Once we distribute socket protocol processing requests to different
[dragonfly.git] / sys / netproto / smb / smb_trantcp.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 2000-2001 Boris Popov
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Boris Popov.
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 *
32 * $FreeBSD: src/sys/netsmb/smb_trantcp.c,v 1.3.2.1 2001/05/22 08:32:34 bp Exp $
e4700d00 33 * $DragonFly: src/sys/netproto/smb/smb_trantcp.c,v 1.9 2004/03/05 16:57:16 hsu Exp $
984263bc
MD
34 */
35#include <sys/param.h>
36#include <sys/systm.h>
37#include <sys/kernel.h>
38#include <sys/malloc.h>
39#include <sys/mbuf.h>
40#include <sys/proc.h>
41#include <sys/protosw.h>
e4700d00 42#include <sys/resourcevar.h>
984263bc
MD
43#include <sys/socket.h>
44#include <sys/socketvar.h>
6b6e0885 45#include <sys/socketops.h>
984263bc
MD
46#include <sys/poll.h>
47#include <sys/uio.h>
48#include <sys/sysctl.h>
49
50#include <net/if.h>
51#include <net/route.h>
52
53#include <netinet/in.h>
54#include <netinet/tcp.h>
55
56#include <sys/mchain.h>
57
1f2de5d4 58#include "netbios.h"
984263bc 59
1f2de5d4
MD
60#include "smb.h"
61#include "smb_conn.h"
62#include "smb_tran.h"
63#include "smb_trantcp.h"
64#include "smb_subr.h"
984263bc
MD
65
66#define M_NBDATA M_PCB
67
68static int smb_tcpsndbuf = 10 * 1024;
69static int smb_tcprcvbuf = 10 * 1024;
70
71SYSCTL_DECL(_net_smb);
72SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
73SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
74
6b6e0885
JH
75#define nb_sosend(so,m,flags,p) \
76 so_pru_sosend(so, NULL, NULL, m, NULL, flags, td)
984263bc
MD
77
78static int nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
dadab5e9
MD
79 u_int8_t *rpcodep, struct thread *td);
80static int smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
984263bc
MD
81
82static int
83nb_setsockopt_int(struct socket *so, int level, int name, int val)
84{
85 struct sockopt sopt;
86
87 bzero(&sopt, sizeof(sopt));
88 sopt.sopt_level = level;
89 sopt.sopt_name = name;
90 sopt.sopt_val = &val;
91 sopt.sopt_valsize = sizeof(val);
92 return sosetopt(so, &sopt);
93}
94
95static __inline int
dadab5e9 96nb_poll(struct nbpcb *nbp, int events, struct thread *td)
984263bc 97{
6b6e0885 98 return so_pru_sopoll(nbp->nbp_tso, events, NULL, td);
984263bc
MD
99}
100
101static int
dadab5e9 102nbssn_rselect(struct nbpcb *nbp, struct timeval *tv, int events, struct thread *td)
984263bc 103{
dadab5e9 104 struct proc *p = td->td_proc;
984263bc
MD
105 struct timeval atv, rtv, ttv;
106 int s, timo, error;
107
108 if (tv) {
109 atv = *tv;
110 if (itimerfix(&atv)) {
111 error = EINVAL;
112 goto done;
113 }
114 getmicrouptime(&rtv);
115 timevaladd(&atv, &rtv);
116 }
117 timo = 0;
dadab5e9 118 KKASSERT(p);
984263bc
MD
119retry:
120 p->p_flag |= P_SELECT;
dadab5e9 121 error = nb_poll(nbp, events, td);
984263bc
MD
122 if (error) {
123 error = 0;
124 goto done;
125 }
126 if (tv) {
127 getmicrouptime(&rtv);
128 if (timevalcmp(&rtv, &atv, >=))
129 goto done;
130 ttv = atv;
131 timevalsub(&ttv, &rtv);
a94976ad 132 timo = tvtohz_high(&ttv);
984263bc
MD
133 }
134 s = splhigh();
135 if ((p->p_flag & P_SELECT) == 0) {
136 splx(s);
137 goto retry;
138 }
139 p->p_flag &= ~P_SELECT;
377d4740 140 error = tsleep((caddr_t)&selwait, 0, "nbsel", timo);
984263bc
MD
141 splx(s);
142done:
143 p->p_flag &= ~P_SELECT;
144 if (error == ERESTART)
145 return 0;
146 return error;
147}
148
149static int
dadab5e9 150nb_intr(struct nbpcb *nbp, struct thread *td)
984263bc
MD
151{
152 return 0;
153}
154
155static void
156nb_upcall(struct socket *so, void *arg, int waitflag)
157{
158 struct nbpcb *nbp = arg;
159
160 if (arg == NULL || nbp->nbp_selectid == NULL)
161 return;
162 wakeup(nbp->nbp_selectid);
163}
164
165static int
166nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
167{
168 u_int32_t *p = mtod(m, u_int32_t *);
169
170 *p = htonl((len & 0x1FFFF) | (type << 24));
171 return 0;
172}
173
174static int
175nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
176{
177 int error;
178 u_char seglen, *cp;
179
180 cp = snb->snb_name;
181 if (*cp == 0)
182 return EINVAL;
183 NBDEBUG("[%s]\n", cp);
184 for (;;) {
185 seglen = (*cp) + 1;
186 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
187 if (error)
188 return error;
189 if (seglen == 1)
190 break;
191 cp += seglen;
192 }
193 return 0;
194}
195
196static int
dadab5e9 197nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
984263bc
MD
198{
199 struct socket *so;
200 int error, s;
201
dadab5e9 202 error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP, td);
984263bc
MD
203 if (error)
204 return error;
205 nbp->nbp_tso = so;
206 so->so_upcallarg = (caddr_t)nbp;
207 so->so_upcall = nb_upcall;
208 so->so_rcv.sb_flags |= SB_UPCALL;
209 so->so_rcv.sb_timeo = (5 * hz);
210 so->so_snd.sb_timeo = (5 * hz);
e4700d00
JH
211 error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf,
212 &td->td_proc->p_rlimit[RLIMIT_SBSIZE]);
984263bc
MD
213 if (error)
214 goto bad;
215 nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
216 nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
217 so->so_rcv.sb_flags &= ~SB_NOINTR;
218 so->so_snd.sb_flags &= ~SB_NOINTR;
dadab5e9 219 error = soconnect(so, (struct sockaddr*)to, td);
984263bc
MD
220 if (error)
221 goto bad;
222 s = splnet();
223 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
377d4740 224 tsleep(&so->so_timeo, 0, "nbcon", 2 * hz);
984263bc 225 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
dadab5e9 226 (error = nb_intr(nbp, td)) != 0) {
984263bc
MD
227 so->so_state &= ~SS_ISCONNECTING;
228 splx(s);
229 goto bad;
230 }
231 }
232 if (so->so_error) {
233 error = so->so_error;
234 so->so_error = 0;
235 splx(s);
236 goto bad;
237 }
238 splx(s);
239 return 0;
240bad:
dadab5e9 241 smb_nbst_disconnect(nbp->nbp_vc, td);
984263bc
MD
242 return error;
243}
244
245static int
dadab5e9 246nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
984263bc
MD
247{
248 struct mbchain mb, *mbp = &mb;
249 struct mdchain md, *mdp = &md;
250 struct mbuf *m0;
251 struct timeval tv;
252 struct sockaddr_in sin;
253 u_short port;
254 u_int8_t rpcode;
255 int error, rplen;
256
257 error = mb_init(mbp);
258 if (error)
259 return error;
260 mb_put_uint32le(mbp, 0);
261 nb_put_name(mbp, nbp->nbp_paddr);
262 nb_put_name(mbp, nbp->nbp_laddr);
263 nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
dadab5e9 264 error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
984263bc
MD
265 if (!error) {
266 nbp->nbp_state = NBST_RQSENT;
267 }
268 mb_detach(mbp);
269 mb_done(mbp);
270 if (error)
271 return error;
272 TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
dadab5e9 273 error = nbssn_rselect(nbp, &tv, POLLIN, td);
984263bc
MD
274 if (error == EWOULDBLOCK) { /* Timeout */
275 NBDEBUG("initial request timeout\n");
276 return ETIMEDOUT;
277 }
278 if (error) /* restart or interrupt */
279 return error;
dadab5e9 280 error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
984263bc
MD
281 if (error) {
282 NBDEBUG("recv() error %d\n", error);
283 return error;
284 }
285 /*
286 * Process NETBIOS reply
287 */
288 if (m0)
289 md_initm(mdp, m0);
290 error = 0;
291 do {
292 if (rpcode == NB_SSN_POSRESP) {
293 nbp->nbp_state = NBST_SESSION;
294 nbp->nbp_flags |= NBF_CONNECTED;
295 break;
296 }
297 if (rpcode != NB_SSN_RTGRESP) {
298 error = ECONNABORTED;
299 break;
300 }
301 if (rplen != 6) {
302 error = ECONNABORTED;
303 break;
304 }
305 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
306 md_get_uint16(mdp, &port);
307 sin.sin_port = port;
308 nbp->nbp_state = NBST_RETARGET;
dadab5e9
MD
309 smb_nbst_disconnect(nbp->nbp_vc, td);
310 error = nb_connect_in(nbp, &sin, td);
984263bc 311 if (!error)
dadab5e9 312 error = nbssn_rq_request(nbp, td);
984263bc 313 if (error) {
dadab5e9 314 smb_nbst_disconnect(nbp->nbp_vc, td);
984263bc
MD
315 break;
316 }
317 } while(0);
318 if (m0)
319 md_done(mdp);
320 return error;
321}
322
323static int
324nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
dadab5e9 325 u_int8_t *rpcodep, int flags, struct thread *td)
984263bc
MD
326{
327 struct socket *so = nbp->nbp_tso;
328 struct uio auio;
329 struct iovec aio;
330 u_int32_t len;
331 int error;
332
333 aio.iov_base = (caddr_t)&len;
334 aio.iov_len = sizeof(len);
335 auio.uio_iov = &aio;
336 auio.uio_iovcnt = 1;
337 auio.uio_segflg = UIO_SYSSPACE;
338 auio.uio_rw = UIO_READ;
339 auio.uio_offset = 0;
340 auio.uio_resid = sizeof(len);
dadab5e9 341 auio.uio_td = td;
6b6e0885 342 error = so_pru_soreceive(so, NULL, &auio, NULL, NULL, &flags);
984263bc
MD
343 if (error)
344 return error;
345 if (auio.uio_resid > 0) {
346 SMBSDEBUG("short reply\n");
347 return EPIPE;
348 }
349 len = ntohl(len);
350 *rpcodep = (len >> 24) & 0xFF;
351 len &= 0x1ffff;
352 if (len > SMB_MAXPKTLEN) {
353 SMBERROR("packet too long (%d)\n", len);
354 return EFBIG;
355 }
356 *lenp = len;
357 return 0;
358}
359
360static int
361nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
dadab5e9 362 u_int8_t *rpcodep, struct thread *td)
984263bc
MD
363{
364 struct socket *so = nbp->nbp_tso;
365 struct uio auio;
366 struct mbuf *m;
367 u_int8_t rpcode;
368 int len;
369 int error, rcvflg;
370
371 if (so == NULL)
372 return ENOTCONN;
373
374 if (mpp)
375 *mpp = NULL;
376 for(;;) {
377 m = NULL;
dadab5e9 378 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
984263bc
MD
379 if (so->so_state &
380 (SS_ISDISCONNECTING | SS_ISDISCONNECTED | SS_CANTRCVMORE)) {
381 nbp->nbp_state = NBST_CLOSED;
382 NBDEBUG("session closed by peer\n");
383 return ECONNRESET;
384 }
385 if (error)
386 return error;
387 if (len == 0 && nbp->nbp_state != NBST_SESSION)
388 break;
389 if (rpcode == NB_SSN_KEEPALIVE)
390 continue;
391 bzero(&auio, sizeof(auio));
392 auio.uio_resid = len;
dadab5e9 393 auio.uio_td = td;
984263bc
MD
394 do {
395 rcvflg = MSG_WAITALL;
6b6e0885
JH
396 error = so_pru_soreceive(so, NULL, &auio, &m, NULL,
397 &rcvflg);
984263bc
MD
398 } while (error == EWOULDBLOCK || error == EINTR ||
399 error == ERESTART);
400 if (error)
401 break;
402 if (auio.uio_resid > 0) {
403 SMBERROR("packet is shorter than expected\n");
404 error = EPIPE;
405 break;
406 }
407 if (nbp->nbp_state == NBST_SESSION &&
408 rpcode == NB_SSN_MESSAGE)
409 break;
410 NBDEBUG("non-session packet %x\n", rpcode);
411 if (m)
412 m_freem(m);
413 }
414 if (error) {
415 if (m)
416 m_freem(m);
417 return error;
418 }
419 if (mpp)
420 *mpp = m;
421 else
422 m_freem(m);
423 *lenp = len;
424 *rpcodep = rpcode;
425 return 0;
426}
427
428/*
429 * SMB transport interface
430 */
431static int
dadab5e9 432smb_nbst_create(struct smb_vc *vcp, struct thread *td)
984263bc
MD
433{
434 struct nbpcb *nbp;
435
436 MALLOC(nbp, struct nbpcb *, sizeof *nbp, M_NBDATA, M_WAITOK);
437 bzero(nbp, sizeof *nbp);
438 nbp->nbp_timo.tv_sec = 15; /* XXX: sysctl ? */
439 nbp->nbp_state = NBST_CLOSED;
440 nbp->nbp_vc = vcp;
441 nbp->nbp_sndbuf = smb_tcpsndbuf;
442 nbp->nbp_rcvbuf = smb_tcprcvbuf;
443 vcp->vc_tdata = nbp;
444 return 0;
445}
446
447static int
dadab5e9 448smb_nbst_done(struct smb_vc *vcp, struct thread *td)
984263bc
MD
449{
450 struct nbpcb *nbp = vcp->vc_tdata;
451
452 if (nbp == NULL)
453 return ENOTCONN;
dadab5e9 454 smb_nbst_disconnect(vcp, td);
984263bc
MD
455 if (nbp->nbp_laddr)
456 free(nbp->nbp_laddr, M_SONAME);
457 if (nbp->nbp_paddr)
458 free(nbp->nbp_paddr, M_SONAME);
459 free(nbp, M_NBDATA);
460 return 0;
461}
462
463static int
dadab5e9 464smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
984263bc
MD
465{
466 struct nbpcb *nbp = vcp->vc_tdata;
467 struct sockaddr_nb *snb;
468 int error, slen;
469
470 NBDEBUG("\n");
471 error = EINVAL;
472 do {
473 if (nbp->nbp_flags & NBF_LOCADDR)
474 break;
475 /*
476 * It is possible to create NETBIOS name in the kernel,
477 * but nothing prevents us to do it in the user space.
478 */
479 if (sap == NULL)
480 break;
481 slen = sap->sa_len;
482 if (slen < NB_MINSALEN)
483 break;
484 snb = (struct sockaddr_nb*)dup_sockaddr(sap, 1);
485 if (snb == NULL) {
486 error = ENOMEM;
487 break;
488 }
489 nbp->nbp_laddr = snb;
490 nbp->nbp_flags |= NBF_LOCADDR;
491 error = 0;
492 } while(0);
493 return error;
494}
495
496static int
dadab5e9 497smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
984263bc
MD
498{
499 struct nbpcb *nbp = vcp->vc_tdata;
500 struct sockaddr_in sin;
501 struct sockaddr_nb *snb;
502 struct timespec ts1, ts2;
503 int error, slen;
504
505 NBDEBUG("\n");
506 if (nbp->nbp_tso != NULL)
507 return EISCONN;
508 if (nbp->nbp_laddr == NULL)
509 return EINVAL;
510 slen = sap->sa_len;
511 if (slen < NB_MINSALEN)
512 return EINVAL;
513 if (nbp->nbp_paddr) {
514 free(nbp->nbp_paddr, M_SONAME);
515 nbp->nbp_paddr = NULL;
516 }
517 snb = (struct sockaddr_nb*)dup_sockaddr(sap, 1);
518 if (snb == NULL)
519 return ENOMEM;
520 nbp->nbp_paddr = snb;
521 sin = snb->snb_addrin;
522 getnanotime(&ts1);
dadab5e9 523 error = nb_connect_in(nbp, &sin, td);
984263bc
MD
524 if (error)
525 return error;
526 getnanotime(&ts2);
527 timespecsub(&ts2, &ts1);
528 if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
529 ts2.tv_sec = 1;
530 nbp->nbp_timo = ts2;
531 timespecadd(&nbp->nbp_timo, &ts2);
532 timespecadd(&nbp->nbp_timo, &ts2);
533 timespecadd(&nbp->nbp_timo, &ts2); /* * 4 */
dadab5e9 534 error = nbssn_rq_request(nbp, td);
984263bc 535 if (error)
dadab5e9 536 smb_nbst_disconnect(vcp, td);
984263bc
MD
537 return error;
538}
539
540static int
dadab5e9 541smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
984263bc
MD
542{
543 struct nbpcb *nbp = vcp->vc_tdata;
544 struct socket *so;
545
546 if (nbp == NULL || nbp->nbp_tso == NULL)
547 return ENOTCONN;
548 if ((so = nbp->nbp_tso) != NULL) {
549 nbp->nbp_flags &= ~NBF_CONNECTED;
550 nbp->nbp_tso = (struct socket *)NULL;
551 soshutdown(so, 2);
552 soclose(so);
553 }
554 if (nbp->nbp_state != NBST_RETARGET) {
555 nbp->nbp_state = NBST_CLOSED;
556 }
557 return 0;
558}
559
560static int
dadab5e9 561smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
984263bc
MD
562{
563 struct nbpcb *nbp = vcp->vc_tdata;
564 int error;
565
566 if (nbp->nbp_state != NBST_SESSION) {
567 error = ENOTCONN;
568 goto abort;
569 }
1c878b75 570 M_PREPEND(m0, 4, M_TRYWAIT);
984263bc
MD
571 if (m0 == NULL)
572 return ENOBUFS;
573 nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
dadab5e9 574 error = nb_sosend(nbp->nbp_tso, m0, 0, td);
984263bc
MD
575 return error;
576abort:
577 if (m0)
578 m_freem(m0);
579 return error;
580}
581
582
583static int
dadab5e9 584smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
984263bc
MD
585{
586 struct nbpcb *nbp = vcp->vc_tdata;
587 u_int8_t rpcode;
588 int error, rplen;
589
590 nbp->nbp_flags |= NBF_RECVLOCK;
dadab5e9 591 error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
984263bc
MD
592 nbp->nbp_flags &= ~NBF_RECVLOCK;
593 return error;
594}
595
596static void
597smb_nbst_timo(struct smb_vc *vcp)
598{
599 return;
600}
601
602static void
603smb_nbst_intr(struct smb_vc *vcp)
604{
605 struct nbpcb *nbp = vcp->vc_tdata;
606
607 if (nbp == NULL || nbp->nbp_tso == NULL)
608 return;
609 sorwakeup(nbp->nbp_tso);
610 sowwakeup(nbp->nbp_tso);
611}
612
613static int
614smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
615{
616 struct nbpcb *nbp = vcp->vc_tdata;
617
618 switch (param) {
619 case SMBTP_SNDSZ:
620 *(int*)data = nbp->nbp_sndbuf;
621 break;
622 case SMBTP_RCVSZ:
623 *(int*)data = nbp->nbp_rcvbuf;
624 break;
625 case SMBTP_TIMEOUT:
626 *(struct timespec*)data = nbp->nbp_timo;
627 break;
628 default:
629 return EINVAL;
630 }
631 return 0;
632}
633
634static int
635smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
636{
637 struct nbpcb *nbp = vcp->vc_tdata;
638
639 switch (param) {
640 case SMBTP_SELECTID:
641 nbp->nbp_selectid = data;
642 break;
643 default:
644 return EINVAL;
645 }
646 return 0;
647}
648
649/*
650 * Check for fatal errors
651 */
652static int
653smb_nbst_fatal(struct smb_vc *vcp, int error)
654{
655 switch (error) {
656 case ENOTCONN:
657 case ENETRESET:
658 case ECONNABORTED:
659 return 1;
660 }
661 return 0;
662}
663
664
665struct smb_tran_desc smb_tran_nbtcp_desc = {
666 SMBT_NBTCP,
667 smb_nbst_create, smb_nbst_done,
668 smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
669 smb_nbst_send, smb_nbst_recv,
670 smb_nbst_timo, smb_nbst_intr,
671 smb_nbst_getparam, smb_nbst_setparam,
672 smb_nbst_fatal
673};
674