<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/libexec/ld.so, branch jd/queueboosts</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/libexec/ld.so?h=jd%2Fqueueboosts</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/libexec/ld.so?h=jd%2Fqueueboosts'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2020-05-08T11:04:50Z</updated>
<entry>
<title>ld.so(1) also ignores LD_LIBRARY_PATH an friends for set-group-ID executables</title>
<updated>2020-05-08T11:04:50Z</updated>
<author>
<name>jca</name>
<email>jca@openbsd.org</email>
</author>
<published>2020-05-08T11:04:50Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c6bdb7a3b4a9b5a31f18446370e0b65f007d4b8c'/>
<id>urn:sha1:c6bdb7a3b4a9b5a31f18446370e0b65f007d4b8c</id>
<content type='text'>
While here, use consistent casing and don't use .Ev for
set-user-ID/set-group-ID.

from Miod
</content>
</entry>
<entry>
<title>LD_DEBUG is ignored for set-user-ID and set-group-ID executables</title>
<updated>2020-05-08T10:57:50Z</updated>
<author>
<name>jca</name>
<email>jca@openbsd.org</email>
</author>
<published>2020-05-08T10:57:50Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=b3f796b2e608b9c07cbbff10841e7a52807b9c94'/>
<id>urn:sha1:b3f796b2e608b9c07cbbff10841e7a52807b9c94</id>
<content type='text'>
from Miod
</content>
</entry>
<entry>
<title>Add missing space in stack smash handler error message.</title>
<updated>2020-03-27T22:17:47Z</updated>
<author>
<name>matthieu</name>
<email>matthieu@openbsd.org</email>
</author>
<published>2020-03-27T22:17:47Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=fa9f194654f351d5755593abf760e3720c8f75dc'/>
<id>urn:sha1:fa9f194654f351d5755593abf760e3720c8f75dc</id>
<content type='text'>
ok kettenis@, deraadt@
</content>
</entry>
<entry>
<title>Anthony Steinhauser reports that 32-bit arm cpus have the same speculation</title>
<updated>2020-03-13T09:31:24Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2020-03-13T09:31:24Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=f74a2b77455090a00a6234c40c5f02aa52986a5b'/>
<id>urn:sha1:f74a2b77455090a00a6234c40c5f02aa52986a5b</id>
<content type='text'>
problems as 64-bit models.  To resolve the syscall speculation, as a first
step "nop; nop" was added after all occurances of the syscall ("swi 0")
instruction.  Then the kernel was changed to jump over the 2 extra instructions.
In this final step, those pair of nops are converted into the speculation-blocking
sequence ("dsb nsh; isb").
Don't try to build through these multiple steps, use a snapshot instead.
Packages matching the new ABI will be out in a while...
ok kettenis
</content>
</entry>
<entry>
<title>Anthony Steinhauser reports that 32-bit arm cpus have the same speculation</title>
<updated>2020-03-13T06:38:55Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2020-03-13T06:38:55Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=ded5ef52d3291f96a0c7cf356fdf60838643405d'/>
<id>urn:sha1:ded5ef52d3291f96a0c7cf356fdf60838643405d</id>
<content type='text'>
problems as 64-bit models.  For the syscall instruction issue, add nop;nop
after swi 0, in preparation for jumping over a speculation barrier here later.
(a lonely swi 0 was hiding in __asm in this file)
</content>
</entry>
<entry>
<title>Anthony Steinhauser reports that 32-bit arm cpus have the same speculation</title>
<updated>2020-03-11T12:53:19Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2020-03-11T12:53:19Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=f377c7672bd38a70b428cd7751ceff0af609e750'/>
<id>urn:sha1:f377c7672bd38a70b428cd7751ceff0af609e750</id>
<content type='text'>
problems as 64-bit models.  For the syscall instruction issue, add nop;nop
after swi 0, in preparation for jumping over a speculation barrier here later.
ok kettenis
</content>
</entry>
<entry>
<title>Now that the kernel skips the two instructions immediately following</title>
<updated>2020-02-18T12:19:11Z</updated>
<author>
<name>kettenis</name>
<email>kettenis@openbsd.org</email>
</author>
<published>2020-02-18T12:19:11Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=5ecc9681133f1894e81c385eddd09981f78f1193'/>
<id>urn:sha1:5ecc9681133f1894e81c385eddd09981f78f1193</id>
<content type='text'>
a syscall, replace the double nop with a dsb nsh; isb; sequence which
stops the CPU from speculating any further.  This fix was suggested
by Anthony Steinhauser.

ok deraadt@
</content>
</entry>
<entry>
<title>Insert two nop instructions after each svc #0 instruction in userland.</title>
<updated>2020-01-26T02:19:43Z</updated>
<author>
<name>kettenis</name>
<email>kettenis@openbsd.org</email>
</author>
<published>2020-01-26T02:19:43Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=0c401ffc2a2550c32105ce180746b0a95071123b'/>
<id>urn:sha1:0c401ffc2a2550c32105ce180746b0a95071123b</id>
<content type='text'>
The will be replaced by a speculation barrier as soon as we teach the
kernel to skip over these two instructions when returning from a
system call.

ok patrick@, deraadt@
</content>
</entry>
<entry>
<title>Eliminate failure returns from _dl_split_path(): if malloc fails just _dl_oom()</title>
<updated>2019-12-17T17:16:32Z</updated>
<author>
<name>guenther</name>
<email>guenther@openbsd.org</email>
</author>
<published>2019-12-17T17:16:32Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=3d8e19a1e88234ef8b946d7c79832ee657fb249a'/>
<id>urn:sha1:3d8e19a1e88234ef8b946d7c79832ee657fb249a</id>
<content type='text'>
Prompted by Qualys's leveraging malloc failure in _dl_split_path() to get
stuff past.

ok deraadt@ millert@
</content>
</entry>
<entry>
<title>Don't look up env variables until we know we'll trust them.  Otherwise,</title>
<updated>2019-12-17T03:16:07Z</updated>
<author>
<name>guenther</name>
<email>guenther@openbsd.org</email>
</author>
<published>2019-12-17T03:16:07Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=4b65c70c5e05dc7a3d5ef502a5b4dc938ecf3bc5'/>
<id>urn:sha1:4b65c70c5e05dc7a3d5ef502a5b4dc938ecf3bc5</id>
<content type='text'>
just delete them without looking.

ok millert@
</content>
</entry>
</feed>
