manuals: Correct some sysctl markup

This enables additional searching the manual by sysctl variable.
This syntax is standardized in style.mdoc(5).

Reported by:	bapt
MFC after:	3 days
This commit is contained in:
Alexander Ziaee 2026-01-06 11:02:24 -05:00
parent 03e1605cdf
commit 75866d71e8
No known key found for this signature in database
GPG key ID: 0A8F850BCDEF4511
4 changed files with 38 additions and 38 deletions

View file

@ -62,7 +62,7 @@ It should be noted that
has no effect on the process's current directory.
.Pp
This call is restricted to the super-user, unless the
.Ql security.bsd.unprivileged_chroot
.Ql Va security.bsd.unprivileged_chroot
sysctl variable is set to 1
and the process has enabled the
.Dv PROC_NO_NEW_PRIVS_CTL
@ -118,7 +118,7 @@ will fail and the root directory will be unchanged if:
.Bl -tag -width Er
.It Bq Er EPERM
The effective user ID is not the super-user and the
.Ql security.bsd.unprivileged_chroot
.Ql Va security.bsd.unprivileged_chroot
sysctl is 0.
.It Bq Er EPERM
The effective user ID is not the super-user and the
@ -127,7 +127,7 @@ process has not enabled the
.Xr procctl 2 .
.It Bq Er EPERM
One or more filedescriptors are open directories and the
.Ql kern.chroot_allow_open_directories
.Ql Va kern.chroot_allow_open_directories
sysctl is not set to permit this.
.It Bq Er EIO
An I/O error occurred while reading from or writing to the file system.

View file

@ -148,31 +148,31 @@ Sometimes it may be desirable to disallow it either completely, or limit
its scope.
The following controls are provided for this:
.Bl -tag -width security.bsd.unprivileged_proc_debug
.It Dv security.bsd.allow_ptrace
.It Va security.bsd.allow_ptrace
Setting this sysctl to zero makes
.Nm
return
.Er ENOSYS
always as if the syscall is not implemented by the kernel.
.It Dv security.bsd.unprivileged_proc_debug
.It Va security.bsd.unprivileged_proc_debug
Setting this sysctl to zero disallows the use of
.Fn ptrace
by unprivileged processes.
.It Dv security.bsd.see_other_uids
.It Va security.bsd.see_other_uids
Setting this sysctl to zero prevents
.Fn ptrace
requests from targeting processes with a real user identifier different
from the caller's.
These requests will fail with error
.Er ESRCH .
.It Dv security.bsd.see_other_gids
.It Va security.bsd.see_other_gids
Setting this sysctl to zero disallows
.Fn ptrace
requests from processes that have no groups in common with the target process,
considering their sets of real and supplementary groups.
These requests will fail with error
.Er ESRCH .
.It Dv security.bsd.see_jail_proc
.It Va security.bsd.see_jail_proc
Setting this sysctl to zero disallows
.Fn ptrace
requests from processes belonging to a different jail than that of the target

View file

@ -955,7 +955,7 @@ briefly listed there, together with controls which enable some mitigations
of the hardware state leaks.
.Pp
Hardware mitigation sysctl knobs described below have been moved under
.Pa machdep.mitigations ,
.Va machdep.mitigations ,
with backwards-compatibility shims to accept the existing names.
A future change will rationalize the sense of the individual sysctls
(so that enabled / true always indicates that the mitigation is active).
@ -965,20 +965,20 @@ Backwards compatibility shims for the interim sysctls under
.Pa machdep.mitigations
will not be added.
.Bl -tag -width security.bsd.unprivileged_proc_debug
.It Dv security.bsd.see_other_uids
.It Va security.bsd.see_other_uids
Controls visibility and reachability of subjects (e.g., processes) and objects
(e.g., sockets) owned by a different uid.
The knob directly affects the
.Dv kern.proc
.Va kern.proc
sysctls filtering of data, which results in restricted output from
utilities like
.Xr ps 1 .
.It Dv security.bsd.see_other_gids
.It Va security.bsd.see_other_gids
Same, for subjects and objects owned by a different gid.
.It Dv security.bsd.see_jail_proc
.It Va security.bsd.see_jail_proc
Same, for subjects and objects belonging to a different jail, including
sub-jails.
.It Dv security.bsd.conservative_signals
.It Va security.bsd.conservative_signals
When enabled, unprivileged users are only allowed to send job control
and usual termination signals like
.Dv SIGKILL ,
@ -986,13 +986,13 @@ and usual termination signals like
and
.Dv SIGTERM ,
to the processes executing programs with changed uids.
.It Dv security.bsd.unprivileged_proc_debug
.It Va security.bsd.unprivileged_proc_debug
Controls availability of the process debugging facilities to non-root users.
See also
.Xr proccontrol 1
mode
.Dv trace .
.It Dv vm.pmap.pti
.It Va vm.pmap.pti
Tunable, amd64-only.
Enables mode of operation of virtual memory system where usermode page
tables are sanitized to prevent so-called Meltdown information leak on
@ -1003,25 +1003,25 @@ See also
.Xr proccontrol 1
mode
.Dv kpti .
.It Dv machdep.mitigations.flush_rsb_ctxsw
.It Va machdep.mitigations.flush_rsb_ctxsw
amd64.
Controls Return Stack Buffer flush on context switch, to prevent
cross-process ret2spec attacks.
Only needed, and only enabled by default, if the machine
supports SMEP, otherwise IBRS would do necessary flushing on kernel
entry anyway.
.It Dv hw.mds_disable
.It Va hw.mds_disable
amd64 and i386.
Controls Microarchitectural Data Sampling hardware information leak
mitigation.
.It Dv hw.spec_store_bypass_disable
.It Va hw.spec_store_bypass_disable
amd64 and i386.
Controls Speculative Store Bypass hardware information leak mitigation.
.It Dv hw.ibrs_disable
.It Va hw.ibrs_disable
amd64 and i386.
Controls Indirect Branch Restricted Speculation hardware information leak
mitigation.
.It Dv machdep.syscall_ret_flush_l1d
.It Va machdep.syscall_ret_flush_l1d
amd64.
Controls force-flush of L1D cache on return from syscalls which report
errors other than
@ -1036,62 +1036,62 @@ This is mostly a paranoid setting added to prevent hypothetical exploitation
of unknown gadgets for unknown hardware issues.
The error codes exclusion list is composed of the most common errors which
typically occurs on normal system operation.
.It Dv machdep.nmi_flush_l1d_sw
.It Va machdep.nmi_flush_l1d_sw
amd64.
Controls force-flush of L1D cache on NMI;
this provides software assist for bhyve mitigation of L1 terminal fault
hardware information leak.
.It Dv hw.vmm.vmx.l1d_flush
.It Va hw.vmm.vmx.l1d_flush
amd64.
Controls the mitigation of L1 Terminal Fault in bhyve hypervisor.
.It Dv vm.pmap.allow_2m_x_ept
.It Va vm.pmap.allow_2m_x_ept
amd64.
Allows the use of superpages for executable mappings under the EPT
page table format used by hypervisors on Intel CPUs to map the guest
physical address space to machine physical memory.
May be disabled to work around a CPU Erratum called
Machine Check Error Avoidance on Page Size Change.
.It Dv machdep.mitigations.rngds.enable
.It Va machdep.mitigations.rngds.enable
amd64 and i386.
Controls mitigation of Special Register Buffer Data Sampling versus
optimization of the MCU access.
When set to zero, the mitigation is disabled, and the RDSEED and RDRAND
instructions do not incur serialization overhead for shared buffer accesses,
and do not serialize off-core memory accesses.
.It Dv kern.elf32.aslr.enable
.It Va kern.elf32.aslr.enable
Controls system-global Address Space Layout Randomization (ASLR) for
normal non-PIE (Position Independent Executable) 32-bit ELF binaries.
See also the
.Xr proccontrol 1
.Dv aslr
mode, also affected by the per-image control note flag.
.It Dv kern.elf32.aslr.pie_enable
.It Va kern.elf32.aslr.pie_enable
Controls system-global Address Space Layout Randomization for
position-independent (PIE) 32-bit binaries.
.It Dv kern.elf32.aslr.honor_sbrk
.It Va kern.elf32.aslr.honor_sbrk
Makes ASLR less aggressive and more compatible with old binaries
relying on the sbrk area.
.It Dv kern.elf32.aslr.stack
.It Va kern.elf32.aslr.stack
Enable randomization of the stack for 32-bit binaries.
Otherwise, the stack is mapped at a fixed location determined by the
process ABI.
.It Dv kern.elf64.aslr.enable
.It Va kern.elf64.aslr.enable
ASLR control for 64-bit ELF binaries.
.It Dv kern.elf64.aslr.pie_enable
.It Va kern.elf64.aslr.pie_enable
ASLR control for 64-bit ELF PIEs.
.It Dv kern.elf64.aslr.honor_sbrk
.It Va kern.elf64.aslr.honor_sbrk
ASLR sbrk compatibility control for 64-bit binaries.
.It Dv kern.elf64.aslr.stack
.It Va kern.elf64.aslr.stack
Controls stack address randomization for 64-bit binaries.
.It Dv kern.elf32.nxstack
.It Va kern.elf32.nxstack
Enables non-executable stack for 32-bit processes.
Enabled by default if supported by hardware and corresponding binary.
.It Dv kern.elf64.nxstack
.It Va kern.elf64.nxstack
Enables non-executable stack for 64-bit processes.
.It Dv kern.elf32.allow_wx
.It Va kern.elf32.allow_wx
Enables mapping of simultaneously writable and executable pages for
32-bit processes.
.It Dv kern.elf64.allow_wx
.It Va kern.elf64.allow_wx
Enables mapping of simultaneously writable and executable pages for
64-bit processes.
.El

View file

@ -68,7 +68,7 @@ Use the
command before chrooting, effectively disabling SUID/SGID bits
for the calling process and its descendants.
If
.Dv security.bsd.unprivileged_chroot
.Va security.bsd.unprivileged_chroot
sysctl is set to 1, it will make it possible to chroot without
superuser privileges.
.El