xref: /freebsd/sys/netsmb/smb_trantcp.c (revision aa0a1e58)
1 /*-
2  * Copyright (c) 2000-2001 Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  */
26 
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
29 
30 #include <sys/param.h>
31 #include <sys/condvar.h>
32 #include <sys/kernel.h>
33 #include <sys/lock.h>
34 #include <sys/malloc.h>
35 #include <sys/mbuf.h>
36 #include <sys/poll.h>
37 #include <sys/proc.h>
38 #include <sys/protosw.h>
39 #include <sys/signalvar.h>
40 #include <sys/socket.h>
41 #include <sys/socketvar.h>
42 #include <sys/sx.h>
43 #include <sys/sysctl.h>
44 #include <sys/systm.h>
45 #include <sys/uio.h>
46 
47 #include <net/if.h>
48 #include <net/route.h>
49 
50 #include <netinet/in.h>
51 #include <netinet/tcp.h>
52 
53 #include <sys/mchain.h>
54 
55 #include <netsmb/netbios.h>
56 
57 #include <netsmb/smb.h>
58 #include <netsmb/smb_conn.h>
59 #include <netsmb/smb_tran.h>
60 #include <netsmb/smb_trantcp.h>
61 #include <netsmb/smb_subr.h>
62 
63 #define M_NBDATA	M_PCB
64 
65 static int smb_tcpsndbuf = NB_SNDQ - 1;
66 static int smb_tcprcvbuf = NB_RCVQ - 1;
67 
68 SYSCTL_DECL(_net_smb);
69 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
70 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
71 
72 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
73 
74 static int  nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
75 	u_int8_t *rpcodep, struct thread *td);
76 static int  smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
77 
78 static int
79 nb_setsockopt_int(struct socket *so, int level, int name, int val)
80 {
81 	struct sockopt sopt;
82 
83 	bzero(&sopt, sizeof(sopt));
84 	sopt.sopt_level = level;
85 	sopt.sopt_name = name;
86 	sopt.sopt_val = &val;
87 	sopt.sopt_valsize = sizeof(val);
88 	return sosetopt(so, &sopt);
89 }
90 
91 static int
92 nb_intr(struct nbpcb *nbp, struct proc *p)
93 {
94 	return 0;
95 }
96 
97 static int
98 nb_upcall(struct socket *so, void *arg, int waitflag)
99 {
100 	struct nbpcb *nbp = arg;
101 
102 	if (arg == NULL || nbp->nbp_selectid == NULL)
103 		return (SU_OK);
104 	wakeup(nbp->nbp_selectid);
105 	return (SU_OK);
106 }
107 
108 static int
109 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
110 {
111 	u_int32_t *p = mtod(m, u_int32_t *);
112 
113 	*p = htonl((len & 0x1FFFF) | (type << 24));
114 	return 0;
115 }
116 
117 static int
118 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
119 {
120 	int error;
121 	u_char seglen, *cp;
122 
123 	cp = snb->snb_name;
124 	if (*cp == 0)
125 		return EINVAL;
126 	NBDEBUG("[%s]\n", cp);
127 	for (;;) {
128 		seglen = (*cp) + 1;
129 		error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
130 		if (error)
131 			return error;
132 		if (seglen == 1)
133 			break;
134 		cp += seglen;
135 	}
136 	return 0;
137 }
138 
139 static int
140 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
141 {
142 	struct socket *so;
143 	int error, s;
144 
145 	error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
146 	    td->td_ucred, td);
147 	if (error)
148 		return error;
149 	nbp->nbp_tso = so;
150 	SOCKBUF_LOCK(&so->so_rcv);
151 	soupcall_set(so, SO_RCV, nb_upcall, nbp);
152 	SOCKBUF_UNLOCK(&so->so_rcv);
153 	so->so_rcv.sb_timeo = (5 * hz);
154 	so->so_snd.sb_timeo = (5 * hz);
155 	error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
156 	if (error)
157 		goto bad;
158 	nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
159 	nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
160 	SOCKBUF_LOCK(&so->so_rcv);
161 	so->so_rcv.sb_flags &= ~SB_NOINTR;
162 	SOCKBUF_UNLOCK(&so->so_rcv);
163 	SOCKBUF_LOCK(&so->so_snd);
164 	so->so_snd.sb_flags &= ~SB_NOINTR;
165 	SOCKBUF_UNLOCK(&so->so_snd);
166 	error = soconnect(so, (struct sockaddr*)to, td);
167 	if (error)
168 		goto bad;
169 	s = splnet();
170 	while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
171 		tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
172 		if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
173 			(error = nb_intr(nbp, td->td_proc)) != 0) {
174 			so->so_state &= ~SS_ISCONNECTING;
175 			splx(s);
176 			goto bad;
177 		}
178 	}
179 	if (so->so_error) {
180 		error = so->so_error;
181 		so->so_error = 0;
182 		splx(s);
183 		goto bad;
184 	}
185 	splx(s);
186 	return 0;
187 bad:
188 	smb_nbst_disconnect(nbp->nbp_vc, td);
189 	return error;
190 }
191 
192 static int
193 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
194 {
195 	struct mbchain mb, *mbp = &mb;
196 	struct mdchain md, *mdp = &md;
197 	struct mbuf *m0;
198 	struct timeval tv;
199 	struct sockaddr_in sin;
200 	u_short port;
201 	u_int8_t rpcode;
202 	int error, rplen;
203 
204 	error = mb_init(mbp);
205 	if (error)
206 		return error;
207 	mb_put_uint32le(mbp, 0);
208 	nb_put_name(mbp, nbp->nbp_paddr);
209 	nb_put_name(mbp, nbp->nbp_laddr);
210 	nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
211 	error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
212 	if (!error) {
213 		nbp->nbp_state = NBST_RQSENT;
214 	}
215 	mb_detach(mbp);
216 	mb_done(mbp);
217 	if (error)
218 		return error;
219 	TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
220 	error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
221 	if (error == EWOULDBLOCK) {	/* Timeout */
222 		NBDEBUG("initial request timeout\n");
223 		return ETIMEDOUT;
224 	}
225 	if (error)			/* restart or interrupt */
226 		return error;
227 	error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
228 	if (error) {
229 		NBDEBUG("recv() error %d\n", error);
230 		return error;
231 	}
232 	/*
233 	 * Process NETBIOS reply
234 	 */
235 	if (m0)
236 		md_initm(mdp, m0);
237 	error = 0;
238 	do {
239 		if (rpcode == NB_SSN_POSRESP) {
240 			nbp->nbp_state = NBST_SESSION;
241 			nbp->nbp_flags |= NBF_CONNECTED;
242 			break;
243 		}
244 		if (rpcode != NB_SSN_RTGRESP) {
245 			error = ECONNABORTED;
246 			break;
247 		}
248 		if (rplen != 6) {
249 			error = ECONNABORTED;
250 			break;
251 		}
252 		md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
253 		md_get_uint16(mdp, &port);
254 		sin.sin_port = port;
255 		nbp->nbp_state = NBST_RETARGET;
256 		smb_nbst_disconnect(nbp->nbp_vc, td);
257 		error = nb_connect_in(nbp, &sin, td);
258 		if (!error)
259 			error = nbssn_rq_request(nbp, td);
260 		if (error) {
261 			smb_nbst_disconnect(nbp->nbp_vc, td);
262 			break;
263 		}
264 	} while(0);
265 	if (m0)
266 		md_done(mdp);
267 	return error;
268 }
269 
270 static int
271 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
272 	u_int8_t *rpcodep, int flags, struct thread *td)
273 {
274 	struct socket *so = nbp->nbp_tso;
275 	struct uio auio;
276 	struct iovec aio;
277 	u_int32_t len;
278 	int error;
279 
280 	aio.iov_base = (caddr_t)&len;
281 	aio.iov_len = sizeof(len);
282 	auio.uio_iov = &aio;
283 	auio.uio_iovcnt = 1;
284 	auio.uio_segflg = UIO_SYSSPACE;
285 	auio.uio_rw = UIO_READ;
286 	auio.uio_offset = 0;
287 	auio.uio_resid = sizeof(len);
288 	auio.uio_td = td;
289 	error = soreceive(so, (struct sockaddr **)NULL, &auio,
290 	    (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
291 	if (error)
292 		return error;
293 	if (auio.uio_resid > 0) {
294 		SMBSDEBUG("short reply\n");
295 		return EPIPE;
296 	}
297 	len = ntohl(len);
298 	*rpcodep = (len >> 24) & 0xFF;
299 	len &= 0x1ffff;
300 	if (len > SMB_MAXPKTLEN) {
301 		SMBERROR("packet too long (%d)\n", len);
302 		return EFBIG;
303 	}
304 	*lenp = len;
305 	return 0;
306 }
307 
308 static int
309 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
310 	u_int8_t *rpcodep, struct thread *td)
311 {
312 	struct socket *so = nbp->nbp_tso;
313 	struct uio auio;
314 	struct mbuf *m, *tm, *im;
315 	u_int8_t rpcode;
316 	int len, resid;
317 	int error, rcvflg;
318 
319 	if (so == NULL)
320 		return ENOTCONN;
321 
322 	if (mpp)
323 		*mpp = NULL;
324 	m = NULL;
325 	for(;;) {
326 		/*
327 		 * Poll for a response header.
328 		 * If we don't have one waiting, return.
329 		 */
330 		len = 0;
331 		rpcode = 0;
332 		error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
333 		if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
334 		    (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
335 			nbp->nbp_state = NBST_CLOSED;
336 			NBDEBUG("session closed by peer\n");
337 			return ECONNRESET;
338 		}
339 		if (error)
340 			return error;
341 		if (len == 0 && nbp->nbp_state != NBST_SESSION)
342 			break;
343 		/* no data, try again */
344 		if (rpcode == NB_SSN_KEEPALIVE)
345 			continue;
346 
347 		/*
348 		 * Loop, blocking, for data following the response header.
349 		 *
350 		 * Note that we can't simply block here with MSG_WAITALL for the
351 		 * entire response size, as it may be larger than the TCP
352 		 * slow-start window that the sender employs.  This will result
353 		 * in the sender stalling until the delayed ACK is sent, then
354 		 * resuming slow-start, resulting in very poor performance.
355 		 *
356 		 * Instead, we never request more than NB_SORECEIVE_CHUNK
357 		 * bytes at a time, resulting in an ack being pushed by
358 		 * the TCP code at the completion of each call.
359 		 */
360 		resid = len;
361 		while (resid > 0) {
362 			tm = NULL;
363 			rcvflg = MSG_WAITALL;
364 			bzero(&auio, sizeof(auio));
365 			auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
366 			auio.uio_td = td;
367 			resid -= auio.uio_resid;
368 			/*
369 			 * Spin until we have collected everything in
370 			 * this chunk.
371 			 */
372 			do {
373 				rcvflg = MSG_WAITALL;
374 				error = soreceive(so, (struct sockaddr **)NULL,
375 				    &auio, &tm, (struct mbuf **)NULL, &rcvflg);
376 			} while (error == EWOULDBLOCK || error == EINTR ||
377 				 error == ERESTART);
378 			if (error)
379 				goto out;
380 			/* short return guarantees unhappiness */
381 			if (auio.uio_resid > 0) {
382 				SMBERROR("packet is shorter than expected\n");
383 				error = EPIPE;
384 				goto out;
385 			}
386 			/* append received chunk to previous chunk(s) */
387 			if (m == NULL) {
388 				m = tm;
389 			} else {
390 				/*
391 				 * Just glue the new chain on the end.
392 				 * Consumer will pullup as required.
393 				 */
394 				for (im = m; im->m_next != NULL; im = im->m_next)
395 					;
396 				im->m_next = tm;
397 			}
398 		}
399 		/* got a session/message packet? */
400 		if (nbp->nbp_state == NBST_SESSION &&
401 		    rpcode == NB_SSN_MESSAGE)
402 			break;
403 		/* drop packet and try for another */
404 		NBDEBUG("non-session packet %x\n", rpcode);
405 		if (m) {
406 			m_freem(m);
407 			m = NULL;
408 		}
409 	}
410 
411 out:
412 	if (error) {
413 		if (m)
414 			m_freem(m);
415 		return error;
416 	}
417 	if (mpp)
418 		*mpp = m;
419 	else
420 		m_freem(m);
421 	*lenp = len;
422 	*rpcodep = rpcode;
423 	return 0;
424 }
425 
426 /*
427  * SMB transport interface
428  */
429 static int
430 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
431 {
432 	struct nbpcb *nbp;
433 
434 	nbp = malloc(sizeof *nbp, M_NBDATA, M_WAITOK);
435 	bzero(nbp, sizeof *nbp);
436 	nbp->nbp_timo.tv_sec = 15;	/* XXX: sysctl ? */
437 	nbp->nbp_state = NBST_CLOSED;
438 	nbp->nbp_vc = vcp;
439 	nbp->nbp_sndbuf = smb_tcpsndbuf;
440 	nbp->nbp_rcvbuf = smb_tcprcvbuf;
441 	vcp->vc_tdata = nbp;
442 	return 0;
443 }
444 
445 static int
446 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
447 {
448 	struct nbpcb *nbp = vcp->vc_tdata;
449 
450 	if (nbp == NULL)
451 		return ENOTCONN;
452 	smb_nbst_disconnect(vcp, td);
453 	if (nbp->nbp_laddr)
454 		free(nbp->nbp_laddr, M_SONAME);
455 	if (nbp->nbp_paddr)
456 		free(nbp->nbp_paddr, M_SONAME);
457 	free(nbp, M_NBDATA);
458 	return 0;
459 }
460 
461 static int
462 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
463 {
464 	struct nbpcb *nbp = vcp->vc_tdata;
465 	struct sockaddr_nb *snb;
466 	int error, slen;
467 
468 	NBDEBUG("\n");
469 	error = EINVAL;
470 	do {
471 		if (nbp->nbp_flags & NBF_LOCADDR)
472 			break;
473 		/*
474 		 * It is possible to create NETBIOS name in the kernel,
475 		 * but nothing prevents us to do it in the user space.
476 		 */
477 		if (sap == NULL)
478 			break;
479 		slen = sap->sa_len;
480 		if (slen < NB_MINSALEN)
481 			break;
482 		snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
483 		if (snb == NULL) {
484 			error = ENOMEM;
485 			break;
486 		}
487 		nbp->nbp_laddr = snb;
488 		nbp->nbp_flags |= NBF_LOCADDR;
489 		error = 0;
490 	} while(0);
491 	return error;
492 }
493 
494 static int
495 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
496 {
497 	struct nbpcb *nbp = vcp->vc_tdata;
498 	struct sockaddr_in sin;
499 	struct sockaddr_nb *snb;
500 	struct timespec ts1, ts2;
501 	int error, slen;
502 
503 	NBDEBUG("\n");
504 	if (nbp->nbp_tso != NULL)
505 		return EISCONN;
506 	if (nbp->nbp_laddr == NULL)
507 		return EINVAL;
508 	slen = sap->sa_len;
509 	if (slen < NB_MINSALEN)
510 		return EINVAL;
511 	if (nbp->nbp_paddr) {
512 		free(nbp->nbp_paddr, M_SONAME);
513 		nbp->nbp_paddr = NULL;
514 	}
515 	snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
516 	if (snb == NULL)
517 		return ENOMEM;
518 	nbp->nbp_paddr = snb;
519 	sin = snb->snb_addrin;
520 	getnanotime(&ts1);
521 	error = nb_connect_in(nbp, &sin, td);
522 	if (error)
523 		return error;
524 	getnanotime(&ts2);
525 	timespecsub(&ts2, &ts1);
526 	if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
527 		ts2.tv_sec = 1;
528 	nbp->nbp_timo = ts2;
529 	timespecadd(&nbp->nbp_timo, &ts2);
530 	timespecadd(&nbp->nbp_timo, &ts2);
531 	timespecadd(&nbp->nbp_timo, &ts2);	/*  * 4 */
532 	error = nbssn_rq_request(nbp, td);
533 	if (error)
534 		smb_nbst_disconnect(vcp, td);
535 	return error;
536 }
537 
538 static int
539 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
540 {
541 	struct nbpcb *nbp = vcp->vc_tdata;
542 	struct socket *so;
543 
544 	if (nbp == NULL || nbp->nbp_tso == NULL)
545 		return ENOTCONN;
546 	if ((so = nbp->nbp_tso) != NULL) {
547 		nbp->nbp_flags &= ~NBF_CONNECTED;
548 		nbp->nbp_tso = (struct socket *)NULL;
549 		soshutdown(so, 2);
550 		soclose(so);
551 	}
552 	if (nbp->nbp_state != NBST_RETARGET) {
553 		nbp->nbp_state = NBST_CLOSED;
554 	}
555 	return 0;
556 }
557 
558 static int
559 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
560 {
561 	struct nbpcb *nbp = vcp->vc_tdata;
562 	int error;
563 
564 	if (nbp->nbp_state != NBST_SESSION) {
565 		error = ENOTCONN;
566 		goto abort;
567 	}
568 	M_PREPEND(m0, 4, M_WAIT);
569 	nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
570 	error = nb_sosend(nbp->nbp_tso, m0, 0, td);
571 	return error;
572 abort:
573 	if (m0)
574 		m_freem(m0);
575 	return error;
576 }
577 
578 
579 static int
580 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
581 {
582 	struct nbpcb *nbp = vcp->vc_tdata;
583 	u_int8_t rpcode;
584 	int error, rplen;
585 
586 	nbp->nbp_flags |= NBF_RECVLOCK;
587 	error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
588 	nbp->nbp_flags &= ~NBF_RECVLOCK;
589 	return error;
590 }
591 
592 static void
593 smb_nbst_timo(struct smb_vc *vcp)
594 {
595 	return;
596 }
597 
598 static void
599 smb_nbst_intr(struct smb_vc *vcp)
600 {
601 	struct nbpcb *nbp = vcp->vc_tdata;
602 
603 	if (nbp == NULL || nbp->nbp_tso == NULL)
604 		return;
605 	sorwakeup(nbp->nbp_tso);
606 	sowwakeup(nbp->nbp_tso);
607 }
608 
609 static int
610 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
611 {
612 	struct nbpcb *nbp = vcp->vc_tdata;
613 
614 	switch (param) {
615 	    case SMBTP_SNDSZ:
616 		*(int*)data = nbp->nbp_sndbuf;
617 		break;
618 	    case SMBTP_RCVSZ:
619 		*(int*)data = nbp->nbp_rcvbuf;
620 		break;
621 	    case SMBTP_TIMEOUT:
622 		*(struct timespec*)data = nbp->nbp_timo;
623 		break;
624 	    default:
625 		return EINVAL;
626 	}
627 	return 0;
628 }
629 
630 static int
631 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
632 {
633 	struct nbpcb *nbp = vcp->vc_tdata;
634 
635 	switch (param) {
636 	    case SMBTP_SELECTID:
637 		nbp->nbp_selectid = data;
638 		break;
639 	    default:
640 		return EINVAL;
641 	}
642 	return 0;
643 }
644 
645 /*
646  * Check for fatal errors
647  */
648 static int
649 smb_nbst_fatal(struct smb_vc *vcp, int error)
650 {
651 	switch (error) {
652 	    case ENOTCONN:
653 	    case ENETRESET:
654 	    case ECONNABORTED:
655 		return 1;
656 	}
657 	return 0;
658 }
659 
660 
661 struct smb_tran_desc smb_tran_nbtcp_desc = {
662 	SMBT_NBTCP,
663 	smb_nbst_create, smb_nbst_done,
664 	smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
665 	smb_nbst_send, smb_nbst_recv,
666 	smb_nbst_timo, smb_nbst_intr,
667 	smb_nbst_getparam, smb_nbst_setparam,
668 	smb_nbst_fatal
669 };
670 
671