1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22 /*
23 * Copyright 2010 Sun Microsystems, Inc. All rights reserved.
24 * Use is subject to license terms.
25 */
26
27 /*
28 * Xen network backend - mac client edition.
29 *
30 * A driver that sits above an existing GLDv3/Nemo MAC driver and
31 * relays packets to/from that driver from/to a guest domain.
32 */
33
34 #ifdef DEBUG
35 #define XNBO_DEBUG 1
36 #endif /* DEBUG */
37
38 #include "xnb.h"
39
40 #include <sys/sunddi.h>
41 #include <sys/ddi.h>
42 #include <sys/modctl.h>
43 #include <sys/strsubr.h>
44 #include <sys/mac_client.h>
45 #include <sys/mac_provider.h>
46 #include <sys/mac_client_priv.h>
47 #include <sys/mac.h>
48 #include <net/if.h>
49 #include <sys/dlpi.h>
50 #include <sys/pattr.h>
51 #include <xen/sys/xenbus_impl.h>
52 #include <xen/sys/xendev.h>
53 #include <sys/sdt.h>
54 #include <sys/note.h>
55
56 #ifdef XNBO_DEBUG
57 boolean_t xnbo_cksum_offload_to_peer = B_TRUE;
58 boolean_t xnbo_cksum_offload_from_peer = B_TRUE;
59 #endif /* XNBO_DEBUG */
60
61 /* Track multicast addresses. */
62 typedef struct xmca {
63 struct xmca *next;
64 ether_addr_t addr;
65 } xmca_t;
66
67 /* State about this device instance. */
68 typedef struct xnbo {
69 mac_handle_t o_mh;
70 mac_client_handle_t o_mch;
71 mac_unicast_handle_t o_mah;
72 mac_promisc_handle_t o_mphp;
73 boolean_t o_running;
74 boolean_t o_promiscuous;
75 uint32_t o_hcksum_capab;
76 xmca_t *o_mca;
77 char o_link_name[LIFNAMSIZ];
78 boolean_t o_need_rx_filter;
79 boolean_t o_need_setphysaddr;
80 boolean_t o_multicast_control;
81 } xnbo_t;
82
83 static void xnbo_close_mac(xnb_t *);
84 static void i_xnbo_close_mac(xnb_t *, boolean_t);
85
86 /*
87 * Packets from the peer come here. We pass them to the mac device.
88 */
89 static void
xnbo_to_mac(xnb_t * xnbp,mblk_t * mp)90 xnbo_to_mac(xnb_t *xnbp, mblk_t *mp)
91 {
92 xnbo_t *xnbop = xnbp->xnb_flavour_data;
93
94 ASSERT(mp != NULL);
95
96 if (!xnbop->o_running) {
97 xnbp->xnb_stat_tx_too_early++;
98 goto fail;
99 }
100
101 if (mac_tx(xnbop->o_mch, mp, 0,
102 MAC_DROP_ON_NO_DESC, NULL) != NULL) {
103 xnbp->xnb_stat_mac_full++;
104 }
105
106 return;
107
108 fail:
109 freemsgchain(mp);
110 }
111
112 /*
113 * Process the checksum flags `flags' provided by the peer for the
114 * packet `mp'.
115 */
116 static mblk_t *
xnbo_cksum_from_peer(xnb_t * xnbp,mblk_t * mp,uint16_t flags)117 xnbo_cksum_from_peer(xnb_t *xnbp, mblk_t *mp, uint16_t flags)
118 {
119 xnbo_t *xnbop = xnbp->xnb_flavour_data;
120
121 ASSERT(mp->b_next == NULL);
122
123 if ((flags & NETTXF_csum_blank) != 0) {
124 uint32_t capab = xnbop->o_hcksum_capab;
125
126 #ifdef XNBO_DEBUG
127 if (!xnbo_cksum_offload_from_peer)
128 capab = 0;
129 #endif /* XNBO_DEBUG */
130
131 /*
132 * The checksum in the packet is blank. Determine
133 * whether we can do hardware offload and, if so,
134 * update the flags on the mblk according. If not,
135 * calculate and insert the checksum using software.
136 */
137 mp = xnb_process_cksum_flags(xnbp, mp, capab);
138 }
139
140 return (mp);
141 }
142
143 /*
144 * Calculate the checksum flags to be relayed to the peer for the
145 * packet `mp'.
146 */
147 static uint16_t
xnbo_cksum_to_peer(xnb_t * xnbp,mblk_t * mp)148 xnbo_cksum_to_peer(xnb_t *xnbp, mblk_t *mp)
149 {
150 _NOTE(ARGUNUSED(xnbp));
151 uint16_t r = 0;
152 uint32_t pflags, csum;
153
154 #ifdef XNBO_DEBUG
155 if (!xnbo_cksum_offload_to_peer)
156 return (0);
157 #endif /* XNBO_DEBUG */
158
159 /*
160 * We might also check for HCK_PARTIALCKSUM here and,
161 * providing that the partial checksum covers the TCP/UDP
162 * payload, return NETRXF_data_validated.
163 *
164 * It seems that it's probably not worthwhile, as even MAC
165 * devices which advertise HCKSUM_INET_PARTIAL in their
166 * capabilities tend to use HCK_FULLCKSUM on the receive side
167 * - they are actually saying that in the output path the
168 * caller must use HCK_PARTIALCKSUM.
169 *
170 * Then again, if a NIC supports HCK_PARTIALCKSUM in its'
171 * output path, the host IP stack will use it. If such packets
172 * are destined for the peer (i.e. looped around) we would
173 * gain some advantage.
174 */
175
176 mac_hcksum_get(mp, NULL, NULL, NULL, &csum, &pflags);
177
178 /*
179 * If the MAC driver has asserted that the checksum is
180 * good, let the peer know.
181 */
182 if (((pflags & HCK_FULLCKSUM) != 0) &&
183 (((pflags & HCK_FULLCKSUM_OK) != 0) ||
184 (csum == 0xffff)))
185 r |= NETRXF_data_validated;
186
187 return (r);
188 }
189
190 /*
191 * Packets from the mac device come here. We pass them to the peer.
192 */
193 /*ARGSUSED*/
194 static void
xnbo_from_mac(void * arg,mac_resource_handle_t mrh,mblk_t * mp,boolean_t loopback)195 xnbo_from_mac(void *arg, mac_resource_handle_t mrh, mblk_t *mp,
196 boolean_t loopback)
197 {
198 xnb_t *xnbp = arg;
199
200 mp = xnb_copy_to_peer(xnbp, mp);
201
202 if (mp != NULL)
203 freemsgchain(mp);
204 }
205
206 /*
207 * Packets from the mac device come here. We pass them to the peer if
208 * the destination mac address matches or it's a multicast/broadcast
209 * address.
210 */
211 static void
xnbo_from_mac_filter(void * arg,mac_resource_handle_t mrh,mblk_t * mp,boolean_t loopback)212 xnbo_from_mac_filter(void *arg, mac_resource_handle_t mrh, mblk_t *mp,
213 boolean_t loopback)
214 {
215 _NOTE(ARGUNUSED(loopback));
216 xnb_t *xnbp = arg;
217 xnbo_t *xnbop = xnbp->xnb_flavour_data;
218 mblk_t *next, *keep, *keep_head, *free, *free_head;
219
220 keep = keep_head = free = free_head = NULL;
221
222 #define ADD(list, bp) \
223 if (list != NULL) \
224 list->b_next = bp; \
225 else \
226 list##_head = bp; \
227 list = bp;
228
229 for (; mp != NULL; mp = next) {
230 mac_header_info_t hdr_info;
231
232 next = mp->b_next;
233 mp->b_next = NULL;
234
235 if (mac_header_info(xnbop->o_mh, mp, &hdr_info) != 0) {
236 ADD(free, mp);
237 continue;
238 }
239
240 if ((hdr_info.mhi_dsttype == MAC_ADDRTYPE_BROADCAST) ||
241 (hdr_info.mhi_dsttype == MAC_ADDRTYPE_MULTICAST)) {
242 ADD(keep, mp);
243 continue;
244 }
245
246 if (bcmp(hdr_info.mhi_daddr, xnbp->xnb_mac_addr,
247 sizeof (xnbp->xnb_mac_addr)) == 0) {
248 ADD(keep, mp);
249 continue;
250 }
251
252 ADD(free, mp);
253 }
254 #undef ADD
255
256 if (keep_head != NULL)
257 xnbo_from_mac(xnbp, mrh, keep_head, B_FALSE);
258
259 if (free_head != NULL)
260 freemsgchain(free_head);
261 }
262
263 static boolean_t
xnbo_open_mac(xnb_t * xnbp,char * mac)264 xnbo_open_mac(xnb_t *xnbp, char *mac)
265 {
266 xnbo_t *xnbop = xnbp->xnb_flavour_data;
267 int err;
268 const mac_info_t *mi;
269 void (*rx_fn)(void *, mac_resource_handle_t, mblk_t *, boolean_t);
270 struct ether_addr ea;
271 uint_t max_sdu;
272 mac_diag_t diag;
273
274 if ((err = mac_open_by_linkname(mac, &xnbop->o_mh)) != 0) {
275 cmn_err(CE_WARN, "xnbo_open_mac: "
276 "cannot open mac for link %s (%d)", mac, err);
277 return (B_FALSE);
278 }
279 ASSERT(xnbop->o_mh != NULL);
280
281 mi = mac_info(xnbop->o_mh);
282 ASSERT(mi != NULL);
283
284 if (mi->mi_media != DL_ETHER) {
285 cmn_err(CE_WARN, "xnbo_open_mac: "
286 "device is not DL_ETHER (%d)", mi->mi_media);
287 i_xnbo_close_mac(xnbp, B_TRUE);
288 return (B_FALSE);
289 }
290 if (mi->mi_media != mi->mi_nativemedia) {
291 cmn_err(CE_WARN, "xnbo_open_mac: "
292 "device media and native media mismatch (%d != %d)",
293 mi->mi_media, mi->mi_nativemedia);
294 i_xnbo_close_mac(xnbp, B_TRUE);
295 return (B_FALSE);
296 }
297
298 mac_sdu_get(xnbop->o_mh, NULL, &max_sdu);
299 if (max_sdu > XNBMAXPKT) {
300 cmn_err(CE_WARN, "xnbo_open_mac: mac device SDU too big (%d)",
301 max_sdu);
302 i_xnbo_close_mac(xnbp, B_TRUE);
303 return (B_FALSE);
304 }
305
306 /*
307 * MAC_OPEN_FLAGS_MULTI_PRIMARY is relevant when we are migrating a
308 * guest on the localhost itself. In this case we would have the MAC
309 * client open for the guest being migrated *and* also for the
310 * migrated guest (i.e. the former will be active till the migration
311 * is complete when the latter will be activated). This flag states
312 * that it is OK for mac_unicast_add to add the primary MAC unicast
313 * address multiple times.
314 */
315 if (mac_client_open(xnbop->o_mh, &xnbop->o_mch, NULL,
316 MAC_OPEN_FLAGS_USE_DATALINK_NAME |
317 MAC_OPEN_FLAGS_MULTI_PRIMARY) != 0) {
318 cmn_err(CE_WARN, "xnbo_open_mac: "
319 "error (%d) opening mac client", err);
320 i_xnbo_close_mac(xnbp, B_TRUE);
321 return (B_FALSE);
322 }
323
324 if (xnbop->o_need_rx_filter)
325 rx_fn = xnbo_from_mac_filter;
326 else
327 rx_fn = xnbo_from_mac;
328
329 err = mac_unicast_add_set_rx(xnbop->o_mch, NULL, MAC_UNICAST_PRIMARY,
330 &xnbop->o_mah, 0, &diag, xnbop->o_multicast_control ? rx_fn : NULL,
331 xnbp);
332 if (err != 0) {
333 cmn_err(CE_WARN, "xnbo_open_mac: failed to get the primary "
334 "MAC address of %s: %d", mac, err);
335 i_xnbo_close_mac(xnbp, B_TRUE);
336 return (B_FALSE);
337 }
338 if (!xnbop->o_multicast_control) {
339 err = mac_promisc_add(xnbop->o_mch, MAC_CLIENT_PROMISC_ALL,
340 rx_fn, xnbp, &xnbop->o_mphp, MAC_PROMISC_FLAGS_NO_TX_LOOP |
341 MAC_PROMISC_FLAGS_VLAN_TAG_STRIP);
342 if (err != 0) {
343 cmn_err(CE_WARN, "xnbo_open_mac: "
344 "cannot enable promiscuous mode of %s: %d",
345 mac, err);
346 i_xnbo_close_mac(xnbp, B_TRUE);
347 return (B_FALSE);
348 }
349 xnbop->o_promiscuous = B_TRUE;
350 }
351
352 if (xnbop->o_need_setphysaddr) {
353 err = mac_unicast_primary_set(xnbop->o_mh, xnbp->xnb_mac_addr);
354 /* Warn, but continue on. */
355 if (err != 0) {
356 bcopy(xnbp->xnb_mac_addr, ea.ether_addr_octet,
357 ETHERADDRL);
358 cmn_err(CE_WARN, "xnbo_open_mac: "
359 "cannot set MAC address of %s to "
360 "%s: %d", mac, ether_sprintf(&ea), err);
361 }
362 }
363
364 if (!mac_capab_get(xnbop->o_mh, MAC_CAPAB_HCKSUM,
365 &xnbop->o_hcksum_capab))
366 xnbop->o_hcksum_capab = 0;
367
368 xnbop->o_running = B_TRUE;
369
370 return (B_TRUE);
371 }
372
373 static void
xnbo_close_mac(xnb_t * xnbp)374 xnbo_close_mac(xnb_t *xnbp)
375 {
376 i_xnbo_close_mac(xnbp, B_FALSE);
377 }
378
379 static void
i_xnbo_close_mac(xnb_t * xnbp,boolean_t locked)380 i_xnbo_close_mac(xnb_t *xnbp, boolean_t locked)
381 {
382 xnbo_t *xnbop = xnbp->xnb_flavour_data;
383 xmca_t *loop;
384
385 ASSERT(!locked || MUTEX_HELD(&xnbp->xnb_state_lock));
386
387 if (xnbop->o_mh == NULL)
388 return;
389
390 if (xnbop->o_running)
391 xnbop->o_running = B_FALSE;
392
393 if (!locked)
394 mutex_enter(&xnbp->xnb_state_lock);
395 loop = xnbop->o_mca;
396 xnbop->o_mca = NULL;
397 if (!locked)
398 mutex_exit(&xnbp->xnb_state_lock);
399
400 while (loop != NULL) {
401 xmca_t *next = loop->next;
402
403 DTRACE_PROBE3(mcast_remove,
404 (char *), "close",
405 (void *), xnbp,
406 (etheraddr_t *), loop->addr);
407 (void) mac_multicast_remove(xnbop->o_mch, loop->addr);
408 kmem_free(loop, sizeof (*loop));
409 loop = next;
410 }
411
412 if (xnbop->o_promiscuous) {
413 if (xnbop->o_mphp != NULL) {
414 mac_promisc_remove(xnbop->o_mphp);
415 xnbop->o_mphp = NULL;
416 }
417 xnbop->o_promiscuous = B_FALSE;
418 } else {
419 if (xnbop->o_mch != NULL)
420 mac_rx_clear(xnbop->o_mch);
421 }
422
423 if (xnbop->o_mah != NULL) {
424 (void) mac_unicast_remove(xnbop->o_mch, xnbop->o_mah);
425 xnbop->o_mah = NULL;
426 }
427
428 if (xnbop->o_mch != NULL) {
429 mac_client_close(xnbop->o_mch, 0);
430 xnbop->o_mch = NULL;
431 }
432
433 mac_close(xnbop->o_mh);
434 xnbop->o_mh = NULL;
435 }
436
437 /*
438 * Hotplug has completed and we are connected to the peer. We have all
439 * the information we need to exchange traffic, so open the MAC device
440 * and configure it appropriately.
441 */
442 static boolean_t
xnbo_start_connect(xnb_t * xnbp)443 xnbo_start_connect(xnb_t *xnbp)
444 {
445 xnbo_t *xnbop = xnbp->xnb_flavour_data;
446
447 return (xnbo_open_mac(xnbp, xnbop->o_link_name));
448 }
449
450 /*
451 * The guest has successfully synchronize with this instance. We read
452 * the configuration of the guest from xenstore to check whether the
453 * guest requests multicast control. If not (the default) we make a
454 * note that the MAC device needs to be used in promiscious mode.
455 */
456 static boolean_t
xnbo_peer_connected(xnb_t * xnbp)457 xnbo_peer_connected(xnb_t *xnbp)
458 {
459 char *oename;
460 int request;
461 xnbo_t *xnbop = xnbp->xnb_flavour_data;
462
463 oename = xvdi_get_oename(xnbp->xnb_devinfo);
464
465 if (xenbus_scanf(XBT_NULL, oename,
466 "request-multicast-control", "%d", &request) != 0)
467 request = 0;
468 xnbop->o_multicast_control = (request > 0);
469
470 return (B_TRUE);
471 }
472
473 /*
474 * The guest domain has closed down the inter-domain connection. We
475 * close the underlying MAC device.
476 */
477 static void
xnbo_peer_disconnected(xnb_t * xnbp)478 xnbo_peer_disconnected(xnb_t *xnbp)
479 {
480 xnbo_close_mac(xnbp);
481 }
482
483 /*
484 * The hotplug script has completed. We read information from xenstore
485 * about our configuration, most notably the name of the MAC device we
486 * should use.
487 */
488 static boolean_t
xnbo_hotplug_connected(xnb_t * xnbp)489 xnbo_hotplug_connected(xnb_t *xnbp)
490 {
491 char *xsname;
492 xnbo_t *xnbop = xnbp->xnb_flavour_data;
493 int need;
494
495 xsname = xvdi_get_xsname(xnbp->xnb_devinfo);
496
497 if (xenbus_scanf(XBT_NULL, xsname,
498 "nic", "%s", xnbop->o_link_name) != 0) {
499 cmn_err(CE_WARN, "xnbo_connect: "
500 "cannot read nic name from %s", xsname);
501 return (B_FALSE);
502 }
503
504 if (xenbus_scanf(XBT_NULL, xsname,
505 "SUNW-need-rx-filter", "%d", &need) != 0)
506 need = 0;
507 xnbop->o_need_rx_filter = (need > 0);
508
509 if (xenbus_scanf(XBT_NULL, xsname,
510 "SUNW-need-set-physaddr", "%d", &need) != 0)
511 need = 0;
512 xnbop->o_need_setphysaddr = (need > 0);
513
514 return (B_TRUE);
515 }
516
517 /*
518 * Find the multicast address `addr', return B_TRUE if it is one that
519 * we receive. If `remove', remove it from the set received.
520 */
521 static boolean_t
xnbo_mcast_find(xnb_t * xnbp,ether_addr_t * addr,boolean_t remove)522 xnbo_mcast_find(xnb_t *xnbp, ether_addr_t *addr, boolean_t remove)
523 {
524 xnbo_t *xnbop = xnbp->xnb_flavour_data;
525 xmca_t *prev, *del, *this;
526
527 ASSERT(MUTEX_HELD(&xnbp->xnb_state_lock));
528 ASSERT(xnbop->o_promiscuous == B_FALSE);
529
530 prev = del = NULL;
531
532 this = xnbop->o_mca;
533
534 while (this != NULL) {
535 if (bcmp(&this->addr, addr, sizeof (this->addr)) == 0) {
536 del = this;
537 if (remove) {
538 if (prev == NULL)
539 xnbop->o_mca = this->next;
540 else
541 prev->next = this->next;
542 }
543 break;
544 }
545
546 prev = this;
547 this = this->next;
548 }
549
550 if (del == NULL)
551 return (B_FALSE);
552
553 if (remove) {
554 DTRACE_PROBE3(mcast_remove,
555 (char *), "remove",
556 (void *), xnbp,
557 (etheraddr_t *), del->addr);
558 mac_multicast_remove(xnbop->o_mch, del->addr);
559 kmem_free(del, sizeof (*del));
560 }
561
562 return (B_TRUE);
563 }
564
565 /*
566 * Add the multicast address `addr' to the set received.
567 */
568 static boolean_t
xnbo_mcast_add(xnb_t * xnbp,ether_addr_t * addr)569 xnbo_mcast_add(xnb_t *xnbp, ether_addr_t *addr)
570 {
571 xnbo_t *xnbop = xnbp->xnb_flavour_data;
572 boolean_t r = B_FALSE;
573
574 ASSERT(xnbop->o_promiscuous == B_FALSE);
575
576 mutex_enter(&xnbp->xnb_state_lock);
577
578 if (xnbo_mcast_find(xnbp, addr, B_FALSE)) {
579 r = B_TRUE;
580 } else if (mac_multicast_add(xnbop->o_mch,
581 (const uint8_t *)addr) == 0) {
582 xmca_t *mca;
583
584 DTRACE_PROBE3(mcast_add,
585 (char *), "add",
586 (void *), xnbp,
587 (etheraddr_t *), addr);
588
589 mca = kmem_alloc(sizeof (*mca), KM_SLEEP);
590 bcopy(addr, &mca->addr, sizeof (mca->addr));
591
592 mca->next = xnbop->o_mca;
593 xnbop->o_mca = mca;
594
595 r = B_TRUE;
596 }
597
598 mutex_exit(&xnbp->xnb_state_lock);
599
600 return (r);
601 }
602
603 /*
604 * Remove the multicast address `addr' from the set received.
605 */
606 static boolean_t
xnbo_mcast_del(xnb_t * xnbp,ether_addr_t * addr)607 xnbo_mcast_del(xnb_t *xnbp, ether_addr_t *addr)
608 {
609 boolean_t r;
610
611 mutex_enter(&xnbp->xnb_state_lock);
612 r = xnbo_mcast_find(xnbp, addr, B_TRUE);
613 mutex_exit(&xnbp->xnb_state_lock);
614
615 return (r);
616 }
617
618 static int
xnbo_attach(dev_info_t * dip,ddi_attach_cmd_t cmd)619 xnbo_attach(dev_info_t *dip, ddi_attach_cmd_t cmd)
620 {
621 static xnb_flavour_t flavour = {
622 xnbo_to_mac, xnbo_peer_connected, xnbo_peer_disconnected,
623 xnbo_hotplug_connected, xnbo_start_connect,
624 xnbo_cksum_from_peer, xnbo_cksum_to_peer,
625 xnbo_mcast_add, xnbo_mcast_del,
626 };
627 xnbo_t *xnbop;
628
629 switch (cmd) {
630 case DDI_ATTACH:
631 break;
632 case DDI_RESUME:
633 return (DDI_SUCCESS);
634 default:
635 return (DDI_FAILURE);
636 }
637
638 xnbop = kmem_zalloc(sizeof (*xnbop), KM_SLEEP);
639
640 if (xnb_attach(dip, &flavour, xnbop) != DDI_SUCCESS) {
641 kmem_free(xnbop, sizeof (*xnbop));
642 return (DDI_FAILURE);
643 }
644
645 return (DDI_SUCCESS);
646 }
647
648 static int
xnbo_detach(dev_info_t * dip,ddi_detach_cmd_t cmd)649 xnbo_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
650 {
651 xnb_t *xnbp = ddi_get_driver_private(dip);
652 xnbo_t *xnbop = xnbp->xnb_flavour_data;
653
654 switch (cmd) {
655 case DDI_DETACH:
656 break;
657 case DDI_SUSPEND:
658 return (DDI_SUCCESS);
659 default:
660 return (DDI_FAILURE);
661 }
662
663 mutex_enter(&xnbp->xnb_tx_lock);
664 mutex_enter(&xnbp->xnb_rx_lock);
665
666 if (!xnbp->xnb_detachable || xnbp->xnb_connected ||
667 (xnbp->xnb_tx_buf_count > 0)) {
668 mutex_exit(&xnbp->xnb_rx_lock);
669 mutex_exit(&xnbp->xnb_tx_lock);
670
671 return (DDI_FAILURE);
672 }
673
674 mutex_exit(&xnbp->xnb_rx_lock);
675 mutex_exit(&xnbp->xnb_tx_lock);
676
677 xnbo_close_mac(xnbp);
678 kmem_free(xnbop, sizeof (*xnbop));
679
680 xnb_detach(dip);
681
682 return (DDI_SUCCESS);
683 }
684
685 static struct cb_ops cb_ops = {
686 nulldev, /* open */
687 nulldev, /* close */
688 nodev, /* strategy */
689 nodev, /* print */
690 nodev, /* dump */
691 nodev, /* read */
692 nodev, /* write */
693 nodev, /* ioctl */
694 nodev, /* devmap */
695 nodev, /* mmap */
696 nodev, /* segmap */
697 nochpoll, /* poll */
698 ddi_prop_op, /* cb_prop_op */
699 0, /* streamtab */
700 D_NEW | D_MP | D_64BIT /* Driver compatibility flag */
701 };
702
703 static struct dev_ops ops = {
704 DEVO_REV, /* devo_rev */
705 0, /* devo_refcnt */
706 nulldev, /* devo_getinfo */
707 nulldev, /* devo_identify */
708 nulldev, /* devo_probe */
709 xnbo_attach, /* devo_attach */
710 xnbo_detach, /* devo_detach */
711 nodev, /* devo_reset */
712 &cb_ops, /* devo_cb_ops */
713 (struct bus_ops *)0, /* devo_bus_ops */
714 NULL, /* devo_power */
715 ddi_quiesce_not_needed, /* devo_quiesce */
716 };
717
718 static struct modldrv modldrv = {
719 &mod_driverops, "xnbo driver", &ops,
720 };
721
722 static struct modlinkage modlinkage = {
723 MODREV_1, &modldrv, NULL
724 };
725
726 int
_init(void)727 _init(void)
728 {
729 return (mod_install(&modlinkage));
730 }
731
732 int
_info(struct modinfo * modinfop)733 _info(struct modinfo *modinfop)
734 {
735 return (mod_info(&modlinkage, modinfop));
736 }
737
738 int
_fini(void)739 _fini(void)
740 {
741 return (mod_remove(&modlinkage));
742 }
743