rpc_generic.c revision 184588
1/*	$NetBSD: rpc_generic.c,v 1.4 2000/09/28 09:07:04 kleink Exp $	*/
2
3/*
4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 * unrestricted use provided that this legend is included on all tape
6 * media and as a part of the software program in whole or part.  Users
7 * may copy or modify Sun RPC without charge, but are not authorized
8 * to license or distribute it to anyone else except as part of a product or
9 * program developed by the user.
10 *
11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 *
15 * Sun RPC is provided with no support and without any obligation on the
16 * part of Sun Microsystems, Inc. to assist in its use, correction,
17 * modification or enhancement.
18 *
19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 * OR ANY PART THEREOF.
22 *
23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 * or profits or other special, indirect and consequential damages, even if
25 * Sun has been advised of the possibility of such damages.
26 *
27 * Sun Microsystems, Inc.
28 * 2550 Garcia Avenue
29 * Mountain View, California  94043
30 */
31/*
32 * Copyright (c) 1986-1991 by Sun Microsystems Inc.
33 */
34
35/* #pragma ident	"@(#)rpc_generic.c	1.17	94/04/24 SMI" */
36#include <sys/cdefs.h>
37__FBSDID("$FreeBSD: head/sys/rpc/rpc_generic.c 184588 2008-11-03 10:38:00Z dfr $");
38
39/*
40 * rpc_generic.c, Miscl routines for RPC.
41 *
42 */
43
44#include "opt_inet6.h"
45
46#include <sys/param.h>
47#include <sys/kernel.h>
48#include <sys/malloc.h>
49#include <sys/mbuf.h>
50#include <sys/module.h>
51#include <sys/proc.h>
52#include <sys/protosw.h>
53#include <sys/sbuf.h>
54#include <sys/systm.h>
55#include <sys/socket.h>
56#include <sys/socketvar.h>
57#include <sys/syslog.h>
58
59#include <rpc/rpc.h>
60#include <rpc/nettype.h>
61
62#include <rpc/rpc_com.h>
63
64#if __FreeBSD_version < 700000
65#define strrchr rindex
66#endif
67
68struct handle {
69	NCONF_HANDLE *nhandle;
70	int nflag;		/* Whether NETPATH or NETCONFIG */
71	int nettype;
72};
73
74static const struct _rpcnettype {
75	const char *name;
76	const int type;
77} _rpctypelist[] = {
78	{ "netpath", _RPC_NETPATH },
79	{ "visible", _RPC_VISIBLE },
80	{ "circuit_v", _RPC_CIRCUIT_V },
81	{ "datagram_v", _RPC_DATAGRAM_V },
82	{ "circuit_n", _RPC_CIRCUIT_N },
83	{ "datagram_n", _RPC_DATAGRAM_N },
84	{ "tcp", _RPC_TCP },
85	{ "udp", _RPC_UDP },
86	{ 0, _RPC_NONE }
87};
88
89struct netid_af {
90	const char	*netid;
91	int		af;
92	int		protocol;
93};
94
95static const struct netid_af na_cvt[] = {
96	{ "udp",  AF_INET,  IPPROTO_UDP },
97	{ "tcp",  AF_INET,  IPPROTO_TCP },
98#ifdef INET6
99	{ "udp6", AF_INET6, IPPROTO_UDP },
100	{ "tcp6", AF_INET6, IPPROTO_TCP },
101#endif
102	{ "local", AF_LOCAL, 0 }
103};
104
105struct rpc_createerr rpc_createerr;
106
107/*
108 * Find the appropriate buffer size
109 */
110u_int
111/*ARGSUSED*/
112__rpc_get_t_size(int af, int proto, int size)
113{
114	int maxsize, defsize;
115
116	maxsize = 256 * 1024;	/* XXX */
117	switch (proto) {
118	case IPPROTO_TCP:
119		defsize = 64 * 1024;	/* XXX */
120		break;
121	case IPPROTO_UDP:
122		defsize = UDPMSGSIZE;
123		break;
124	default:
125		defsize = RPC_MAXDATASIZE;
126		break;
127	}
128	if (size == 0)
129		return defsize;
130
131	/* Check whether the value is within the upper max limit */
132	return (size > maxsize ? (u_int)maxsize : (u_int)size);
133}
134
135/*
136 * Find the appropriate address buffer size
137 */
138u_int
139__rpc_get_a_size(af)
140	int af;
141{
142	switch (af) {
143	case AF_INET:
144		return sizeof (struct sockaddr_in);
145#ifdef INET6
146	case AF_INET6:
147		return sizeof (struct sockaddr_in6);
148#endif
149	case AF_LOCAL:
150		return sizeof (struct sockaddr_un);
151	default:
152		break;
153	}
154	return ((u_int)RPC_MAXADDRSIZE);
155}
156
157#if 0
158
159/*
160 * Used to ping the NULL procedure for clnt handle.
161 * Returns NULL if fails, else a non-NULL pointer.
162 */
163void *
164rpc_nullproc(clnt)
165	CLIENT *clnt;
166{
167	struct timeval TIMEOUT = {25, 0};
168
169	if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL,
170		(xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) {
171		return (NULL);
172	}
173	return ((void *) clnt);
174}
175
176#endif
177
178int
179__rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip)
180{
181	int type, proto;
182	struct sockaddr *sa;
183	sa_family_t family;
184	struct sockopt opt;
185	int error;
186
187	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
188	if (error)
189		return 0;
190
191	sip->si_alen = sa->sa_len;
192	family = sa->sa_family;
193	free(sa, M_SONAME);
194
195	opt.sopt_dir = SOPT_GET;
196	opt.sopt_level = SOL_SOCKET;
197	opt.sopt_name = SO_TYPE;
198	opt.sopt_val = &type;
199	opt.sopt_valsize = sizeof type;
200	opt.sopt_td = NULL;
201	error = sogetopt(so, &opt);
202	if (error)
203		return 0;
204
205	/* XXX */
206	if (family != AF_LOCAL) {
207		if (type == SOCK_STREAM)
208			proto = IPPROTO_TCP;
209		else if (type == SOCK_DGRAM)
210			proto = IPPROTO_UDP;
211		else
212			return 0;
213	} else
214		proto = 0;
215
216	sip->si_af = family;
217	sip->si_proto = proto;
218	sip->si_socktype = type;
219
220	return 1;
221}
222
223/*
224 * Linear search, but the number of entries is small.
225 */
226int
227__rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip)
228{
229	int i;
230
231	for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++)
232		if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || (
233		    strcmp(nconf->nc_netid, "unix") == 0 &&
234		    strcmp(na_cvt[i].netid, "local") == 0)) {
235			sip->si_af = na_cvt[i].af;
236			sip->si_proto = na_cvt[i].protocol;
237			sip->si_socktype =
238			    __rpc_seman2socktype((int)nconf->nc_semantics);
239			if (sip->si_socktype == -1)
240				return 0;
241			sip->si_alen = __rpc_get_a_size(sip->si_af);
242			return 1;
243		}
244
245	return 0;
246}
247
248struct socket *
249__rpc_nconf2socket(const struct netconfig *nconf)
250{
251	struct __rpc_sockinfo si;
252	struct socket *so;
253	int error;
254
255	if (!__rpc_nconf2sockinfo(nconf, &si))
256		return 0;
257
258	so = NULL;
259	error =  socreate(si.si_af, &so, si.si_socktype, si.si_proto,
260	    curthread->td_ucred, curthread);
261
262	if (error)
263		return NULL;
264	else
265		return so;
266}
267
268char *
269taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf)
270{
271	struct __rpc_sockinfo si;
272
273	if (!__rpc_nconf2sockinfo(nconf, &si))
274		return NULL;
275	return __rpc_taddr2uaddr_af(si.si_af, nbuf);
276}
277
278struct netbuf *
279uaddr2taddr(const struct netconfig *nconf, const char *uaddr)
280{
281	struct __rpc_sockinfo si;
282
283	if (!__rpc_nconf2sockinfo(nconf, &si))
284		return NULL;
285	return __rpc_uaddr2taddr_af(si.si_af, uaddr);
286}
287
288char *
289__rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf)
290{
291	char *ret;
292	struct sbuf sb;
293	struct sockaddr_in *sin;
294	struct sockaddr_un *sun;
295	char namebuf[INET_ADDRSTRLEN];
296#ifdef INET6
297	struct sockaddr_in6 *sin6;
298	char namebuf6[INET6_ADDRSTRLEN];
299#endif
300	u_int16_t port;
301
302	sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND);
303
304	switch (af) {
305	case AF_INET:
306		sin = nbuf->buf;
307		if (__rpc_inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf)
308		    == NULL)
309			return NULL;
310		port = ntohs(sin->sin_port);
311		if (sbuf_printf(&sb, "%s.%u.%u", namebuf,
312			((uint32_t)port) >> 8,
313			port & 0xff) < 0)
314			return NULL;
315		break;
316#ifdef INET6
317	case AF_INET6:
318		sin6 = nbuf->buf;
319		if (__rpc_inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6)
320		    == NULL)
321			return NULL;
322		port = ntohs(sin6->sin6_port);
323		if (sbuf_printf(&sb, "%s.%u.%u", namebuf6,
324			((uint32_t)port) >> 8,
325			port & 0xff) < 0)
326			return NULL;
327		break;
328#endif
329	case AF_LOCAL:
330		sun = nbuf->buf;
331		if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len -
332			    offsetof(struct sockaddr_un, sun_path)),
333			sun->sun_path) < 0)
334			return (NULL);
335		break;
336	default:
337		return NULL;
338	}
339
340	sbuf_finish(&sb);
341	ret = strdup(sbuf_data(&sb), M_RPC);
342	sbuf_delete(&sb);
343
344	return ret;
345}
346
347struct netbuf *
348__rpc_uaddr2taddr_af(int af, const char *uaddr)
349{
350	struct netbuf *ret = NULL;
351	char *addrstr, *p;
352	unsigned port, portlo, porthi;
353	struct sockaddr_in *sin;
354#ifdef INET6
355	struct sockaddr_in6 *sin6;
356#endif
357	struct sockaddr_un *sun;
358
359	port = 0;
360	sin = NULL;
361	addrstr = strdup(uaddr, M_RPC);
362	if (addrstr == NULL)
363		return NULL;
364
365	/*
366	 * AF_LOCAL addresses are expected to be absolute
367	 * pathnames, anything else will be AF_INET or AF_INET6.
368	 */
369	if (*addrstr != '/') {
370		p = strrchr(addrstr, '.');
371		if (p == NULL)
372			goto out;
373		portlo = (unsigned)strtol(p + 1, NULL, 10);
374		*p = '\0';
375
376		p = strrchr(addrstr, '.');
377		if (p == NULL)
378			goto out;
379		porthi = (unsigned)strtol(p + 1, NULL, 10);
380		*p = '\0';
381		port = (porthi << 8) | portlo;
382	}
383
384	ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK);
385	if (ret == NULL)
386		goto out;
387
388	switch (af) {
389	case AF_INET:
390		sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC,
391		    M_WAITOK);
392		if (sin == NULL)
393			goto out;
394		memset(sin, 0, sizeof *sin);
395		sin->sin_family = AF_INET;
396		sin->sin_port = htons(port);
397		if (__rpc_inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) {
398			free(sin, M_RPC);
399			free(ret, M_RPC);
400			ret = NULL;
401			goto out;
402		}
403		sin->sin_len = ret->maxlen = ret->len = sizeof *sin;
404		ret->buf = sin;
405		break;
406#ifdef INET6
407	case AF_INET6:
408		sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC,
409		    M_WAITOK);
410		if (sin6 == NULL)
411			goto out;
412		memset(sin6, 0, sizeof *sin6);
413		sin6->sin6_family = AF_INET6;
414		sin6->sin6_port = htons(port);
415		if (__rpc_inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) {
416			free(sin6, M_RPC);
417			free(ret, M_RPC);
418			ret = NULL;
419			goto out;
420		}
421		sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6;
422		ret->buf = sin6;
423		break;
424#endif
425	case AF_LOCAL:
426		sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC,
427		    M_WAITOK);
428		if (sun == NULL)
429			goto out;
430		memset(sun, 0, sizeof *sun);
431		sun->sun_family = AF_LOCAL;
432		strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1);
433		ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun);
434		ret->buf = sun;
435		break;
436	default:
437		break;
438	}
439out:
440	free(addrstr, M_RPC);
441	return ret;
442}
443
444int
445__rpc_seman2socktype(int semantics)
446{
447	switch (semantics) {
448	case NC_TPI_CLTS:
449		return SOCK_DGRAM;
450	case NC_TPI_COTS_ORD:
451		return SOCK_STREAM;
452	case NC_TPI_RAW:
453		return SOCK_RAW;
454	default:
455		break;
456	}
457
458	return -1;
459}
460
461int
462__rpc_socktype2seman(int socktype)
463{
464	switch (socktype) {
465	case SOCK_DGRAM:
466		return NC_TPI_CLTS;
467	case SOCK_STREAM:
468		return NC_TPI_COTS_ORD;
469	case SOCK_RAW:
470		return NC_TPI_RAW;
471	default:
472		break;
473	}
474
475	return -1;
476}
477
478/*
479 * Returns the type of the network as defined in <rpc/nettype.h>
480 * If nettype is NULL, it defaults to NETPATH.
481 */
482static int
483getnettype(const char *nettype)
484{
485	int i;
486
487	if ((nettype == NULL) || (nettype[0] == 0)) {
488		return (_RPC_NETPATH);	/* Default */
489	}
490
491#if 0
492	nettype = strlocase(nettype);
493#endif
494	for (i = 0; _rpctypelist[i].name; i++)
495		if (strcasecmp(nettype, _rpctypelist[i].name) == 0) {
496			return (_rpctypelist[i].type);
497		}
498	return (_rpctypelist[i].type);
499}
500
501/*
502 * For the given nettype (tcp or udp only), return the first structure found.
503 * This should be freed by calling freenetconfigent()
504 */
505struct netconfig *
506__rpc_getconfip(const char *nettype)
507{
508	char *netid;
509	static char *netid_tcp = (char *) NULL;
510	static char *netid_udp = (char *) NULL;
511	struct netconfig *dummy;
512
513	if (!netid_udp && !netid_tcp) {
514		struct netconfig *nconf;
515		void *confighandle;
516
517		if (!(confighandle = setnetconfig())) {
518			log(LOG_ERR, "rpc: failed to open " NETCONFIG);
519			return (NULL);
520		}
521		while ((nconf = getnetconfig(confighandle)) != NULL) {
522			if (strcmp(nconf->nc_protofmly, NC_INET) == 0) {
523				if (strcmp(nconf->nc_proto, NC_TCP) == 0) {
524					netid_tcp = strdup(nconf->nc_netid,
525					    M_RPC);
526				} else
527				if (strcmp(nconf->nc_proto, NC_UDP) == 0) {
528					netid_udp = strdup(nconf->nc_netid,
529					    M_RPC);
530				}
531			}
532		}
533		endnetconfig(confighandle);
534	}
535	if (strcmp(nettype, "udp") == 0)
536		netid = netid_udp;
537	else if (strcmp(nettype, "tcp") == 0)
538		netid = netid_tcp;
539	else {
540		return (NULL);
541	}
542	if ((netid == NULL) || (netid[0] == 0)) {
543		return (NULL);
544	}
545	dummy = getnetconfigent(netid);
546	return (dummy);
547}
548
549/*
550 * Returns the type of the nettype, which should then be used with
551 * __rpc_getconf().
552 *
553 * For simplicity in the kernel, we don't support the NETPATH
554 * environment variable. We behave as userland would then NETPATH is
555 * unset, i.e. iterate over all visible entries in netconfig.
556 */
557void *
558__rpc_setconf(nettype)
559	const char *nettype;
560{
561	struct handle *handle;
562
563	handle = (struct handle *) malloc(sizeof (struct handle),
564	    M_RPC, M_WAITOK);
565	switch (handle->nettype = getnettype(nettype)) {
566	case _RPC_NETPATH:
567	case _RPC_CIRCUIT_N:
568	case _RPC_DATAGRAM_N:
569		if (!(handle->nhandle = setnetconfig()))
570			goto failed;
571		handle->nflag = TRUE;
572		break;
573	case _RPC_VISIBLE:
574	case _RPC_CIRCUIT_V:
575	case _RPC_DATAGRAM_V:
576	case _RPC_TCP:
577	case _RPC_UDP:
578		if (!(handle->nhandle = setnetconfig())) {
579		        log(LOG_ERR, "rpc: failed to open " NETCONFIG);
580			goto failed;
581		}
582		handle->nflag = FALSE;
583		break;
584	default:
585		goto failed;
586	}
587
588	return (handle);
589
590failed:
591	free(handle, M_RPC);
592	return (NULL);
593}
594
595/*
596 * Returns the next netconfig struct for the given "net" type.
597 * __rpc_setconf() should have been called previously.
598 */
599struct netconfig *
600__rpc_getconf(void *vhandle)
601{
602	struct handle *handle;
603	struct netconfig *nconf;
604
605	handle = (struct handle *)vhandle;
606	if (handle == NULL) {
607		return (NULL);
608	}
609	for (;;) {
610		if (handle->nflag) {
611			nconf = getnetconfig(handle->nhandle);
612			if (nconf && !(nconf->nc_flag & NC_VISIBLE))
613				continue;
614		} else {
615			nconf = getnetconfig(handle->nhandle);
616		}
617		if (nconf == NULL)
618			break;
619		if ((nconf->nc_semantics != NC_TPI_CLTS) &&
620			(nconf->nc_semantics != NC_TPI_COTS) &&
621			(nconf->nc_semantics != NC_TPI_COTS_ORD))
622			continue;
623		switch (handle->nettype) {
624		case _RPC_VISIBLE:
625			if (!(nconf->nc_flag & NC_VISIBLE))
626				continue;
627			/* FALLTHROUGH */
628		case _RPC_NETPATH:	/* Be happy */
629			break;
630		case _RPC_CIRCUIT_V:
631			if (!(nconf->nc_flag & NC_VISIBLE))
632				continue;
633			/* FALLTHROUGH */
634		case _RPC_CIRCUIT_N:
635			if ((nconf->nc_semantics != NC_TPI_COTS) &&
636				(nconf->nc_semantics != NC_TPI_COTS_ORD))
637				continue;
638			break;
639		case _RPC_DATAGRAM_V:
640			if (!(nconf->nc_flag & NC_VISIBLE))
641				continue;
642			/* FALLTHROUGH */
643		case _RPC_DATAGRAM_N:
644			if (nconf->nc_semantics != NC_TPI_CLTS)
645				continue;
646			break;
647		case _RPC_TCP:
648			if (((nconf->nc_semantics != NC_TPI_COTS) &&
649				(nconf->nc_semantics != NC_TPI_COTS_ORD)) ||
650				(strcmp(nconf->nc_protofmly, NC_INET)
651#ifdef INET6
652				 && strcmp(nconf->nc_protofmly, NC_INET6))
653#else
654				)
655#endif
656				||
657				strcmp(nconf->nc_proto, NC_TCP))
658				continue;
659			break;
660		case _RPC_UDP:
661			if ((nconf->nc_semantics != NC_TPI_CLTS) ||
662				(strcmp(nconf->nc_protofmly, NC_INET)
663#ifdef INET6
664				&& strcmp(nconf->nc_protofmly, NC_INET6))
665#else
666				)
667#endif
668				||
669				strcmp(nconf->nc_proto, NC_UDP))
670				continue;
671			break;
672		}
673		break;
674	}
675	return (nconf);
676}
677
678void
679__rpc_endconf(vhandle)
680	void * vhandle;
681{
682	struct handle *handle;
683
684	handle = (struct handle *) vhandle;
685	if (handle == NULL) {
686		return;
687	}
688	endnetconfig(handle->nhandle);
689	free(handle, M_RPC);
690}
691
692int
693__rpc_sockisbound(struct socket *so)
694{
695	struct sockaddr *sa;
696	int error, bound;
697
698	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
699	if (error)
700		return (0);
701
702	switch (sa->sa_family) {
703		case AF_INET:
704			bound = (((struct sockaddr_in *) sa)->sin_port != 0);
705			break;
706#ifdef INET6
707		case AF_INET6:
708			bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0);
709			break;
710#endif
711		case AF_LOCAL:
712			/* XXX check this */
713			bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0');
714			break;
715		default:
716			bound = FALSE;
717			break;
718	}
719
720	free(sa, M_SONAME);
721
722	return bound;
723}
724
725/*
726 * Implement XDR-style API for RPC call.
727 */
728enum clnt_stat
729clnt_call_private(
730	CLIENT		*cl,		/* client handle */
731	struct rpc_callextra *ext,	/* call metadata */
732	rpcproc_t	proc,		/* procedure number */
733	xdrproc_t	xargs,		/* xdr routine for args */
734	void		*argsp,		/* pointer to args */
735	xdrproc_t	xresults,	/* xdr routine for results */
736	void		*resultsp,	/* pointer to results */
737	struct timeval	utimeout)	/* seconds to wait before giving up */
738{
739	XDR xdrs;
740	struct mbuf *mreq;
741	struct mbuf *mrep;
742	enum clnt_stat stat;
743
744	MGET(mreq, M_WAIT, MT_DATA);
745	MCLGET(mreq, M_WAIT);
746	mreq->m_len = 0;
747
748	xdrmbuf_create(&xdrs, mreq, XDR_ENCODE);
749	if (!xargs(&xdrs, argsp)) {
750		m_freem(mreq);
751		return (RPC_CANTENCODEARGS);
752	}
753	XDR_DESTROY(&xdrs);
754
755	stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout);
756	m_freem(mreq);
757
758	if (stat == RPC_SUCCESS) {
759		xdrmbuf_create(&xdrs, mrep, XDR_DECODE);
760		if (!xresults(&xdrs, resultsp)) {
761			XDR_DESTROY(&xdrs);
762			return (RPC_CANTDECODERES);
763		}
764		XDR_DESTROY(&xdrs);
765	}
766
767	return (stat);
768}
769
770/*
771 * Bind a socket to a privileged IP port
772 */
773int
774bindresvport(struct socket *so, struct sockaddr *sa)
775{
776	int old, error, af;
777	bool_t freesa = FALSE;
778	struct sockaddr_in *sin;
779#ifdef INET6
780	struct sockaddr_in6 *sin6;
781#endif
782	struct sockopt opt;
783	int proto, portrange, portlow;
784	u_int16_t *portp;
785	socklen_t salen;
786
787	if (sa == NULL) {
788		error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
789		if (error)
790			return (error);
791		freesa = TRUE;
792		af = sa->sa_family;
793		salen = sa->sa_len;
794		memset(sa, 0, sa->sa_len);
795	} else {
796		af = sa->sa_family;
797		salen = sa->sa_len;
798	}
799
800	switch (af) {
801	case AF_INET:
802		proto = IPPROTO_IP;
803		portrange = IP_PORTRANGE;
804		portlow = IP_PORTRANGE_LOW;
805		sin = (struct sockaddr_in *)sa;
806		portp = &sin->sin_port;
807		break;
808#ifdef INET6
809	case AF_INET6:
810		proto = IPPROTO_IPV6;
811		portrange = IPV6_PORTRANGE;
812		portlow = IPV6_PORTRANGE_LOW;
813		sin6 = (struct sockaddr_in6 *)sa;
814		portp = &sin6->sin6_port;
815		break;
816#endif
817	default:
818		return (EPFNOSUPPORT);
819	}
820
821	sa->sa_family = af;
822	sa->sa_len = salen;
823
824	if (*portp == 0) {
825		bzero(&opt, sizeof(opt));
826		opt.sopt_dir = SOPT_GET;
827		opt.sopt_level = proto;
828		opt.sopt_name = portrange;
829		opt.sopt_val = &old;
830		opt.sopt_valsize = sizeof(old);
831		error = sogetopt(so, &opt);
832		if (error)
833			goto out;
834
835		opt.sopt_dir = SOPT_SET;
836		opt.sopt_val = &portlow;
837		error = sosetopt(so, &opt);
838		if (error)
839			goto out;
840	}
841
842	error = sobind(so, sa, curthread);
843
844	if (*portp == 0) {
845		if (error) {
846			opt.sopt_dir = SOPT_SET;
847			opt.sopt_val = &old;
848			sosetopt(so, &opt);
849		}
850	}
851out:
852	if (freesa)
853		free(sa, M_SONAME);
854
855	return (error);
856}
857
858/*
859 * Kernel module glue
860 */
861static int
862krpc_modevent(module_t mod, int type, void *data)
863{
864
865	return (0);
866}
867static moduledata_t krpc_mod = {
868	"krpc",
869	krpc_modevent,
870	NULL,
871};
872DECLARE_MODULE(krpc, krpc_mod, SI_SUB_VFS, SI_ORDER_ANY);
873
874/* So that loader and kldload(2) can find us, wherever we are.. */
875MODULE_VERSION(krpc, 1);
876