fwupd/plugins/amt
Richard Hughes c4b7f42e43 Only compress one version of the builtin-quirks
Saving the quirks in the GResource section worked well, but it made the build
system very complicated and also meant the .data section was duplicated in
both `fwupd` and `fwupdtool` -- negating a lot of the hard-fought savings.

Simplify this feature so that we just `cat` all the quirk files together, then
gzip them into a single file. This means that at startup fwupd only needs to
check the mtime of one file, and weirdly it's actually faster to load a smaller
compressed file from disk that it is to load multiple uncompressed files.
2022-09-27 12:44:04 +01:00
..
amt.quirk amt: Modernize the plugin and split out common functionality 2022-06-21 08:10:04 +01:00
fu-amt-device.c amt: Connect to the interface during ->open() 2022-07-20 20:11:32 +01:00
fu-amt-device.h amt: Modernize the plugin and split out common functionality 2022-06-21 08:10:04 +01:00
fu-plugin-amt.c amt: Modernize the plugin and split out common functionality 2022-06-21 08:10:04 +01:00
meson.build Only compress one version of the builtin-quirks 2022-09-27 12:44:04 +01:00
README.md trivial: update markdown for pre-commit style 2021-07-18 14:42:47 -05:00

Intel Management Engine

Introduction

This plugin is used to get the version number on the Intel Management Engine.

If AMT is enabled and provisioned and the AMT version is between 6.0 and 11.2, and you have not upgraded your firmware, you are vulnerable to CVE-2017-5689 and you should disable AMT in your system firmware.

This code is inspired by 'AMT status checker for Linux' by Matthew Garrett which can be found here: https://github.com/mjg59/mei-amt-check

That tool in turn is heavily based on mei-amt-version from samples/mei in the Linux source tree and copyright Intel Corporation.

GUID Generation

These devices use the existing GUID provided by the AMT host interface.

Vendor ID Security

The device is not upgradable and thus requires no vendor ID set.

External Interface Access

This plugin requires read only access to /dev/mei0.