1/*	$NetBSD: rpc_generic.c,v 1.4 2000/09/28 09:07:04 kleink Exp $	*/
2
3/*-
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 * Copyright (c) 2009, Sun Microsystems, Inc.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions are met:
11 * - Redistributions of source code must retain the above copyright notice,
12 *   this list of conditions and the following disclaimer.
13 * - Redistributions in binary form must reproduce the above copyright notice,
14 *   this list of conditions and the following disclaimer in the documentation
15 *   and/or other materials provided with the distribution.
16 * - Neither the name of Sun Microsystems, Inc. nor the names of its
17 *   contributors may be used to endorse or promote products derived
18 *   from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32/*
33 * Copyright (c) 1986-1991 by Sun Microsystems Inc.
34 */
35
36/* #pragma ident	"@(#)rpc_generic.c	1.17	94/04/24 SMI" */
37#include <sys/cdefs.h>
38__FBSDID("$FreeBSD$");
39
40/*
41 * rpc_generic.c, Miscl routines for RPC.
42 *
43 */
44
45#include "opt_inet6.h"
46
47#include <sys/param.h>
48#include <sys/kernel.h>
49#include <sys/malloc.h>
50#include <sys/mbuf.h>
51#include <sys/module.h>
52#include <sys/proc.h>
53#include <sys/protosw.h>
54#include <sys/sbuf.h>
55#include <sys/systm.h>
56#include <sys/socket.h>
57#include <sys/socketvar.h>
58#include <sys/syslog.h>
59
60#include <net/vnet.h>
61
62#include <rpc/rpc.h>
63#include <rpc/nettype.h>
64#include <rpc/rpcsec_gss.h>
65
66#include <rpc/rpc_com.h>
67
68extern	u_long sb_max_adj;	/* not defined in socketvar.h */
69
70#if __FreeBSD_version < 700000
71#define strrchr rindex
72#endif
73
74/* Provide an entry point hook for the rpcsec_gss module. */
75struct rpc_gss_entries	rpc_gss_entries;
76
77struct handle {
78	NCONF_HANDLE *nhandle;
79	int nflag;		/* Whether NETPATH or NETCONFIG */
80	int nettype;
81};
82
83static const struct _rpcnettype {
84	const char *name;
85	const int type;
86} _rpctypelist[] = {
87	{ "netpath", _RPC_NETPATH },
88	{ "visible", _RPC_VISIBLE },
89	{ "circuit_v", _RPC_CIRCUIT_V },
90	{ "datagram_v", _RPC_DATAGRAM_V },
91	{ "circuit_n", _RPC_CIRCUIT_N },
92	{ "datagram_n", _RPC_DATAGRAM_N },
93	{ "tcp", _RPC_TCP },
94	{ "udp", _RPC_UDP },
95	{ 0, _RPC_NONE }
96};
97
98struct netid_af {
99	const char	*netid;
100	int		af;
101	int		protocol;
102};
103
104static const struct netid_af na_cvt[] = {
105	{ "udp",  AF_INET,  IPPROTO_UDP },
106	{ "tcp",  AF_INET,  IPPROTO_TCP },
107#ifdef INET6
108	{ "udp6", AF_INET6, IPPROTO_UDP },
109	{ "tcp6", AF_INET6, IPPROTO_TCP },
110#endif
111	{ "local", AF_LOCAL, 0 }
112};
113
114struct rpc_createerr rpc_createerr;
115
116/*
117 * Find the appropriate buffer size
118 */
119u_int
120/*ARGSUSED*/
121__rpc_get_t_size(int af, int proto, int size)
122{
123	int defsize;
124
125	switch (proto) {
126	case IPPROTO_TCP:
127		defsize = 64 * 1024;	/* XXX */
128		break;
129	case IPPROTO_UDP:
130		defsize = UDPMSGSIZE;
131		break;
132	default:
133		defsize = RPC_MAXDATASIZE;
134		break;
135	}
136	if (size == 0)
137		return defsize;
138
139	/* Check whether the value is within the upper max limit */
140	return (size > sb_max_adj ? (u_int)sb_max_adj : (u_int)size);
141}
142
143/*
144 * Find the appropriate address buffer size
145 */
146u_int
147__rpc_get_a_size(af)
148	int af;
149{
150	switch (af) {
151	case AF_INET:
152		return sizeof (struct sockaddr_in);
153#ifdef INET6
154	case AF_INET6:
155		return sizeof (struct sockaddr_in6);
156#endif
157	case AF_LOCAL:
158		return sizeof (struct sockaddr_un);
159	default:
160		break;
161	}
162	return ((u_int)RPC_MAXADDRSIZE);
163}
164
165#if 0
166
167/*
168 * Used to ping the NULL procedure for clnt handle.
169 * Returns NULL if fails, else a non-NULL pointer.
170 */
171void *
172rpc_nullproc(clnt)
173	CLIENT *clnt;
174{
175	struct timeval TIMEOUT = {25, 0};
176
177	if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL,
178		(xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) {
179		return (NULL);
180	}
181	return ((void *) clnt);
182}
183
184#endif
185
186int
187__rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip)
188{
189	int type, proto;
190	struct sockaddr *sa;
191	sa_family_t family;
192	struct sockopt opt;
193	int error;
194
195	CURVNET_SET(so->so_vnet);
196	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
197	CURVNET_RESTORE();
198	if (error)
199		return 0;
200
201	sip->si_alen = sa->sa_len;
202	family = sa->sa_family;
203	free(sa, M_SONAME);
204
205	opt.sopt_dir = SOPT_GET;
206	opt.sopt_level = SOL_SOCKET;
207	opt.sopt_name = SO_TYPE;
208	opt.sopt_val = &type;
209	opt.sopt_valsize = sizeof type;
210	opt.sopt_td = NULL;
211	error = sogetopt(so, &opt);
212	if (error)
213		return 0;
214
215	/* XXX */
216	if (family != AF_LOCAL) {
217		if (type == SOCK_STREAM)
218			proto = IPPROTO_TCP;
219		else if (type == SOCK_DGRAM)
220			proto = IPPROTO_UDP;
221		else
222			return 0;
223	} else
224		proto = 0;
225
226	sip->si_af = family;
227	sip->si_proto = proto;
228	sip->si_socktype = type;
229
230	return 1;
231}
232
233/*
234 * Linear search, but the number of entries is small.
235 */
236int
237__rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip)
238{
239	int i;
240
241	for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++)
242		if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || (
243		    strcmp(nconf->nc_netid, "unix") == 0 &&
244		    strcmp(na_cvt[i].netid, "local") == 0)) {
245			sip->si_af = na_cvt[i].af;
246			sip->si_proto = na_cvt[i].protocol;
247			sip->si_socktype =
248			    __rpc_seman2socktype((int)nconf->nc_semantics);
249			if (sip->si_socktype == -1)
250				return 0;
251			sip->si_alen = __rpc_get_a_size(sip->si_af);
252			return 1;
253		}
254
255	return 0;
256}
257
258struct socket *
259__rpc_nconf2socket(const struct netconfig *nconf)
260{
261	struct __rpc_sockinfo si;
262	struct socket *so;
263	int error;
264
265	if (!__rpc_nconf2sockinfo(nconf, &si))
266		return 0;
267
268	so = NULL;
269	error =  socreate(si.si_af, &so, si.si_socktype, si.si_proto,
270	    curthread->td_ucred, curthread);
271
272	if (error)
273		return NULL;
274	else
275		return so;
276}
277
278char *
279taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf)
280{
281	struct __rpc_sockinfo si;
282
283	if (!__rpc_nconf2sockinfo(nconf, &si))
284		return NULL;
285	return __rpc_taddr2uaddr_af(si.si_af, nbuf);
286}
287
288struct netbuf *
289uaddr2taddr(const struct netconfig *nconf, const char *uaddr)
290{
291	struct __rpc_sockinfo si;
292
293	if (!__rpc_nconf2sockinfo(nconf, &si))
294		return NULL;
295	return __rpc_uaddr2taddr_af(si.si_af, uaddr);
296}
297
298char *
299__rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf)
300{
301	char *ret;
302	struct sbuf sb;
303	struct sockaddr_in *sin;
304	struct sockaddr_un *sun;
305	char namebuf[INET_ADDRSTRLEN];
306#ifdef INET6
307	struct sockaddr_in6 *sin6;
308	char namebuf6[INET6_ADDRSTRLEN];
309#endif
310	u_int16_t port;
311
312	sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND);
313
314	switch (af) {
315	case AF_INET:
316		if (nbuf->len < sizeof(*sin))
317			return NULL;
318		sin = nbuf->buf;
319		if (inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf)
320		    == NULL)
321			return NULL;
322		port = ntohs(sin->sin_port);
323		if (sbuf_printf(&sb, "%s.%u.%u", namebuf,
324			((uint32_t)port) >> 8,
325			port & 0xff) < 0)
326			return NULL;
327		break;
328#ifdef INET6
329	case AF_INET6:
330		if (nbuf->len < sizeof(*sin6))
331			return NULL;
332		sin6 = nbuf->buf;
333		if (inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6)
334		    == NULL)
335			return NULL;
336		port = ntohs(sin6->sin6_port);
337		if (sbuf_printf(&sb, "%s.%u.%u", namebuf6,
338			((uint32_t)port) >> 8,
339			port & 0xff) < 0)
340			return NULL;
341		break;
342#endif
343	case AF_LOCAL:
344		sun = nbuf->buf;
345		if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len -
346			    offsetof(struct sockaddr_un, sun_path)),
347			sun->sun_path) < 0)
348			return (NULL);
349		break;
350	default:
351		return NULL;
352	}
353
354	sbuf_finish(&sb);
355	ret = strdup(sbuf_data(&sb), M_RPC);
356	sbuf_delete(&sb);
357
358	return ret;
359}
360
361struct netbuf *
362__rpc_uaddr2taddr_af(int af, const char *uaddr)
363{
364	struct netbuf *ret = NULL;
365	char *addrstr, *p;
366	unsigned port, portlo, porthi;
367	struct sockaddr_in *sin;
368#ifdef INET6
369	struct sockaddr_in6 *sin6;
370#endif
371	struct sockaddr_un *sun;
372
373	port = 0;
374	sin = NULL;
375
376	if (uaddr == NULL)
377		return NULL;
378
379	addrstr = strdup(uaddr, M_RPC);
380	if (addrstr == NULL)
381		return NULL;
382
383	/*
384	 * AF_LOCAL addresses are expected to be absolute
385	 * pathnames, anything else will be AF_INET or AF_INET6.
386	 */
387	if (*addrstr != '/') {
388		p = strrchr(addrstr, '.');
389		if (p == NULL)
390			goto out;
391		portlo = (unsigned)strtol(p + 1, NULL, 10);
392		*p = '\0';
393
394		p = strrchr(addrstr, '.');
395		if (p == NULL)
396			goto out;
397		porthi = (unsigned)strtol(p + 1, NULL, 10);
398		*p = '\0';
399		port = (porthi << 8) | portlo;
400	}
401
402	ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK);
403
404	switch (af) {
405	case AF_INET:
406		sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC,
407		    M_WAITOK);
408		memset(sin, 0, sizeof *sin);
409		sin->sin_family = AF_INET;
410		sin->sin_port = htons(port);
411		if (inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) {
412			free(sin, M_RPC);
413			free(ret, M_RPC);
414			ret = NULL;
415			goto out;
416		}
417		sin->sin_len = ret->maxlen = ret->len = sizeof *sin;
418		ret->buf = sin;
419		break;
420#ifdef INET6
421	case AF_INET6:
422		sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC,
423		    M_WAITOK);
424		memset(sin6, 0, sizeof *sin6);
425		sin6->sin6_family = AF_INET6;
426		sin6->sin6_port = htons(port);
427		if (inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) {
428			free(sin6, M_RPC);
429			free(ret, M_RPC);
430			ret = NULL;
431			goto out;
432		}
433		sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6;
434		ret->buf = sin6;
435		break;
436#endif
437	case AF_LOCAL:
438		sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC,
439		    M_WAITOK);
440		memset(sun, 0, sizeof *sun);
441		sun->sun_family = AF_LOCAL;
442		strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1);
443		ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun);
444		ret->buf = sun;
445		break;
446	default:
447		break;
448	}
449out:
450	free(addrstr, M_RPC);
451	return ret;
452}
453
454int
455__rpc_seman2socktype(int semantics)
456{
457	switch (semantics) {
458	case NC_TPI_CLTS:
459		return SOCK_DGRAM;
460	case NC_TPI_COTS_ORD:
461		return SOCK_STREAM;
462	case NC_TPI_RAW:
463		return SOCK_RAW;
464	default:
465		break;
466	}
467
468	return -1;
469}
470
471int
472__rpc_socktype2seman(int socktype)
473{
474	switch (socktype) {
475	case SOCK_DGRAM:
476		return NC_TPI_CLTS;
477	case SOCK_STREAM:
478		return NC_TPI_COTS_ORD;
479	case SOCK_RAW:
480		return NC_TPI_RAW;
481	default:
482		break;
483	}
484
485	return -1;
486}
487
488/*
489 * Returns the type of the network as defined in <rpc/nettype.h>
490 * If nettype is NULL, it defaults to NETPATH.
491 */
492static int
493getnettype(const char *nettype)
494{
495	int i;
496
497	if ((nettype == NULL) || (nettype[0] == 0)) {
498		return (_RPC_NETPATH);	/* Default */
499	}
500
501#if 0
502	nettype = strlocase(nettype);
503#endif
504	for (i = 0; _rpctypelist[i].name; i++)
505		if (strcasecmp(nettype, _rpctypelist[i].name) == 0) {
506			return (_rpctypelist[i].type);
507		}
508	return (_rpctypelist[i].type);
509}
510
511/*
512 * For the given nettype (tcp or udp only), return the first structure found.
513 * This should be freed by calling freenetconfigent()
514 */
515struct netconfig *
516__rpc_getconfip(const char *nettype)
517{
518	char *netid;
519	static char *netid_tcp = (char *) NULL;
520	static char *netid_udp = (char *) NULL;
521	struct netconfig *dummy;
522
523	if (!netid_udp && !netid_tcp) {
524		struct netconfig *nconf;
525		void *confighandle;
526
527		if (!(confighandle = setnetconfig())) {
528			log(LOG_ERR, "rpc: failed to open " NETCONFIG);
529			return (NULL);
530		}
531		while ((nconf = getnetconfig(confighandle)) != NULL) {
532			if (strcmp(nconf->nc_protofmly, NC_INET) == 0) {
533				if (strcmp(nconf->nc_proto, NC_TCP) == 0) {
534					netid_tcp = strdup(nconf->nc_netid,
535					    M_RPC);
536				} else
537				if (strcmp(nconf->nc_proto, NC_UDP) == 0) {
538					netid_udp = strdup(nconf->nc_netid,
539					    M_RPC);
540				}
541			}
542		}
543		endnetconfig(confighandle);
544	}
545	if (strcmp(nettype, "udp") == 0)
546		netid = netid_udp;
547	else if (strcmp(nettype, "tcp") == 0)
548		netid = netid_tcp;
549	else {
550		return (NULL);
551	}
552	if ((netid == NULL) || (netid[0] == 0)) {
553		return (NULL);
554	}
555	dummy = getnetconfigent(netid);
556	return (dummy);
557}
558
559/*
560 * Returns the type of the nettype, which should then be used with
561 * __rpc_getconf().
562 *
563 * For simplicity in the kernel, we don't support the NETPATH
564 * environment variable. We behave as userland would then NETPATH is
565 * unset, i.e. iterate over all visible entries in netconfig.
566 */
567void *
568__rpc_setconf(nettype)
569	const char *nettype;
570{
571	struct handle *handle;
572
573	handle = (struct handle *) malloc(sizeof (struct handle),
574	    M_RPC, M_WAITOK);
575	switch (handle->nettype = getnettype(nettype)) {
576	case _RPC_NETPATH:
577	case _RPC_CIRCUIT_N:
578	case _RPC_DATAGRAM_N:
579		if (!(handle->nhandle = setnetconfig()))
580			goto failed;
581		handle->nflag = TRUE;
582		break;
583	case _RPC_VISIBLE:
584	case _RPC_CIRCUIT_V:
585	case _RPC_DATAGRAM_V:
586	case _RPC_TCP:
587	case _RPC_UDP:
588		if (!(handle->nhandle = setnetconfig())) {
589		        log(LOG_ERR, "rpc: failed to open " NETCONFIG);
590			goto failed;
591		}
592		handle->nflag = FALSE;
593		break;
594	default:
595		goto failed;
596	}
597
598	return (handle);
599
600failed:
601	free(handle, M_RPC);
602	return (NULL);
603}
604
605/*
606 * Returns the next netconfig struct for the given "net" type.
607 * __rpc_setconf() should have been called previously.
608 */
609struct netconfig *
610__rpc_getconf(void *vhandle)
611{
612	struct handle *handle;
613	struct netconfig *nconf;
614
615	handle = (struct handle *)vhandle;
616	if (handle == NULL) {
617		return (NULL);
618	}
619	for (;;) {
620		if (handle->nflag) {
621			nconf = getnetconfig(handle->nhandle);
622			if (nconf && !(nconf->nc_flag & NC_VISIBLE))
623				continue;
624		} else {
625			nconf = getnetconfig(handle->nhandle);
626		}
627		if (nconf == NULL)
628			break;
629		if ((nconf->nc_semantics != NC_TPI_CLTS) &&
630			(nconf->nc_semantics != NC_TPI_COTS) &&
631			(nconf->nc_semantics != NC_TPI_COTS_ORD))
632			continue;
633		switch (handle->nettype) {
634		case _RPC_VISIBLE:
635			if (!(nconf->nc_flag & NC_VISIBLE))
636				continue;
637			/* FALLTHROUGH */
638		case _RPC_NETPATH:	/* Be happy */
639			break;
640		case _RPC_CIRCUIT_V:
641			if (!(nconf->nc_flag & NC_VISIBLE))
642				continue;
643			/* FALLTHROUGH */
644		case _RPC_CIRCUIT_N:
645			if ((nconf->nc_semantics != NC_TPI_COTS) &&
646				(nconf->nc_semantics != NC_TPI_COTS_ORD))
647				continue;
648			break;
649		case _RPC_DATAGRAM_V:
650			if (!(nconf->nc_flag & NC_VISIBLE))
651				continue;
652			/* FALLTHROUGH */
653		case _RPC_DATAGRAM_N:
654			if (nconf->nc_semantics != NC_TPI_CLTS)
655				continue;
656			break;
657		case _RPC_TCP:
658			if (((nconf->nc_semantics != NC_TPI_COTS) &&
659				(nconf->nc_semantics != NC_TPI_COTS_ORD)) ||
660				(strcmp(nconf->nc_protofmly, NC_INET)
661#ifdef INET6
662				 && strcmp(nconf->nc_protofmly, NC_INET6))
663#else
664				)
665#endif
666				||
667				strcmp(nconf->nc_proto, NC_TCP))
668				continue;
669			break;
670		case _RPC_UDP:
671			if ((nconf->nc_semantics != NC_TPI_CLTS) ||
672				(strcmp(nconf->nc_protofmly, NC_INET)
673#ifdef INET6
674				&& strcmp(nconf->nc_protofmly, NC_INET6))
675#else
676				)
677#endif
678				||
679				strcmp(nconf->nc_proto, NC_UDP))
680				continue;
681			break;
682		}
683		break;
684	}
685	return (nconf);
686}
687
688void
689__rpc_endconf(vhandle)
690	void * vhandle;
691{
692	struct handle *handle;
693
694	handle = (struct handle *) vhandle;
695	if (handle == NULL) {
696		return;
697	}
698	endnetconfig(handle->nhandle);
699	free(handle, M_RPC);
700}
701
702int
703__rpc_sockisbound(struct socket *so)
704{
705	struct sockaddr *sa;
706	int error, bound;
707
708	CURVNET_SET(so->so_vnet);
709	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
710	CURVNET_RESTORE();
711	if (error)
712		return (0);
713
714	switch (sa->sa_family) {
715		case AF_INET:
716			bound = (((struct sockaddr_in *) sa)->sin_port != 0);
717			break;
718#ifdef INET6
719		case AF_INET6:
720			bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0);
721			break;
722#endif
723		case AF_LOCAL:
724			/* XXX check this */
725			bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0');
726			break;
727		default:
728			bound = FALSE;
729			break;
730	}
731
732	free(sa, M_SONAME);
733
734	return bound;
735}
736
737/*
738 * Implement XDR-style API for RPC call.
739 */
740enum clnt_stat
741clnt_call_private(
742	CLIENT		*cl,		/* client handle */
743	struct rpc_callextra *ext,	/* call metadata */
744	rpcproc_t	proc,		/* procedure number */
745	xdrproc_t	xargs,		/* xdr routine for args */
746	void		*argsp,		/* pointer to args */
747	xdrproc_t	xresults,	/* xdr routine for results */
748	void		*resultsp,	/* pointer to results */
749	struct timeval	utimeout)	/* seconds to wait before giving up */
750{
751	XDR xdrs;
752	struct mbuf *mreq;
753	struct mbuf *mrep;
754	enum clnt_stat stat;
755
756	mreq = m_getcl(M_WAITOK, MT_DATA, 0);
757
758	xdrmbuf_create(&xdrs, mreq, XDR_ENCODE);
759	if (!xargs(&xdrs, argsp)) {
760		m_freem(mreq);
761		return (RPC_CANTENCODEARGS);
762	}
763	XDR_DESTROY(&xdrs);
764
765	stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout);
766	m_freem(mreq);
767
768	if (stat == RPC_SUCCESS) {
769		xdrmbuf_create(&xdrs, mrep, XDR_DECODE);
770		if (!xresults(&xdrs, resultsp)) {
771			XDR_DESTROY(&xdrs);
772			return (RPC_CANTDECODERES);
773		}
774		XDR_DESTROY(&xdrs);
775	}
776
777	return (stat);
778}
779
780/*
781 * Bind a socket to a privileged IP port
782 */
783int
784bindresvport(struct socket *so, struct sockaddr *sa)
785{
786	int old, error, af;
787	bool_t freesa = FALSE;
788	struct sockaddr_in *sin;
789#ifdef INET6
790	struct sockaddr_in6 *sin6;
791#endif
792	struct sockopt opt;
793	int proto, portrange, portlow;
794	u_int16_t *portp;
795	socklen_t salen;
796
797	if (sa == NULL) {
798		CURVNET_SET(so->so_vnet);
799		error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
800		CURVNET_RESTORE();
801		if (error)
802			return (error);
803		freesa = TRUE;
804		af = sa->sa_family;
805		salen = sa->sa_len;
806		memset(sa, 0, sa->sa_len);
807	} else {
808		af = sa->sa_family;
809		salen = sa->sa_len;
810	}
811
812	switch (af) {
813	case AF_INET:
814		proto = IPPROTO_IP;
815		portrange = IP_PORTRANGE;
816		portlow = IP_PORTRANGE_LOW;
817		sin = (struct sockaddr_in *)sa;
818		portp = &sin->sin_port;
819		break;
820#ifdef INET6
821	case AF_INET6:
822		proto = IPPROTO_IPV6;
823		portrange = IPV6_PORTRANGE;
824		portlow = IPV6_PORTRANGE_LOW;
825		sin6 = (struct sockaddr_in6 *)sa;
826		portp = &sin6->sin6_port;
827		break;
828#endif
829	default:
830		return (EPFNOSUPPORT);
831	}
832
833	sa->sa_family = af;
834	sa->sa_len = salen;
835
836	if (*portp == 0) {
837		bzero(&opt, sizeof(opt));
838		opt.sopt_dir = SOPT_GET;
839		opt.sopt_level = proto;
840		opt.sopt_name = portrange;
841		opt.sopt_val = &old;
842		opt.sopt_valsize = sizeof(old);
843		error = sogetopt(so, &opt);
844		if (error) {
845			goto out;
846		}
847
848		opt.sopt_dir = SOPT_SET;
849		opt.sopt_val = &portlow;
850		error = sosetopt(so, &opt);
851		if (error)
852			goto out;
853	}
854
855	error = sobind(so, sa, curthread);
856
857	if (*portp == 0) {
858		if (error) {
859			opt.sopt_dir = SOPT_SET;
860			opt.sopt_val = &old;
861			sosetopt(so, &opt);
862		}
863	}
864out:
865	if (freesa)
866		free(sa, M_SONAME);
867
868	return (error);
869}
870
871/*
872 * Kernel module glue
873 */
874static int
875krpc_modevent(module_t mod, int type, void *data)
876{
877
878	return (0);
879}
880static moduledata_t krpc_mod = {
881	"krpc",
882	krpc_modevent,
883	NULL,
884};
885DECLARE_MODULE(krpc, krpc_mod, SI_SUB_VFS, SI_ORDER_ANY);
886
887/* So that loader and kldload(2) can find us, wherever we are.. */
888MODULE_VERSION(krpc, 1);
889MODULE_DEPEND(krpc, xdr, 1, 1, 1);
890