xref: /freebsd/sys/netsmb/smb_trantcp.c (revision 13014ca04aad1931d41958b56f71a2c65b9a7a2c)
1 /*-
2  * Copyright (c) 2000-2001 Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include <sys/cdefs.h>
34 __FBSDID("$FreeBSD$");
35 
36 #include <sys/param.h>
37 #include <sys/condvar.h>
38 #include <sys/kernel.h>
39 #include <sys/lock.h>
40 #include <sys/malloc.h>
41 #include <sys/mbuf.h>
42 #include <sys/poll.h>
43 #include <sys/proc.h>
44 #include <sys/protosw.h>
45 #include <sys/signalvar.h>
46 #include <sys/socket.h>
47 #include <sys/socketvar.h>
48 #include <sys/sx.h>
49 #include <sys/sysctl.h>
50 #include <sys/systm.h>
51 #include <sys/uio.h>
52 
53 #include <net/if.h>
54 #include <net/route.h>
55 
56 #include <netinet/in.h>
57 #include <netinet/tcp.h>
58 
59 #include <sys/mchain.h>
60 
61 #include <netsmb/netbios.h>
62 
63 #include <netsmb/smb.h>
64 #include <netsmb/smb_conn.h>
65 #include <netsmb/smb_tran.h>
66 #include <netsmb/smb_trantcp.h>
67 #include <netsmb/smb_subr.h>
68 
69 #define M_NBDATA	M_PCB
70 
71 static int smb_tcpsndbuf = NB_SNDQ - 1;
72 static int smb_tcprcvbuf = NB_RCVQ - 1;
73 
74 SYSCTL_DECL(_net_smb);
75 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
76 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
77 
78 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
79 
80 static int  nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
81 	u_int8_t *rpcodep, struct thread *td);
82 static int  smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
83 
84 static int
85 nb_setsockopt_int(struct socket *so, int level, int name, int val)
86 {
87 	struct sockopt sopt;
88 
89 	bzero(&sopt, sizeof(sopt));
90 	sopt.sopt_level = level;
91 	sopt.sopt_name = name;
92 	sopt.sopt_val = &val;
93 	sopt.sopt_valsize = sizeof(val);
94 	return sosetopt(so, &sopt);
95 }
96 
97 static int
98 nb_intr(struct nbpcb *nbp, struct proc *p)
99 {
100 	return 0;
101 }
102 
103 static void
104 nb_upcall(struct socket *so, void *arg, int waitflag)
105 {
106 	struct nbpcb *nbp = arg;
107 
108 	if (arg == NULL || nbp->nbp_selectid == NULL)
109 		return;
110 	wakeup(nbp->nbp_selectid);
111 }
112 
113 static int
114 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
115 {
116 	u_int32_t *p = mtod(m, u_int32_t *);
117 
118 	*p = htonl((len & 0x1FFFF) | (type << 24));
119 	return 0;
120 }
121 
122 static int
123 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
124 {
125 	int error;
126 	u_char seglen, *cp;
127 
128 	cp = snb->snb_name;
129 	if (*cp == 0)
130 		return EINVAL;
131 	NBDEBUG("[%s]\n", cp);
132 	for (;;) {
133 		seglen = (*cp) + 1;
134 		error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
135 		if (error)
136 			return error;
137 		if (seglen == 1)
138 			break;
139 		cp += seglen;
140 	}
141 	return 0;
142 }
143 
144 static int
145 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
146 {
147 	struct socket *so;
148 	int error, s;
149 
150 	error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
151 	    td->td_ucred, td);
152 	if (error)
153 		return error;
154 	nbp->nbp_tso = so;
155 	so->so_upcallarg = (caddr_t)nbp;
156 	so->so_upcall = nb_upcall;
157 	SOCKBUF_LOCK(&so->so_rcv);
158 	so->so_rcv.sb_flags |= SB_UPCALL;
159 	SOCKBUF_UNLOCK(&so->so_rcv);
160 	so->so_rcv.sb_timeo = (5 * hz);
161 	so->so_snd.sb_timeo = (5 * hz);
162 	error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
163 	if (error)
164 		goto bad;
165 	nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
166 	nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
167 	SOCKBUF_LOCK(&so->so_rcv);
168 	so->so_rcv.sb_flags &= ~SB_NOINTR;
169 	SOCKBUF_UNLOCK(&so->so_rcv);
170 	SOCKBUF_LOCK(&so->so_snd);
171 	so->so_snd.sb_flags &= ~SB_NOINTR;
172 	SOCKBUF_UNLOCK(&so->so_snd);
173 	error = soconnect(so, (struct sockaddr*)to, td);
174 	if (error)
175 		goto bad;
176 	s = splnet();
177 	while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
178 		tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
179 		if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
180 			(error = nb_intr(nbp, td->td_proc)) != 0) {
181 			so->so_state &= ~SS_ISCONNECTING;
182 			splx(s);
183 			goto bad;
184 		}
185 	}
186 	if (so->so_error) {
187 		error = so->so_error;
188 		so->so_error = 0;
189 		splx(s);
190 		goto bad;
191 	}
192 	splx(s);
193 	return 0;
194 bad:
195 	smb_nbst_disconnect(nbp->nbp_vc, td);
196 	return error;
197 }
198 
199 static int
200 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
201 {
202 	struct mbchain mb, *mbp = &mb;
203 	struct mdchain md, *mdp = &md;
204 	struct mbuf *m0;
205 	struct timeval tv;
206 	struct sockaddr_in sin;
207 	u_short port;
208 	u_int8_t rpcode;
209 	int error, rplen;
210 
211 	error = mb_init(mbp);
212 	if (error)
213 		return error;
214 	mb_put_uint32le(mbp, 0);
215 	nb_put_name(mbp, nbp->nbp_paddr);
216 	nb_put_name(mbp, nbp->nbp_laddr);
217 	nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
218 	error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
219 	if (!error) {
220 		nbp->nbp_state = NBST_RQSENT;
221 	}
222 	mb_detach(mbp);
223 	mb_done(mbp);
224 	if (error)
225 		return error;
226 	TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
227 	error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
228 	if (error == EWOULDBLOCK) {	/* Timeout */
229 		NBDEBUG("initial request timeout\n");
230 		return ETIMEDOUT;
231 	}
232 	if (error)			/* restart or interrupt */
233 		return error;
234 	error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
235 	if (error) {
236 		NBDEBUG("recv() error %d\n", error);
237 		return error;
238 	}
239 	/*
240 	 * Process NETBIOS reply
241 	 */
242 	if (m0)
243 		md_initm(mdp, m0);
244 	error = 0;
245 	do {
246 		if (rpcode == NB_SSN_POSRESP) {
247 			nbp->nbp_state = NBST_SESSION;
248 			nbp->nbp_flags |= NBF_CONNECTED;
249 			break;
250 		}
251 		if (rpcode != NB_SSN_RTGRESP) {
252 			error = ECONNABORTED;
253 			break;
254 		}
255 		if (rplen != 6) {
256 			error = ECONNABORTED;
257 			break;
258 		}
259 		md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
260 		md_get_uint16(mdp, &port);
261 		sin.sin_port = port;
262 		nbp->nbp_state = NBST_RETARGET;
263 		smb_nbst_disconnect(nbp->nbp_vc, td);
264 		error = nb_connect_in(nbp, &sin, td);
265 		if (!error)
266 			error = nbssn_rq_request(nbp, td);
267 		if (error) {
268 			smb_nbst_disconnect(nbp->nbp_vc, td);
269 			break;
270 		}
271 	} while(0);
272 	if (m0)
273 		md_done(mdp);
274 	return error;
275 }
276 
277 static int
278 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
279 	u_int8_t *rpcodep, int flags, struct thread *td)
280 {
281 	struct socket *so = nbp->nbp_tso;
282 	struct uio auio;
283 	struct iovec aio;
284 	u_int32_t len;
285 	int error;
286 
287 	aio.iov_base = (caddr_t)&len;
288 	aio.iov_len = sizeof(len);
289 	auio.uio_iov = &aio;
290 	auio.uio_iovcnt = 1;
291 	auio.uio_segflg = UIO_SYSSPACE;
292 	auio.uio_rw = UIO_READ;
293 	auio.uio_offset = 0;
294 	auio.uio_resid = sizeof(len);
295 	auio.uio_td = td;
296 	error = soreceive(so, (struct sockaddr **)NULL, &auio,
297 	    (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
298 	if (error)
299 		return error;
300 	if (auio.uio_resid > 0) {
301 		SMBSDEBUG("short reply\n");
302 		return EPIPE;
303 	}
304 	len = ntohl(len);
305 	*rpcodep = (len >> 24) & 0xFF;
306 	len &= 0x1ffff;
307 	if (len > SMB_MAXPKTLEN) {
308 		SMBERROR("packet too long (%d)\n", len);
309 		return EFBIG;
310 	}
311 	*lenp = len;
312 	return 0;
313 }
314 
315 static int
316 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
317 	u_int8_t *rpcodep, struct thread *td)
318 {
319 	struct socket *so = nbp->nbp_tso;
320 	struct uio auio;
321 	struct mbuf *m, *tm, *im;
322 	u_int8_t rpcode;
323 	int len, resid;
324 	int error, rcvflg;
325 
326 	if (so == NULL)
327 		return ENOTCONN;
328 
329 	if (mpp)
330 		*mpp = NULL;
331 	m = NULL;
332 	for(;;) {
333 		/*
334 		 * Poll for a response header.
335 		 * If we don't have one waiting, return.
336 		 */
337 		len = 0;
338 		rpcode = 0;
339 		error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
340 		if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
341 		    (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
342 			nbp->nbp_state = NBST_CLOSED;
343 			NBDEBUG("session closed by peer\n");
344 			return ECONNRESET;
345 		}
346 		if (error)
347 			return error;
348 		if (len == 0 && nbp->nbp_state != NBST_SESSION)
349 			break;
350 		/* no data, try again */
351 		if (rpcode == NB_SSN_KEEPALIVE)
352 			continue;
353 
354 		/*
355 		 * Loop, blocking, for data following the response header.
356 		 *
357 		 * Note that we can't simply block here with MSG_WAITALL for the
358 		 * entire response size, as it may be larger than the TCP
359 		 * slow-start window that the sender employs.  This will result
360 		 * in the sender stalling until the delayed ACK is sent, then
361 		 * resuming slow-start, resulting in very poor performance.
362 		 *
363 		 * Instead, we never request more than NB_SORECEIVE_CHUNK
364 		 * bytes at a time, resulting in an ack being pushed by
365 		 * the TCP code at the completion of each call.
366 		 */
367 		resid = len;
368 		while (resid > 0) {
369 			tm = NULL;
370 			rcvflg = MSG_WAITALL;
371 			bzero(&auio, sizeof(auio));
372 			auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
373 			auio.uio_td = td;
374 			resid -= auio.uio_resid;
375 			/*
376 			 * Spin until we have collected everything in
377 			 * this chunk.
378 			 */
379 			do {
380 				rcvflg = MSG_WAITALL;
381 				error = soreceive(so, (struct sockaddr **)NULL,
382 				    &auio, &tm, (struct mbuf **)NULL, &rcvflg);
383 			} while (error == EWOULDBLOCK || error == EINTR ||
384 				 error == ERESTART);
385 			if (error)
386 				goto out;
387 			/* short return guarantees unhappiness */
388 			if (auio.uio_resid > 0) {
389 				SMBERROR("packet is shorter than expected\n");
390 				error = EPIPE;
391 				goto out;
392 			}
393 			/* append received chunk to previous chunk(s) */
394 			if (m == NULL) {
395 				m = tm;
396 			} else {
397 				/*
398 				 * Just glue the new chain on the end.
399 				 * Consumer will pullup as required.
400 				 */
401 				for (im = m; im->m_next != NULL; im = im->m_next)
402 					;
403 				im->m_next = tm;
404 			}
405 		}
406 		/* got a session/message packet? */
407 		if (nbp->nbp_state == NBST_SESSION &&
408 		    rpcode == NB_SSN_MESSAGE)
409 			break;
410 		/* drop packet and try for another */
411 		NBDEBUG("non-session packet %x\n", rpcode);
412 		if (m) {
413 			m_freem(m);
414 			m = NULL;
415 		}
416 	}
417 
418 out:
419 	if (error) {
420 		if (m)
421 			m_freem(m);
422 		return error;
423 	}
424 	if (mpp)
425 		*mpp = m;
426 	else
427 		m_freem(m);
428 	*lenp = len;
429 	*rpcodep = rpcode;
430 	return 0;
431 }
432 
433 /*
434  * SMB transport interface
435  */
436 static int
437 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
438 {
439 	struct nbpcb *nbp;
440 
441 	MALLOC(nbp, struct nbpcb *, sizeof *nbp, M_NBDATA, M_WAITOK);
442 	bzero(nbp, sizeof *nbp);
443 	nbp->nbp_timo.tv_sec = 15;	/* XXX: sysctl ? */
444 	nbp->nbp_state = NBST_CLOSED;
445 	nbp->nbp_vc = vcp;
446 	nbp->nbp_sndbuf = smb_tcpsndbuf;
447 	nbp->nbp_rcvbuf = smb_tcprcvbuf;
448 	vcp->vc_tdata = nbp;
449 	return 0;
450 }
451 
452 static int
453 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
454 {
455 	struct nbpcb *nbp = vcp->vc_tdata;
456 
457 	if (nbp == NULL)
458 		return ENOTCONN;
459 	smb_nbst_disconnect(vcp, td);
460 	if (nbp->nbp_laddr)
461 		free(nbp->nbp_laddr, M_SONAME);
462 	if (nbp->nbp_paddr)
463 		free(nbp->nbp_paddr, M_SONAME);
464 	free(nbp, M_NBDATA);
465 	return 0;
466 }
467 
468 static int
469 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
470 {
471 	struct nbpcb *nbp = vcp->vc_tdata;
472 	struct sockaddr_nb *snb;
473 	int error, slen;
474 
475 	NBDEBUG("\n");
476 	error = EINVAL;
477 	do {
478 		if (nbp->nbp_flags & NBF_LOCADDR)
479 			break;
480 		/*
481 		 * It is possible to create NETBIOS name in the kernel,
482 		 * but nothing prevents us to do it in the user space.
483 		 */
484 		if (sap == NULL)
485 			break;
486 		slen = sap->sa_len;
487 		if (slen < NB_MINSALEN)
488 			break;
489 		snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
490 		if (snb == NULL) {
491 			error = ENOMEM;
492 			break;
493 		}
494 		nbp->nbp_laddr = snb;
495 		nbp->nbp_flags |= NBF_LOCADDR;
496 		error = 0;
497 	} while(0);
498 	return error;
499 }
500 
501 static int
502 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
503 {
504 	struct nbpcb *nbp = vcp->vc_tdata;
505 	struct sockaddr_in sin;
506 	struct sockaddr_nb *snb;
507 	struct timespec ts1, ts2;
508 	int error, slen;
509 
510 	NBDEBUG("\n");
511 	if (nbp->nbp_tso != NULL)
512 		return EISCONN;
513 	if (nbp->nbp_laddr == NULL)
514 		return EINVAL;
515 	slen = sap->sa_len;
516 	if (slen < NB_MINSALEN)
517 		return EINVAL;
518 	if (nbp->nbp_paddr) {
519 		free(nbp->nbp_paddr, M_SONAME);
520 		nbp->nbp_paddr = NULL;
521 	}
522 	snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
523 	if (snb == NULL)
524 		return ENOMEM;
525 	nbp->nbp_paddr = snb;
526 	sin = snb->snb_addrin;
527 	getnanotime(&ts1);
528 	error = nb_connect_in(nbp, &sin, td);
529 	if (error)
530 		return error;
531 	getnanotime(&ts2);
532 	timespecsub(&ts2, &ts1);
533 	if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
534 		ts2.tv_sec = 1;
535 	nbp->nbp_timo = ts2;
536 	timespecadd(&nbp->nbp_timo, &ts2);
537 	timespecadd(&nbp->nbp_timo, &ts2);
538 	timespecadd(&nbp->nbp_timo, &ts2);	/*  * 4 */
539 	error = nbssn_rq_request(nbp, td);
540 	if (error)
541 		smb_nbst_disconnect(vcp, td);
542 	return error;
543 }
544 
545 static int
546 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
547 {
548 	struct nbpcb *nbp = vcp->vc_tdata;
549 	struct socket *so;
550 
551 	if (nbp == NULL || nbp->nbp_tso == NULL)
552 		return ENOTCONN;
553 	if ((so = nbp->nbp_tso) != NULL) {
554 		nbp->nbp_flags &= ~NBF_CONNECTED;
555 		nbp->nbp_tso = (struct socket *)NULL;
556 		soshutdown(so, 2);
557 		soclose(so);
558 	}
559 	if (nbp->nbp_state != NBST_RETARGET) {
560 		nbp->nbp_state = NBST_CLOSED;
561 	}
562 	return 0;
563 }
564 
565 static int
566 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
567 {
568 	struct nbpcb *nbp = vcp->vc_tdata;
569 	int error;
570 
571 	if (nbp->nbp_state != NBST_SESSION) {
572 		error = ENOTCONN;
573 		goto abort;
574 	}
575 	M_PREPEND(m0, 4, M_WAIT);
576 	nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
577 	error = nb_sosend(nbp->nbp_tso, m0, 0, td);
578 	return error;
579 abort:
580 	if (m0)
581 		m_freem(m0);
582 	return error;
583 }
584 
585 
586 static int
587 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
588 {
589 	struct nbpcb *nbp = vcp->vc_tdata;
590 	u_int8_t rpcode;
591 	int error, rplen;
592 
593 	nbp->nbp_flags |= NBF_RECVLOCK;
594 	error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
595 	nbp->nbp_flags &= ~NBF_RECVLOCK;
596 	return error;
597 }
598 
599 static void
600 smb_nbst_timo(struct smb_vc *vcp)
601 {
602 	return;
603 }
604 
605 static void
606 smb_nbst_intr(struct smb_vc *vcp)
607 {
608 	struct nbpcb *nbp = vcp->vc_tdata;
609 
610 	if (nbp == NULL || nbp->nbp_tso == NULL)
611 		return;
612 	sorwakeup(nbp->nbp_tso);
613 	sowwakeup(nbp->nbp_tso);
614 }
615 
616 static int
617 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
618 {
619 	struct nbpcb *nbp = vcp->vc_tdata;
620 
621 	switch (param) {
622 	    case SMBTP_SNDSZ:
623 		*(int*)data = nbp->nbp_sndbuf;
624 		break;
625 	    case SMBTP_RCVSZ:
626 		*(int*)data = nbp->nbp_rcvbuf;
627 		break;
628 	    case SMBTP_TIMEOUT:
629 		*(struct timespec*)data = nbp->nbp_timo;
630 		break;
631 	    default:
632 		return EINVAL;
633 	}
634 	return 0;
635 }
636 
637 static int
638 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
639 {
640 	struct nbpcb *nbp = vcp->vc_tdata;
641 
642 	switch (param) {
643 	    case SMBTP_SELECTID:
644 		nbp->nbp_selectid = data;
645 		break;
646 	    default:
647 		return EINVAL;
648 	}
649 	return 0;
650 }
651 
652 /*
653  * Check for fatal errors
654  */
655 static int
656 smb_nbst_fatal(struct smb_vc *vcp, int error)
657 {
658 	switch (error) {
659 	    case ENOTCONN:
660 	    case ENETRESET:
661 	    case ECONNABORTED:
662 		return 1;
663 	}
664 	return 0;
665 }
666 
667 
668 struct smb_tran_desc smb_tran_nbtcp_desc = {
669 	SMBT_NBTCP,
670 	smb_nbst_create, smb_nbst_done,
671 	smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
672 	smb_nbst_send, smb_nbst_recv,
673 	smb_nbst_timo, smb_nbst_intr,
674 	smb_nbst_getparam, smb_nbst_setparam,
675 	smb_nbst_fatal
676 };
677 
678