xref: /freebsd-13.1/lib/libc/sys/procctl.2 (revision 2c19e8ed)
1.\" Copyright (c) 2013 Hudson River Trading LLC
2.\" Written by: John H. Baldwin <[email protected]>
3.\" All rights reserved.
4.\"
5.\" Copyright (c) 2014 The FreeBSD Foundation
6.\" Portions of this documentation were written by Konstantin Belousov
7.\" under sponsorship from the FreeBSD Foundation.
8.\"
9.\" Redistribution and use in source and binary forms, with or without
10.\" modification, are permitted provided that the following conditions
11.\" are met:
12.\" 1. Redistributions of source code must retain the above copyright
13.\"    notice, this list of conditions and the following disclaimer.
14.\" 2. Redistributions in binary form must reproduce the above copyright
15.\"    notice, this list of conditions and the following disclaimer in the
16.\"    documentation and/or other materials provided with the distribution.
17.\"
18.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28.\" SUCH DAMAGE.
29.\"
30.\" $FreeBSD$
31.\"
32.Dd June 13, 2020
33.Dt PROCCTL 2
34.Os
35.Sh NAME
36.Nm procctl
37.Nd control processes
38.Sh LIBRARY
39.Lb libc
40.Sh SYNOPSIS
41.In sys/procctl.h
42.Ft int
43.Fn procctl "idtype_t idtype" "id_t id" "int cmd" "void *data"
44.Sh DESCRIPTION
45The
46.Fn procctl
47system call provides for control over processes.
48The
49.Fa idtype
50and
51.Fa id
52arguments specify the set of processes to control.
53If multiple processes match the identifier,
54.Nm
55will make a
56.Dq best effort
57to control as many of the selected processes as possible.
58An error is only returned if no selected processes successfully complete
59the request.
60The following identifier types are supported:
61.Bl -tag -width P_PGID
62.It Dv P_PID
63Control the process with the process ID
64.Fa id .
65.It Dv P_PGID
66Control processes belonging to the process group with the ID
67.Fa id .
68.El
69.Pp
70The control request to perform is specified by the
71.Fa cmd
72argument.
73The following commands are supported:
74.Bl -tag -width PROC_TRAPCAP_STATUS
75.It Dv PROC_ASLR_CTL
76Controls the Address Space Layout Randomization (ASLR) in the program
77images created
78by
79.Xr execve 2
80in the specified process or its descendants that did not changed
81the control nor modified it by other means.
82The
83.Fa data
84parameter must point to the integer variable holding one of the following
85values:
86.Bl -tag -width PROC_ASLR_FORCE_DISABLE
87.It Dv PROC_ASLR_FORCE_ENABLE
88Request that ASLR is enabled after execution, even if it is disabled
89system-wide.
90The image flag and set-uid might prevent ASLR enablement still.
91.It Dv PROC_ASLR_FORCE_DISABLE
92Request that ASLR is disabled after execution.
93Same notes as for
94.Dv PROC_ASLR_FORCE_ENABLE
95apply.
96.It Dv PROC_ASLR_NOFORCE
97Use the system-wide configured policy for ASLR.
98.El
99.It Dv PROC_ASLR_STATUS
100Returns the current status of ASLR enablement for the target process.
101The
102.Fa data
103parameter must point to the integer variable, where one of the
104following values is written:
105.Bl -tag -width PROC_ASLR_FORCE_DISABLE
106.It Dv PROC_ASLR_FORCE_ENABLE
107.It Dv PROC_ASLR_FORCE_DISABLE
108.It Dv PROC_ASLR_NOFORCE
109.El
110.Pp
111If the currently executed image in the process itself has ASLR enabled,
112the
113.Dv PROC_ASLR_ACTIVE
114flag is or-ed with the value listed above.
115.It Dv PROC_PROTMAX_CTL
116Controls implicit application of PROT_MAX protection equal to the
117.Fa prot
118argument of the
119.Xr mmap 2
120syscall, in the target process.
121The
122.Fa data
123parameter must point to the integer variable holding one of the following
124values:
125.Bl -tag -width PROC_PROTMAX_FORCE_DISABLE
126.It Dv PROC_PROTMAX_FORCE_ENABLE
127Enables implicit PROT_MAX application,
128even if it is disabled system-wide by the sysctl
129.Va vm.imply_prot_max .
130The image flag might still prevent the enablement.
131.It Dv PROC_PROTMAX_FORCE_DISABLE
132Request that implicit application of PROT_MAX be disabled.
133Same notes as for
134.Dv PROC_PROTMAX_FORCE_ENABLE
135apply.
136.It Dv PROC_PROTMAX_NOFORCE
137Use the system-wide configured policy for PROT_MAX.
138.El
139.It Dv PROC_PROTMAX_STATUS
140Returns the current status of implicit PROT_MAX enablement for the
141target process.
142The
143.Fa data
144parameter must point to the integer variable, where one of the
145following values is written:
146.Bl -tag -width PROC_PROTMAX_FORCE_DISABLE
147.It Dv PROC_PROTMAX_FORCE_ENABLE
148.It Dv PROC_PROTMAX_FORCE_DISABLE
149.It Dv PROC_PROTMAX_NOFORCE
150.El
151.Pp
152If the currently executed image in the process itself has implicit PROT_MAX
153application enabled, the
154.Dv PROC_PROTMAX_ACTIVE
155flag is or-ed with the value listed above.
156.It Dv PROC_SPROTECT
157Set process protection state.
158This is used to mark a process as protected from being killed if the system
159exhausts the available memory and swap.
160The
161.Fa data
162parameter must point to an integer containing an operation and zero or more
163optional flags.
164The following operations are supported:
165.Bl -tag -width PPROT_CLEAR
166.It Dv PPROT_SET
167Mark the selected processes as protected.
168.It Dv PPROT_CLEAR
169Clear the protected state of selected processes.
170.El
171.Pp
172The following optional flags are supported:
173.Bl -tag -width PPROT_DESCEND
174.It Dv PPROT_DESCEND
175Apply the requested operation to all child processes of each selected process
176in addition to each selected process.
177.It Dv PPROT_INHERIT
178When used with
179.Dv PPROT_SET ,
180mark all future child processes of each selected process as protected.
181Future child processes will also mark all of their future child processes.
182.El
183.It Dv PROC_REAP_ACQUIRE
184Acquires the reaper status for the current process.
185Reaper status means that children orphaned by the reaper's descendants
186that were forked after the acquisition of reaper status are reparented to the
187reaper process.
188After system initialization,
189.Xr init 8
190is the default reaper.
191.It Dv PROC_REAP_RELEASE
192Release the reaper state for the current process.
193The reaper of the current process becomes the new reaper of the
194current process's descendants.
195.It Dv PROC_REAP_STATUS
196Provides information about the reaper of the specified process,
197or the process itself when it is a reaper.
198The
199.Fa data
200argument must point to a
201.Vt procctl_reaper_status
202structure which is filled in by the syscall on successful return.
203.Bd -literal
204struct procctl_reaper_status {
205	u_int	rs_flags;
206	u_int	rs_children;
207	u_int	rs_descendants;
208	pid_t	rs_reaper;
209	pid_t	rs_pid;
210};
211.Ed
212The
213.Fa rs_flags
214may have the following flags returned:
215.Bl -tag -width REAPER_STATUS_REALINIT
216.It Dv REAPER_STATUS_OWNED
217The specified process has acquired reaper status and has not
218released it.
219When the flag is returned, the specified process
220.Fa id ,
221pid, identifies the reaper, otherwise the
222.Fa rs_reaper
223field of the structure is set to the pid of the reaper
224for the specified process id.
225.It Dv REAPER_STATUS_REALINIT
226The specified process is the root of the reaper tree, i.e.,
227.Xr init 8 .
228.El
229.Pp
230The
231.Fa rs_children
232field returns the number of children of the reaper among the descendants.
233It is possible to have a child whose reaper is not the specified process,
234since the reaper for any existing children is not reset on the
235.Dv PROC_REAP_ACQUIRE
236operation.
237The
238.Fa rs_descendants
239field returns the total number of descendants of the reaper(s),
240not counting descendants of the reaper in the subtree.
241The
242.Fa rs_reaper
243field returns the reaper pid.
244The
245.Fa rs_pid
246returns the pid of one reaper child if there are any descendants.
247.It Dv PROC_REAP_GETPIDS
248Queries the list of descendants of the reaper of the specified process.
249The request takes a pointer to a
250.Vt procctl_reaper_pids
251structure in the
252.Fa data
253parameter.
254.Bd -literal
255struct procctl_reaper_pids {
256	u_int	rp_count;
257	struct procctl_reaper_pidinfo *rp_pids;
258};
259.Ed
260When called, the
261.Fa rp_pids
262field must point to an array of
263.Vt procctl_reaper_pidinfo
264structures, to be filled in on return,
265and the
266.Fa rp_count
267field must specify the size of the array,
268into which no more than
269.Fa rp_count
270elements will be filled in by the kernel.
271.Pp
272The
273.Vt "struct procctl_reaper_pidinfo"
274structure provides some information about one of the reaper's descendants.
275Note that for a descendant that is not a child, it may be incorrectly
276identified because of a race in which the original child process exited
277and the exited process's pid was reused for an unrelated process.
278.Bd -literal
279struct procctl_reaper_pidinfo {
280	pid_t	pi_pid;
281	pid_t	pi_subtree;
282	u_int	pi_flags;
283};
284.Ed
285The
286.Fa pi_pid
287field is the process id of the descendant.
288The
289.Fa pi_subtree
290field provides the pid of the child of the reaper, which is the (grand-)parent
291of the process.
292The
293.Fa pi_flags
294field returns the following flags, further describing the descendant:
295.Bl -tag -width REAPER_PIDINFO_REAPER
296.It Dv REAPER_PIDINFO_VALID
297Set to indicate that the
298.Vt procctl_reaper_pidinfo
299structure was filled in by the kernel.
300Zero-filling the
301.Fa rp_pids
302array and testing the
303.Dv REAPER_PIDINFO_VALID
304flag allows the caller to detect the end
305of the returned array.
306.It Dv REAPER_PIDINFO_CHILD
307The
308.Fa pi_pid
309field identifies the direct child of the reaper.
310.It Dv REAPER_PIDINFO_REAPER
311The reported process is itself a reaper.
312The descendants of the subordinate reaper are not reported.
313.El
314.It Dv PROC_REAP_KILL
315Request to deliver a signal to some subset of the descendants of the reaper.
316The
317.Fa data
318parameter must point to a
319.Vt procctl_reaper_kill
320structure, which is used both for parameters and status return.
321.Bd -literal
322struct procctl_reaper_kill {
323	int	rk_sig;
324	u_int	rk_flags;
325	pid_t	rk_subtree;
326	u_int	rk_killed;
327	pid_t	rk_fpid;
328};
329.Ed
330The
331.Fa rk_sig
332field specifies the signal to be delivered.
333Zero is not a valid signal number, unlike for
334.Xr kill 2 .
335The
336.Fa rk_flags
337field further directs the operation.
338It is or-ed from the following flags:
339.Bl -tag -width REAPER_KILL_CHILDREN
340.It Dv REAPER_KILL_CHILDREN
341Deliver the specified signal only to direct children of the reaper.
342.It Dv REAPER_KILL_SUBTREE
343Deliver the specified signal only to descendants that were forked by
344the direct child with pid specified in the
345.Fa rk_subtree
346field.
347.El
348If neither the
349.Dv REAPER_KILL_CHILDREN
350nor the
351.Dv REAPER_KILL_SUBTREE
352flags are specified, all current descendants of the reaper are signalled.
353.Pp
354If a signal was delivered to any process, the return value from the request
355is zero.
356In this case, the
357.Fa rk_killed
358field identifies the number of processes signalled.
359The
360.Fa rk_fpid
361field is set to the pid of the first process for which signal
362delivery failed, e.g., due to permission problems.
363If no such process exists, the
364.Fa rk_fpid
365field is set to -1.
366.It Dv PROC_TRACE_CTL
367Enable or disable tracing of the specified process(es), according to the
368value of the integer argument.
369Tracing includes attachment to the process using the
370.Xr ptrace 2
371and
372.Xr ktrace 2 ,
373debugging sysctls,
374.Xr hwpmc 4 ,
375.Xr dtrace 1 ,
376and core dumping.
377Possible values for the
378.Fa data
379argument are:
380.Bl -tag -width PROC_TRACE_CTL_DISABLE_EXEC
381.It Dv PROC_TRACE_CTL_ENABLE
382Enable tracing, after it was disabled by
383.Dv PROC_TRACE_CTL_DISABLE .
384Only allowed for self.
385.It Dv PROC_TRACE_CTL_DISABLE
386Disable tracing for the specified process.
387Tracing is re-enabled when the process changes the executing
388program with the
389.Xr execve 2
390syscall.
391A child inherits the trace settings from the parent on
392.Xr fork 2 .
393.It Dv PROC_TRACE_CTL_DISABLE_EXEC
394Same as
395.Dv PROC_TRACE_CTL_DISABLE ,
396but the setting persists for the process even after
397.Xr execve 2 .
398.El
399.It Dv PROC_TRACE_STATUS
400Returns the current tracing status for the specified process in
401the integer variable pointed to by
402.Fa data .
403If tracing is disabled,
404.Fa data
405is set to -1.
406If tracing is enabled, but no debugger is attached by the
407.Xr ptrace 2
408syscall,
409.Fa data
410is set to 0.
411If a debugger is attached,
412.Fa data
413is set to the pid of the debugger process.
414.It Dv PROC_TRAPCAP_CTL
415Controls the capability mode sandbox actions for the specified
416sandboxed processes,
417on a return from any syscall which gives either a
418.Er ENOTCAPABLE
419or
420.Er ECAPMODE
421error.
422If the control is enabled, such errors from the syscalls cause
423delivery of the synchronous
424.Dv SIGTRAP
425signal to the thread immediately before returning from the syscalls.
426.Pp
427Possible values for the
428.Fa data
429argument are:
430.Bl -tag -width PROC_TRAPCAP_CTL_DISABLE
431.It Dv PROC_TRAPCAP_CTL_ENABLE
432Enable the
433.Dv SIGTRAP
434signal delivery on capability mode access violations.
435The enabled mode is inherited by the children of the process,
436and is kept after
437.Xr fexecve 2
438calls.
439.It Dv PROC_TRAPCAP_CTL_DISABLE
440Disable the signal delivery on capability mode access violations.
441Note that the global sysctl
442.Dv kern.trap_enotcap
443might still cause the signal to be delivered.
444See
445.Xr capsicum 4 .
446.El
447.Pp
448On signal delivery, the
449.Va si_errno
450member of the
451.Fa siginfo
452signal handler parameter is set to the syscall error value,
453and the
454.Va si_code
455member is set to
456.Dv TRAP_CAP .
457.Pp
458See
459.Xr capsicum 4
460for more information about the capability mode.
461.It Dv PROC_TRAPCAP_STATUS
462Return the current status of signalling capability mode access
463violations for the specified process.
464The integer value pointed to by the
465.Fa data
466argument is set to the
467.Dv PROC_TRAPCAP_CTL_ENABLE
468value if the process control enables signal delivery, and to
469.Dv PROC_TRAPCAP_CTL_DISABLE
470otherwise.
471.Pp
472See the note about sysctl
473.Dv kern.trap_enotcap
474above, which gives independent global control of signal delivery.
475.It Dv PROC_PDEATHSIG_CTL
476Request the delivery of a signal when the parent of the calling
477process exits.
478.Fa idtype
479must be
480.Dv P_PID
481and
482.Fa id
483must be the either caller's pid or zero, with no difference in effect.
484The value is cleared for child processes
485and when executing set-user-ID or set-group-ID binaries.
486.Fa data
487must point to a value of type
488.Vt int
489indicating the signal
490that should be delivered to the caller.
491Use zero to cancel a previously requested signal delivery.
492.It Dv PROC_PDEATHSIG_STATUS
493Query the current signal number that will be delivered when the parent
494of the calling process exits.
495.Fa idtype
496must be
497.Dv P_PID
498and
499.Fa id
500must be the either caller's pid or zero, with no difference in effect.
501.Fa data
502must point to a memory location that can hold a value of type
503.Vt int .
504If signal delivery has not been requested, it will contain zero
505on return.
506.It Dv PROC_STACKGAP_CTL
507Controls the stack gaps in the specified process.
508A stack gap is the part of the growth area for a
509.Dv MAP_STACK
510mapped region that is reserved and never filled by memory.
511Instead, the process is guaranteed to receive a
512.Dv SIGSEGV
513signal on accessing pages in the gap.
514Gaps protect against stack overflow corrupting memory adjacent
515to the stack.
516.Pp
517The
518.Fa data
519argument must point to an integer variable containing flags.
520The following flags are allowed:
521.Bl -tag -width PROC_STACKGAP_DISABLE_EXEC
522.It Dv PROC_STACKGAP_ENABLE
523This flag is only accepted for consistency with
524.Dv PROC_STACKGAP_STATUS .
525If stack gaps are enabled, the flag is ignored.
526If disabled, the flag causes an
527.Ev EINVAL
528error to be returned.
529After gaps are disabled in a process, they can only be re-enabled when an
530.Xr execve 2
531is performed.
532.It Dv PROC_STACKGAP_DISABLE
533Disable stack gaps for the process.
534For existing stacks, the gap is no longer a reserved part of the growth
535area and can be filled by memory on access.
536.It Dv PROC_STACKGAP_ENABLE_EXEC
537Enable stack gaps for programs started after an
538.Xr execve 2
539by the specified process.
540.It Dv PROC_STACKGAP_DISABLE_EXEC
541Inherit disabled stack gaps state after
542.Xr execve 2 .
543In other words, if the currently executing program has stack gaps disabled,
544they are kept disabled on exec.
545If gaps were enabled, they are kept enabled after exec.
546.El
547.Pp
548The stack gap state is inherited from the parent on
549.Xr fork 2 .
550.It Dv PROC_STACKGAP_STATUS
551Returns the current stack gap state for the specified process.
552.Fa data
553must point to an integer variable, which is used to return a bitmask
554consisting of the following flags:
555.Bl -tag -width PROC_STACKGAP_DISABLE_EXEC
556.It Dv PROC_STACKGAP_ENABLE
557Stack gaps are enabled.
558.It Dv PROC_STACKGAP_DISABLE
559Stack gaps are disabled.
560.It Dv PROC_STACKGAP_ENABLE_EXEC
561Stack gaps are enabled in the process after
562.Xr execve 2 .
563.It Dv PROC_STACKGAP_DISABLE_EXEC
564Stack gaps are disabled in the process after
565.Xr execve 2 .
566.El
567.El
568.Sh x86 MACHINE-SPECIFIC REQUESTS
569.Bl -tag -width PROC_KPTI_STATUS
570.It Dv PROC_KPTI_CTL
571AMD64 only.
572Controls the Kernel Page Table Isolation (KPTI) option for the children
573of the specified process.
574For the command to work, the
575.Va vm.pmap.kpti
576tunable must be enabled on boot.
577It is not possible to change the KPTI setting for a running process,
578except at the
579.Xr execve 2 ,
580where the address space is reinitialized.
581.Pp
582The
583.Fa data
584parameter must point to an integer variable containing one of the
585following commands:
586.Bl -tag -width PROC_KPTI_CTL_DISABLE_ON_EXEC
587.It Dv PROC_KPTI_CTL_ENABLE_ON_EXEC
588Enable KPTI after
589.Xr execve 2 .
590.It Dv PROC_KPTI_CTL_DISABLE_ON_EXEC
591Disable KPTI after
592.Xr execve 2 .
593Only root or a process having the
594.Va PRIV_IO
595privilege might use this option.
596.El
597.It Dv PROC_KPTI_STATUS
598Returns the current KPTI status for the specified process.
599.Fa data
600must point to the integer variable, which returns the
601following statuses:
602.Bl -tag -width PROC_KPTI_CTL_DISABLE_ON_EXEC
603.It Dv PROC_KPTI_CTL_ENABLE_ON_EXEC
604.It Dv PROC_KPTI_CTL_DISABLE_ON_EXEC
605.El
606.Pp
607The status is or-ed with the
608.Va PROC_KPTI_STATUS_ACTIVE
609in case KPTI is active for the current address space of the process.
610.Sh NOTES
611Disabling tracing on a process should not be considered a security
612feature, as it is bypassable both by the kernel and privileged processes,
613and via other system mechanisms.
614As such, it should not be utilized to reliably protect cryptographic
615keying material or other confidential data.
616.Sh RETURN VALUES
617If an error occurs, a value of -1 is returned and
618.Va errno
619is set to indicate the error.
620.Sh ERRORS
621The
622.Fn procctl
623system call
624will fail if:
625.Bl -tag -width Er
626.It Bq Er EFAULT
627The
628.Fa data
629parameter points outside the process's allocated address space.
630.It Bq Er EINVAL
631The
632.Fa cmd
633argument specifies an unsupported command.
634.Pp
635The
636.Fa idtype
637argument specifies an unsupported identifier type.
638.It Bq Er EPERM
639The calling process does not have permission to perform the requested
640operation on any of the selected processes.
641.It Bq Er ESRCH
642No processes matched the requested
643.Fa idtype
644and
645.Fa id .
646.It Bq Er EINVAL
647An invalid operation or flag was passed in
648.Fa data
649for a
650.Dv PROC_SPROTECT
651command.
652.It Bq Er EPERM
653The
654.Fa idtype
655argument is not equal to
656.Dv P_PID ,
657or
658.Fa id
659is not equal to the pid of the calling process, for
660.Dv PROC_REAP_ACQUIRE
661or
662.Dv PROC_REAP_RELEASE
663requests.
664.It Bq Er EINVAL
665Invalid or undefined flags were passed to a
666.Dv PROC_REAP_KILL
667request.
668.It Bq Er EINVAL
669An invalid or zero signal number was requested for a
670.Dv PROC_REAP_KILL
671request.
672.It Bq Er EINVAL
673The
674.Dv PROC_REAP_RELEASE
675request was issued by the
676.Xr init 8
677process.
678.It Bq Er EBUSY
679The
680.Dv PROC_REAP_ACQUIRE
681request was issued by a process that had already acquired reaper status
682and has not yet released it.
683.It Bq Er EBUSY
684The
685.Dv PROC_TRACE_CTL
686request was issued for a process already being traced.
687.It Bq Er EPERM
688The
689.Dv PROC_TRACE_CTL
690request to re-enable tracing of the process
691.Po Dv PROC_TRACE_CTL_ENABLE Pc ,
692or to disable persistence of
693.Dv PROC_TRACE_CTL_DISABLE
694on
695.Xr execve 2
696was issued for a non-current process.
697.It Bq Er EINVAL
698The value of the integer
699.Fa data
700parameter for the
701.Dv PROC_TRACE_CTL
702or
703.Dv PROC_TRAPCAP_CTL
704request is invalid.
705.It Bq Er EINVAL
706The
707.Dv PROC_PDEATHSIG_CTL
708or
709.Dv PROC_PDEATHSIG_STATUS
710request referenced an unsupported
711.Fa id ,
712.Fa idtype
713or invalid signal number.
714.El
715.Sh SEE ALSO
716.Xr dtrace 1 ,
717.Xr proccontrol 1 ,
718.Xr protect 1 ,
719.Xr cap_enter 2 ,
720.Xr kill 2 ,
721.Xr ktrace 2 ,
722.Xr mmap 2 ,
723.Xr mprotect 2 ,
724.Xr ptrace 2 ,
725.Xr wait 2 ,
726.Xr capsicum 4 ,
727.Xr hwpmc 4 ,
728.Xr init 8
729.Sh HISTORY
730The
731.Fn procctl
732function appeared in
733.Fx 10.0 .
734.Pp
735The reaper facility is based on a similar feature of Linux and
736DragonflyBSD, and first appeared in
737.Fx 10.2 .
738.Pp
739The
740.Dv PROC_PDEATHSIG_CTL
741facility is based on the prctl(PR_SET_PDEATHSIG, ...) feature of Linux,
742and first appeared in
743.Fx 11.2 .
744.Pp
745The ASLR support was added to system for the checklists compliance in
746.Fx 13.0 .
747