commit:     ec025ee92ca22f9f2d2ca374605e8b8b756f6f4a
Author:     Patrick McLean <chutzpah <AT> gentoo <DOT> org>
AuthorDate: Mon Jun 26 23:16:06 2017 +0000
Commit:     Patrick McLean <chutzpah <AT> gentoo <DOT> org>
CommitDate: Mon Jun 26 23:16:06 2017 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ec025ee9

sys-apps/intel-sa-00075-tools: New package, tools from Intel to detect and 
mitigate MEI/AMT vulnerability

Package-Manager: Portage-2.3.6, Repoman-2.3.2

 sys-apps/intel-sa-00075-tools/Manifest             |  1 +
 .../files/intel-sa-00075-tools-makefile.patch      | 24 ++++++++++++++++++++++
 .../intel-sa-00075-tools-1.0.ebuild                | 24 ++++++++++++++++++++++
 sys-apps/intel-sa-00075-tools/metadata.xml         | 19 +++++++++++++++++
 4 files changed, 68 insertions(+)

diff --git a/sys-apps/intel-sa-00075-tools/Manifest 
b/sys-apps/intel-sa-00075-tools/Manifest
new file mode 100644
index 00000000000..5f8857894b7
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/Manifest
@@ -0,0 +1 @@
+DIST intel-sa-00075-tools-1.0.tar.gz 18750 SHA256 
1f6f86cb7740285f49c0c2882f7f2ad318cf04adfcbfcb29ffd80e7eb6d03e14 SHA512 
a42ee0e1553f4638c2976d8a28feb8c91d5ecb9163608f735406a3c80213f34933231320630f43392552fa69674afb1795f23fffef29b4cad45641827130e86e
 WHIRLPOOL 
3accb57db89d50a558e910d8a1f091cf122f6788b754834caf5a578204cfe2ae25e5aa7231da9c1aaf20ab20f97d5647d78bab76d10d346fed168b782a560aaf

diff --git 
a/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch 
b/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch
new file mode 100644
index 00000000000..3cdf418315f
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch
@@ -0,0 +1,24 @@
+diff --git a/Makefile b/Makefile
+index 5ccccff..f58d7bb 100644
+--- a/Makefile
++++ b/Makefile
+@@ -63,12 +63,12 @@
+ #
+ 
#;****************************************************************************;
+ 
++PREFIX := /usr
+ 
+ PROGS = INTEL-SA-00075-Discovery-Tool \
+               INTEL-SA-00075-Unprovisioning-Tool
+ 
+ all:$(PROGS)
+-      strip $(PROGS)
+ 
+ INTEL-SA-00075-Discovery-Tool: INTEL-SA-00075-Discovery-Tool.o 
INTEL-SA-00075.o
+ INTEL-SA-00075-Unprovisioning-Tool: INTEL-SA-00075-Unprovisioning-Tool.o 
INTEL-SA-00075.o
+@@ -77,3 +77,5 @@ clean:
+       rm -f $(PROGS)
+       rm -f *.o
+ 
++install:
++      install -D -t $(DESTDIR)$(PREFIX)/sbin/ $(PROGS)

diff --git a/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild 
b/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild
new file mode 100644
index 00000000000..ad560d57688
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild
@@ -0,0 +1,24 @@
+# Copyright 1999-2017 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=6
+
+inherit toolchain-funcs
+
+MY_PN="INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools"
+
+DESCRIPTION="Tools from Intel to detect and mitigate the AMT/MEI vulnerability"
+HOMEPAGE="https://downloadcenter.intel.com/download/26799/INTEL-SA-00075-Linux-Detection-and-Mitigation-Tools";
+SRC_URI="https://github.com/intel/${MY_PN}/archive/${PV}.tar.gz -> ${P}.tar.gz"
+
+LICENSE="GPL-2 BSD"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+
+S="${WORKDIR}/${MY_PN}-${PV}"
+
+PATCHES=("${FILESDIR}/${PN}-makefile.patch")
+
+src_compile() {
+       emake CC="$(tc-getCC)" CFLAGS="${CFLAGS}" LDFLAGS="${LDFLAGS}"
+}

diff --git a/sys-apps/intel-sa-00075-tools/metadata.xml 
b/sys-apps/intel-sa-00075-tools/metadata.xml
new file mode 100644
index 00000000000..bf8d19147b7
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/metadata.xml
@@ -0,0 +1,19 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd";>
+<pkgmetadata>
+       <maintainer type="person">
+               <email>chutz...@gentoo.org</email>
+               <name>Patrick McLean</name>
+       </maintainer>
+       <longdescription lang="en">
+               The INTEL-SA-00075-Discovery-Tool for local analysis of a 
single or
+               multiple systems.
+
+               The INTEL-SA-00075-Unprovisioning-Tool will unprovision 
computers with
+               Intel® Active Management Technology (Intel® AMT), Intel® 
Standard
+               Manageability, and Intel® Small Business Technology (Intel® 
SBT) that
+               are vulnerable to the issue identified in INTEL-SA-00075.  This 
tool
+               will allow you to unprovision management features, configured in
+               Client Control Mode (CCM).
+       </longdescription>
+</pkgmetadata>

Reply via email to