mirror of
https://git.proxmox.com/git/fwupd
synced 2026-03-28 06:25:00 +00:00
Saving the quirks in the GResource section worked well, but it made the build system very complicated and also meant the .data section was duplicated in both `fwupd` and `fwupdtool` -- negating a lot of the hard-fought savings. Simplify this feature so that we just `cat` all the quirk files together, then gzip them into a single file. This means that at startup fwupd only needs to check the mtime of one file, and weirdly it's actually faster to load a smaller compressed file from disk that it is to load multiple uncompressed files. |
||
|---|---|---|
| .. | ||
| amt.quirk | ||
| fu-amt-device.c | ||
| fu-amt-device.h | ||
| fu-plugin-amt.c | ||
| meson.build | ||
| README.md | ||
Intel Management Engine
Introduction
This plugin is used to get the version number on the Intel Management Engine.
If AMT is enabled and provisioned and the AMT version is between 6.0 and 11.2, and you have not upgraded your firmware, you are vulnerable to CVE-2017-5689 and you should disable AMT in your system firmware.
This code is inspired by 'AMT status checker for Linux' by Matthew Garrett which can be found here: https://github.com/mjg59/mei-amt-check
That tool in turn is heavily based on mei-amt-version from samples/mei in the Linux source tree and copyright Intel Corporation.
GUID Generation
These devices use the existing GUID provided by the AMT host interface.
Vendor ID Security
The device is not upgradable and thus requires no vendor ID set.
External Interface Access
This plugin requires read only access to /dev/mei0.