summaryrefslogtreecommitdiff
path: root/sys-apps/intel-sa-00075-tools
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2017-10-09 18:53:29 +0100
committerV3n3RiX <venerix@redcorelinux.org>2017-10-09 18:53:29 +0100
commit4f2d7949f03e1c198bc888f2d05f421d35c57e21 (patch)
treeba5f07bf3f9d22d82e54a462313f5d244036c768 /sys-apps/intel-sa-00075-tools
reinit the tree, so we can have metadata
Diffstat (limited to 'sys-apps/intel-sa-00075-tools')
-rw-r--r--sys-apps/intel-sa-00075-tools/Manifest4
-rw-r--r--sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch24
-rw-r--r--sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild24
-rw-r--r--sys-apps/intel-sa-00075-tools/metadata.xml19
4 files changed, 71 insertions, 0 deletions
diff --git a/sys-apps/intel-sa-00075-tools/Manifest b/sys-apps/intel-sa-00075-tools/Manifest
new file mode 100644
index 000000000000..d395e7097754
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/Manifest
@@ -0,0 +1,4 @@
+AUX intel-sa-00075-tools-makefile.patch 620 SHA256 d34bfc1ecf3b46de4a379f44594d522a557fc9e7026fb265dfa1cee7e726357a SHA512 01347eaa8a50731ec21effc80125a6384760e75a954205710b7a813d65e392b2aba002ac521db8ca9fb9cfc1f8a071cf8d988969068415e410987f0473147483 WHIRLPOOL 6300150b18486b10def6a35a3129486b0c045b064e05551ca0944f612ed52de7811ad79321fe6f6739bd5a3ab95f9355c33d18cfd6911755d6483d2edc63be64
+DIST intel-sa-00075-tools-1.0.tar.gz 18750 SHA256 1f6f86cb7740285f49c0c2882f7f2ad318cf04adfcbfcb29ffd80e7eb6d03e14 SHA512 a42ee0e1553f4638c2976d8a28feb8c91d5ecb9163608f735406a3c80213f34933231320630f43392552fa69674afb1795f23fffef29b4cad45641827130e86e WHIRLPOOL 3accb57db89d50a558e910d8a1f091cf122f6788b754834caf5a578204cfe2ae25e5aa7231da9c1aaf20ab20f97d5647d78bab76d10d346fed168b782a560aaf
+EBUILD intel-sa-00075-tools-1.0.ebuild 686 SHA256 10b6e6de6efd541c5a6b3ec77502a3c6fd72312acf271a33efb5a681fa16fea1 SHA512 a2989947caff57d7b262a10518fb0174f182b9f4cc20ce1161a43fab357860de77e8d68084cf942338d06cce695a037d550038afb32bb5c1859908a4e6d9520d WHIRLPOOL 3864fe805c3439558c9bc419367b5321b720f06d7a0f25b0d29ee0452e9ea44a4f8c15a96c5b8b4dfc820c40e95a0dd07bc81203587100d926b32192fbda2059
+MISC metadata.xml 774 SHA256 7aea9b28051c62f79c8b64a6ff7cdd705e233bcf467112d9f0a15d82376154d6 SHA512 8adfad13fe748dce84af7b77094c732f746d5c9564d117b7ae771cf23ae54298e0f6acf9289a8aa7964f2ce356f61a21d330969512220fb0f66f2cece0ab0c63 WHIRLPOOL 3e79d2f4c05b9553558060eb6b2f7defc4589de37ce613fa7d6a1ddf19c4771dc5dd6e9de5d2270c88338bc3173e934446e2481d63788ef797b41d87fb6f9b6a
diff --git a/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch b/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch
new file mode 100644
index 000000000000..3cdf418315f7
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/files/intel-sa-00075-tools-makefile.patch
@@ -0,0 +1,24 @@
+diff --git a/Makefile b/Makefile
+index 5ccccff..f58d7bb 100644
+--- a/Makefile
++++ b/Makefile
+@@ -63,12 +63,12 @@
+ #
+ #;****************************************************************************;
+
++PREFIX := /usr
+
+ PROGS = INTEL-SA-00075-Discovery-Tool \
+ INTEL-SA-00075-Unprovisioning-Tool
+
+ all:$(PROGS)
+- strip $(PROGS)
+
+ INTEL-SA-00075-Discovery-Tool: INTEL-SA-00075-Discovery-Tool.o INTEL-SA-00075.o
+ INTEL-SA-00075-Unprovisioning-Tool: INTEL-SA-00075-Unprovisioning-Tool.o INTEL-SA-00075.o
+@@ -77,3 +77,5 @@ clean:
+ rm -f $(PROGS)
+ rm -f *.o
+
++install:
++ install -D -t $(DESTDIR)$(PREFIX)/sbin/ $(PROGS)
diff --git a/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild b/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild
new file mode 100644
index 000000000000..ad560d576889
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/intel-sa-00075-tools-1.0.ebuild
@@ -0,0 +1,24 @@
+# Copyright 1999-2017 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=6
+
+inherit toolchain-funcs
+
+MY_PN="INTEL-SA-00075-Linux-Detection-And-Mitigation-Tools"
+
+DESCRIPTION="Tools from Intel to detect and mitigate the AMT/MEI vulnerability"
+HOMEPAGE="https://downloadcenter.intel.com/download/26799/INTEL-SA-00075-Linux-Detection-and-Mitigation-Tools"
+SRC_URI="https://github.com/intel/${MY_PN}/archive/${PV}.tar.gz -> ${P}.tar.gz"
+
+LICENSE="GPL-2 BSD"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+
+S="${WORKDIR}/${MY_PN}-${PV}"
+
+PATCHES=("${FILESDIR}/${PN}-makefile.patch")
+
+src_compile() {
+ emake CC="$(tc-getCC)" CFLAGS="${CFLAGS}" LDFLAGS="${LDFLAGS}"
+}
diff --git a/sys-apps/intel-sa-00075-tools/metadata.xml b/sys-apps/intel-sa-00075-tools/metadata.xml
new file mode 100644
index 000000000000..bf8d19147b75
--- /dev/null
+++ b/sys-apps/intel-sa-00075-tools/metadata.xml
@@ -0,0 +1,19 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <maintainer type="person">
+ <email>chutzpah@gentoo.org</email>
+ <name>Patrick McLean</name>
+ </maintainer>
+ <longdescription lang="en">
+ The INTEL-SA-00075-Discovery-Tool for local analysis of a single or
+ multiple systems.
+
+ The INTEL-SA-00075-Unprovisioning-Tool will unprovision computers with
+ Intel® Active Management Technology (Intel® AMT), Intel® Standard
+ Manageability, and Intel® Small Business Technology (Intel® SBT) that
+ are vulnerable to the issue identified in INTEL-SA-00075. This tool
+ will allow you to unprovision management features, configured in
+ Client Control Mode (CCM).
+ </longdescription>
+</pkgmetadata>