===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/innovations.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -c -r1.88 -r1.89
*** www/innovations.html 2020/08/13 15:30:13 1.88
--- www/innovations.html 2020/10/12 16:47:20 1.89
***************
*** 171,183 ****
relative branches/calls. Basically a unique address space for each
kernel boot, similar to the userland fork+exec model described above
but for the kernel. Theo de Raadt, June 2017.
!
! Rearranged i386/amd64 register allocator order in
clang(1)
to reduce polymorphic RET instructions:
Todd Mortimer, November 20, 2017.
!
! Reencoding of i386/amd64 instruction sequences to avoid
embedded polymorphic RET instructions. Enhancements to
clang(1)
Todd Mortimer, April 28, 2018 and onwards.
--- 171,181 ----
relative branches/calls. Basically a unique address space for each
kernel boot, similar to the userland fork+exec model described above
but for the kernel. Theo de Raadt, June 2017.
! Rearranged i386/amd64 register allocator order in
clang(1)
to reduce polymorphic RET instructions:
Todd Mortimer, November 20, 2017.
! Reencoding of i386/amd64 instruction sequences to avoid
embedded polymorphic RET instructions. Enhancements to
clang(1)
Todd Mortimer, April 28, 2018 and onwards.
***************
*** 190,197 ****
RETGUARD is a replacement for the stack-protector
which uses a per-function random cookie (located in the read-only ELF
.openbsd.randomdata section) to consistency-check the
! return address on the stack. Implemented for AMD64 and ARM64
! by Todd Mortimer in OpenBSD 6.4, and for Octeon in OpenBSD 6.7.
MAP_CONCEAL addition to
mmap(2)
disallows memory pages to be written to core dumps, preventing
--- 188,196 ----
RETGUARD is a replacement for the stack-protector
which uses a per-function random cookie (located in the read-only ELF
.openbsd.randomdata section) to consistency-check the
! return address on the stack. Implemented for amd64 and arm64
! by Todd Mortimer in OpenBSD 6.4, for mips64 in OpenBSD 6.7, and
! powerpc/power64 in OpenBSD 6.9.
MAP_CONCEAL addition to
mmap(2)
disallows memory pages to be written to core dumps, preventing