1515#define FORTIFY_REASON (func , write ) (FIELD_PREP(BIT(0), write) | \
1616 FIELD_PREP(GENMASK(7, 1), func))
1717
18- #define fortify_panic (func , write ) \
19- __fortify_panic(FORTIFY_REASON(func, write))
18+ #ifndef fortify_panic
19+ # define fortify_panic (func , write , retfail ) \
20+ __fortify_panic(FORTIFY_REASON(func, write))
21+ #endif
2022
2123#define FORTIFY_READ 0
2224#define FORTIFY_WRITE 1
@@ -181,7 +183,7 @@ char *strncpy(char * const POS p, const char *q, __kernel_size_t size)
181183 if (__compiletime_lessthan (p_size , size ))
182184 __write_overflow ();
183185 if (p_size < size )
184- fortify_panic (FORTIFY_FUNC_strncpy , FORTIFY_WRITE );
186+ fortify_panic (FORTIFY_FUNC_strncpy , FORTIFY_WRITE , p );
185187 return __underlying_strncpy (p , q , size );
186188}
187189
@@ -212,7 +214,7 @@ __FORTIFY_INLINE __kernel_size_t strnlen(const char * const POS p, __kernel_size
212214 /* Do not check characters beyond the end of p. */
213215 ret = __real_strnlen (p , maxlen < p_size ? maxlen : p_size );
214216 if (p_size <= ret && maxlen != ret )
215- fortify_panic (FORTIFY_FUNC_strnlen , FORTIFY_READ );
217+ fortify_panic (FORTIFY_FUNC_strnlen , FORTIFY_READ , ret );
216218 return ret ;
217219}
218220
@@ -248,7 +250,7 @@ __kernel_size_t __fortify_strlen(const char * const POS p)
248250 return __underlying_strlen (p );
249251 ret = strnlen (p , p_size );
250252 if (p_size <= ret )
251- fortify_panic (FORTIFY_FUNC_strlen , FORTIFY_READ );
253+ fortify_panic (FORTIFY_FUNC_strlen , FORTIFY_READ , ret );
252254 return ret ;
253255}
254256
@@ -299,7 +301,7 @@ __FORTIFY_INLINE ssize_t sized_strscpy(char * const POS p, const char * const PO
299301 * p_size.
300302 */
301303 if (len > p_size )
302- fortify_panic (FORTIFY_FUNC_strscpy , FORTIFY_WRITE );
304+ fortify_panic (FORTIFY_FUNC_strscpy , FORTIFY_WRITE , - E2BIG );
303305
304306 /*
305307 * We can now safely call vanilla strscpy because we are protected from:
@@ -357,7 +359,7 @@ size_t strlcat(char * const POS p, const char * const POS q, size_t avail)
357359
358360 /* Give up if string is already overflowed. */
359361 if (p_size <= p_len )
360- fortify_panic (FORTIFY_FUNC_strlcat , FORTIFY_READ );
362+ fortify_panic (FORTIFY_FUNC_strlcat , FORTIFY_READ , wanted );
361363
362364 if (actual >= avail ) {
363365 copy_len = avail - p_len - 1 ;
@@ -366,7 +368,7 @@ size_t strlcat(char * const POS p, const char * const POS q, size_t avail)
366368
367369 /* Give up if copy will overflow. */
368370 if (p_size <= actual )
369- fortify_panic (FORTIFY_FUNC_strlcat , FORTIFY_WRITE );
371+ fortify_panic (FORTIFY_FUNC_strlcat , FORTIFY_WRITE , wanted );
370372 __underlying_memcpy (p + p_len , q , copy_len );
371373 p [actual ] = '\0' ;
372374
@@ -395,7 +397,7 @@ char *strcat(char * const POS p, const char *q)
395397 const size_t p_size = __member_size (p );
396398
397399 if (strlcat (p , q , p_size ) >= p_size )
398- fortify_panic (FORTIFY_FUNC_strcat , FORTIFY_WRITE );
400+ fortify_panic (FORTIFY_FUNC_strcat , FORTIFY_WRITE , p );
399401 return p ;
400402}
401403
@@ -431,13 +433,13 @@ char *strncat(char * const POS p, const char * const POS q, __kernel_size_t coun
431433 p_len = strlen (p );
432434 copy_len = strnlen (q , count );
433435 if (p_size < p_len + copy_len + 1 )
434- fortify_panic (FORTIFY_FUNC_strncat , FORTIFY_WRITE );
436+ fortify_panic (FORTIFY_FUNC_strncat , FORTIFY_WRITE , p );
435437 __underlying_memcpy (p + p_len , q , copy_len );
436438 p [p_len + copy_len ] = '\0' ;
437439 return p ;
438440}
439441
440- __FORTIFY_INLINE void fortify_memset_chk (__kernel_size_t size ,
442+ __FORTIFY_INLINE bool fortify_memset_chk (__kernel_size_t size ,
441443 const size_t p_size ,
442444 const size_t p_size_field )
443445{
@@ -472,7 +474,8 @@ __FORTIFY_INLINE void fortify_memset_chk(__kernel_size_t size,
472474 * lengths are unknown.)
473475 */
474476 if (p_size != SIZE_MAX && p_size < size )
475- fortify_panic (FORTIFY_FUNC_memset , FORTIFY_WRITE );
477+ fortify_panic (FORTIFY_FUNC_memset , FORTIFY_WRITE , true);
478+ return false;
476479}
477480
478481#define __fortify_memset_chk (p , c , size , p_size , p_size_field ) ({ \
@@ -571,9 +574,9 @@ __FORTIFY_INLINE bool fortify_memcpy_chk(__kernel_size_t size,
571574 * lengths are unknown.)
572575 */
573576 if (p_size != SIZE_MAX && p_size < size )
574- fortify_panic (func , FORTIFY_WRITE );
577+ fortify_panic (func , FORTIFY_WRITE , true );
575578 else if (q_size != SIZE_MAX && q_size < size )
576- fortify_panic (func , FORTIFY_READ );
579+ fortify_panic (func , FORTIFY_READ , true );
577580
578581 /*
579582 * Warn when writing beyond destination field size.
@@ -673,7 +676,7 @@ __FORTIFY_INLINE void *memscan(void * const POS0 p, int c, __kernel_size_t size)
673676 if (__compiletime_lessthan (p_size , size ))
674677 __read_overflow ();
675678 if (p_size < size )
676- fortify_panic (FORTIFY_FUNC_memscan , FORTIFY_READ );
679+ fortify_panic (FORTIFY_FUNC_memscan , FORTIFY_READ , NULL );
677680 return __real_memscan (p , c , size );
678681}
679682
@@ -690,7 +693,7 @@ int memcmp(const void * const POS0 p, const void * const POS0 q, __kernel_size_t
690693 __read_overflow2 ();
691694 }
692695 if (p_size < size || q_size < size )
693- fortify_panic (FORTIFY_FUNC_memcmp , FORTIFY_READ );
696+ fortify_panic (FORTIFY_FUNC_memcmp , FORTIFY_READ , INT_MIN );
694697 return __underlying_memcmp (p , q , size );
695698}
696699
@@ -702,7 +705,7 @@ void *memchr(const void * const POS0 p, int c, __kernel_size_t size)
702705 if (__compiletime_lessthan (p_size , size ))
703706 __read_overflow ();
704707 if (p_size < size )
705- fortify_panic (FORTIFY_FUNC_memchr , FORTIFY_READ );
708+ fortify_panic (FORTIFY_FUNC_memchr , FORTIFY_READ , NULL );
706709 return __underlying_memchr (p , c , size );
707710}
708711
@@ -714,7 +717,7 @@ __FORTIFY_INLINE void *memchr_inv(const void * const POS0 p, int c, size_t size)
714717 if (__compiletime_lessthan (p_size , size ))
715718 __read_overflow ();
716719 if (p_size < size )
717- fortify_panic (FORTIFY_FUNC_memchr_inv , FORTIFY_READ );
720+ fortify_panic (FORTIFY_FUNC_memchr_inv , FORTIFY_READ , NULL );
718721 return __real_memchr_inv (p , c , size );
719722}
720723
@@ -727,7 +730,7 @@ __FORTIFY_INLINE void *kmemdup(const void * const POS0 p, size_t size, gfp_t gfp
727730 if (__compiletime_lessthan (p_size , size ))
728731 __read_overflow ();
729732 if (p_size < size )
730- fortify_panic (FORTIFY_FUNC_kmemdup , FORTIFY_READ );
733+ fortify_panic (FORTIFY_FUNC_kmemdup , FORTIFY_READ , NULL );
731734 return __real_kmemdup (p , size , gfp );
732735}
733736
@@ -764,7 +767,7 @@ char *strcpy(char * const POS p, const char * const POS q)
764767 __write_overflow ();
765768 /* Run-time check for dynamic size overflow. */
766769 if (p_size < size )
767- fortify_panic (FORTIFY_FUNC_strcpy , FORTIFY_WRITE );
770+ fortify_panic (FORTIFY_FUNC_strcpy , FORTIFY_WRITE , p );
768771 __underlying_memcpy (p , q , size );
769772 return p ;
770773}
0 commit comments