[PATCH 0/2] sigaction.2: Updates for SEGV_CPERR

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Control-flow Enforcement [1] [2] introduces a new control-protection fault,
which is triggered by a branch instruction (call, ret, or jmp) violating
branch-enforcement rules.  When the signal is delivered, si_code is set to
SEGV_CPERR.  Add the code to sigaction.2, and while at it, clarify when
si_addr is set.

[1] Intel 64 and IA-32 Architectures Software Developer's Manual:

    https://software.intel.com/en-us/download/intel-64-and-ia-32-
    architectures-sdm-combined-volumes-1-2a-2b-2c-2d-3a-3b-3c-3d-and-4

[2] CET Shadow Stack patches v21:

    https://lkml.kernel.org/r/20210217222730.15819-1-yu-cheng.yu@xxxxxxxxx/
    https://lkml.kernel.org/r/20210217223135.16790-1-yu-cheng.yu@xxxxxxxxx/

Yu-cheng Yu (2):
  sigaction.2: Add SEGV_CPERR
  sigaction.2: wfix - Clarify si_addr description.

 man2/sigaction.2 | 10 +++++++++-
 1 file changed, 9 insertions(+), 1 deletion(-)

-- 
2.21.0




[Index of Archives]     [Kernel Documentation]     [Netdev]     [Linux Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux