| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-protocols/net-snmp/files/ |
| H A D | snmpd.conf | 61 com2sec paranoid default public 69 group MyROSystem v1 paranoid 70 group MyROSystem v2c paranoid 71 group MyROSystem usm paranoid
|
| /OK3568_Linux_fs/buildroot/toolchain/ |
| H A D | toolchain-wrapper.c | 162 int paranoid, in check_unsafe_path() argument 173 paranoid ? "ERROR" : "WARNING", in check_unsafe_path() 177 if (paranoid) in check_unsafe_path() 254 int paranoid; in main() local 509 paranoid = 1; in main() 511 paranoid = 0; in main() 529 check_unsafe_path(argv[i-1], argv[i], paranoid, 0); in main() 531 check_unsafe_path(argv[i], argv[i] + opt->len, paranoid, 1); in main()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/tcp-wrappers/tcp-wrappers-7.6/ |
| H A D | 00_man_quoting.diff | 47 -A host name or network address, or one of the `unknown' or `paranoid' 48 +A host name or network address, or one of the `unknown\' or `paranoid\' 56 -A host name or network address, or one of the `unknown' or `paranoid' 58 +A host name or network address, or one of the `unknown\' or `paranoid\' 71 tcpdmatch in.telnetd paranoid
|
| H A D | expand_remote_port.patch | 41 The client (server) host name (or "unknown" or "paranoid").
|
| H A D | 10_usagi-ipv6.patch | 795 + strcpy(host->name, paranoid); /* name is bad, clobber it */ 889 + strcpy(host->name, paranoid); /* name is bad, clobber it */ 899 strcpy(host->name, paranoid); /* name is bad, clobber it */
|
| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | entry_64.rst | 75 The expensive (paranoid) way is to read back the MSR_GS_BASE value 100 must use idtentry with paranoid=1 to handle gsbase correctly. This 107 We try to only use IST entries and the paranoid entry code for vectors 109 generate all 'normal' entry points with the regular (faster) paranoid=0
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0016-relocator-Protect-grub_relocator_alloc_chunk_addr-in.patch | 11 I didn't want to be too paranoid to check every possible math equation
|
| /OK3568_Linux_fs/kernel/Documentation/livepatch/ |
| H A D | callbacks.rst | 117 In this case, if we're being super paranoid, it might make sense to
|
| /OK3568_Linux_fs/kernel/arch/arc/kernel/ |
| H A D | entry-compact.S | 371 ; paranoid check, given A1 was active when A2 happened, preempt count
|
| /OK3568_Linux_fs/kernel/tools/perf/util/ |
| H A D | evsel.c | 2510 int paranoid; in evsel__fallback() local 2532 (paranoid = perf_event_paranoid()) > 1) { in evsel__fallback() 2554 " samples", paranoid); in evsel__fallback()
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | mandatory-locking.rst | 109 paranoid HP-UX behaviour.
|
| H A D | ext2.rst | 298 If you're exceptionally paranoid, there are 3 ways of making metadata
|
| /OK3568_Linux_fs/kernel/arch/arc/ |
| H A D | Kconfig | 592 Enable paranoid checks and self-test of both ARC-specific and generic
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/procmail/procmail/ |
| H A D | from-debian-to-fix-compile-errors.patch | 221 - { const struct hostent*host; /* what host? paranoid checks */
|
| /OK3568_Linux_fs/u-boot/spl/drivers/mtd/ |
| H A D | .mtdcore.o.cmd | |
| H A D | .mtdpart.o.cmd | |
| /OK3568_Linux_fs/u-boot/drivers/mtd/ |
| H A D | .mtdcore.o.cmd | |
| H A D | .mtdpart.o.cmd | |
| /OK3568_Linux_fs/buildroot/ |
| H A D | Config.in | 660 bool "paranoid check of library/header paths"
|
| /OK3568_Linux_fs/kernel/Documentation/virt/uml/ |
| H A D | user_mode_linux_howto_v2.rst | 930 already in the COW file header. If you're paranoid, boot the new
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | can.rst | 309 /* paranoid check ... */
|
| /OK3568_Linux_fs/kernel/init/ |
| H A D | Kconfig | 652 If you are paranoid and not sure what the kernel will be
|
| /OK3568_Linux_fs/external/xserver/ |
| H A D | ChangeLog | 12831 glx: Be a bit more paranoid in glx client cleanup 38656 These are paranoid about integer overflow, and will return -1 if their 38732 glx: Be more paranoid about variable-length requests [CVE-2014-8093 1/6]
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |