TM)/USB4(TM) binary merged into the output image
generated by the Intel® FIT tool.
Click on FW Update Image Build in the left tabs menu> ISH Image is expanded by default:
8
IUnit UP4 Enabled
Values: Enabled/Disabled UP3 Enabled
This setting Enables / Disables IUNIT in the FWUpdate image.
IUnit Max Length
IUnit Binary File UP4 IUnit Binary
Values: Binary File UP3 IUnit Binary
This loads the IUnit binary merged into the output image generated by the Intel®
FIT tool.
Click on FW Update Image Build in the left tabs menu> PCHC Image is expanded by default:
9
PCH Configuration Max Length
Values: Binary File UP4 PCHC Binary
This loads the PCHC binary merged into the output image generated by the Intel® UP3 PCHC Binary
FIT tool.
Click on FW Update Image Build in the left tabs menu> GBST Image is expanded by default:
10
GBST Configuration Enable UP4 Disabled
Values: Enabled/Disabled UP3 Disabled
This setting Enables / Disables GBST in the FWUpdate image.
GBST Configuration Max Length
Values: Binary File UP4 GBST Binary
This loads the GBST binary merged into the output image generated by the Intel® UP3 (Optional)
FIT tool. GBST Binary
(Optional)
Note: The GBST sub-partition is used for FuSa safety standards and is not
applicable for client platforms.
2
Console shows status of build and path where saved
Now that the Flash image file has been created, it can be programmed into the SPI
Flash device(s) of the target machine. For platforms that don’t boot, a Flash Chip
Programmer will be required. For platforms that can boot to DOS or Windows*, the
Intel® FPT can be used.
If two total SPI Flash devices were specified during the build process, then
additional image files will be saved, one for each SPI Flash devices. These files are
assumed to be named outimage(1).bin and outimage(2).bin.
2. Utilize a Flash burner/programmer to program the image(s). For multiple SPI Flash
devices, the images are numbered sequentially to correspond to the first and
second SPI Flash devices accordingly.
Note: Intel® FPT will automatically disable the Intel® ME or EFI prior to flashing the
image to the platform.
fptw.exe -i
The system should respond with the number of SPI Flash device available. For
example:
Note: If the SPI Flash device does not currently contain a descriptor it may
report only a single device.
3. Program the SPI Flash image to the Flash device(s) by issuing the following
command at the prompt:
fptw.exe -f outimage.bin
If the programming was successful, then the following message will be shown.
If the programming was NOT successful, then repeat this step to try again. If
programming problems persist, then check the SPI Flash devices and platform
hardware.
4. Use fptw.exe -greset to perform a G3 power cycle. Next go to Section 3.3 to check
the Intel® ME Firmware status.
2. Boot the target system and use F2 or Del to enter the BIOS setup menu. Load
default values for BIOS (on Intel® CRBs press F3 to load default values). Save and
reboot (on Intel® CRBs press F4 and select Yes).
3. Boot the target system to DOS and change to the root directory of the bootable
USB key. At the DOS prompt type:
MEInfo.exe -fwsts
Note: This section is only intended to show how to use the MEInfo.exe tool for checking
firmware status. For full usage and capabilities of the MEInfo.exe tool, please see the
System Tools User Guide.
System does not boot to By default, the system will boot to EFI Shell. To boot to DOS,
DOS 1. Enter BIOS menu, then go to the ‘Boot’ screen
2. Change ‘Boot Option #1’ to be your USB key (ensure USB key is
formatted to be DOS bootable)
3. Press ‘F4’ to save settings and reboot
Hear 3 beeps when Possible device is disconnected or device not found, check
platform powers on • platform power and MCP fan power connectors
• DIMM memory modules (if applicable for memory down modules
• USB devices (keyboard, mouse, USB key) may be plugged into
inactive USB port
• missing/incorrect jumpers
• missing or poorly socketed MCP
No display on monitor Ensure Corporate FW SKU supports integrated graphics. Try external
graphics card.
USB device not detected USB device may be plugged into inactive USB port
or does not work
System does not boot Incorrect Flash image – possible reasons:
(Post Code 00) • wrong FW selected during Flash image build process
• wrong Flash size selected
Re-build image with correct settings and re-flash using Flash burner.
§§
A Appendix — Flash
Configurations
This chapter covers only the basic information needed for clock control parameter
programming. For a more detailed treatment of Mainstream - Mobile Family clocks, see
Intel®Tiger Lake PCH-H / LP Clocks and Intel® Converged Security and Management
Engine — Platform Compliancy Guide for ME Hardware.
§§
The following table describes ICC features supported for specific PCH SKU, clock range
(maximum and minimum), spread mode supported by Tiger Lake-LP SKUs.
Note: Please refer to Tiger Lake-H/LP Platform Controller Hub (PCH) External Design
Specification (EDS) for details about Tiger Lake-H/LP Chipset Clock architecture
In below tables,
Premium Y x
Premium U x
Base U x
Clock Range
[Min-Max]=100 MHz. BCLK [Min-Max] = 98 - 100 MHz.
Supported
SSC
Down SSC: 0 - 0.5% Down SSC: 0 - 0.5%
Supported
Boot Guard Profile - 0 0 0 00 0 This configuration will invoke Boot Guard during boot with
No_FVME neither Verification nor Measurement. For platforms with all
0
the required Boot Guard components but do not wish to enable
Boot Guard boot block verification protection.
3 Boot Guard VM 0 1 1 00 1 When Verification and Measured are desired and the asset
protection is provided by TPM protection.
Error Enforcement
Enforcement Mode Name Description
Policy (ENF)
2 Reserved
3 Restricted Mode 0 minutes before shutdown – instant shutdown policy.
Force Boot Guard ACM Enabled Force Boot Guard Boot determines if the false - Allow the CPU to jump to the
(F) platform starts the Force Boot Guard Boot legacy reset vector if the Boot Guard
timer. If it successfully starts it indicates Module cannot be successfully loaded.
success. When the Force Boot Guard timer (default)
stops, it starts the Protect Bios Environment
timer, if indicated by the boot policy
true - Force the Boot Guard ACM to
restrictions. Anchor ACM then jumps to the
execute.
Initial Boot Block(IBB) with the Force Boot
Guard Boot time stopped and the Protect BIOS
enable timer running.
Verified Boot Enabled (V) Boot Guard cryptographically verifies the false - Platform does not perform
platform Initial Boot Block (IBB) using the verified boot (default)
boot policy key. On successful verification,
Boot Guard executes Initial Boot Block (IBB)
true - Platform performs verified boot
using the boot policy key. If the verification
fails, Anchor signals or enters Remediation.
Measured Boot Enabled (M) Boot Guard measures the Initial Boot Block false - Platform does not perform
(IBB) into the TPM. Boot Guard perform no measured boot (default)
verification that the IBB is correct or from the
platform manufacturer. The Slylake
true - Platform performs measured
implementation of Boot Guard will support
boot
measurements into TPM or Intel’s Platform
Trust Technology.
Protect Bios Environment Platform manufacturer may want Initial boot false - Take no actions to control the
Enabled (PBE) block to be protected between verification/ environment during execution of the
measurement and execution from attacks on BIOS components (default)
buses and non-CPU components. Boot Guard
accomplishes this by allowing the initial boot
true - Takes actions to control the
block to be verified and executed in LLC in
environment during the execution of
NEM if PBE is enabled.
the BIOS components.
Error Enforcement Policy (ENF) Boot Guard invokes the Enforcement Policy See Section C-2 for details.
when a fatal error is encountered. The action
taken by ENF is determined by the OEM set
persistent policies. Like,
• Allowing platform to continue to boot
• Immediate Shutdown
• Shutdown with Timeout intervals
When the ENF logic is invoked, PTT or TPM
also disconnects.
Configuration Description
Intel® PTT Supported
Intel® PTT Permanently Disabled No No After the End of Manufacturing command, this setting will
Disabled in HW via FPF permanently set into the FPFs contained in the MCP. If disabled,
the specific MCP can never be enabled for Intel® PTT.
Intel® PTT Permanently Disabled No Yes This setting allows Intel® PTT to be set to disabled without
Disabled in base firmware disabling the MCP FPFs. This is the recommended option to
image permanently disable Intel® PTT on a platform.
Intel® PTT Ship State Disabled Yes Yes Intel® PTT initially shipped in disabled mode, can be enabled by
Disabled in base firmware BIOS command.
image
Intel® PTT Enabled Enabled Yes Yes This is the recommended option to enable Intel® PTT on a
platform.
CLSMNF = Close Manufacturing switch used with Intel® Flash Programming Tool (FPT)
PV = Production Version
For additional information on FPT see System Tools User Guide included with ME kit under system
tools folder.
FPF Automatic FPF MEI command after FPF MEI command before
Firmware MCP
Commit CLSMNF (Yes/No) CLSMNF (Yes/No)
Note: The Intel® FIT allows integration of binary files within Integrated Sensor Hub section under ISH
Image and ISH Data. The Intel® FIT does not generate or create the required files. The table above
lists configuration combinations that can be used.
UP4