For a description of the security risks of 32-bit executable stacks, see Protecting Executable Files From Compromising Security.
Before You Begin
You must assume the root role. For more information, see Using Your Assigned Administrative Rights in Securing Users and Processes in Oracle Solaris 11.2 .
# pfedit /etc/system ... set noexec_user_stack=1 set noexec_user_stack_log=1
# reboot
In this example, the administrator disables logging of executable stack messages, then reboots the system.
# cat /etc/system set noexec_user_stack=1 set noexec_user_stack_log=0 # reboot
See also
For more information, read the following: