#define FORTIFY_REASON(func, write)    (FIELD_PREP(BIT(0), write) | \
                                         FIELD_PREP(GENMASK(7, 1), func))
 
-#define fortify_panic(func, write)     \
-       __fortify_panic(FORTIFY_REASON(func, write))
+#ifndef fortify_panic
+# define fortify_panic(func, write, retfail)   \
+        __fortify_panic(FORTIFY_REASON(func, write))
+#endif
 
 #define FORTIFY_READ            0
 #define FORTIFY_WRITE           1
        if (__compiletime_lessthan(p_size, size))
                __write_overflow();
        if (p_size < size)
-               fortify_panic(FORTIFY_FUNC_strncpy, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_strncpy, FORTIFY_WRITE, p);
        return __underlying_strncpy(p, q, size);
 }
 
        /* Do not check characters beyond the end of p. */
        ret = __real_strnlen(p, maxlen < p_size ? maxlen : p_size);
        if (p_size <= ret && maxlen != ret)
-               fortify_panic(FORTIFY_FUNC_strnlen, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_strnlen, FORTIFY_READ, ret);
        return ret;
 }
 
                return __underlying_strlen(p);
        ret = strnlen(p, p_size);
        if (p_size <= ret)
-               fortify_panic(FORTIFY_FUNC_strlen, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_strlen, FORTIFY_READ, ret);
        return ret;
 }
 
         * p_size.
         */
        if (len > p_size)
-               fortify_panic(FORTIFY_FUNC_strscpy, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_strscpy, FORTIFY_WRITE, -E2BIG);
 
        /*
         * We can now safely call vanilla strscpy because we are protected from:
 
        /* Give up if string is already overflowed. */
        if (p_size <= p_len)
-               fortify_panic(FORTIFY_FUNC_strlcat, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_strlcat, FORTIFY_READ, wanted);
 
        if (actual >= avail) {
                copy_len = avail - p_len - 1;
 
        /* Give up if copy will overflow. */
        if (p_size <= actual)
-               fortify_panic(FORTIFY_FUNC_strlcat, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_strlcat, FORTIFY_WRITE, wanted);
        __underlying_memcpy(p + p_len, q, copy_len);
        p[actual] = '\0';
 
        const size_t p_size = __member_size(p);
 
        if (strlcat(p, q, p_size) >= p_size)
-               fortify_panic(FORTIFY_FUNC_strcat, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_strcat, FORTIFY_WRITE, p);
        return p;
 }
 
        p_len = strlen(p);
        copy_len = strnlen(q, count);
        if (p_size < p_len + copy_len + 1)
-               fortify_panic(FORTIFY_FUNC_strncat, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_strncat, FORTIFY_WRITE, p);
        __underlying_memcpy(p + p_len, q, copy_len);
        p[p_len + copy_len] = '\0';
        return p;
 }
 
-__FORTIFY_INLINE void fortify_memset_chk(__kernel_size_t size,
+__FORTIFY_INLINE bool fortify_memset_chk(__kernel_size_t size,
                                         const size_t p_size,
                                         const size_t p_size_field)
 {
         * lengths are unknown.)
         */
        if (p_size != SIZE_MAX && p_size < size)
-               fortify_panic(FORTIFY_FUNC_memset, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_memset, FORTIFY_WRITE, true);
+       return false;
 }
 
 #define __fortify_memset_chk(p, c, size, p_size, p_size_field) ({      \
         * lengths are unknown.)
         */
        if (p_size != SIZE_MAX && p_size < size)
-               fortify_panic(func, FORTIFY_WRITE);
+               fortify_panic(func, FORTIFY_WRITE, true);
        else if (q_size != SIZE_MAX && q_size < size)
-               fortify_panic(func, FORTIFY_READ);
+               fortify_panic(func, FORTIFY_READ, true);
 
        /*
         * Warn when writing beyond destination field size.
        if (__compiletime_lessthan(p_size, size))
                __read_overflow();
        if (p_size < size)
-               fortify_panic(FORTIFY_FUNC_memscan, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_memscan, FORTIFY_READ, NULL);
        return __real_memscan(p, c, size);
 }
 
                        __read_overflow2();
        }
        if (p_size < size || q_size < size)
-               fortify_panic(FORTIFY_FUNC_memcmp, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_memcmp, FORTIFY_READ, INT_MIN);
        return __underlying_memcmp(p, q, size);
 }
 
        if (__compiletime_lessthan(p_size, size))
                __read_overflow();
        if (p_size < size)
-               fortify_panic(FORTIFY_FUNC_memchr, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_memchr, FORTIFY_READ, NULL);
        return __underlying_memchr(p, c, size);
 }
 
        if (__compiletime_lessthan(p_size, size))
                __read_overflow();
        if (p_size < size)
-               fortify_panic(FORTIFY_FUNC_memchr_inv, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_memchr_inv, FORTIFY_READ, NULL);
        return __real_memchr_inv(p, c, size);
 }
 
        if (__compiletime_lessthan(p_size, size))
                __read_overflow();
        if (p_size < size)
-               fortify_panic(FORTIFY_FUNC_kmemdup, FORTIFY_READ);
+               fortify_panic(FORTIFY_FUNC_kmemdup, FORTIFY_READ, NULL);
        return __real_kmemdup(p, size, gfp);
 }
 
                __write_overflow();
        /* Run-time check for dynamic size overflow. */
        if (p_size < size)
-               fortify_panic(FORTIFY_FUNC_strcpy, FORTIFY_WRITE);
+               fortify_panic(FORTIFY_FUNC_strcpy, FORTIFY_WRITE, p);
        __underlying_memcpy(p, q, size);
        return p;
 }
 
  */
 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 
+/* Redefine fortify_panic() to track failures. */
+void fortify_add_kunit_error(int write);
+#define fortify_panic(func, write, retfail) do {                       \
+       __fortify_report(FORTIFY_REASON(func, write));                  \
+       fortify_add_kunit_error(write);                                 \
+       return (retfail);                                               \
+} while (0)
+
 #include <kunit/device.h>
 #include <kunit/test.h>
+#include <kunit/test-bug.h>
 #include <linux/device.h>
 #include <linux/slab.h>
 #include <linux/string.h>
 # define __compiletime_strlen __builtin_strlen
 #endif
 
+static struct kunit_resource read_resource;
+static struct kunit_resource write_resource;
+static int fortify_read_overflows;
+static int fortify_write_overflows;
+
 static const char array_of_10[] = "this is 10";
 static const char *ptr_of_11 = "this is 11!";
 static char array_unknown[] = "compiler thinks I might change";
 
+void fortify_add_kunit_error(int write)
+{
+       struct kunit_resource *resource;
+       struct kunit *current_test;
+
+       current_test = kunit_get_current_test();
+       if (!current_test)
+               return;
+
+       resource = kunit_find_named_resource(current_test,
+                       write ? "fortify_write_overflows"
+                             : "fortify_read_overflows");
+       if (!resource)
+               return;
+
+       (*(int *)resource->data)++;
+       kunit_put_resource(resource);
+}
+
 static void known_sizes_test(struct kunit *test)
 {
        KUNIT_EXPECT_EQ(test, __compiletime_strlen("88888888"), 8);
        if (!IS_ENABLED(CONFIG_FORTIFY_SOURCE))
                kunit_skip(test, "Not built with CONFIG_FORTIFY_SOURCE=y");
 
+       fortify_read_overflows = 0;
+       kunit_add_named_resource(test, NULL, NULL, &read_resource,
+                                "fortify_read_overflows",
+                                &fortify_read_overflows);
+       fortify_write_overflows = 0;
+       kunit_add_named_resource(test, NULL, NULL, &write_resource,
+                                "fortify_write_overflows",
+                                &fortify_write_overflows);
        return 0;
 }