summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* stable on ppc64Tom Gall2005-12-031-15/+5
| | | | | (Portage version: 2.0.51.22-r3) (Unsigned Manifest commit)
* stable on ppc64Tom Gall2005-12-032-3/+6
| | | | (Portage version: 2.0.51.22-r3)
* Stable on sparcGustavo Zacarias2005-10-181-0/+10
| | | | | (Portage version: 2.0.53_rc5) (Signed Manifest commit)
* Stable on sparcGustavo Zacarias2005-10-181-6/+6
| | | | | (Portage version: 2.0.53_rc5) (Unsigned Manifest commit)
* Stable on sparcGustavo Zacarias2005-10-182-3/+6
| | | | (Portage version: 2.0.53_rc5)
* stable on ia64Aron Griffis2005-08-231-2/+2
| | | | | (Portage version: 2.0.51.22-r2) (Unsigned Manifest commit)
* stable on ia64Aron Griffis2005-08-233-17/+10
| | | | (Portage version: 2.0.51.22-r2)
* - return EXIT_FAILURE when paxctl fails to do as requestedKevin F. Quinn2005-06-131-2/+12
| | | | | (Portage version: 2.0.51.19) (Manifest recommit) (Portage version: 2.0.51.19)
* - return EXIT_FAILURE when paxctl fails to do as requestedKevin F. Quinn2005-06-135-15/+384
| | | | (Portage version: 2.0.51.19)
* - stable on x86/ppc/amd64Ned Ludd2005-06-111-0/+12
| | | | (Signed Manifest commit)
* - stable on x86/ppc/amd64Ned Ludd2005-06-111-2/+2
| | | | (Unsigned Manifest commit)
* - stable on x86/ppc/amd64Ned Ludd2005-06-113-17/+8
|
* - new paxctl release. new version includes ability to reuse/rename existing ↵Ned Ludd2005-05-041-2/+14
| | | | | | | unneeded program header into PT_PAX_FLAGS (Portage version: 2.0.51.21) (Manifest recommit) (Portage version: 2.0.51.21)
* - new paxctl release. new version includes ability to reuse/rename existing ↵Ned Ludd2005-05-044-2/+37
| | | | | | unneeded program header into PT_PAX_FLAGS (Portage version: 2.0.51.21)
* stable on ia64Aron Griffis2005-04-011-2/+2
| | | | | (Portage version: 2.0.51.19) (Manifest recommit) (Portage version: 2.0.51.19)
* stable on ia64Aron Griffis2005-04-012-3/+6
| | | | (Portage version: 2.0.51.19)
* ~ppc64 for testingDaniel Ostrow2005-03-171-2/+2
| | | | | (Portage version: 2.0.51.19) (Manifest recommit) (Portage version: 2.0.51.19)
* ~ppc64 for testingDaniel Ostrow2005-03-172-5/+8
| | | | (Portage version: 2.0.51.19)
* marked paxctl stable on x86 now that min-version binutils is in stable ↵Ned Ludd2004-07-221-2/+2
| | | | (Manifest recommit)
* marked paxctl stable on x86 now that min-version binutils is in stableNed Ludd2004-07-223-5/+7
|
* stable on amd64 (Manifest recommit)Travis Tilley2004-07-221-2/+2
|
* stable on amd64Travis Tilley2004-07-222-3/+7
|
* sync IUSE (missing), glibc -> libc (Manifest recommit)Aron Griffis2004-06-301-2/+2
|
* sync IUSE (missing), glibc -> libcAron Griffis2004-06-302-3/+7
|
* (Manifest recommit)Aron Griffis2004-06-241-2/+2
|
* update copyright line: Gentoo Technologies => Gentoo FoundationAron Griffis2004-06-242-4/+4
|
* ChangeLog fixes (Manifest recommit)Daniel Ahlberg2004-03-011-1/+1
|
* ChangeLog fixesDaniel Ahlberg2004-03-011-1/+3
|
* This is paxctl for controlling PaX flags on a per binary basis. PaXNed Ludd2004-02-181-2/+2
| | | | | | | | | | | | | | | | is an intrusion prevention system that provides the best protection mechanisms against memory corruption bugs. Some applications are not compatible with certain features (due to design or bad engineering) and therefore they have to be exempted from certain enforcements. It is also possible to use PaX in soft mode where none of the protection mechanisms are active by default - here paxctl can be used to turn them on for selected programs (e.g., network daemons, programs that process network data such as mail clients, web browsers, etc). PaX and paxctl work on ELF executables, both of the standard ET_EXEC and the newer ET_DYN kind (older PaX releases referred to the latter as ET_DYN executables, these days they are called Position Independent Executables or PIEs for short). (Manifest recommit)
* This is paxctl for controlling PaX flags on a per binary basis. PaXNed Ludd2004-02-185-0/+55
is an intrusion prevention system that provides the best protection mechanisms against memory corruption bugs. Some applications are not compatible with certain features (due to design or bad engineering) and therefore they have to be exempted from certain enforcements. It is also possible to use PaX in soft mode where none of the protection mechanisms are active by default - here paxctl can be used to turn them on for selected programs (e.g., network daemons, programs that process network data such as mail clients, web browsers, etc). PaX and paxctl work on ELF executables, both of the standard ET_EXEC and the newer ET_DYN kind (older PaX releases referred to the latter as ET_DYN executables, these days they are called Position Independent Executables or PIEs for short).