security.7 (ea6020830c8f88e2b844ae9700c8ef58fbb51c75) | security.7 (17edf152e556ec1bcbcdce2d34e1f1612f198d1e) |
---|---|
1.\" Copyright (C) 1998 Matthew Dillon. All rights reserved. 2.\" Copyright (c) 2019 The FreeBSD Foundation, Inc. 3.\" 4.\" Parts of this documentation were written by 5.\" Konstantin Belousov <kib@FreeBSD.org> under sponsorship 6.\" from the FreeBSD Foundation. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 14 unchanged lines hidden (view full) --- 23.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27.\" SUCH DAMAGE. 28.\" 29.\" $FreeBSD$ 30.\" | 1.\" Copyright (C) 1998 Matthew Dillon. All rights reserved. 2.\" Copyright (c) 2019 The FreeBSD Foundation, Inc. 3.\" 4.\" Parts of this documentation were written by 5.\" Konstantin Belousov <kib@FreeBSD.org> under sponsorship 6.\" from the FreeBSD Foundation. 7.\" 8.\" Redistribution and use in source and binary forms, with or without --- 14 unchanged lines hidden (view full) --- 23.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27.\" SUCH DAMAGE. 28.\" 29.\" $FreeBSD$ 30.\" |
31.Dd May 16, 2020 | 31.Dd June 11, 2020 |
32.Dt SECURITY 7 33.Os 34.Sh NAME 35.Nm security 36.Nd introduction to security under FreeBSD 37.Sh DESCRIPTION 38Security is a function that begins and ends with the system administrator. 39While all --- 995 unchanged lines hidden (view full) --- 1035Controls the mitigation of L1 Terminal Fault in bhyve hypervisor. 1036.It Dv vm.pmap.allow_2m_x_ept 1037amd64. 1038Allows the use of superpages for executable mappings under the EPT 1039page table format used by hypervisors on Intel CPUs to map the guest 1040physical address space to machine physical memory. 1041May be disabled to work around a CPU Erratum called 1042Machine Check Error Avoidance on Page Size Change. | 32.Dt SECURITY 7 33.Os 34.Sh NAME 35.Nm security 36.Nd introduction to security under FreeBSD 37.Sh DESCRIPTION 38Security is a function that begins and ends with the system administrator. 39While all --- 995 unchanged lines hidden (view full) --- 1035Controls the mitigation of L1 Terminal Fault in bhyve hypervisor. 1036.It Dv vm.pmap.allow_2m_x_ept 1037amd64. 1038Allows the use of superpages for executable mappings under the EPT 1039page table format used by hypervisors on Intel CPUs to map the guest 1040physical address space to machine physical memory. 1041May be disabled to work around a CPU Erratum called 1042Machine Check Error Avoidance on Page Size Change. |
1043.It Dv machdep.mitigations.rngds.enable 1044amd64 and i386. 1045Controls mitigation of Special Register Buffer Data Sampling versus 1046optimization of the MCU access. 1047When set to zero, the mitigation is disabled, and the RDSEED and RDRAND 1048instructions do not incur serialization overhead for shared buffer accesses, 1049and do not serialize off-core memory accessses. |
|
1043.It Dv kern.elf32.aslr.enable 1044Controls system-global Address Space Layout Randomization (ASLR) for 1045normal non-PIE (Position Independent Executable) 32bit binaries. 1046See also 1047.Xr proccontrol 1 1048mode 1049.Dv aslr , 1050also affected by the per-image control note flag. --- 52 unchanged lines hidden --- | 1050.It Dv kern.elf32.aslr.enable 1051Controls system-global Address Space Layout Randomization (ASLR) for 1052normal non-PIE (Position Independent Executable) 32bit binaries. 1053See also 1054.Xr proccontrol 1 1055mode 1056.Dv aslr , 1057also affected by the per-image control note flag. --- 52 unchanged lines hidden --- |