Pax Creative Driver For Mac

Pax Creative Driver For Mac Average ratng: 4,4/5 4314 votes
Thread Tools
  1. PAX Drivers by Robert McClelland are designed to improve your audio experience over the standard Creative driver sets. Containing tweaks which optimise for maximum performance they can also resolve bugs found in other versions.
  2. Mac Os X Snow Leopard Iso Direct Download. Xz, Zip, Tar, Zip, Tar, Gzip, Bzip2, ISO, EXE, CAB, PAX Here on this subject we are able to download Mac OS X 10.6 Snow.
  3. I bought my awesome son the Creative wireless WoW headset for Xmas. Mainly so he can play with his friends online. He's since then lost the USB plug in so can't now connect the headphones to the PC or his Xbox etc.
  4. Search titles only; Posted by Member: Separate names with a comma. Newer Than: Search this forum only. Display results as threads.
post #1 of 110 (permalink) Old11-02-2008, 04:46 PM - Thread Starter

EarlKeimJun 30, Installation and tweaks AkakiJul 15, However, after 3 months of exploration, research and filming, pax creative lasting. Pax creative download the pattern to make the hats visit HatPax.

New to Overclock.net

Location: pa
Rep: 199 (Unique: 160)
Creative's drivers are good , but to those who have spent a considerable amount of money on their sound system , its good to have software that can more extensively manage your sound.
Here i am presenting you with the latest driver package modded by youP-PAX - and i am pretty impressed so far.
PAX X-FI OS Driver V6.20 codename “Wing Foot”
Special Bass + Treble Edition
Crystal clear true 24bit sound
Supported cards:
PCI XFI
Supported OS:
XP
X32
X64
Vista
X32
X64
Changes:
+ World first Creative Console Launcher
+ Fix all sound to 24bit level
+ Fix all sound cards to make mic work
+ Fix stuff in infs
+ Perfect Bass sound
+ Added nice crisp bass to it.
+ Super Bass in Games Boost bass level fight off weak bass in games.
+ Added Bass in ENT mode for movies and music
+ Added Bass in Audio creation mode
+ Added support in infs
+ Added support in XP x64
+ Added support in Vista x64
+ 100% working Dolby in Vista and XP
+ Dell support should work now!
* Fix EAX and EQ Presets they all work now!
* Added more Treble please let me know how it goes.
Know issue No DTS and DD for Dell OEM Cards yet.
Platforms tested:
XP and Vista

v6.20
http://files.filefront.com/PAX+X+Fi+../fileinfo.html

v6.25 (compatible with both audigy/x-fi) [TEMP. INVALID]
http://www.youp-pax.org/viewthread.p..extra=page%3D1
Youp-Pax X-Fi Software Suite XP 2008 (
Windows XP Only)[TEMP. INVALID]
http://www.youp-pax.org/viewthread.p..extra=page%3D1
v6.25 (compatible with both audigy/x-fi) [Thanks to bobfig]
http://www.megaupload.com/?d=4Y3K379M
Front i/o instructions from fellow OCN member
Hp driver for mac
Originally Posted by ericeod
The Creative Entertainment Ceter are not included with the driver pack, but it was easy enough to install the application from the X-Fi driver disk.
All I did was removed all Creative drivers (almost didnt see the volume control in the add/remove..), ran driver cleaner and installed the Pax drivers. When installation finished i just selected not to restart, then poped in the X-Fi disk. I then selected custom installation and just checked only the Entertainment Center. After the application installed I rebooted. Everything is working great.

Testimonials:

Originally Posted by ljason8eg
These drivers make your speakers sound far better than anything creative has on their site. The bass response is night and day when you compare the two.

Enjoy

Chaintech AV-710 Denon DA-500 Soloz Elite Resolution TCA Gizmo Onix Reference 0.5s
4ghz cpuz speaker work log youP-Pax Modded x-fi drivers OCN Headphone Club

Sponsored Links

post #2 of 110 (permalink) Old11-02-2008, 04:51 PM
Retired Staff

Location: Anchorage, AK
Rep: 2741 (Unique: 1482)
Do you know if these drivers allow support for the front I/O with the X-Fi Platinim? In other words, does it include the Creative Entertainment Center for use with the remote?
<div><div><div><span></span><div><span>Quote:</span><span></span><div><span>Originally Posted by </span><strong>DuckieHo</strong><span> </span><a href='showthread.php?s=bd8d1313c09af4210eda3f9b5ad 8a046&amp;p=4306551#post4306551'><img alt='go_quote.gif' src='http://static.overclock.net//img/forum/go_quote.gif'></a></div><span></span><div><span>Benchmarking is so boring...</span></div><span></span></div><span></span></div><span></span><a href='https://www.overclock.net/intel-motherboards/229532-essentials-overclocking-680i-nvidia-reference-boards.html'>eVGA 680i Overclocking guide</a><span> ..... </span><a href='https://www.overclock.net/intel-motherboards/269840-asus-p5e-x38-thread.html'>ASUS P5E/Rampage Formula Thread</a><span>..... </span><a href='http://valid.canardpc.com/show_oc.php?id=521851' target='_blank'>4.4GHz CPU-Z</a><br><br><div><span><a href='https://www.overclock.net/intel-motherboards/426626-official-rog-asus-rampage-formula-x48.html'><span><b>The Official Asus Rampage Formula Club</b></span></a></span></div></div></div>

post #3 of 110 (permalink) Old11-02-2008, 04:54 PM
Linux Lobbyist

Location: Folsom, CA
Rep: 773 (Unique: 598)
Think these would be worth it with my Z-5500s? Like will they just make them sound better or what?

DSLR gear: Canon 1D Mark III RokiBowYang 14mm f/2.8 24-105 f/4 L IS 70-200 f/2.8 L 300mm f/4L IS Tamron 150-600mm f/5-6.3 1.4x II 580 EX II AB 800


Sponsored Links

post #4 of 110 (permalink) Old11-02-2008, 04:56 PM - Thread Starter
New to Overclock.net

Location: pa
Rep: 199 (Unique: 160)
Originally Posted by ericeod
Do you know if these drivers allow support for the front I/O with the X-Fi Platinim? In other words, does it include the Creative Entertainment Center for use with the remote?
It should..Im not completely sure though.

Chaintech AV-710 Denon DA-500 Soloz Elite Resolution TCA Gizmo Onix Reference 0.5s
4ghz cpuz speaker work log youP-Pax Modded x-fi drivers OCN Headphone Club

post #5 of 110 (permalink) Old11-02-2008, 04:56 PM - Thread Starter
New to Overclock.net

Location: pa
Rep: 199 (Unique: 160)
Originally Posted by ljason8eg
Think these would be worth it with my Z-5500s? Like will they just make them sound better or what?
Yeah , its great for fine tuning things just to your liking

Chaintech AV-710 Denon DA-500 Soloz Elite Resolution TCA Gizmo Onix Reference 0.5s
4ghz cpuz speaker work log youP-Pax Modded x-fi drivers OCN Headphone Club

post #6 of 110 (permalink) Old11-02-2008, 04:57 PM
Retired Staff

Location: I'm near Silver Lake
Rep: 1012 (Unique: 603)
Originally Posted by ericeod
Do you know if these drivers allow support for the front I/O with the X-Fi Platinim? In other words, does it include the Creative Entertainment Center for use with the remote?
I'm wondering the same thing.
Sinar F Toyo 45CF (Rodenstock Grandagon-N 75mm f/4.5 Rodenstock Sironar-N 135mm f/5.6 Nikkor-W 180mm f/5.6) Profoto Acute2 1200w (2xD4)

OCN Team Fortress 2 Group
How Marin got her new mouse!Filco Majestouch Tenkeyless Tactile Click OtakuHappy Hacking Professional 2
post #7 of 110 (permalink) Old11-02-2008, 04:58 PM
Linux Lobbyist

Location: Folsom, CA
Rep: 773 (Unique: 598)
Hmm..i'm going to try these since i have some free time to install them right now.

DSLR gear: Canon 1D Mark III RokiBowYang 14mm f/2.8 24-105 f/4 L IS 70-200 f/2.8 L 300mm f/4L IS Tamron 150-600mm f/5-6.3 1.4x II 580 EX II AB 800


post #8 of 110 (permalink) Old11-02-2008, 05:00 PM

Location: My Room


post #9 of 110 (permalink) Old11-02-2008, 05:05 PM - Thread Starter
New to Overclock.net

Location: pa
Rep: 199 (Unique: 160)
Originally Posted by ljason8eg
Hmm..i'm going to try these since i have some free time to install them right now.

Cool , let us know how you like them.

Chaintech AV-710 Denon DA-500 Soloz Elite Resolution TCA Gizmo Onix Reference 0.5s
4ghz cpuz speaker work log youP-Pax Modded x-fi drivers OCN Headphone Club

post #10 of 110 (permalink) Old11-02-2008, 05:31 PM
Retired Staff

Location: Anchorage, AK
Rep: 2741 (Unique: 1482)
Originally Posted by Marin
I'm trying them now and will post back to let you know if it works with the Entertainment center.
<div><div><div><span></span><div><span>Quote:</span><span></span><div><span>Originally Posted by </span><strong>DuckieHo</strong><span> </span><a href='showthread.php?s=bd8d1313c09af4210eda3f9b5ad 8a046&amp;p=4306551#post4306551'><img alt='go_quote.gif' src='http://static.overclock.net//img/forum/go_quote.gif'></a></div><span></span><div><span>Benchmarking is so boring...</span></div><span></span></div><span></span></div><span></span><a href='https://www.overclock.net/intel-motherboards/229532-essentials-overclocking-680i-nvidia-reference-boards.html'>eVGA 680i Overclocking guide</a><span> ..... </span><a href='https://www.overclock.net/intel-motherboards/269840-asus-p5e-x38-thread.html'>ASUS P5E/Rampage Formula Thread</a><span>..... </span><a href='http://valid.canardpc.com/show_oc.php?id=521851' target='_blank'>4.4GHz CPU-Z</a><br><br><div><span><a href='https://www.overclock.net/intel-motherboards/426626-official-rog-asus-rampage-formula-x48.html'><span><b>The Official Asus Rampage Formula Club</b></span></a></span></div></div></div>



«Previous Thread Next Thread

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)


Posting Rules
You may post replies
You may not edit your posts
Smilies are On
HTML code is Off
Pingbacks are Off
< Grsecurity‎ Appendix
Grsecurity/Appendix
Grsecurity and PaX Configuration OptionsRole Modes
  • 2Grsecurity (top level menu)
    • 2.2Configuration Method
    • 2.3Usage Type
    • 2.4Virtualization Type
    • 2.5Virtualization Hardware
    • 2.6Virtualization Software
    • 2.7Required Priorities
    • 2.8Default Special Groups
    • 2.9Customize Configuration
      • 2.9.1PaX
        • 2.9.1.2PaX Control
          • 2.9.1.2.5MAC system integration
        • 2.9.1.3Non-executable pages
          • 2.9.1.3.13Return Address Instrumentation Method
        • 2.9.1.4Address Space Layout Randomization
        • 2.9.1.5Miscellaneous hardening features
      • 2.9.2Memory Protections
      • 2.9.3Role Based Access Control Options
      • 2.9.4Filesystem Protections
      • 2.9.5Kernel Auditing
      • 2.9.6Executable Protections
      • 2.9.7Network Protections
      • 2.9.8Physical Protections
      • 2.9.9Sysctl Support
      • 2.9.10Logging Options

Introduction[edit]

This is a list of all grsecurity and PaX configuration options in the kernel. You can access this same information using the kernel configuration's built-in help. This page contains only the configuration options present in the latest stable grsecurity release. The grsecurity options are available under Security options » Grsecurity.

Each option contains the corresponding kernel configuration symbol (e.g. GRKERNSEC_FIFO), all related sysctl variable names if the option is configurable through sysctl, and description of the option.

Grsecurity[edit]

GRKERNSEC

Configuration Method[edit]

Automatic[edit]

/driver-lexmark-z645-for-mac.html. GRKERNSEC_CONFIG_AUTO

Custom[edit]

GRKERNSEC_CONFIG_CUSTOM

Usage Type[edit]

Server[edit]

GRKERNSEC_CONFIG_SERVER

Desktop[edit]

GRKERNSEC_CONFIG_DESKTOP

Virtualization Type[edit]

None[edit]

GRKERNSEC_CONFIG_VIRT_NONE

Guest[edit]

GRKERNSEC_CONFIG_VIRT_GUEST

Host[edit]

GRKERNSEC_CONFIG_VIRT_HOST

Virtualization Hardware[edit]

EPT/RVI Processor Support[edit]

GRKERNSEC_CONFIG_VIRT_EPT

First-gen/No Hardware Virtualization[edit]

GRKERNSEC_CONFIG_VIRT_SOFT

Virtualization Software[edit]

Xen[edit]

GRKERNSEC_CONFIG_VIRT_XEN

VMWare[edit]

GRKERNSEC_CONFIG_VIRT_VMWARE

KVM[edit]

GRKERNSEC_CONFIG_VIRT_KVM

VirtualBox[edit]

GRKERNSEC_CONFIG_VIRT_VIRTUALBOX

Required Priorities[edit]

Performance[edit]

GRKERNSEC_CONFIG_PRIORITY_PERF

Security[edit]

GRKERNSEC_CONFIG_PRIORITY_SECURITY

Default Special Groups[edit]

GID exempted from /proc restrictions[edit]

GRKERNSEC_PROC_GID

GID for TPE-untrusted users[edit]

GRKERNSEC_TPE_UNTRUSTED_GID

GID for TPE-trusted users[edit]

GRKERNSEC_TPE_TRUSTED_GID

GID for users with kernel-enforced SymlinksIfOwnerMatch[edit]

GRKERNSEC_SYMLINKOWN_GID

Customize Configuration[edit]

PaX[edit]

Enable various PaX features[edit]

PAX

PaX Control[edit]

Support soft mode[edit]

PAX_SOFTMODE

Use legacy ELF header marking[edit]

PAX_EI_PAX

Use ELF program header marking[edit]

PAX_PT_PAX_FLAGS

Use filesystem extended attributes marking[edit]

PAX_XATTR_PAX_FLAGS

MAC system integration[edit]
none[edit]

PAX_NO_ACL_FLAGS

direct[edit]

PAX_HAVE_ACL_FLAGS

hook[edit]

PAX_HOOK_ACL_FLAGS

Non-executable pages[edit]

Enforce non-executable pages[edit]

PAX_NOEXEC

Paging based non-executable pages[edit]

PAX_PAGEEXEC

Segmentation based non-executable pages[edit]

PAX_SEGMEXEC

Emulate trampolines[edit]

PAX_EMUTRAMP

Automatically emulate sigreturn trampolines[edit]

PAX_EMUSIGRT

Restrict mprotect()[edit]

PAX_MPROTECT

Use legacy/compat protection demoting (read help)[edit]

PAX_MPROTECT_COMPAT

Allow ELF text relocations (read help)[edit]

PAX_ELFRELOCS

Allow ELF ET_EXEC text relocations[edit]

PAX_ETEXECRELOCS

Automatically emulate ELF PLT[edit]

PAX_EMUPLT

Emulate old glibc resolver stub[edit]

PAX_DLRESOLVE

Enforce non-executable kernel pages[edit]

PAX_KERNEXEC

Return Address Instrumentation Method[edit]
bts[edit]

PAX_KERNEXEC_PLUGIN_METHOD_BTS

bts[edit]

PAX_KERNEXEC_PLUGIN_METHOD

Minimum amount of memory reserved for module code[edit]

PAX_KERNEXEC_MODULE_TEXT

Address Space Layout Randomization[edit]

Address Space Layout Randomization[edit]

PAX_ASLR

Randomize kernel stack base[edit]

PAX_RANDKSTACK

Randomize user stack base[edit]

PAX_RANDUSTACK

Randomize mmap() base[edit]

PAX_RANDMMAP

Miscellaneous hardening features[edit]

Sanitize all freed memory[edit]

PAX_MEMORY_SANITIZE

Sanitize kernel stack[edit]

PAX_MEMORY_STACKLEAK

Forcibly initialize local variables copied to userland[edit]

PAX_MEMORY_STRUCTLEAK

Prevent invalid userland pointer dereference[edit]

PAX_MEMORY_UDEREF

Prevent various kernel object reference counter overflows[edit]

PAX_REFCOUNT

Automatically constify eligible structures[edit]

PAX_CONSTIFY_PLUGIN

Harden heap object copies between kernel and userland[edit]

PAX_USERCOPY

Prevent various integer overflows in function size parameters[edit]

PAX_SIZE_OVERFLOW

Generate some entropy during boot and runtime[edit]

PAX_LATENT_ENTROPY

Prevent code reuse attacks[edit]

PAX_RAP

Memory Protections[edit]

Deny reading/writing to /dev/kmem, /dev/mem, and /dev/port[edit]

GRKERNSEC_KMEM

Restrict VM86 mode[edit]

GRKERNSEC_VM86

Disable privileged I/O[edit]

GRKERNSEC_IO
Related sysctl variables:

kernel.grsecurity.disable_priv_io

Harden BPF JIT against spray attacks[edit]

GRKERNSEC_JIT_HARDEN

Disable unprivileged PERF_EVENTS usage by default[edit]

GRKERNSEC_PERF_HARDEN

Insert random gaps between thread stacks[edit]

GRKERNSEC_RAND_THREADSTACK

Harden ASLR against information leaks and entropy reduction[edit]

GRKERNSEC_PROC_MEMMAP

Prevent kernel stack overflows[edit]

GRKERNSEC_KSTACKOVERFLOW

Deter exploit bruteforcing[edit]

GRKERNSEC_BRUTE
Related sysctl variables:

kernel.grsecurity.deter_bruteforce

Harden module auto-loading[edit]

GRKERNSEC_MODHARDEN

Hide kernel symbols[edit]

GRKERNSEC_HIDESYM

Randomize layout of sensitive kernel structures[edit]

GRKERNSEC_RANDSTRUCT

Use cacheline-aware structure randomization[edit]

GRKERNSEC_RANDSTRUCT_PERFORMANCE

Active kernel exploit response[edit]

GRKERNSEC_KERN_LOCKOUT

Old ARM userland compatibility[edit]

GRKERNSEC_OLD_ARM_USERLAND

Role Based Access Control Options[edit]

Disable RBAC system[edit]

GRKERNSEC_NO_RBAC

Hide kernel processes[edit]

GRKERNSEC_ACL_HIDEKERN

Maximum tries before password lockout[edit]

GRKERNSEC_ACL_MAXTRIES

Time to wait after max password tries, in seconds[edit]

GRKERNSEC_ACL_TIMEOUT

Filesystem Protections[edit]

Proc restrictions[edit]

GRKERNSEC_PROC

Restrict /proc to user only[edit]

GRKERNSEC_PROC_USER

Allow special group[edit]

GRKERNSEC_PROC_USERGROUP

GID exempted from /proc restrictions[edit]

GRKERNSEC_PROC_GID

Additional restrictions[edit]

GRKERNSEC_PROC_ADD

Linking restrictions[edit]

GRKERNSEC_LINK
Related sysctl variables:

kernel.grsecurity.linking_restrictions

Kernel-enforced SymlinksIfOwnerMatch[edit]

GRKERNSEC_SYMLINKOWN
Related sysctl variables:

kernel.grsecurity.enforce_symlinksifowner
kernel.grsecurity.symlinkown_gid

GID for users with kernel-enforced SymlinksIfOwnerMatch[edit]

GRKERNSEC_SYMLINKOWN_GID

FIFO restrictions[edit]

GRKERNSEC_FIFO
Related sysctl variables:

kernel.grsecurity.fifo_restrictions

Sysfs/debugfs restriction[edit]

GRKERNSEC_SYSFS_RESTRICT

Runtime read-only mount protection[edit]

GRKERNSEC_ROFS
Related sysctl variables:

kernel.grsecurity.romount_protect

Eliminate stat/notify-based device sidechannels[edit]

GRKERNSEC_DEVICE_SIDECHANNEL

Chroot jail restrictions[edit]

GRKERNSEC_CHROOT

Deny mounts[edit]

GRKERNSEC_CHROOT_MOUNT
Related sysctl variables:

kernel.grsecurity.chroot_deny_mount

Deny double-chroots[edit]

GRKERNSEC_CHROOT_DOUBLE
Related sysctl variables:

kernel.grsecurity.chroot_deny_chroot

Deny pivot_root in chroot[edit]

GRKERNSEC_CHROOT_PIVOT
Related sysctl variables:

kernel.grsecurity.chroot_deny_pivot

Enforce chdir('/')[edit]

GRKERNSEC_CHROOT_CHDIR
Related sysctl variables:

kernel.grsecurity.chroot_enforce_chdir

Deny (f)chmod +s[edit]

GRKERNSEC_CHROOT_CHMOD
Related sysctl variables:

kernel.grsecurity.chroot_deny_chmod

Deny fchdir out of chroot[edit]

GRKERNSEC_CHROOT_FCHDIR
Related sysctl variables:

kernel.grsecurity.chroot_deny_fchdir

Deny mknod[edit]

GRKERNSEC_CHROOT_MKNOD
Related sysctl variables:

kernel.grsecurity.chroot_deny_mknod

Deny shmat() out of chroot[edit]

GRKERNSEC_CHROOT_SHMAT
Related sysctl variables:

kernel.grsecurity.chroot_deny_shmat

Deny access to abstract AF_UNIX sockets out of chroot[edit]

GRKERNSEC_CHROOT_UNIX
Related sysctl variables:

kernel.grsecurity.chroot_deny_unix

Protect outside processes[edit]

GRKERNSEC_CHROOT_FINDTASK
Related sysctl variables:

kernel.grsecurity.chroot_findtask

Restrict priority changes[edit]

For

GRKERNSEC_CHROOT_NICE
Related sysctl variables:

kernel.grsecurity.chroot_restrict_nice

Deny sysctl writes[edit]

GRKERNSEC_CHROOT_SYSCTL
Related sysctl variables:

kernel.grsecurity.chroot_deny_sysctl

Capability restrictions[edit]

GRKERNSEC_CHROOT_CAPS
Related sysctl variables:

kernel.grsecurity.chroot_caps

Exempt initrd tasks from restrictions[edit]

GRKERNSEC_CHROOT_INITRD

Kernel Auditing[edit]

Single group for auditing[edit]

GRKERNSEC_AUDIT_GROUP
Related sysctl variables:

kernel.grsecurity.audit_gid
kernel.grsecurity.audit_group

GID for auditing[edit]

GRKERNSEC_AUDIT_GID

Exec logging[edit]

GRKERNSEC_EXECLOG
Related sysctl variables:

kernel.grsecurity.exec_logging

Resource logging[edit]

GRKERNSEC_RESLOG
Related sysctl variables:

kernel.grsecurity.resource_logging

Log execs within chroot[edit]

GRKERNSEC_CHROOT_EXECLOG
Related sysctl variables:

kernel.grsecurity.chroot_execlog

Ptrace logging[edit]

GRKERNSEC_AUDIT_PTRACE
Related sysctl variables:

kernel.grsecurity.audit_ptrace

Chdir logging[edit]

GRKERNSEC_AUDIT_CHDIR
Related sysctl variables:

kernel.grsecurity.audit_chdir

(Un)Mount logging[edit]

GRKERNSEC_AUDIT_MOUNT
Related sysctl variables:

kernel.grsecurity.audit_mount

Signal logging[edit]

GRKERNSEC_SIGNAL
Related sysctl variables:

kernel.grsecurity.signal_logging

Fork failure logging[edit]

GRKERNSEC_FORKFAIL
Related sysctl variables:

kernel.grsecurity.forkfail_logging

Time change logging[edit]

GRKERNSEC_TIME
Related sysctl variables:

kernel.grsecurity.timechange_logging

/proc/<pid>/ipaddr support[edit]

GRKERNSEC_PROC_IPADDR

Denied RWX mmap/mprotect logging[edit]

GRKERNSEC_RWXMAP_LOG
Related sysctl variables:

kernel.grsecurity.rwxmap_logging

Executable Protections[edit]

Dmesg(8) restriction[edit]

GRKERNSEC_DMESG
Related sysctl variables:

kernel.grsecurity.dmesg

Deter ptrace-based process snooping[edit]

GRKERNSEC_HARDEN_PTRACE
Related sysctl variables:

kernel.grsecurity.harden_ptrace

Require read access to ptrace sensitive binaries[edit]

GRKERNSEC_PTRACE_READEXEC
Related sysctl variables:

kernel.grsecurity.ptrace_readexec

Enforce consistent multithreaded privileges[edit]

GRKERNSEC_SETXID
Related sysctl variables:

kernel.grsecurity.consistent_setxid

Disallow access to overly-permissive IPC objects[edit]

Creative Driver Download

GRKERNSEC_HARDEN_IPC
Related sysctl variables:

kernel.grsecurity.harden_ipc

Trusted Path Execution (TPE)[edit]

GRKERNSEC_TPE
Related sysctl variables:

Canon Printer Driver For Mac

kernel.grsecurity.tpe
kernel.grsecurity.tpe_gid

Partially restrict all non-root users[edit]

GRKERNSEC_TPE_ALL
Related sysctl variables:

kernel.grsecurity.tpe_restrict_all

Invert GID option[edit]

GRKERNSEC_TPE_INVERT
Related sysctl variables:

kernel.grsecurity.tpe_invert

GID for TPE-untrusted users[edit]

GRKERNSEC_TPE_UNTRUSTED_GID

GID for TPE-trusted users[edit]

GRKERNSEC_TPE_TRUSTED_GID

Network Protections[edit]

Larger entropy pools[edit]

GRKERNSEC_RANDNET

TCP/UDP blackhole and LAST_ACK DoS prevention[edit]

GRKERNSEC_BLACKHOLE
Related sysctl variables:

kernel.grsecurity.ip_blackhole
kernel.grsecurity.lastack_retries

Disable TCP Simultaneous Connect[edit]

GRKERNSEC_NO_SIMULT_CONNECT

Socket restrictions[edit]

GRKERNSEC_SOCKET

Deny any sockets to group[edit]

GRKERNSEC_SOCKET_ALL
Related sysctl variables:

kernel.grsecurity.socket_all
kernel.grsecurity.socket_all_gid

GID to deny all sockets for[edit]

GRKERNSEC_SOCKET_ALL_GID

Deny client sockets to group[edit]

GRKERNSEC_SOCKET_CLIENT
Related sysctl variables:

kernel.grsecurity.socket_client
kernel.grsecurity.socket_client_gid

GID to deny client sockets for[edit]

GRKERNSEC_SOCKET_CLIENT_GID

Deny server sockets to group[edit]

GRKERNSEC_SOCKET_SERVER
Related sysctl variables:

kernel.grsecurity.socket_server
kernel.grsecurity.socket_server_gid

GID to deny server sockets for[edit]

GRKERNSEC_SOCKET_SERVER_GID

Physical Protections[edit]

Deny new USB connections after toggle[edit]

GRKERNSEC_DENYUSB
Related sysctl variables:

kernel.grsecurity.deny_new_usb

Reject all USB devices not connected at boot[edit]

GRKERNSEC_DENYUSB_FORCE

Sysctl Support[edit]

Sysctl support[edit]

GRKERNSEC_SYSCTL

Extra sysctl support for distro makers (READ HELP)[edit]

GRKERNSEC_SYSCTL_DISTRO

Turn on features by default[edit]

Creative Driver Update

GRKERNSEC_SYSCTL_ON

Logging Options[edit]

Seconds in between log messages (minimum)[edit]

Creative Driver Webcam

GRKERNSEC_FLOODTIME

Number of messages in a burst (maximum)[edit]

Epson Driver For Mac

GRKERNSEC_FLOODBURST

Next Page: Role Modes

Home: Grsecurity/Appendix

Retrieved from 'https://en.wikibooks.org/w/index.php?title=Grsecurity/Appendix/Grsecurity_and_PaX_Configuration_Options&oldid=3444091'