1.\" Copyright (c) 2013 Hudson River Trading LLC 2.\" Written by: John H. Baldwin <[email protected]> 3.\" All rights reserved. 4.\" 5.\" Copyright (c) 2014 The FreeBSD Foundation 6.\" Portions of this documentation were written by Konstantin Belousov 7.\" under sponsorship from the FreeBSD Foundation. 8.\" 9.\" Redistribution and use in source and binary forms, with or without 10.\" modification, are permitted provided that the following conditions 11.\" are met: 12.\" 1. Redistributions of source code must retain the above copyright 13.\" notice, this list of conditions and the following disclaimer. 14.\" 2. Redistributions in binary form must reproduce the above copyright 15.\" notice, this list of conditions and the following disclaimer in the 16.\" documentation and/or other materials provided with the distribution. 17.\" 18.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" 30.\" $FreeBSD$ 31.\" 32.Dd June 13, 2020 33.Dt PROCCTL 2 34.Os 35.Sh NAME 36.Nm procctl 37.Nd control processes 38.Sh LIBRARY 39.Lb libc 40.Sh SYNOPSIS 41.In sys/procctl.h 42.Ft int 43.Fn procctl "idtype_t idtype" "id_t id" "int cmd" "void *data" 44.Sh DESCRIPTION 45The 46.Fn procctl 47system call provides for control over processes. 48The 49.Fa idtype 50and 51.Fa id 52arguments specify the set of processes to control. 53If multiple processes match the identifier, 54.Nm 55will make a 56.Dq best effort 57to control as many of the selected processes as possible. 58An error is only returned if no selected processes successfully complete 59the request. 60The following identifier types are supported: 61.Bl -tag -width P_PGID 62.It Dv P_PID 63Control the process with the process ID 64.Fa id . 65.It Dv P_PGID 66Control processes belonging to the process group with the ID 67.Fa id . 68.El 69.Pp 70The control request to perform is specified by the 71.Fa cmd 72argument. 73The following commands are supported: 74.Bl -tag -width PROC_TRAPCAP_STATUS 75.It Dv PROC_ASLR_CTL 76Controls the Address Space Layout Randomization (ASLR) in the program 77images created 78by 79.Xr execve 2 80in the specified process or its descendants that did not changed 81the control nor modified it by other means. 82The 83.Fa data 84parameter must point to the integer variable holding one of the following 85values: 86.Bl -tag -width PROC_ASLR_FORCE_DISABLE 87.It Dv PROC_ASLR_FORCE_ENABLE 88Request that ASLR is enabled after execution, even if it is disabled 89system-wide. 90The image flag and set-uid might prevent ASLR enablement still. 91.It Dv PROC_ASLR_FORCE_DISABLE 92Request that ASLR is disabled after execution. 93Same notes as for 94.Dv PROC_ASLR_FORCE_ENABLE 95apply. 96.It Dv PROC_ASLR_NOFORCE 97Use the system-wide configured policy for ASLR. 98.El 99.It Dv PROC_ASLR_STATUS 100Returns the current status of ASLR enablement for the target process. 101The 102.Fa data 103parameter must point to the integer variable, where one of the 104following values is written: 105.Bl -tag -width PROC_ASLR_FORCE_DISABLE 106.It Dv PROC_ASLR_FORCE_ENABLE 107.It Dv PROC_ASLR_FORCE_DISABLE 108.It Dv PROC_ASLR_NOFORCE 109.El 110.Pp 111If the currently executed image in the process itself has ASLR enabled, 112the 113.Dv PROC_ASLR_ACTIVE 114flag is or-ed with the value listed above. 115.It Dv PROC_PROTMAX_CTL 116Controls implicit application of PROT_MAX protection equal to the 117.Fa prot 118argument of the 119.Xr mmap 2 120syscall, in the target process. 121The 122.Fa data 123parameter must point to the integer variable holding one of the following 124values: 125.Bl -tag -width PROC_PROTMAX_FORCE_DISABLE 126.It Dv PROC_PROTMAX_FORCE_ENABLE 127Enables implicit PROT_MAX application, 128even if it is disabled system-wide by the sysctl 129.Va vm.imply_prot_max . 130The image flag might still prevent the enablement. 131.It Dv PROC_PROTMAX_FORCE_DISABLE 132Request that implicit application of PROT_MAX be disabled. 133Same notes as for 134.Dv PROC_PROTMAX_FORCE_ENABLE 135apply. 136.It Dv PROC_PROTMAX_NOFORCE 137Use the system-wide configured policy for PROT_MAX. 138.El 139.It Dv PROC_PROTMAX_STATUS 140Returns the current status of implicit PROT_MAX enablement for the 141target process. 142The 143.Fa data 144parameter must point to the integer variable, where one of the 145following values is written: 146.Bl -tag -width PROC_PROTMAX_FORCE_DISABLE 147.It Dv PROC_PROTMAX_FORCE_ENABLE 148.It Dv PROC_PROTMAX_FORCE_DISABLE 149.It Dv PROC_PROTMAX_NOFORCE 150.El 151.Pp 152If the currently executed image in the process itself has implicit PROT_MAX 153application enabled, the 154.Dv PROC_PROTMAX_ACTIVE 155flag is or-ed with the value listed above. 156.It Dv PROC_SPROTECT 157Set process protection state. 158This is used to mark a process as protected from being killed if the system 159exhausts the available memory and swap. 160The 161.Fa data 162parameter must point to an integer containing an operation and zero or more 163optional flags. 164The following operations are supported: 165.Bl -tag -width PPROT_CLEAR 166.It Dv PPROT_SET 167Mark the selected processes as protected. 168.It Dv PPROT_CLEAR 169Clear the protected state of selected processes. 170.El 171.Pp 172The following optional flags are supported: 173.Bl -tag -width PPROT_DESCEND 174.It Dv PPROT_DESCEND 175Apply the requested operation to all child processes of each selected process 176in addition to each selected process. 177.It Dv PPROT_INHERIT 178When used with 179.Dv PPROT_SET , 180mark all future child processes of each selected process as protected. 181Future child processes will also mark all of their future child processes. 182.El 183.It Dv PROC_REAP_ACQUIRE 184Acquires the reaper status for the current process. 185Reaper status means that children orphaned by the reaper's descendants 186that were forked after the acquisition of reaper status are reparented to the 187reaper process. 188After system initialization, 189.Xr init 8 190is the default reaper. 191.It Dv PROC_REAP_RELEASE 192Release the reaper state for the current process. 193The reaper of the current process becomes the new reaper of the 194current process's descendants. 195.It Dv PROC_REAP_STATUS 196Provides information about the reaper of the specified process, 197or the process itself when it is a reaper. 198The 199.Fa data 200argument must point to a 201.Vt procctl_reaper_status 202structure which is filled in by the syscall on successful return. 203.Bd -literal 204struct procctl_reaper_status { 205 u_int rs_flags; 206 u_int rs_children; 207 u_int rs_descendants; 208 pid_t rs_reaper; 209 pid_t rs_pid; 210}; 211.Ed 212The 213.Fa rs_flags 214may have the following flags returned: 215.Bl -tag -width REAPER_STATUS_REALINIT 216.It Dv REAPER_STATUS_OWNED 217The specified process has acquired reaper status and has not 218released it. 219When the flag is returned, the specified process 220.Fa id , 221pid, identifies the reaper, otherwise the 222.Fa rs_reaper 223field of the structure is set to the pid of the reaper 224for the specified process id. 225.It Dv REAPER_STATUS_REALINIT 226The specified process is the root of the reaper tree, i.e., 227.Xr init 8 . 228.El 229.Pp 230The 231.Fa rs_children 232field returns the number of children of the reaper among the descendants. 233It is possible to have a child whose reaper is not the specified process, 234since the reaper for any existing children is not reset on the 235.Dv PROC_REAP_ACQUIRE 236operation. 237The 238.Fa rs_descendants 239field returns the total number of descendants of the reaper(s), 240not counting descendants of the reaper in the subtree. 241The 242.Fa rs_reaper 243field returns the reaper pid. 244The 245.Fa rs_pid 246returns the pid of one reaper child if there are any descendants. 247.It Dv PROC_REAP_GETPIDS 248Queries the list of descendants of the reaper of the specified process. 249The request takes a pointer to a 250.Vt procctl_reaper_pids 251structure in the 252.Fa data 253parameter. 254.Bd -literal 255struct procctl_reaper_pids { 256 u_int rp_count; 257 struct procctl_reaper_pidinfo *rp_pids; 258}; 259.Ed 260When called, the 261.Fa rp_pids 262field must point to an array of 263.Vt procctl_reaper_pidinfo 264structures, to be filled in on return, 265and the 266.Fa rp_count 267field must specify the size of the array, 268into which no more than 269.Fa rp_count 270elements will be filled in by the kernel. 271.Pp 272The 273.Vt "struct procctl_reaper_pidinfo" 274structure provides some information about one of the reaper's descendants. 275Note that for a descendant that is not a child, it may be incorrectly 276identified because of a race in which the original child process exited 277and the exited process's pid was reused for an unrelated process. 278.Bd -literal 279struct procctl_reaper_pidinfo { 280 pid_t pi_pid; 281 pid_t pi_subtree; 282 u_int pi_flags; 283}; 284.Ed 285The 286.Fa pi_pid 287field is the process id of the descendant. 288The 289.Fa pi_subtree 290field provides the pid of the child of the reaper, which is the (grand-)parent 291of the process. 292The 293.Fa pi_flags 294field returns the following flags, further describing the descendant: 295.Bl -tag -width REAPER_PIDINFO_REAPER 296.It Dv REAPER_PIDINFO_VALID 297Set to indicate that the 298.Vt procctl_reaper_pidinfo 299structure was filled in by the kernel. 300Zero-filling the 301.Fa rp_pids 302array and testing the 303.Dv REAPER_PIDINFO_VALID 304flag allows the caller to detect the end 305of the returned array. 306.It Dv REAPER_PIDINFO_CHILD 307The 308.Fa pi_pid 309field identifies the direct child of the reaper. 310.It Dv REAPER_PIDINFO_REAPER 311The reported process is itself a reaper. 312The descendants of the subordinate reaper are not reported. 313.El 314.It Dv PROC_REAP_KILL 315Request to deliver a signal to some subset of the descendants of the reaper. 316The 317.Fa data 318parameter must point to a 319.Vt procctl_reaper_kill 320structure, which is used both for parameters and status return. 321.Bd -literal 322struct procctl_reaper_kill { 323 int rk_sig; 324 u_int rk_flags; 325 pid_t rk_subtree; 326 u_int rk_killed; 327 pid_t rk_fpid; 328}; 329.Ed 330The 331.Fa rk_sig 332field specifies the signal to be delivered. 333Zero is not a valid signal number, unlike for 334.Xr kill 2 . 335The 336.Fa rk_flags 337field further directs the operation. 338It is or-ed from the following flags: 339.Bl -tag -width REAPER_KILL_CHILDREN 340.It Dv REAPER_KILL_CHILDREN 341Deliver the specified signal only to direct children of the reaper. 342.It Dv REAPER_KILL_SUBTREE 343Deliver the specified signal only to descendants that were forked by 344the direct child with pid specified in the 345.Fa rk_subtree 346field. 347.El 348If neither the 349.Dv REAPER_KILL_CHILDREN 350nor the 351.Dv REAPER_KILL_SUBTREE 352flags are specified, all current descendants of the reaper are signalled. 353.Pp 354If a signal was delivered to any process, the return value from the request 355is zero. 356In this case, the 357.Fa rk_killed 358field identifies the number of processes signalled. 359The 360.Fa rk_fpid 361field is set to the pid of the first process for which signal 362delivery failed, e.g., due to permission problems. 363If no such process exists, the 364.Fa rk_fpid 365field is set to -1. 366.It Dv PROC_TRACE_CTL 367Enable or disable tracing of the specified process(es), according to the 368value of the integer argument. 369Tracing includes attachment to the process using the 370.Xr ptrace 2 371and 372.Xr ktrace 2 , 373debugging sysctls, 374.Xr hwpmc 4 , 375.Xr dtrace 1 , 376and core dumping. 377Possible values for the 378.Fa data 379argument are: 380.Bl -tag -width PROC_TRACE_CTL_DISABLE_EXEC 381.It Dv PROC_TRACE_CTL_ENABLE 382Enable tracing, after it was disabled by 383.Dv PROC_TRACE_CTL_DISABLE . 384Only allowed for self. 385.It Dv PROC_TRACE_CTL_DISABLE 386Disable tracing for the specified process. 387Tracing is re-enabled when the process changes the executing 388program with the 389.Xr execve 2 390syscall. 391A child inherits the trace settings from the parent on 392.Xr fork 2 . 393.It Dv PROC_TRACE_CTL_DISABLE_EXEC 394Same as 395.Dv PROC_TRACE_CTL_DISABLE , 396but the setting persists for the process even after 397.Xr execve 2 . 398.El 399.It Dv PROC_TRACE_STATUS 400Returns the current tracing status for the specified process in 401the integer variable pointed to by 402.Fa data . 403If tracing is disabled, 404.Fa data 405is set to -1. 406If tracing is enabled, but no debugger is attached by the 407.Xr ptrace 2 408syscall, 409.Fa data 410is set to 0. 411If a debugger is attached, 412.Fa data 413is set to the pid of the debugger process. 414.It Dv PROC_TRAPCAP_CTL 415Controls the capability mode sandbox actions for the specified 416sandboxed processes, 417on a return from any syscall which gives either a 418.Er ENOTCAPABLE 419or 420.Er ECAPMODE 421error. 422If the control is enabled, such errors from the syscalls cause 423delivery of the synchronous 424.Dv SIGTRAP 425signal to the thread immediately before returning from the syscalls. 426.Pp 427Possible values for the 428.Fa data 429argument are: 430.Bl -tag -width PROC_TRAPCAP_CTL_DISABLE 431.It Dv PROC_TRAPCAP_CTL_ENABLE 432Enable the 433.Dv SIGTRAP 434signal delivery on capability mode access violations. 435The enabled mode is inherited by the children of the process, 436and is kept after 437.Xr fexecve 2 438calls. 439.It Dv PROC_TRAPCAP_CTL_DISABLE 440Disable the signal delivery on capability mode access violations. 441Note that the global sysctl 442.Dv kern.trap_enotcap 443might still cause the signal to be delivered. 444See 445.Xr capsicum 4 . 446.El 447.Pp 448On signal delivery, the 449.Va si_errno 450member of the 451.Fa siginfo 452signal handler parameter is set to the syscall error value, 453and the 454.Va si_code 455member is set to 456.Dv TRAP_CAP . 457.Pp 458See 459.Xr capsicum 4 460for more information about the capability mode. 461.It Dv PROC_TRAPCAP_STATUS 462Return the current status of signalling capability mode access 463violations for the specified process. 464The integer value pointed to by the 465.Fa data 466argument is set to the 467.Dv PROC_TRAPCAP_CTL_ENABLE 468value if the process control enables signal delivery, and to 469.Dv PROC_TRAPCAP_CTL_DISABLE 470otherwise. 471.Pp 472See the note about sysctl 473.Dv kern.trap_enotcap 474above, which gives independent global control of signal delivery. 475.It Dv PROC_PDEATHSIG_CTL 476Request the delivery of a signal when the parent of the calling 477process exits. 478.Fa idtype 479must be 480.Dv P_PID 481and 482.Fa id 483must be the either caller's pid or zero, with no difference in effect. 484The value is cleared for child processes 485and when executing set-user-ID or set-group-ID binaries. 486.Fa data 487must point to a value of type 488.Vt int 489indicating the signal 490that should be delivered to the caller. 491Use zero to cancel a previously requested signal delivery. 492.It Dv PROC_PDEATHSIG_STATUS 493Query the current signal number that will be delivered when the parent 494of the calling process exits. 495.Fa idtype 496must be 497.Dv P_PID 498and 499.Fa id 500must be the either caller's pid or zero, with no difference in effect. 501.Fa data 502must point to a memory location that can hold a value of type 503.Vt int . 504If signal delivery has not been requested, it will contain zero 505on return. 506.It Dv PROC_STACKGAP_CTL 507Controls the stack gaps in the specified process. 508A stack gap is the part of the growth area for a 509.Dv MAP_STACK 510mapped region that is reserved and never filled by memory. 511Instead, the process is guaranteed to receive a 512.Dv SIGSEGV 513signal on accessing pages in the gap. 514Gaps protect against stack overflow corrupting memory adjacent 515to the stack. 516.Pp 517The 518.Fa data 519argument must point to an integer variable containing flags. 520The following flags are allowed: 521.Bl -tag -width PROC_STACKGAP_DISABLE_EXEC 522.It Dv PROC_STACKGAP_ENABLE 523This flag is only accepted for consistency with 524.Dv PROC_STACKGAP_STATUS . 525If stack gaps are enabled, the flag is ignored. 526If disabled, the flag causes an 527.Ev EINVAL 528error to be returned. 529After gaps are disabled in a process, they can only be re-enabled when an 530.Xr execve 2 531is performed. 532.It Dv PROC_STACKGAP_DISABLE 533Disable stack gaps for the process. 534For existing stacks, the gap is no longer a reserved part of the growth 535area and can be filled by memory on access. 536.It Dv PROC_STACKGAP_ENABLE_EXEC 537Enable stack gaps for programs started after an 538.Xr execve 2 539by the specified process. 540.It Dv PROC_STACKGAP_DISABLE_EXEC 541Inherit disabled stack gaps state after 542.Xr execve 2 . 543In other words, if the currently executing program has stack gaps disabled, 544they are kept disabled on exec. 545If gaps were enabled, they are kept enabled after exec. 546.El 547.Pp 548The stack gap state is inherited from the parent on 549.Xr fork 2 . 550.It Dv PROC_STACKGAP_STATUS 551Returns the current stack gap state for the specified process. 552.Fa data 553must point to an integer variable, which is used to return a bitmask 554consisting of the following flags: 555.Bl -tag -width PROC_STACKGAP_DISABLE_EXEC 556.It Dv PROC_STACKGAP_ENABLE 557Stack gaps are enabled. 558.It Dv PROC_STACKGAP_DISABLE 559Stack gaps are disabled. 560.It Dv PROC_STACKGAP_ENABLE_EXEC 561Stack gaps are enabled in the process after 562.Xr execve 2 . 563.It Dv PROC_STACKGAP_DISABLE_EXEC 564Stack gaps are disabled in the process after 565.Xr execve 2 . 566.El 567.El 568.Sh x86 MACHINE-SPECIFIC REQUESTS 569.Bl -tag -width PROC_KPTI_STATUS 570.It Dv PROC_KPTI_CTL 571AMD64 only. 572Controls the Kernel Page Table Isolation (KPTI) option for the children 573of the specified process. 574For the command to work, the 575.Va vm.pmap.kpti 576tunable must be enabled on boot. 577It is not possible to change the KPTI setting for a running process, 578except at the 579.Xr execve 2 , 580where the address space is reinitialized. 581.Pp 582The 583.Fa data 584parameter must point to an integer variable containing one of the 585following commands: 586.Bl -tag -width PROC_KPTI_CTL_DISABLE_ON_EXEC 587.It Dv PROC_KPTI_CTL_ENABLE_ON_EXEC 588Enable KPTI after 589.Xr execve 2 . 590.It Dv PROC_KPTI_CTL_DISABLE_ON_EXEC 591Disable KPTI after 592.Xr execve 2 . 593Only root or a process having the 594.Va PRIV_IO 595privilege might use this option. 596.El 597.It Dv PROC_KPTI_STATUS 598Returns the current KPTI status for the specified process. 599.Fa data 600must point to the integer variable, which returns the 601following statuses: 602.Bl -tag -width PROC_KPTI_CTL_DISABLE_ON_EXEC 603.It Dv PROC_KPTI_CTL_ENABLE_ON_EXEC 604.It Dv PROC_KPTI_CTL_DISABLE_ON_EXEC 605.El 606.Pp 607The status is or-ed with the 608.Va PROC_KPTI_STATUS_ACTIVE 609in case KPTI is active for the current address space of the process. 610.Sh NOTES 611Disabling tracing on a process should not be considered a security 612feature, as it is bypassable both by the kernel and privileged processes, 613and via other system mechanisms. 614As such, it should not be utilized to reliably protect cryptographic 615keying material or other confidential data. 616.Sh RETURN VALUES 617If an error occurs, a value of -1 is returned and 618.Va errno 619is set to indicate the error. 620.Sh ERRORS 621The 622.Fn procctl 623system call 624will fail if: 625.Bl -tag -width Er 626.It Bq Er EFAULT 627The 628.Fa data 629parameter points outside the process's allocated address space. 630.It Bq Er EINVAL 631The 632.Fa cmd 633argument specifies an unsupported command. 634.Pp 635The 636.Fa idtype 637argument specifies an unsupported identifier type. 638.It Bq Er EPERM 639The calling process does not have permission to perform the requested 640operation on any of the selected processes. 641.It Bq Er ESRCH 642No processes matched the requested 643.Fa idtype 644and 645.Fa id . 646.It Bq Er EINVAL 647An invalid operation or flag was passed in 648.Fa data 649for a 650.Dv PROC_SPROTECT 651command. 652.It Bq Er EPERM 653The 654.Fa idtype 655argument is not equal to 656.Dv P_PID , 657or 658.Fa id 659is not equal to the pid of the calling process, for 660.Dv PROC_REAP_ACQUIRE 661or 662.Dv PROC_REAP_RELEASE 663requests. 664.It Bq Er EINVAL 665Invalid or undefined flags were passed to a 666.Dv PROC_REAP_KILL 667request. 668.It Bq Er EINVAL 669An invalid or zero signal number was requested for a 670.Dv PROC_REAP_KILL 671request. 672.It Bq Er EINVAL 673The 674.Dv PROC_REAP_RELEASE 675request was issued by the 676.Xr init 8 677process. 678.It Bq Er EBUSY 679The 680.Dv PROC_REAP_ACQUIRE 681request was issued by a process that had already acquired reaper status 682and has not yet released it. 683.It Bq Er EBUSY 684The 685.Dv PROC_TRACE_CTL 686request was issued for a process already being traced. 687.It Bq Er EPERM 688The 689.Dv PROC_TRACE_CTL 690request to re-enable tracing of the process 691.Po Dv PROC_TRACE_CTL_ENABLE Pc , 692or to disable persistence of 693.Dv PROC_TRACE_CTL_DISABLE 694on 695.Xr execve 2 696was issued for a non-current process. 697.It Bq Er EINVAL 698The value of the integer 699.Fa data 700parameter for the 701.Dv PROC_TRACE_CTL 702or 703.Dv PROC_TRAPCAP_CTL 704request is invalid. 705.It Bq Er EINVAL 706The 707.Dv PROC_PDEATHSIG_CTL 708or 709.Dv PROC_PDEATHSIG_STATUS 710request referenced an unsupported 711.Fa id , 712.Fa idtype 713or invalid signal number. 714.El 715.Sh SEE ALSO 716.Xr dtrace 1 , 717.Xr proccontrol 1 , 718.Xr protect 1 , 719.Xr cap_enter 2 , 720.Xr kill 2 , 721.Xr ktrace 2 , 722.Xr mmap 2 , 723.Xr mprotect 2 , 724.Xr ptrace 2 , 725.Xr wait 2 , 726.Xr capsicum 4 , 727.Xr hwpmc 4 , 728.Xr init 8 729.Sh HISTORY 730The 731.Fn procctl 732function appeared in 733.Fx 10.0 . 734.Pp 735The reaper facility is based on a similar feature of Linux and 736DragonflyBSD, and first appeared in 737.Fx 10.2 . 738.Pp 739The 740.Dv PROC_PDEATHSIG_CTL 741facility is based on the prctl(PR_SET_PDEATHSIG, ...) feature of Linux, 742and first appeared in 743.Fx 11.2 . 744.Pp 745The ASLR support was added to system for the checklists compliance in 746.Fx 13.0 . 747