OpenBSD has a bunch of stack hardening measures built in by default, as well as a number of security modifications to the gcc compiler that make it compile binaries to be loaded in a very secure manner. It takes forever to explain all the modifications made, but fortunately they wrote a great
set of slides that explain all of it. These measures are similar to what the Openwall patch does for Linux.
If you could do all the things that SELinux does without SELinux, then there would be no point to it, would there? Thats why there are so many third-party patches for the Linux kernel to add security. It's also why distros like Red Hat are incorporating SELinux into their kenel. There are several distros out right now that do have the Openwall patches applied by default.