-
Trond Myklebust authored
The 2.5.x RPC code is currently broken in that it demands that all tasks that call xprt_create_proto() in order to open a TCP socket must have CAP_NET_BIND_SERVICE capabilities, and must bind to a privileged port. This breaks the NLM locking code and its use of the call_bind() RPC portmapper lookup feature. This patch allows the built-in portmapper client to use unbound TCP sockets if the user does not have the necessary capabilities.
23288376