From ca8d24bbaebb1c160e3931206cfa41bf0a4c59c0 Mon Sep 17 00:00:00 2001 From: bluhm <> Date: Mon, 9 Sep 2019 20:02:26 +0000 Subject: [PATCH] Inform about system call memory write protection and stack mapping violations in system accounting. This will help to find missbehaving programs and possible attacks. The flags bit field is full, so recycle the PDP-11 compatibility on VAX. lastcomm(1) prints the AMAP flag as 'M'. daily(8) prints a list of affected processes. OK deraadt@ --- src/etc/daily | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/etc/daily b/src/etc/daily index 255acd06..a3d89391 100644 --- a/src/etc/daily +++ b/src/etc/daily @@ -1,5 +1,5 @@ # -# $OpenBSD: daily,v 1.92 2019/07/25 13:13:53 bluhm Exp $ +# $OpenBSD: daily,v 1.93 2019/09/09 20:02:26 bluhm Exp $ # From: @(#)daily 8.2 (Berkeley) 1/25/94 # # For local additions, create the file /etc/daily.local. @@ -74,7 +74,7 @@ if [ -f /var/account/acct ]; then mv -f /var/account/acct.0 /var/account/acct.1 cp -f /var/account/acct /var/account/acct.0 sa -sq - lastcomm -f /var/account/acct.0 | grep -e ' -[A-Z]*[PTU]' + lastcomm -f /var/account/acct.0 | grep -e ' -[A-Z]*[MPTU]' fi # If ROOTBACKUP is set to 1 in the environment, and