Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.

Split Close
Expand all
Collapse all
          --- old/usr/src/lib/libbsm/audit_event.txt
          +++ new/usr/src/lib/libbsm/audit_event.txt
↓ open down ↓ 352 lines elided ↑ open up ↑
 353  353  304:AUE_LABELSYS_TNMLP:tnmlp(2) - config TN multi-level port entry:as
 354  354  #
 355  355  305:AUE_PORTFS_ASSOCIATE:portfs(2) - file events source - PORT_ASSOCIATE:fa
 356  356  306:AUE_PORTFS_DISSOCIATE:portfs(2) - file events source - PORT_DISSOCIATE:fa
 357  357  #
 358  358  307:AUE_SETSID:setsid(2):pm
 359  359  308:AUE_SETPGID:setpgid(2):pm
 360  360  309:AUE_FACCESSAT:faccessat(2):no
 361  361  310:AUE_AUDITON_GETAMASK:auditon(2) - get default user preselection mask:aa
 362  362  311:AUE_AUDITON_SETAMASK:auditon(2) - set default user preselection mask:as
      363 +312:AUE_PSECFLAGS:psecflags(2) - set process security flags:pm
 363  364  #
 364  365  # user level audit events
 365  366  #       2048 -  6143    Reserved
 366  367  #
 367  368  #       6000 -  7999    allocated for Solaris
 368  369  #
 369  370  6144:AUE_at_create:at-create atjob:ua
 370  371  6145:AUE_at_delete:at-delete atjob (at or atrm):ua
 371  372  6146:AUE_at_perm:at-permission:no
 372  373  6147:AUE_cron_invoke:cron-invoke:ua
↓ open down ↓ 303 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX