From nobody Thu Jan 29 15:40:05 2026 X-Original-To: dev-commits-src-branches@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4f23HT4wClz6Qrv4 for ; Thu, 29 Jan 2026 15:40:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R13" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4f23HT2JJfz3y1Z for ; Thu, 29 Jan 2026 15:40:05 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1769701205; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=x87hVdq0S9tTMjUfosbR6TMk24vplhAmzL2TnvDogzo=; b=HQG/DdYwBzLpC0Lq5PvkwHC/nkzWI1fLrNNnmT/ZCP6NCKLohi8cFZ8DKosfhTO8XIYq4t A9whIed6MmLpm6Twgna4c++du+NH92nXHhvbvPpK3PQOgZ8yXJky+3OnzrfDvtqonExTLm kSDDue5PQBmSGOUkkZ64KFYSERifN74IgOi5HfLcFmo1YvKogXnDBZCLFWGzSfSkwwNGpQ F4Kp+Js9oMamu/hDP6e+Jbw6mEi8etECIhu9e8C8sJLwkqlu1mNyb9tFoyrx/DRutkGDFK scTdvSINYv8954bzZChv7u4RUsKjpzULUmF07bK2hEmF6CqJ4vyq0CwVNNfvHQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1769701205; a=rsa-sha256; cv=none; b=ttJaXuAy3vA8m2BTwMcneYSj32O2MqBQL1eePsplrVrFMcs3o4GaBauj7+gZW4nRTSNgCl N1eCplx1FEPhpx4383pMHL9Wvb3Jv+RlFv6eiP36z6U8jqedh1vCk1VdG+kWSX8ehL/xOr VrTyYSQ9ca9KI3VY3MYkwYMw9ijGdXBicKK1ZWXelbHaBnU0Be84y8BQlJ4erBXfNmzHuY /php/Ry6seCxGax5Mzf7Ouz0Rab49uKVEaEoFvlXOL4pVcvh6H04e69CZElMyrvMXON/0n nJwFYSXGv0ftAXNUbEX30C6xF7SB831gFp2Dr2u2MRa1YwxpfVQzRIK6+gyp4A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1769701205; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=x87hVdq0S9tTMjUfosbR6TMk24vplhAmzL2TnvDogzo=; b=POgJhOucWsD0qztfPWGBJzi3DiO9Qg5maCEhqO7cFeeZrLz3FjNLXBogDgi5deW/wiXrrp gvpOq9Rs43xsGxCkOLQxpF9NJlAdYY2T1Wy9hxWRcpq1iHUnd60SJEtMiQtGOBxg3zzaqW qaqZDO87i9sHTnLlhNZWbPXWIO9ih2gfRyjUbM7dq//i7PsSoGhKMCjbHP8ZfCGvSK+wVq vNnFuzHO1Zc1aH6DVEEW9NSxPzE7f+9kjbUpdddIDeA9TndUohnretwIuo+cYB2oFabVzh NfEQsrUjoKncOxxlDBYSlE+p+93RN9uiWu/st9RZaZ99t0sQYy1Wp2VKWfc/mw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4f23HT1rXlzkw4 for ; Thu, 29 Jan 2026 15:40:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 3a62a by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Thu, 29 Jan 2026 15:40:05 +0000 To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org From: John Baldwin Subject: git: 52864a411a6f - stable/14 - setcred: Move initial copyin of struct setcred out to per-ABI syscall List-Id: Commits to the stable branches of the FreeBSD src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-branches List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-src-branches@freebsd.org Sender: owner-dev-commits-src-branches@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jhb X-Git-Repository: src X-Git-Refname: refs/heads/stable/14 X-Git-Reftype: branch X-Git-Commit: 52864a411a6fb5bbb599ef6d15d727b782abf104 Auto-Submitted: auto-generated Date: Thu, 29 Jan 2026 15:40:05 +0000 Message-Id: <697b7f55.3a62a.3dcf37f1@gitrepo.freebsd.org> The branch stable/14 has been updated by jhb: URL: https://cgit.FreeBSD.org/src/commit/?id=52864a411a6fb5bbb599ef6d15d727b782abf104 commit 52864a411a6fb5bbb599ef6d15d727b782abf104 Author: John Baldwin AuthorDate: 2025-11-24 15:48:48 +0000 Commit: John Baldwin CommitDate: 2026-01-29 15:30:22 +0000 setcred: Move initial copyin of struct setcred out to per-ABI syscall This is the more typical approach used in the tree for system calls with per-ABI structure layouts. Reviewed by: olce, brooks Obtained from: CheriBSD Sponsored by: AFRL, DARPA Differential Revision: https://reviews.freebsd.org/D53756 (cherry picked from commit 6292eecfd95c78abc1ab14f20ceaa507ab9c636a) --- sys/compat/freebsd32/freebsd32_misc.c | 18 ++++++++++-- sys/kern/kern_prot.c | 52 ++++++++++++----------------------- sys/sys/ucred.h | 4 +-- 3 files changed, 35 insertions(+), 39 deletions(-) diff --git a/sys/compat/freebsd32/freebsd32_misc.c b/sys/compat/freebsd32/freebsd32_misc.c index c147c9cf1dd1..320b739deeab 100644 --- a/sys/compat/freebsd32/freebsd32_misc.c +++ b/sys/compat/freebsd32/freebsd32_misc.c @@ -4237,6 +4237,20 @@ ofreebsd32_sethostid(struct thread *td, struct ofreebsd32_sethostid_args *uap) int freebsd32_setcred(struct thread *td, struct freebsd32_setcred_args *uap) { - /* Last argument is 'is_32bit'. */ - return (user_setcred(td, uap->flags, uap->wcred, uap->size, true)); + struct setcred wcred; + struct setcred32 wcred32; + int error; + + if (uap->size != sizeof(wcred32)) + return (EINVAL); + error = copyin(uap->wcred, &wcred32, sizeof(wcred32)); + if (error != 0) + return (error); + /* These fields have exactly the same sizes and positions. */ + memcpy(&wcred, &wcred32, __rangeof(struct setcred32, + setcred32_copy_start, setcred32_copy_end)); + /* Remaining fields are pointers and need PTRIN*(). */ + PTRIN_CP(wcred32, wcred, sc_supp_groups); + PTRIN_CP(wcred32, wcred, sc_label); + return (user_setcred(td, uap->flags, &wcred)); } diff --git a/sys/kern/kern_prot.c b/sys/kern/kern_prot.c index 900b6136a1fe..872645da8614 100644 --- a/sys/kern/kern_prot.c +++ b/sys/kern/kern_prot.c @@ -543,10 +543,8 @@ kern_setcred_copyin_supp_groups(struct setcred *const wcred, } int -user_setcred(struct thread *td, const u_int flags, - const void *const uwcred, const size_t size, bool is_32bit) +user_setcred(struct thread *td, const u_int flags, struct setcred *const wcred) { - struct setcred wcred; #ifdef MAC struct mac mac; /* Pointer to 'struct mac' or 'struct mac32'. */ @@ -566,42 +564,18 @@ user_setcred(struct thread *td, const u_int flags, if ((flags & ~SETCREDF_MASK) != 0) return (EINVAL); -#ifdef COMPAT_FREEBSD32 - if (is_32bit) { - struct setcred32 wcred32; - - if (size != sizeof(wcred32)) - return (EINVAL); - error = copyin(uwcred, &wcred32, sizeof(wcred32)); - if (error != 0) - return (error); - /* These fields have exactly the same sizes and positions. */ - memcpy(&wcred, &wcred32, __rangeof(struct setcred32, - setcred32_copy_start, setcred32_copy_end)); - /* Remaining fields are pointers and need PTRIN*(). */ - PTRIN_CP(wcred32, wcred, sc_supp_groups); - PTRIN_CP(wcred32, wcred, sc_label); - } else -#endif /* COMPAT_FREEBSD32 */ - { - if (size != sizeof(wcred)) - return (EINVAL); - error = copyin(uwcred, &wcred, sizeof(wcred)); - if (error != 0) - return (error); - } #ifdef MAC - umac = wcred.sc_label; + umac = wcred->sc_label; #endif /* Also done on !MAC as a defensive measure. */ - wcred.sc_label = NULL; + wcred->sc_label = NULL; /* * Copy supplementary groups as needed. There is no specific * alternative for 32-bit compatibility as 'gid_t' has the same size * everywhere. */ - error = kern_setcred_copyin_supp_groups(&wcred, flags, smallgroups, + error = kern_setcred_copyin_supp_groups(wcred, flags, smallgroups, &groups); if (error != 0) goto free_groups; @@ -611,15 +585,15 @@ user_setcred(struct thread *td, const u_int flags, error = mac_label_copyin(umac, &mac, NULL); if (error != 0) goto free_groups; - wcred.sc_label = &mac; + wcred->sc_label = &mac; } #endif - error = kern_setcred(td, flags, &wcred, groups); + error = kern_setcred(td, flags, wcred, groups); #ifdef MAC - if (wcred.sc_label != NULL) - free_copied_label(wcred.sc_label); + if (wcred->sc_label != NULL) + free_copied_label(wcred->sc_label); #endif free_groups: @@ -640,7 +614,15 @@ struct setcred_args { int sys_setcred(struct thread *td, struct setcred_args *uap) { - return (user_setcred(td, uap->flags, uap->wcred, uap->size, false)); + struct setcred wcred; + int error; + + if (uap->size != sizeof(wcred)) + return (EINVAL); + error = copyin(uap->wcred, &wcred, sizeof(wcred)); + if (error != 0) + return (error); + return (user_setcred(td, uap->flags, &wcred)); } /* diff --git a/sys/sys/ucred.h b/sys/sys/ucred.h index f43e3bb12414..d018e10d14a9 100644 --- a/sys/sys/ucred.h +++ b/sys/sys/ucred.h @@ -188,8 +188,8 @@ struct setcred32 { struct thread; /* Common native and 32-bit compatibility entry point. */ -int user_setcred(struct thread *td, const u_int flags, - const void *const uwcred, const size_t size, bool is_32bit); +int user_setcred(struct thread *td, const u_int flags, + struct setcred *const wcred); struct proc;