diff options
author | Kees Cook <keescook@chromium.org> | 2023-04-07 12:27:16 -0700 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2024-02-29 13:38:02 -0800 |
commit | 3d965b33e40d973b450cb0212913f039476c16f4 (patch) | |
tree | 213bf660d55d66a2a4a273f8394156f30f83410c /arch/arm/boot/compressed/misc.c | |
parent | fa4a3f86d4982b603865ccb97dde82f0ae1e3302 (diff) | |
download | linux-3d965b33e40d973b450cb0212913f039476c16f4.tar.gz linux-3d965b33e40d973b450cb0212913f039476c16f4.tar.bz2 linux-3d965b33e40d973b450cb0212913f039476c16f4.zip |
fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'arch/arm/boot/compressed/misc.c')
-rw-r--r-- | arch/arm/boot/compressed/misc.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/arm/boot/compressed/misc.c b/arch/arm/boot/compressed/misc.c index d93e2e466f6a..6c41b270560e 100644 --- a/arch/arm/boot/compressed/misc.c +++ b/arch/arm/boot/compressed/misc.c @@ -154,7 +154,7 @@ decompress_kernel(unsigned long output_start, unsigned long free_mem_ptr_p, putstr(" done, booting the kernel.\n"); } -void __fortify_panic(const u8 reason) +void __fortify_panic(const u8 reason, size_t avail, size_t size) { error("detected buffer overflow"); } |