Control-flow Enforcement [1] [2] introduces a new control-protection fault, which is triggered by a branch instruction (call, ret, or jmp) violating branch-enforcement rules. When the signal is delivered, si_code is set to SEGV_CPERR. Add the code to sigaction.2, and while at it, clarify when si_addr is set. [1] Intel 64 and IA-32 Architectures Software Developer's Manual: https://software.intel.com/en-us/download/intel-64-and-ia-32- architectures-sdm-combined-volumes-1-2a-2b-2c-2d-3a-3b-3c-3d-and-4 [2] CET Shadow Stack patches v21: https://lkml.kernel.org/r/20210217222730.15819-1-yu-cheng.yu@xxxxxxxxx/ https://lkml.kernel.org/r/20210217223135.16790-1-yu-cheng.yu@xxxxxxxxx/ Yu-cheng Yu (2): sigaction.2: Add SEGV_CPERR sigaction.2: wfix - Clarify si_addr description. man2/sigaction.2 | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) -- 2.21.0