401 panels/firmware-security/cc-firmware-security-utils.c:148 | ||
402 panels/firmware-security/cc-firmware-security-utils.c:153 | ||
403 panels/firmware-security/cc-firmware-security-utils.c:158 | ||
404 panels/firmware-security/cc-firmware-security-utils.c:163 | ||
405 panels/firmware-security/cc-firmware-security-utils.c:168 | ||
406 panels/firmware-security/cc-firmware-security-utils.c:175 | ||
English
TRANSLATORS: Title: MEI = Intel Management Engine, and the "override" is enabled
* with a jumper -- luckily it is probably not accessible to end users on consumer
* boards
|
||
407 panels/firmware-security/cc-firmware-security-utils.c:180 | ||
408 panels/firmware-security/cc-firmware-security-utils.c:185 | ||
409 panels/firmware-security/cc-firmware-security-utils.c:190 | ||
410 panels/firmware-security/cc-firmware-security-utils.c:195 | ||
411 panels/firmware-security/cc-firmware-security-utils.c:201 | ||
412 panels/firmware-security/cc-firmware-security-utils.c:206 | ||
413 panels/firmware-security/cc-firmware-security-utils.c:211 | ||
414 panels/firmware-security/cc-firmware-security-utils.c:216 | ||
English
https://en.wikipedia.org/wiki/Replay_attack
TRANSLATORS: Title: if hardware enforces control of SPI replays
|
||
415 panels/firmware-security/cc-firmware-security-utils.c:221 | ||
416 panels/firmware-security/cc-firmware-security-utils.c:226 | ||
417 panels/firmware-security/cc-firmware-security-utils.c:237 | ||
418 panels/firmware-security/cc-firmware-security-utils.c:242 | ||
419 panels/firmware-security/cc-firmware-security-utils.c:252 | ||
420 panels/firmware-security/cc-firmware-security-utils.c:257 | ||
English
TRANSLATORS: the memory space or system mode is locked to prevent from malicious modification.
|
||