397 panels/firmware-security/cc-firmware-security-utils.c:128 | ||
398 panels/firmware-security/cc-firmware-security-utils.c:133 | ||
399 panels/firmware-security/cc-firmware-security-utils.c:138 | ||
400 panels/firmware-security/cc-firmware-security-utils.c:143 | ||
401 panels/firmware-security/cc-firmware-security-utils.c:148 | ||
402 panels/firmware-security/cc-firmware-security-utils.c:153 | ||
|
||
403 panels/firmware-security/cc-firmware-security-utils.c:158 | ||
404 panels/firmware-security/cc-firmware-security-utils.c:163 | ||
405 panels/firmware-security/cc-firmware-security-utils.c:168 | ||
406 panels/firmware-security/cc-firmware-security-utils.c:175 | ||
English
TRANSLATORS: Title: MEI = Intel Management Engine, and the "override" is enabled
* with a jumper -- luckily it is probably not accessible to end users on consumer
* boards
|
||
407 panels/firmware-security/cc-firmware-security-utils.c:180 | ||
408 panels/firmware-security/cc-firmware-security-utils.c:185 | ||
409 panels/firmware-security/cc-firmware-security-utils.c:190 | ||
|
||
410 panels/firmware-security/cc-firmware-security-utils.c:195 | ||
|
||
411 panels/firmware-security/cc-firmware-security-utils.c:201 | ||
412 panels/firmware-security/cc-firmware-security-utils.c:206 | ||
413 panels/firmware-security/cc-firmware-security-utils.c:211 | ||
414 panels/firmware-security/cc-firmware-security-utils.c:216 | ||
|
||
415 panels/firmware-security/cc-firmware-security-utils.c:221 | ||
|
||
416 panels/firmware-security/cc-firmware-security-utils.c:226 | ||