xref: /freebsd/sys/rpc/rpc_generic.c (revision 39beb93c3f8bdbf72a61fda42300b5ebed7390c8)
1 /*	$NetBSD: rpc_generic.c,v 1.4 2000/09/28 09:07:04 kleink Exp $	*/
2 
3 /*
4  * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5  * unrestricted use provided that this legend is included on all tape
6  * media and as a part of the software program in whole or part.  Users
7  * may copy or modify Sun RPC without charge, but are not authorized
8  * to license or distribute it to anyone else except as part of a product or
9  * program developed by the user.
10  *
11  * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12  * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13  * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14  *
15  * Sun RPC is provided with no support and without any obligation on the
16  * part of Sun Microsystems, Inc. to assist in its use, correction,
17  * modification or enhancement.
18  *
19  * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20  * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21  * OR ANY PART THEREOF.
22  *
23  * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24  * or profits or other special, indirect and consequential damages, even if
25  * Sun has been advised of the possibility of such damages.
26  *
27  * Sun Microsystems, Inc.
28  * 2550 Garcia Avenue
29  * Mountain View, California  94043
30  */
31 /*
32  * Copyright (c) 1986-1991 by Sun Microsystems Inc.
33  */
34 
35 /* #pragma ident	"@(#)rpc_generic.c	1.17	94/04/24 SMI" */
36 #include <sys/cdefs.h>
37 __FBSDID("$FreeBSD$");
38 
39 /*
40  * rpc_generic.c, Miscl routines for RPC.
41  *
42  */
43 
44 #include "opt_inet6.h"
45 
46 #include <sys/param.h>
47 #include <sys/kernel.h>
48 #include <sys/malloc.h>
49 #include <sys/mbuf.h>
50 #include <sys/module.h>
51 #include <sys/proc.h>
52 #include <sys/protosw.h>
53 #include <sys/sbuf.h>
54 #include <sys/systm.h>
55 #include <sys/socket.h>
56 #include <sys/socketvar.h>
57 #include <sys/syslog.h>
58 
59 #include <rpc/rpc.h>
60 #include <rpc/nettype.h>
61 
62 #include <rpc/rpc_com.h>
63 
64 #if __FreeBSD_version < 700000
65 #define strrchr rindex
66 #endif
67 
68 struct handle {
69 	NCONF_HANDLE *nhandle;
70 	int nflag;		/* Whether NETPATH or NETCONFIG */
71 	int nettype;
72 };
73 
74 static const struct _rpcnettype {
75 	const char *name;
76 	const int type;
77 } _rpctypelist[] = {
78 	{ "netpath", _RPC_NETPATH },
79 	{ "visible", _RPC_VISIBLE },
80 	{ "circuit_v", _RPC_CIRCUIT_V },
81 	{ "datagram_v", _RPC_DATAGRAM_V },
82 	{ "circuit_n", _RPC_CIRCUIT_N },
83 	{ "datagram_n", _RPC_DATAGRAM_N },
84 	{ "tcp", _RPC_TCP },
85 	{ "udp", _RPC_UDP },
86 	{ 0, _RPC_NONE }
87 };
88 
89 struct netid_af {
90 	const char	*netid;
91 	int		af;
92 	int		protocol;
93 };
94 
95 static const struct netid_af na_cvt[] = {
96 	{ "udp",  AF_INET,  IPPROTO_UDP },
97 	{ "tcp",  AF_INET,  IPPROTO_TCP },
98 #ifdef INET6
99 	{ "udp6", AF_INET6, IPPROTO_UDP },
100 	{ "tcp6", AF_INET6, IPPROTO_TCP },
101 #endif
102 	{ "local", AF_LOCAL, 0 }
103 };
104 
105 struct rpc_createerr rpc_createerr;
106 
107 /*
108  * Find the appropriate buffer size
109  */
110 u_int
111 /*ARGSUSED*/
112 __rpc_get_t_size(int af, int proto, int size)
113 {
114 	int maxsize, defsize;
115 
116 	maxsize = 256 * 1024;	/* XXX */
117 	switch (proto) {
118 	case IPPROTO_TCP:
119 		defsize = 64 * 1024;	/* XXX */
120 		break;
121 	case IPPROTO_UDP:
122 		defsize = UDPMSGSIZE;
123 		break;
124 	default:
125 		defsize = RPC_MAXDATASIZE;
126 		break;
127 	}
128 	if (size == 0)
129 		return defsize;
130 
131 	/* Check whether the value is within the upper max limit */
132 	return (size > maxsize ? (u_int)maxsize : (u_int)size);
133 }
134 
135 /*
136  * Find the appropriate address buffer size
137  */
138 u_int
139 __rpc_get_a_size(af)
140 	int af;
141 {
142 	switch (af) {
143 	case AF_INET:
144 		return sizeof (struct sockaddr_in);
145 #ifdef INET6
146 	case AF_INET6:
147 		return sizeof (struct sockaddr_in6);
148 #endif
149 	case AF_LOCAL:
150 		return sizeof (struct sockaddr_un);
151 	default:
152 		break;
153 	}
154 	return ((u_int)RPC_MAXADDRSIZE);
155 }
156 
157 #if 0
158 
159 /*
160  * Used to ping the NULL procedure for clnt handle.
161  * Returns NULL if fails, else a non-NULL pointer.
162  */
163 void *
164 rpc_nullproc(clnt)
165 	CLIENT *clnt;
166 {
167 	struct timeval TIMEOUT = {25, 0};
168 
169 	if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL,
170 		(xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) {
171 		return (NULL);
172 	}
173 	return ((void *) clnt);
174 }
175 
176 #endif
177 
178 int
179 __rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip)
180 {
181 	int type, proto;
182 	struct sockaddr *sa;
183 	sa_family_t family;
184 	struct sockopt opt;
185 	int error;
186 
187 	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
188 	if (error)
189 		return 0;
190 
191 	sip->si_alen = sa->sa_len;
192 	family = sa->sa_family;
193 	free(sa, M_SONAME);
194 
195 	opt.sopt_dir = SOPT_GET;
196 	opt.sopt_level = SOL_SOCKET;
197 	opt.sopt_name = SO_TYPE;
198 	opt.sopt_val = &type;
199 	opt.sopt_valsize = sizeof type;
200 	opt.sopt_td = NULL;
201 	error = sogetopt(so, &opt);
202 	if (error)
203 		return 0;
204 
205 	/* XXX */
206 	if (family != AF_LOCAL) {
207 		if (type == SOCK_STREAM)
208 			proto = IPPROTO_TCP;
209 		else if (type == SOCK_DGRAM)
210 			proto = IPPROTO_UDP;
211 		else
212 			return 0;
213 	} else
214 		proto = 0;
215 
216 	sip->si_af = family;
217 	sip->si_proto = proto;
218 	sip->si_socktype = type;
219 
220 	return 1;
221 }
222 
223 /*
224  * Linear search, but the number of entries is small.
225  */
226 int
227 __rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip)
228 {
229 	int i;
230 
231 	for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++)
232 		if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || (
233 		    strcmp(nconf->nc_netid, "unix") == 0 &&
234 		    strcmp(na_cvt[i].netid, "local") == 0)) {
235 			sip->si_af = na_cvt[i].af;
236 			sip->si_proto = na_cvt[i].protocol;
237 			sip->si_socktype =
238 			    __rpc_seman2socktype((int)nconf->nc_semantics);
239 			if (sip->si_socktype == -1)
240 				return 0;
241 			sip->si_alen = __rpc_get_a_size(sip->si_af);
242 			return 1;
243 		}
244 
245 	return 0;
246 }
247 
248 struct socket *
249 __rpc_nconf2socket(const struct netconfig *nconf)
250 {
251 	struct __rpc_sockinfo si;
252 	struct socket *so;
253 	int error;
254 
255 	if (!__rpc_nconf2sockinfo(nconf, &si))
256 		return 0;
257 
258 	so = NULL;
259 	error =  socreate(si.si_af, &so, si.si_socktype, si.si_proto,
260 	    curthread->td_ucred, curthread);
261 
262 	if (error)
263 		return NULL;
264 	else
265 		return so;
266 }
267 
268 char *
269 taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf)
270 {
271 	struct __rpc_sockinfo si;
272 
273 	if (!__rpc_nconf2sockinfo(nconf, &si))
274 		return NULL;
275 	return __rpc_taddr2uaddr_af(si.si_af, nbuf);
276 }
277 
278 struct netbuf *
279 uaddr2taddr(const struct netconfig *nconf, const char *uaddr)
280 {
281 	struct __rpc_sockinfo si;
282 
283 	if (!__rpc_nconf2sockinfo(nconf, &si))
284 		return NULL;
285 	return __rpc_uaddr2taddr_af(si.si_af, uaddr);
286 }
287 
288 char *
289 __rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf)
290 {
291 	char *ret;
292 	struct sbuf sb;
293 	struct sockaddr_in *sin;
294 	struct sockaddr_un *sun;
295 	char namebuf[INET_ADDRSTRLEN];
296 #ifdef INET6
297 	struct sockaddr_in6 *sin6;
298 	char namebuf6[INET6_ADDRSTRLEN];
299 #endif
300 	u_int16_t port;
301 
302 	sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND);
303 
304 	switch (af) {
305 	case AF_INET:
306 		sin = nbuf->buf;
307 		if (__rpc_inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf)
308 		    == NULL)
309 			return NULL;
310 		port = ntohs(sin->sin_port);
311 		if (sbuf_printf(&sb, "%s.%u.%u", namebuf,
312 			((uint32_t)port) >> 8,
313 			port & 0xff) < 0)
314 			return NULL;
315 		break;
316 #ifdef INET6
317 	case AF_INET6:
318 		sin6 = nbuf->buf;
319 		if (__rpc_inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6)
320 		    == NULL)
321 			return NULL;
322 		port = ntohs(sin6->sin6_port);
323 		if (sbuf_printf(&sb, "%s.%u.%u", namebuf6,
324 			((uint32_t)port) >> 8,
325 			port & 0xff) < 0)
326 			return NULL;
327 		break;
328 #endif
329 	case AF_LOCAL:
330 		sun = nbuf->buf;
331 		if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len -
332 			    offsetof(struct sockaddr_un, sun_path)),
333 			sun->sun_path) < 0)
334 			return (NULL);
335 		break;
336 	default:
337 		return NULL;
338 	}
339 
340 	sbuf_finish(&sb);
341 	ret = strdup(sbuf_data(&sb), M_RPC);
342 	sbuf_delete(&sb);
343 
344 	return ret;
345 }
346 
347 struct netbuf *
348 __rpc_uaddr2taddr_af(int af, const char *uaddr)
349 {
350 	struct netbuf *ret = NULL;
351 	char *addrstr, *p;
352 	unsigned port, portlo, porthi;
353 	struct sockaddr_in *sin;
354 #ifdef INET6
355 	struct sockaddr_in6 *sin6;
356 #endif
357 	struct sockaddr_un *sun;
358 
359 	port = 0;
360 	sin = NULL;
361 	addrstr = strdup(uaddr, M_RPC);
362 	if (addrstr == NULL)
363 		return NULL;
364 
365 	/*
366 	 * AF_LOCAL addresses are expected to be absolute
367 	 * pathnames, anything else will be AF_INET or AF_INET6.
368 	 */
369 	if (*addrstr != '/') {
370 		p = strrchr(addrstr, '.');
371 		if (p == NULL)
372 			goto out;
373 		portlo = (unsigned)strtol(p + 1, NULL, 10);
374 		*p = '\0';
375 
376 		p = strrchr(addrstr, '.');
377 		if (p == NULL)
378 			goto out;
379 		porthi = (unsigned)strtol(p + 1, NULL, 10);
380 		*p = '\0';
381 		port = (porthi << 8) | portlo;
382 	}
383 
384 	ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK);
385 	if (ret == NULL)
386 		goto out;
387 
388 	switch (af) {
389 	case AF_INET:
390 		sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC,
391 		    M_WAITOK);
392 		if (sin == NULL)
393 			goto out;
394 		memset(sin, 0, sizeof *sin);
395 		sin->sin_family = AF_INET;
396 		sin->sin_port = htons(port);
397 		if (__rpc_inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) {
398 			free(sin, M_RPC);
399 			free(ret, M_RPC);
400 			ret = NULL;
401 			goto out;
402 		}
403 		sin->sin_len = ret->maxlen = ret->len = sizeof *sin;
404 		ret->buf = sin;
405 		break;
406 #ifdef INET6
407 	case AF_INET6:
408 		sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC,
409 		    M_WAITOK);
410 		if (sin6 == NULL)
411 			goto out;
412 		memset(sin6, 0, sizeof *sin6);
413 		sin6->sin6_family = AF_INET6;
414 		sin6->sin6_port = htons(port);
415 		if (__rpc_inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) {
416 			free(sin6, M_RPC);
417 			free(ret, M_RPC);
418 			ret = NULL;
419 			goto out;
420 		}
421 		sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6;
422 		ret->buf = sin6;
423 		break;
424 #endif
425 	case AF_LOCAL:
426 		sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC,
427 		    M_WAITOK);
428 		if (sun == NULL)
429 			goto out;
430 		memset(sun, 0, sizeof *sun);
431 		sun->sun_family = AF_LOCAL;
432 		strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1);
433 		ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun);
434 		ret->buf = sun;
435 		break;
436 	default:
437 		break;
438 	}
439 out:
440 	free(addrstr, M_RPC);
441 	return ret;
442 }
443 
444 int
445 __rpc_seman2socktype(int semantics)
446 {
447 	switch (semantics) {
448 	case NC_TPI_CLTS:
449 		return SOCK_DGRAM;
450 	case NC_TPI_COTS_ORD:
451 		return SOCK_STREAM;
452 	case NC_TPI_RAW:
453 		return SOCK_RAW;
454 	default:
455 		break;
456 	}
457 
458 	return -1;
459 }
460 
461 int
462 __rpc_socktype2seman(int socktype)
463 {
464 	switch (socktype) {
465 	case SOCK_DGRAM:
466 		return NC_TPI_CLTS;
467 	case SOCK_STREAM:
468 		return NC_TPI_COTS_ORD;
469 	case SOCK_RAW:
470 		return NC_TPI_RAW;
471 	default:
472 		break;
473 	}
474 
475 	return -1;
476 }
477 
478 /*
479  * Returns the type of the network as defined in <rpc/nettype.h>
480  * If nettype is NULL, it defaults to NETPATH.
481  */
482 static int
483 getnettype(const char *nettype)
484 {
485 	int i;
486 
487 	if ((nettype == NULL) || (nettype[0] == 0)) {
488 		return (_RPC_NETPATH);	/* Default */
489 	}
490 
491 #if 0
492 	nettype = strlocase(nettype);
493 #endif
494 	for (i = 0; _rpctypelist[i].name; i++)
495 		if (strcasecmp(nettype, _rpctypelist[i].name) == 0) {
496 			return (_rpctypelist[i].type);
497 		}
498 	return (_rpctypelist[i].type);
499 }
500 
501 /*
502  * For the given nettype (tcp or udp only), return the first structure found.
503  * This should be freed by calling freenetconfigent()
504  */
505 struct netconfig *
506 __rpc_getconfip(const char *nettype)
507 {
508 	char *netid;
509 	static char *netid_tcp = (char *) NULL;
510 	static char *netid_udp = (char *) NULL;
511 	struct netconfig *dummy;
512 
513 	if (!netid_udp && !netid_tcp) {
514 		struct netconfig *nconf;
515 		void *confighandle;
516 
517 		if (!(confighandle = setnetconfig())) {
518 			log(LOG_ERR, "rpc: failed to open " NETCONFIG);
519 			return (NULL);
520 		}
521 		while ((nconf = getnetconfig(confighandle)) != NULL) {
522 			if (strcmp(nconf->nc_protofmly, NC_INET) == 0) {
523 				if (strcmp(nconf->nc_proto, NC_TCP) == 0) {
524 					netid_tcp = strdup(nconf->nc_netid,
525 					    M_RPC);
526 				} else
527 				if (strcmp(nconf->nc_proto, NC_UDP) == 0) {
528 					netid_udp = strdup(nconf->nc_netid,
529 					    M_RPC);
530 				}
531 			}
532 		}
533 		endnetconfig(confighandle);
534 	}
535 	if (strcmp(nettype, "udp") == 0)
536 		netid = netid_udp;
537 	else if (strcmp(nettype, "tcp") == 0)
538 		netid = netid_tcp;
539 	else {
540 		return (NULL);
541 	}
542 	if ((netid == NULL) || (netid[0] == 0)) {
543 		return (NULL);
544 	}
545 	dummy = getnetconfigent(netid);
546 	return (dummy);
547 }
548 
549 /*
550  * Returns the type of the nettype, which should then be used with
551  * __rpc_getconf().
552  *
553  * For simplicity in the kernel, we don't support the NETPATH
554  * environment variable. We behave as userland would then NETPATH is
555  * unset, i.e. iterate over all visible entries in netconfig.
556  */
557 void *
558 __rpc_setconf(nettype)
559 	const char *nettype;
560 {
561 	struct handle *handle;
562 
563 	handle = (struct handle *) malloc(sizeof (struct handle),
564 	    M_RPC, M_WAITOK);
565 	switch (handle->nettype = getnettype(nettype)) {
566 	case _RPC_NETPATH:
567 	case _RPC_CIRCUIT_N:
568 	case _RPC_DATAGRAM_N:
569 		if (!(handle->nhandle = setnetconfig()))
570 			goto failed;
571 		handle->nflag = TRUE;
572 		break;
573 	case _RPC_VISIBLE:
574 	case _RPC_CIRCUIT_V:
575 	case _RPC_DATAGRAM_V:
576 	case _RPC_TCP:
577 	case _RPC_UDP:
578 		if (!(handle->nhandle = setnetconfig())) {
579 		        log(LOG_ERR, "rpc: failed to open " NETCONFIG);
580 			goto failed;
581 		}
582 		handle->nflag = FALSE;
583 		break;
584 	default:
585 		goto failed;
586 	}
587 
588 	return (handle);
589 
590 failed:
591 	free(handle, M_RPC);
592 	return (NULL);
593 }
594 
595 /*
596  * Returns the next netconfig struct for the given "net" type.
597  * __rpc_setconf() should have been called previously.
598  */
599 struct netconfig *
600 __rpc_getconf(void *vhandle)
601 {
602 	struct handle *handle;
603 	struct netconfig *nconf;
604 
605 	handle = (struct handle *)vhandle;
606 	if (handle == NULL) {
607 		return (NULL);
608 	}
609 	for (;;) {
610 		if (handle->nflag) {
611 			nconf = getnetconfig(handle->nhandle);
612 			if (nconf && !(nconf->nc_flag & NC_VISIBLE))
613 				continue;
614 		} else {
615 			nconf = getnetconfig(handle->nhandle);
616 		}
617 		if (nconf == NULL)
618 			break;
619 		if ((nconf->nc_semantics != NC_TPI_CLTS) &&
620 			(nconf->nc_semantics != NC_TPI_COTS) &&
621 			(nconf->nc_semantics != NC_TPI_COTS_ORD))
622 			continue;
623 		switch (handle->nettype) {
624 		case _RPC_VISIBLE:
625 			if (!(nconf->nc_flag & NC_VISIBLE))
626 				continue;
627 			/* FALLTHROUGH */
628 		case _RPC_NETPATH:	/* Be happy */
629 			break;
630 		case _RPC_CIRCUIT_V:
631 			if (!(nconf->nc_flag & NC_VISIBLE))
632 				continue;
633 			/* FALLTHROUGH */
634 		case _RPC_CIRCUIT_N:
635 			if ((nconf->nc_semantics != NC_TPI_COTS) &&
636 				(nconf->nc_semantics != NC_TPI_COTS_ORD))
637 				continue;
638 			break;
639 		case _RPC_DATAGRAM_V:
640 			if (!(nconf->nc_flag & NC_VISIBLE))
641 				continue;
642 			/* FALLTHROUGH */
643 		case _RPC_DATAGRAM_N:
644 			if (nconf->nc_semantics != NC_TPI_CLTS)
645 				continue;
646 			break;
647 		case _RPC_TCP:
648 			if (((nconf->nc_semantics != NC_TPI_COTS) &&
649 				(nconf->nc_semantics != NC_TPI_COTS_ORD)) ||
650 				(strcmp(nconf->nc_protofmly, NC_INET)
651 #ifdef INET6
652 				 && strcmp(nconf->nc_protofmly, NC_INET6))
653 #else
654 				)
655 #endif
656 				||
657 				strcmp(nconf->nc_proto, NC_TCP))
658 				continue;
659 			break;
660 		case _RPC_UDP:
661 			if ((nconf->nc_semantics != NC_TPI_CLTS) ||
662 				(strcmp(nconf->nc_protofmly, NC_INET)
663 #ifdef INET6
664 				&& strcmp(nconf->nc_protofmly, NC_INET6))
665 #else
666 				)
667 #endif
668 				||
669 				strcmp(nconf->nc_proto, NC_UDP))
670 				continue;
671 			break;
672 		}
673 		break;
674 	}
675 	return (nconf);
676 }
677 
678 void
679 __rpc_endconf(vhandle)
680 	void * vhandle;
681 {
682 	struct handle *handle;
683 
684 	handle = (struct handle *) vhandle;
685 	if (handle == NULL) {
686 		return;
687 	}
688 	endnetconfig(handle->nhandle);
689 	free(handle, M_RPC);
690 }
691 
692 int
693 __rpc_sockisbound(struct socket *so)
694 {
695 	struct sockaddr *sa;
696 	int error, bound;
697 
698 	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
699 	if (error)
700 		return (0);
701 
702 	switch (sa->sa_family) {
703 		case AF_INET:
704 			bound = (((struct sockaddr_in *) sa)->sin_port != 0);
705 			break;
706 #ifdef INET6
707 		case AF_INET6:
708 			bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0);
709 			break;
710 #endif
711 		case AF_LOCAL:
712 			/* XXX check this */
713 			bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0');
714 			break;
715 		default:
716 			bound = FALSE;
717 			break;
718 	}
719 
720 	free(sa, M_SONAME);
721 
722 	return bound;
723 }
724 
725 /*
726  * Implement XDR-style API for RPC call.
727  */
728 enum clnt_stat
729 clnt_call_private(
730 	CLIENT		*cl,		/* client handle */
731 	struct rpc_callextra *ext,	/* call metadata */
732 	rpcproc_t	proc,		/* procedure number */
733 	xdrproc_t	xargs,		/* xdr routine for args */
734 	void		*argsp,		/* pointer to args */
735 	xdrproc_t	xresults,	/* xdr routine for results */
736 	void		*resultsp,	/* pointer to results */
737 	struct timeval	utimeout)	/* seconds to wait before giving up */
738 {
739 	XDR xdrs;
740 	struct mbuf *mreq;
741 	struct mbuf *mrep;
742 	enum clnt_stat stat;
743 
744 	MGET(mreq, M_WAIT, MT_DATA);
745 	MCLGET(mreq, M_WAIT);
746 	mreq->m_len = 0;
747 
748 	xdrmbuf_create(&xdrs, mreq, XDR_ENCODE);
749 	if (!xargs(&xdrs, argsp)) {
750 		m_freem(mreq);
751 		return (RPC_CANTENCODEARGS);
752 	}
753 	XDR_DESTROY(&xdrs);
754 
755 	stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout);
756 	m_freem(mreq);
757 
758 	if (stat == RPC_SUCCESS) {
759 		xdrmbuf_create(&xdrs, mrep, XDR_DECODE);
760 		if (!xresults(&xdrs, resultsp)) {
761 			XDR_DESTROY(&xdrs);
762 			return (RPC_CANTDECODERES);
763 		}
764 		XDR_DESTROY(&xdrs);
765 	}
766 
767 	return (stat);
768 }
769 
770 /*
771  * Bind a socket to a privileged IP port
772  */
773 int
774 bindresvport(struct socket *so, struct sockaddr *sa)
775 {
776 	int old, error, af;
777 	bool_t freesa = FALSE;
778 	struct sockaddr_in *sin;
779 #ifdef INET6
780 	struct sockaddr_in6 *sin6;
781 #endif
782 	struct sockopt opt;
783 	int proto, portrange, portlow;
784 	u_int16_t *portp;
785 	socklen_t salen;
786 
787 	if (sa == NULL) {
788 		error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
789 		if (error)
790 			return (error);
791 		freesa = TRUE;
792 		af = sa->sa_family;
793 		salen = sa->sa_len;
794 		memset(sa, 0, sa->sa_len);
795 	} else {
796 		af = sa->sa_family;
797 		salen = sa->sa_len;
798 	}
799 
800 	switch (af) {
801 	case AF_INET:
802 		proto = IPPROTO_IP;
803 		portrange = IP_PORTRANGE;
804 		portlow = IP_PORTRANGE_LOW;
805 		sin = (struct sockaddr_in *)sa;
806 		portp = &sin->sin_port;
807 		break;
808 #ifdef INET6
809 	case AF_INET6:
810 		proto = IPPROTO_IPV6;
811 		portrange = IPV6_PORTRANGE;
812 		portlow = IPV6_PORTRANGE_LOW;
813 		sin6 = (struct sockaddr_in6 *)sa;
814 		portp = &sin6->sin6_port;
815 		break;
816 #endif
817 	default:
818 		return (EPFNOSUPPORT);
819 	}
820 
821 	sa->sa_family = af;
822 	sa->sa_len = salen;
823 
824 	if (*portp == 0) {
825 		bzero(&opt, sizeof(opt));
826 		opt.sopt_dir = SOPT_GET;
827 		opt.sopt_level = proto;
828 		opt.sopt_name = portrange;
829 		opt.sopt_val = &old;
830 		opt.sopt_valsize = sizeof(old);
831 		error = sogetopt(so, &opt);
832 		if (error)
833 			goto out;
834 
835 		opt.sopt_dir = SOPT_SET;
836 		opt.sopt_val = &portlow;
837 		error = sosetopt(so, &opt);
838 		if (error)
839 			goto out;
840 	}
841 
842 	error = sobind(so, sa, curthread);
843 
844 	if (*portp == 0) {
845 		if (error) {
846 			opt.sopt_dir = SOPT_SET;
847 			opt.sopt_val = &old;
848 			sosetopt(so, &opt);
849 		}
850 	}
851 out:
852 	if (freesa)
853 		free(sa, M_SONAME);
854 
855 	return (error);
856 }
857 
858 /*
859  * Kernel module glue
860  */
861 static int
862 krpc_modevent(module_t mod, int type, void *data)
863 {
864 
865 	return (0);
866 }
867 static moduledata_t krpc_mod = {
868 	"krpc",
869 	krpc_modevent,
870 	NULL,
871 };
872 DECLARE_MODULE(krpc, krpc_mod, SI_SUB_VFS, SI_ORDER_ANY);
873 
874 /* So that loader and kldload(2) can find us, wherever we are.. */
875 MODULE_VERSION(krpc, 1);
876