cifs_sb->ctx->dir_mode);
        if (cifs_sb->ctx->iocharset)
                seq_printf(s, ",iocharset=%s", cifs_sb->ctx->iocharset);
+       if (tcon->ses->unicode == 0)
+               seq_puts(s, ",nounicode");
+       else if (tcon->ses->unicode == 1)
+               seq_puts(s, ",unicode");
        if (tcon->seal)
                seq_puts(s, ",seal");
        else if (tcon->ses->server->ignore_signature)
 
        unsigned int    cap_unix;
        unsigned int    cap_nt_find;
        unsigned int    cap_large_files;
+       unsigned int    cap_unicode;
        __u16           signing_enabled;
        __u16           signing_required;
        size_t          create_lease_size;
        bool sign;              /* is signing required? */
        bool domainAuto:1;
        bool expired_pwd;  /* track if access denied or expired pwd so can know if need to update */
+       int unicode;
        unsigned int flags;
        __u16 session_flags;
        __u8 smb3signingkey[SMB3_SIGN_KEY_SIZE];
 
                return rc;
 
        pSMB->hdr.Mid = get_next_mid(server);
-       pSMB->hdr.Flags2 |= (SMBFLG2_UNICODE | SMBFLG2_ERR_STATUS);
+       pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS;
+
+       if (ses->unicode != 0)
+               pSMB->hdr.Flags2 |= SMBFLG2_UNICODE;
 
        if (should_set_ext_sec_flag(ses->sectype)) {
                cifs_dbg(FYI, "Requesting extended security\n");
 
        ses->cred_uid = ctx->cred_uid;
        ses->linux_uid = ctx->linux_uid;
 
+       ses->unicode = ctx->unicode;
        ses->sectype = ctx->sectype;
        ses->sign = ctx->sign;
 
                   struct TCP_Server_Info *server,
                   struct nls_table *nls_info)
 {
-       int rc = -ENOSYS;
+       int rc = 0;
        struct TCP_Server_Info *pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
        struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&pserver->dstaddr;
        struct sockaddr_in *addr = (struct sockaddr_in *)&pserver->dstaddr;
                if (!linuxExtEnabled)
                        ses->capabilities &= (~server->vals->cap_unix);
 
+               /*
+                * Check if the server supports specified encoding mode.
+                * Zero value in vals->cap_unicode indidcates that chosen
+                * protocol dialect does not support non-UNICODE mode.
+                */
+               if (ses->unicode == 1 && server->vals->cap_unicode != 0 &&
+                   !(server->capabilities & server->vals->cap_unicode)) {
+                       cifs_dbg(VFS, "Server does not support mounting in UNICODE mode\n");
+                       rc = -EOPNOTSUPP;
+               } else if (ses->unicode == 0 && server->vals->cap_unicode == 0) {
+                       cifs_dbg(VFS, "Server does not support mounting in non-UNICODE mode\n");
+                       rc = -EOPNOTSUPP;
+               } else if (ses->unicode == 0) {
+                       /*
+                        * When UNICODE mode was explicitly disabled then
+                        * do not announce client UNICODE capability.
+                        */
+                       ses->capabilities &= (~server->vals->cap_unicode);
+               }
+
                if (ses->auth_key.response) {
                        cifs_dbg(FYI, "Free previous auth_key.response = %p\n",
                                 ses->auth_key.response);
        cifs_dbg(FYI, "Security Mode: 0x%x Capabilities: 0x%x TimeAdjust: %d\n",
                 server->sec_mode, server->capabilities, server->timeAdj);
 
-       if (server->ops->sess_setup)
-               rc = server->ops->sess_setup(xid, ses, server, nls_info);
+       if (!rc) {
+               if (server->ops->sess_setup)
+                       rc = server->ops->sess_setup(xid, ses, server, nls_info);
+               else
+                       rc = -ENOSYS;
+       }
 
        if (rc) {
                cifs_server_dbg(VFS, "Send error in SessSetup = %d\n", rc);
        ctx->seal = master_tcon->seal;
        ctx->witness = master_tcon->use_witness;
        ctx->dfs_root_ses = master_tcon->ses->dfs_root_ses;
+       ctx->unicode = master_tcon->ses->unicode;
 
        rc = cifs_set_vol_auth(ctx, master_tcon->ses);
        if (rc) {
 
        fsparam_flag("compress", Opt_compress),
        fsparam_flag("witness", Opt_witness),
        fsparam_flag_no("nativesocket", Opt_nativesocket),
+       fsparam_flag_no("unicode", Opt_unicode),
 
        /* Mount options which take uid or gid */
        fsparam_uid("backupuid", Opt_backupuid),
                cifs_errorf(fc, "can not change iocharset during remount\n");
                return -EINVAL;
        }
+       if (new_ctx->unicode != old_ctx->unicode) {
+               cifs_errorf(fc, "can not change unicode during remount\n");
+               return -EINVAL;
+       }
 
        return 0;
 }
                ctx->witness = true;
                pr_warn_once("Witness protocol support is experimental\n");
                break;
+       case Opt_unicode:
+               ctx->unicode = !result.negated;
+               cifs_dbg(FYI, "unicode set to %d\n", ctx->unicode);
+               break;
        case Opt_rootfs:
 #ifndef CONFIG_CIFS_ROOT
                cifs_dbg(VFS, "rootfs support requires CONFIG_CIFS_ROOT config option\n");
        ctx->symlink_type = CIFS_SYMLINK_TYPE_DEFAULT;
        ctx->nonativesocket = 0;
 
+       ctx->unicode = -1; /* autodetect, but prefer UNICODE mode */
+
 /*
  *     short int override_uid = -1;
  *     short int override_gid = -1;
 
        Opt_witness,
        Opt_is_upcall_target_mount,
        Opt_is_upcall_target_application,
+       Opt_unicode,
 
        /* Mount options which take numeric value */
        Opt_backupuid,
        bool compress; /* enable SMB2 messages (READ/WRITE) de/compression */
        bool rootfs:1; /* if it's a SMB root file system */
        bool witness:1; /* use witness protocol */
+       int unicode;
        char *leaf_fullpath;
        struct cifs_ses *dfs_root_ses;
        bool dfs_automount:1; /* set for dfs automount only */
 
        ctx->password = ses->password;
        ctx->sectype = ses->sectype;
        ctx->sign = ses->sign;
+       ctx->unicode = ses->unicode;
 
        /* UNC and paths */
        /* XXX: Use ses->server->hostname? */
 
        .cap_unix = CAP_UNIX,
        .cap_nt_find = CAP_NT_SMBS | CAP_NT_FIND,
        .cap_large_files = CAP_LARGE_FILES,
+       .cap_unicode = CAP_UNICODE,
        .signing_enabled = SECMODE_SIGN_ENABLED,
        .signing_required = SECMODE_SIGN_REQUIRED,
 };