xref: /freebsd/sys/netsmb/smb_trantcp.c (revision f9218d3d4fd34f082473b3a021c6d4d109fb47cf)
1 /*
2  * Copyright (c) 2000-2001 Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $FreeBSD$
33  */
34 #include <sys/param.h>
35 #include <sys/condvar.h>
36 #include <sys/kernel.h>
37 #include <sys/lock.h>
38 #include <sys/malloc.h>
39 #include <sys/mbuf.h>
40 #include <sys/poll.h>
41 #include <sys/proc.h>
42 #include <sys/protosw.h>
43 #include <sys/signalvar.h>
44 #include <sys/socket.h>
45 #include <sys/socketvar.h>
46 #include <sys/sx.h>
47 #include <sys/sysctl.h>
48 #include <sys/systm.h>
49 #include <sys/uio.h>
50 
51 #include <net/if.h>
52 #include <net/route.h>
53 
54 #include <netinet/in.h>
55 #include <netinet/tcp.h>
56 
57 #include <sys/mchain.h>
58 
59 #include <netsmb/netbios.h>
60 
61 #include <netsmb/smb.h>
62 #include <netsmb/smb_conn.h>
63 #include <netsmb/smb_tran.h>
64 #include <netsmb/smb_trantcp.h>
65 #include <netsmb/smb_subr.h>
66 
67 #define M_NBDATA	M_PCB
68 
69 static int smb_tcpsndbuf = NB_SNDQ - 1;
70 static int smb_tcprcvbuf = NB_RCVQ - 1;
71 
72 SYSCTL_DECL(_net_smb);
73 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
74 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
75 
76 #define nb_sosend(so,m,flags,td) (so)->so_proto->pr_usrreqs->pru_sosend( \
77 				    so, NULL, 0, m, 0, flags, td)
78 
79 static int  nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
80 	u_int8_t *rpcodep, struct thread *td);
81 static int  smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
82 
83 static int
84 nb_setsockopt_int(struct socket *so, int level, int name, int val)
85 {
86 	struct sockopt sopt;
87 
88 	bzero(&sopt, sizeof(sopt));
89 	sopt.sopt_level = level;
90 	sopt.sopt_name = name;
91 	sopt.sopt_val = &val;
92 	sopt.sopt_valsize = sizeof(val);
93 	return sosetopt(so, &sopt);
94 }
95 
96 static __inline int
97 nb_poll(struct nbpcb *nbp, int events, struct thread *td)
98 {
99 	return nbp->nbp_tso->so_proto->pr_usrreqs->pru_sopoll(nbp->nbp_tso,
100 	    events, NULL, td);
101 }
102 
103 static int
104 nbssn_rselect(struct nbpcb *nbp, struct timeval *tv, int events,
105 	struct thread *td)
106 {
107 	struct timeval atv, rtv, ttv;
108 	int ncoll, timo, error;
109 
110 	if (tv) {
111 		atv = *tv;
112 		if (itimerfix(&atv)) {
113 			error = EINVAL;
114 			goto done_noproclock;
115 		}
116 		getmicrouptime(&rtv);
117 		timevaladd(&atv, &rtv);
118 	}
119 	timo = 0;
120 	mtx_lock(&sellock);
121 retry:
122 
123 	ncoll = nselcoll;
124 	mtx_lock_spin(&sched_lock);
125 	td->td_flags |= TDF_SELECT;
126 	mtx_unlock_spin(&sched_lock);
127 	mtx_unlock(&sellock);
128 
129 	/* XXX: Should be done when the thread is initialized. */
130 	TAILQ_INIT(&td->td_selq);
131 	error = nb_poll(nbp, events, td);
132 	mtx_lock(&sellock);
133 	if (error) {
134 		error = 0;
135 		goto done;
136 	}
137 	if (tv) {
138 		getmicrouptime(&rtv);
139 		if (timevalcmp(&rtv, &atv, >=))
140 			goto done;
141 		ttv = atv;
142 		timevalsub(&ttv, &rtv);
143 		timo = tvtohz(&ttv);
144 	}
145 	/*
146 	 * An event of our interest may occur during locking a process.
147 	 * In order to avoid missing the event that occurred during locking
148 	 * the process, test P_SELECT and rescan file descriptors if
149 	 * necessary.
150 	 */
151 	mtx_lock_spin(&sched_lock);
152 	if ((td->td_flags & TDF_SELECT) == 0 || nselcoll != ncoll) {
153 		mtx_unlock_spin(&sched_lock);
154 		goto retry;
155 	}
156 	mtx_unlock_spin(&sched_lock);
157 
158 	if (timo > 0)
159 		error = cv_timedwait(&selwait, &sellock, timo);
160 	else {
161 		cv_wait(&selwait, &sellock);
162 		error = 0;
163 	}
164 
165 done:
166 	clear_selinfo_list(td);
167 
168 	mtx_lock_spin(&sched_lock);
169 	td->td_flags &= ~TDF_SELECT;
170 	mtx_unlock_spin(&sched_lock);
171 	mtx_unlock(&sellock);
172 
173 done_noproclock:
174 	if (error == ERESTART)
175 		return 0;
176 	return error;
177 }
178 
179 static int
180 nb_intr(struct nbpcb *nbp, struct proc *p)
181 {
182 	return 0;
183 }
184 
185 static void
186 nb_upcall(struct socket *so, void *arg, int waitflag)
187 {
188 	struct nbpcb *nbp = arg;
189 
190 	if (arg == NULL || nbp->nbp_selectid == NULL)
191 		return;
192 	wakeup(nbp->nbp_selectid);
193 }
194 
195 static int
196 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
197 {
198 	u_int32_t *p = mtod(m, u_int32_t *);
199 
200 	*p = htonl((len & 0x1FFFF) | (type << 24));
201 	return 0;
202 }
203 
204 static int
205 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
206 {
207 	int error;
208 	u_char seglen, *cp;
209 
210 	cp = snb->snb_name;
211 	if (*cp == 0)
212 		return EINVAL;
213 	NBDEBUG("[%s]\n", cp);
214 	for (;;) {
215 		seglen = (*cp) + 1;
216 		error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
217 		if (error)
218 			return error;
219 		if (seglen == 1)
220 			break;
221 		cp += seglen;
222 	}
223 	return 0;
224 }
225 
226 static int
227 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
228 {
229 	struct socket *so;
230 	int error, s;
231 
232 	error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
233 	    td->td_ucred, td);
234 	if (error)
235 		return error;
236 	nbp->nbp_tso = so;
237 	so->so_upcallarg = (caddr_t)nbp;
238 	so->so_upcall = nb_upcall;
239 	so->so_rcv.sb_flags |= SB_UPCALL;
240 	so->so_rcv.sb_timeo = (5 * hz);
241 	so->so_snd.sb_timeo = (5 * hz);
242 	error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
243 	if (error)
244 		goto bad;
245 	nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
246 	nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
247 	so->so_rcv.sb_flags &= ~SB_NOINTR;
248 	so->so_snd.sb_flags &= ~SB_NOINTR;
249 	error = soconnect(so, (struct sockaddr*)to, td);
250 	if (error)
251 		goto bad;
252 	s = splnet();
253 	while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
254 		tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
255 		if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
256 			(error = nb_intr(nbp, td->td_proc)) != 0) {
257 			so->so_state &= ~SS_ISCONNECTING;
258 			splx(s);
259 			goto bad;
260 		}
261 	}
262 	if (so->so_error) {
263 		error = so->so_error;
264 		so->so_error = 0;
265 		splx(s);
266 		goto bad;
267 	}
268 	splx(s);
269 	return 0;
270 bad:
271 	smb_nbst_disconnect(nbp->nbp_vc, td);
272 	return error;
273 }
274 
275 static int
276 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
277 {
278 	struct mbchain mb, *mbp = &mb;
279 	struct mdchain md, *mdp = &md;
280 	struct mbuf *m0;
281 	struct timeval tv;
282 	struct sockaddr_in sin;
283 	u_short port;
284 	u_int8_t rpcode;
285 	int error, rplen;
286 
287 	error = mb_init(mbp);
288 	if (error)
289 		return error;
290 	mb_put_uint32le(mbp, 0);
291 	nb_put_name(mbp, nbp->nbp_paddr);
292 	nb_put_name(mbp, nbp->nbp_laddr);
293 	nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
294 	error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
295 	if (!error) {
296 		nbp->nbp_state = NBST_RQSENT;
297 	}
298 	mb_detach(mbp);
299 	mb_done(mbp);
300 	if (error)
301 		return error;
302 	TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
303 	error = nbssn_rselect(nbp, &tv, POLLIN, td);
304 	if (error == EWOULDBLOCK) {	/* Timeout */
305 		NBDEBUG("initial request timeout\n");
306 		return ETIMEDOUT;
307 	}
308 	if (error)			/* restart or interrupt */
309 		return error;
310 	error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
311 	if (error) {
312 		NBDEBUG("recv() error %d\n", error);
313 		return error;
314 	}
315 	/*
316 	 * Process NETBIOS reply
317 	 */
318 	if (m0)
319 		md_initm(mdp, m0);
320 	error = 0;
321 	do {
322 		if (rpcode == NB_SSN_POSRESP) {
323 			nbp->nbp_state = NBST_SESSION;
324 			nbp->nbp_flags |= NBF_CONNECTED;
325 			break;
326 		}
327 		if (rpcode != NB_SSN_RTGRESP) {
328 			error = ECONNABORTED;
329 			break;
330 		}
331 		if (rplen != 6) {
332 			error = ECONNABORTED;
333 			break;
334 		}
335 		md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
336 		md_get_uint16(mdp, &port);
337 		sin.sin_port = port;
338 		nbp->nbp_state = NBST_RETARGET;
339 		smb_nbst_disconnect(nbp->nbp_vc, td);
340 		error = nb_connect_in(nbp, &sin, td);
341 		if (!error)
342 			error = nbssn_rq_request(nbp, td);
343 		if (error) {
344 			smb_nbst_disconnect(nbp->nbp_vc, td);
345 			break;
346 		}
347 	} while(0);
348 	if (m0)
349 		md_done(mdp);
350 	return error;
351 }
352 
353 static int
354 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
355 	u_int8_t *rpcodep, int flags, struct thread *td)
356 {
357 	struct socket *so = nbp->nbp_tso;
358 	struct uio auio;
359 	struct iovec aio;
360 	u_int32_t len;
361 	int error;
362 
363 	aio.iov_base = (caddr_t)&len;
364 	aio.iov_len = sizeof(len);
365 	auio.uio_iov = &aio;
366 	auio.uio_iovcnt = 1;
367 	auio.uio_segflg = UIO_SYSSPACE;
368 	auio.uio_rw = UIO_READ;
369 	auio.uio_offset = 0;
370 	auio.uio_resid = sizeof(len);
371 	auio.uio_td = td;
372 	error = so->so_proto->pr_usrreqs->pru_soreceive
373 	    (so, (struct sockaddr **)NULL, &auio,
374 	    (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
375 	if (error)
376 		return error;
377 	if (auio.uio_resid > 0) {
378 		SMBSDEBUG("short reply\n");
379 		return EPIPE;
380 	}
381 	len = ntohl(len);
382 	*rpcodep = (len >> 24) & 0xFF;
383 	len &= 0x1ffff;
384 	if (len > SMB_MAXPKTLEN) {
385 		SMBERROR("packet too long (%d)\n", len);
386 		return EFBIG;
387 	}
388 	*lenp = len;
389 	return 0;
390 }
391 
392 static int
393 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
394 	u_int8_t *rpcodep, struct thread *td)
395 {
396 	struct socket *so = nbp->nbp_tso;
397 	struct uio auio;
398 	struct mbuf *m, *tm, *im;
399 	u_int8_t rpcode;
400 	int len, resid;
401 	int error, rcvflg;
402 
403 	if (so == NULL)
404 		return ENOTCONN;
405 
406 	if (mpp)
407 		*mpp = NULL;
408 	m = NULL;
409 	for(;;) {
410 		/*
411 		 * Poll for a response header.
412 		 * If we don't have one waiting, return.
413 		 */
414 		error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
415 		if (so->so_state &
416 		    (SS_ISDISCONNECTING | SS_ISDISCONNECTED | SS_CANTRCVMORE)) {
417 			nbp->nbp_state = NBST_CLOSED;
418 			NBDEBUG("session closed by peer\n");
419 			return ECONNRESET;
420 		}
421 		if (error)
422 			return error;
423 		if (len == 0 && nbp->nbp_state != NBST_SESSION)
424 			break;
425 		/* no data, try again */
426 		if (rpcode == NB_SSN_KEEPALIVE)
427 			continue;
428 
429 		/*
430 		 * Loop, blocking, for data following the response header.
431 		 *
432 		 * Note that we can't simply block here with MSG_WAITALL for the
433 		 * entire response size, as it may be larger than the TCP
434 		 * slow-start window that the sender employs.  This will result
435 		 * in the sender stalling until the delayed ACK is sent, then
436 		 * resuming slow-start, resulting in very poor performance.
437 		 *
438 		 * Instead, we never request more than NB_SORECEIVE_CHUNK
439 		 * bytes at a time, resulting in an ack being pushed by
440 		 * the TCP code at the completion of each call.
441 		 */
442 		resid = len;
443 		while (resid > 0) {
444 			tm = NULL;
445 			rcvflg = MSG_WAITALL;
446 			bzero(&auio, sizeof(auio));
447 			auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
448 			auio.uio_td = td;
449 			resid -= auio.uio_resid;
450 			/*
451 			 * Spin until we have collected everything in
452 			 * this chunk.
453 			 */
454 			do {
455 				rcvflg = MSG_WAITALL;
456 				error = so->so_proto->pr_usrreqs->pru_soreceive
457 				    (so, (struct sockaddr **)NULL,
458 				    &auio, &tm, (struct mbuf **)NULL, &rcvflg);
459 			} while (error == EWOULDBLOCK || error == EINTR ||
460 				 error == ERESTART);
461 			if (error)
462 				goto out;
463 			/* short return guarantees unhappiness */
464 			if (auio.uio_resid > 0) {
465 				SMBERROR("packet is shorter than expected\n");
466 				error = EPIPE;
467 				goto out;
468 			}
469 			/* append received chunk to previous chunk(s) */
470 			if (m == NULL) {
471 				m = tm;
472 			} else {
473 				/*
474 				 * Just glue the new chain on the end.
475 				 * Consumer will pullup as required.
476 				 */
477 				for (im = m; im->m_next != NULL; im = im->m_next)
478 					;
479 				im->m_next = tm;
480 			}
481 		}
482 		/* got a session/message packet? */
483 		if (nbp->nbp_state == NBST_SESSION &&
484 		    rpcode == NB_SSN_MESSAGE)
485 			break;
486 		/* drop packet and try for another */
487 		NBDEBUG("non-session packet %x\n", rpcode);
488 		if (m) {
489 			m_freem(m);
490 			m = NULL;
491 		}
492 	}
493 
494 out:
495 	if (error) {
496 		if (m)
497 			m_freem(m);
498 		return error;
499 	}
500 	if (mpp)
501 		*mpp = m;
502 	else
503 		m_freem(m);
504 	*lenp = len;
505 	*rpcodep = rpcode;
506 	return 0;
507 }
508 
509 /*
510  * SMB transport interface
511  */
512 static int
513 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
514 {
515 	struct nbpcb *nbp;
516 
517 	MALLOC(nbp, struct nbpcb *, sizeof *nbp, M_NBDATA, M_WAITOK);
518 	bzero(nbp, sizeof *nbp);
519 	nbp->nbp_timo.tv_sec = 15;	/* XXX: sysctl ? */
520 	nbp->nbp_state = NBST_CLOSED;
521 	nbp->nbp_vc = vcp;
522 	nbp->nbp_sndbuf = smb_tcpsndbuf;
523 	nbp->nbp_rcvbuf = smb_tcprcvbuf;
524 	vcp->vc_tdata = nbp;
525 	return 0;
526 }
527 
528 static int
529 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
530 {
531 	struct nbpcb *nbp = vcp->vc_tdata;
532 
533 	if (nbp == NULL)
534 		return ENOTCONN;
535 	smb_nbst_disconnect(vcp, td);
536 	if (nbp->nbp_laddr)
537 		free(nbp->nbp_laddr, M_SONAME);
538 	if (nbp->nbp_paddr)
539 		free(nbp->nbp_paddr, M_SONAME);
540 	free(nbp, M_NBDATA);
541 	return 0;
542 }
543 
544 static int
545 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
546 {
547 	struct nbpcb *nbp = vcp->vc_tdata;
548 	struct sockaddr_nb *snb;
549 	int error, slen;
550 
551 	NBDEBUG("\n");
552 	error = EINVAL;
553 	do {
554 		if (nbp->nbp_flags & NBF_LOCADDR)
555 			break;
556 		/*
557 		 * It is possible to create NETBIOS name in the kernel,
558 		 * but nothing prevents us to do it in the user space.
559 		 */
560 		if (sap == NULL)
561 			break;
562 		slen = sap->sa_len;
563 		if (slen < NB_MINSALEN)
564 			break;
565 		snb = (struct sockaddr_nb*)dup_sockaddr(sap, 1);
566 		if (snb == NULL) {
567 			error = ENOMEM;
568 			break;
569 		}
570 		nbp->nbp_laddr = snb;
571 		nbp->nbp_flags |= NBF_LOCADDR;
572 		error = 0;
573 	} while(0);
574 	return error;
575 }
576 
577 static int
578 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
579 {
580 	struct nbpcb *nbp = vcp->vc_tdata;
581 	struct sockaddr_in sin;
582 	struct sockaddr_nb *snb;
583 	struct timespec ts1, ts2;
584 	int error, slen;
585 
586 	NBDEBUG("\n");
587 	if (nbp->nbp_tso != NULL)
588 		return EISCONN;
589 	if (nbp->nbp_laddr == NULL)
590 		return EINVAL;
591 	slen = sap->sa_len;
592 	if (slen < NB_MINSALEN)
593 		return EINVAL;
594 	if (nbp->nbp_paddr) {
595 		free(nbp->nbp_paddr, M_SONAME);
596 		nbp->nbp_paddr = NULL;
597 	}
598 	snb = (struct sockaddr_nb*)dup_sockaddr(sap, 1);
599 	if (snb == NULL)
600 		return ENOMEM;
601 	nbp->nbp_paddr = snb;
602 	sin = snb->snb_addrin;
603 	getnanotime(&ts1);
604 	error = nb_connect_in(nbp, &sin, td);
605 	if (error)
606 		return error;
607 	getnanotime(&ts2);
608 	timespecsub(&ts2, &ts1);
609 	if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
610 		ts2.tv_sec = 1;
611 	nbp->nbp_timo = ts2;
612 	timespecadd(&nbp->nbp_timo, &ts2);
613 	timespecadd(&nbp->nbp_timo, &ts2);
614 	timespecadd(&nbp->nbp_timo, &ts2);	/*  * 4 */
615 	error = nbssn_rq_request(nbp, td);
616 	if (error)
617 		smb_nbst_disconnect(vcp, td);
618 	return error;
619 }
620 
621 static int
622 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
623 {
624 	struct nbpcb *nbp = vcp->vc_tdata;
625 	struct socket *so;
626 
627 	if (nbp == NULL || nbp->nbp_tso == NULL)
628 		return ENOTCONN;
629 	if ((so = nbp->nbp_tso) != NULL) {
630 		nbp->nbp_flags &= ~NBF_CONNECTED;
631 		nbp->nbp_tso = (struct socket *)NULL;
632 		soshutdown(so, 2);
633 		soclose(so);
634 	}
635 	if (nbp->nbp_state != NBST_RETARGET) {
636 		nbp->nbp_state = NBST_CLOSED;
637 	}
638 	return 0;
639 }
640 
641 static int
642 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
643 {
644 	struct nbpcb *nbp = vcp->vc_tdata;
645 	int error;
646 
647 	if (nbp->nbp_state != NBST_SESSION) {
648 		error = ENOTCONN;
649 		goto abort;
650 	}
651 	M_PREPEND(m0, 4, M_TRYWAIT);
652 	if (m0 == NULL)
653 		return ENOBUFS;
654 	nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
655 	error = nb_sosend(nbp->nbp_tso, m0, 0, td);
656 	return error;
657 abort:
658 	if (m0)
659 		m_freem(m0);
660 	return error;
661 }
662 
663 
664 static int
665 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
666 {
667 	struct nbpcb *nbp = vcp->vc_tdata;
668 	u_int8_t rpcode;
669 	int error, rplen;
670 
671 	nbp->nbp_flags |= NBF_RECVLOCK;
672 	error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
673 	nbp->nbp_flags &= ~NBF_RECVLOCK;
674 	return error;
675 }
676 
677 static void
678 smb_nbst_timo(struct smb_vc *vcp)
679 {
680 	return;
681 }
682 
683 static void
684 smb_nbst_intr(struct smb_vc *vcp)
685 {
686 	struct nbpcb *nbp = vcp->vc_tdata;
687 
688 	if (nbp == NULL || nbp->nbp_tso == NULL)
689 		return;
690 	sorwakeup(nbp->nbp_tso);
691 	sowwakeup(nbp->nbp_tso);
692 }
693 
694 static int
695 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
696 {
697 	struct nbpcb *nbp = vcp->vc_tdata;
698 
699 	switch (param) {
700 	    case SMBTP_SNDSZ:
701 		*(int*)data = nbp->nbp_sndbuf;
702 		break;
703 	    case SMBTP_RCVSZ:
704 		*(int*)data = nbp->nbp_rcvbuf;
705 		break;
706 	    case SMBTP_TIMEOUT:
707 		*(struct timespec*)data = nbp->nbp_timo;
708 		break;
709 	    default:
710 		return EINVAL;
711 	}
712 	return 0;
713 }
714 
715 static int
716 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
717 {
718 	struct nbpcb *nbp = vcp->vc_tdata;
719 
720 	switch (param) {
721 	    case SMBTP_SELECTID:
722 		nbp->nbp_selectid = data;
723 		break;
724 	    default:
725 		return EINVAL;
726 	}
727 	return 0;
728 }
729 
730 /*
731  * Check for fatal errors
732  */
733 static int
734 smb_nbst_fatal(struct smb_vc *vcp, int error)
735 {
736 	switch (error) {
737 	    case ENOTCONN:
738 	    case ENETRESET:
739 	    case ECONNABORTED:
740 		return 1;
741 	}
742 	return 0;
743 }
744 
745 
746 struct smb_tran_desc smb_tran_nbtcp_desc = {
747 	SMBT_NBTCP,
748 	smb_nbst_create, smb_nbst_done,
749 	smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
750 	smb_nbst_send, smb_nbst_recv,
751 	smb_nbst_timo, smb_nbst_intr,
752 	smb_nbst_getparam, smb_nbst_setparam,
753 	smb_nbst_fatal
754 };
755 
756