xref: /illumos-gate/usr/src/uts/common/xen/io/xnbo.c (revision c4ccc1f9004b70b07e4cdb57641c38ab607306c9)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 /*
28  * Xen network backend - mac client edition.
29  *
30  * A driver that sits above an existing GLDv3/Nemo MAC driver and
31  * relays packets to/from that driver from/to a guest domain.
32  */
33 
34 #ifdef DEBUG
35 #define	XNBO_DEBUG 1
36 #endif /* DEBUG */
37 
38 #include "xnb.h"
39 
40 #include <sys/sunddi.h>
41 #include <sys/ddi.h>
42 #include <sys/modctl.h>
43 #include <sys/strsubr.h>
44 #include <sys/mac_client.h>
45 #include <sys/mac_provider.h>
46 #include <sys/mac_client_priv.h>
47 #include <sys/mac.h>
48 #include <net/if.h>
49 #include <sys/dlpi.h>
50 #include <sys/pattr.h>
51 #include <xen/sys/xenbus_impl.h>
52 #include <xen/sys/xendev.h>
53 #include <sys/sdt.h>
54 #include <sys/note.h>
55 
56 #ifdef XNBO_DEBUG
57 boolean_t xnbo_cksum_offload_to_peer = B_TRUE;
58 boolean_t xnbo_cksum_offload_from_peer = B_TRUE;
59 #endif /* XNBO_DEBUG */
60 
61 /* Track multicast addresses. */
62 typedef struct xmca {
63 	struct xmca *next;
64 	ether_addr_t addr;
65 } xmca_t;
66 
67 /* State about this device instance. */
68 typedef struct xnbo {
69 	mac_handle_t		o_mh;
70 	mac_client_handle_t	o_mch;
71 	mac_unicast_handle_t	o_mah;
72 	mac_promisc_handle_t	o_mphp;
73 	boolean_t		o_running;
74 	boolean_t		o_promiscuous;
75 	uint32_t		o_hcksum_capab;
76 	xmca_t			*o_mca;
77 	char			o_link_name[LIFNAMSIZ];
78 	boolean_t		o_need_rx_filter;
79 	boolean_t		o_need_setphysaddr;
80 	boolean_t		o_multicast_control;
81 } xnbo_t;
82 
83 static void xnbo_close_mac(xnb_t *);
84 static void i_xnbo_close_mac(xnb_t *, boolean_t);
85 
86 /*
87  * Packets from the peer come here.  We pass them to the mac device.
88  */
89 static void
90 xnbo_to_mac(xnb_t *xnbp, mblk_t *mp)
91 {
92 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
93 
94 	ASSERT(mp != NULL);
95 
96 	if (!xnbop->o_running) {
97 		xnbp->xnb_stat_tx_too_early++;
98 		goto fail;
99 	}
100 
101 	if (mac_tx(xnbop->o_mch, mp, 0,
102 	    MAC_DROP_ON_NO_DESC, NULL) != (mac_tx_cookie_t)NULL) {
103 		xnbp->xnb_stat_mac_full++;
104 	}
105 
106 	return;
107 
108 fail:
109 	freemsgchain(mp);
110 }
111 
112 /*
113  * Process the checksum flags `flags' provided by the peer for the
114  * packet `mp'.
115  */
116 static mblk_t *
117 xnbo_cksum_from_peer(xnb_t *xnbp, mblk_t *mp, uint16_t flags)
118 {
119 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
120 
121 	ASSERT(mp->b_next == NULL);
122 
123 	if ((flags & NETTXF_csum_blank) != 0) {
124 		uint32_t capab = xnbop->o_hcksum_capab;
125 
126 #ifdef XNBO_DEBUG
127 		if (!xnbo_cksum_offload_from_peer)
128 			capab = 0;
129 #endif /* XNBO_DEBUG */
130 
131 		/*
132 		 * The checksum in the packet is blank.  Determine
133 		 * whether we can do hardware offload and, if so,
134 		 * update the flags on the mblk according.  If not,
135 		 * calculate and insert the checksum using software.
136 		 */
137 		mp = xnb_process_cksum_flags(xnbp, mp, capab);
138 	}
139 
140 	return (mp);
141 }
142 
143 /*
144  * Calculate the checksum flags to be relayed to the peer for the
145  * packet `mp'.
146  */
147 static uint16_t
148 xnbo_cksum_to_peer(xnb_t *xnbp, mblk_t *mp)
149 {
150 	_NOTE(ARGUNUSED(xnbp));
151 	uint16_t r = 0;
152 	uint32_t pflags, csum;
153 
154 #ifdef XNBO_DEBUG
155 	if (!xnbo_cksum_offload_to_peer)
156 		return (0);
157 #endif /* XNBO_DEBUG */
158 
159 	/*
160 	 * We might also check for HCK_PARTIALCKSUM here and,
161 	 * providing that the partial checksum covers the TCP/UDP
162 	 * payload, return NETRXF_data_validated.
163 	 *
164 	 * It seems that it's probably not worthwhile, as even MAC
165 	 * devices which advertise HCKSUM_INET_PARTIAL in their
166 	 * capabilities tend to use HCK_FULLCKSUM on the receive side
167 	 * - they are actually saying that in the output path the
168 	 * caller must use HCK_PARTIALCKSUM.
169 	 *
170 	 * Then again, if a NIC supports HCK_PARTIALCKSUM in its'
171 	 * output path, the host IP stack will use it. If such packets
172 	 * are destined for the peer (i.e. looped around) we would
173 	 * gain some advantage.
174 	 */
175 
176 	mac_hcksum_get(mp, NULL, NULL, NULL, &csum, &pflags);
177 
178 	/*
179 	 * If the MAC driver has asserted that the checksum is
180 	 * good, let the peer know.
181 	 */
182 	if (((pflags & HCK_FULLCKSUM) != 0) &&
183 	    (((pflags & HCK_FULLCKSUM_OK) != 0) ||
184 	    (csum == 0xffff)))
185 		r |= NETRXF_data_validated;
186 
187 	return (r);
188 }
189 
190 /*
191  * Packets from the mac device come here.  We pass them to the peer.
192  */
193 /*ARGSUSED*/
194 static void
195 xnbo_from_mac(void *arg, mac_resource_handle_t mrh, mblk_t *mp,
196     boolean_t loopback)
197 {
198 	xnb_t *xnbp = arg;
199 
200 	mp = xnb_copy_to_peer(xnbp, mp);
201 
202 	if (mp != NULL)
203 		freemsgchain(mp);
204 }
205 
206 /*
207  * Packets from the mac device come here. We pass them to the peer if
208  * the destination mac address matches or it's a multicast/broadcast
209  * address.
210  */
211 static void
212 xnbo_from_mac_filter(void *arg, mac_resource_handle_t mrh, mblk_t *mp,
213     boolean_t loopback)
214 {
215 	_NOTE(ARGUNUSED(loopback));
216 	xnb_t *xnbp = arg;
217 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
218 	mblk_t *next, *keep, *keep_head, *free, *free_head;
219 
220 	keep = keep_head = free = free_head = NULL;
221 
222 #define	ADD(list, bp)				\
223 	if (list != NULL)			\
224 		list->b_next = bp;		\
225 	else					\
226 		list##_head = bp;		\
227 	list = bp;
228 
229 	for (; mp != NULL; mp = next) {
230 		mac_header_info_t hdr_info;
231 
232 		next = mp->b_next;
233 		mp->b_next = NULL;
234 
235 		if (mac_header_info(xnbop->o_mh, mp, &hdr_info) != 0) {
236 			ADD(free, mp);
237 			continue;
238 		}
239 
240 		if ((hdr_info.mhi_dsttype == MAC_ADDRTYPE_BROADCAST) ||
241 		    (hdr_info.mhi_dsttype == MAC_ADDRTYPE_MULTICAST)) {
242 			ADD(keep, mp);
243 			continue;
244 		}
245 
246 		if (bcmp(hdr_info.mhi_daddr, xnbp->xnb_mac_addr,
247 		    sizeof (xnbp->xnb_mac_addr)) == 0) {
248 			ADD(keep, mp);
249 			continue;
250 		}
251 
252 		ADD(free, mp);
253 	}
254 #undef	ADD
255 
256 	if (keep_head != NULL)
257 		xnbo_from_mac(xnbp, mrh, keep_head, B_FALSE);
258 
259 	if (free_head != NULL)
260 		freemsgchain(free_head);
261 }
262 
263 static boolean_t
264 xnbo_open_mac(xnb_t *xnbp, char *mac)
265 {
266 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
267 	int err;
268 	const mac_info_t *mi;
269 	void (*rx_fn)(void *, mac_resource_handle_t, mblk_t *, boolean_t);
270 	struct ether_addr ea;
271 	uint_t max_sdu;
272 	mac_diag_t diag;
273 
274 	if ((err = mac_open_by_linkname(mac, &xnbop->o_mh)) != 0) {
275 		cmn_err(CE_WARN, "xnbo_open_mac: "
276 		    "cannot open mac for link %s (%d)", mac, err);
277 		return (B_FALSE);
278 	}
279 	ASSERT(xnbop->o_mh != NULL);
280 
281 	mi = mac_info(xnbop->o_mh);
282 	ASSERT(mi != NULL);
283 
284 	if (mi->mi_media != DL_ETHER) {
285 		cmn_err(CE_WARN, "xnbo_open_mac: "
286 		    "device is not DL_ETHER (%d)", mi->mi_media);
287 		i_xnbo_close_mac(xnbp, B_TRUE);
288 		return (B_FALSE);
289 	}
290 	if (mi->mi_media != mi->mi_nativemedia) {
291 		cmn_err(CE_WARN, "xnbo_open_mac: "
292 		    "device media and native media mismatch (%d != %d)",
293 		    mi->mi_media, mi->mi_nativemedia);
294 		i_xnbo_close_mac(xnbp, B_TRUE);
295 		return (B_FALSE);
296 	}
297 
298 	mac_sdu_get(xnbop->o_mh, NULL, &max_sdu);
299 	if (max_sdu > XNBMAXPKT) {
300 		cmn_err(CE_WARN, "xnbo_open_mac: mac device SDU too big (%d)",
301 		    max_sdu);
302 		i_xnbo_close_mac(xnbp, B_TRUE);
303 		return (B_FALSE);
304 	}
305 
306 	/*
307 	 * MAC_OPEN_FLAGS_MULTI_PRIMARY is relevant when we are migrating a
308 	 * guest on the localhost itself. In this case we would have the MAC
309 	 * client open for the guest being migrated *and* also for the
310 	 * migrated guest (i.e. the former will be active till the migration
311 	 * is complete when the latter will be activated). This flag states
312 	 * that it is OK for mac_unicast_add to add the primary MAC unicast
313 	 * address multiple times.
314 	 */
315 	if (mac_client_open(xnbop->o_mh, &xnbop->o_mch, NULL,
316 	    MAC_OPEN_FLAGS_USE_DATALINK_NAME |
317 	    MAC_OPEN_FLAGS_MULTI_PRIMARY) != 0) {
318 		cmn_err(CE_WARN, "xnbo_open_mac: "
319 		    "error (%d) opening mac client", err);
320 		i_xnbo_close_mac(xnbp, B_TRUE);
321 		return (B_FALSE);
322 	}
323 
324 	if (xnbop->o_need_rx_filter)
325 		rx_fn = xnbo_from_mac_filter;
326 	else
327 		rx_fn = xnbo_from_mac;
328 
329 	err = mac_unicast_add_set_rx(xnbop->o_mch, NULL, MAC_UNICAST_PRIMARY,
330 	    &xnbop->o_mah, 0, &diag, xnbop->o_multicast_control ? rx_fn : NULL,
331 	    xnbp);
332 	if (err != 0) {
333 		cmn_err(CE_WARN, "xnbo_open_mac: failed to get the primary "
334 		    "MAC address of %s: %d", mac, err);
335 		i_xnbo_close_mac(xnbp, B_TRUE);
336 		return (B_FALSE);
337 	}
338 	if (!xnbop->o_multicast_control) {
339 		err = mac_promisc_add(xnbop->o_mch, MAC_CLIENT_PROMISC_ALL,
340 		    rx_fn, xnbp, &xnbop->o_mphp, MAC_PROMISC_FLAGS_NO_TX_LOOP |
341 		    MAC_PROMISC_FLAGS_VLAN_TAG_STRIP);
342 		if (err != 0) {
343 			cmn_err(CE_WARN, "xnbo_open_mac: "
344 			    "cannot enable promiscuous mode of %s: %d",
345 			    mac, err);
346 			i_xnbo_close_mac(xnbp, B_TRUE);
347 			return (B_FALSE);
348 		}
349 		xnbop->o_promiscuous = B_TRUE;
350 	}
351 
352 	if (xnbop->o_need_setphysaddr) {
353 		err = mac_unicast_primary_set(xnbop->o_mh, xnbp->xnb_mac_addr);
354 		/* Warn, but continue on. */
355 		if (err != 0) {
356 			bcopy(xnbp->xnb_mac_addr, ea.ether_addr_octet,
357 			    ETHERADDRL);
358 			cmn_err(CE_WARN, "xnbo_open_mac: "
359 			    "cannot set MAC address of %s to "
360 			    "%s: %d", mac, ether_sprintf(&ea), err);
361 		}
362 	}
363 
364 	if (!mac_capab_get(xnbop->o_mh, MAC_CAPAB_HCKSUM,
365 	    &xnbop->o_hcksum_capab))
366 		xnbop->o_hcksum_capab = 0;
367 
368 	xnbop->o_running = B_TRUE;
369 
370 	return (B_TRUE);
371 }
372 
373 static void
374 xnbo_close_mac(xnb_t *xnbp)
375 {
376 	i_xnbo_close_mac(xnbp, B_FALSE);
377 }
378 
379 static void
380 i_xnbo_close_mac(xnb_t *xnbp, boolean_t locked)
381 {
382 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
383 	xmca_t *loop;
384 
385 	ASSERT(!locked || MUTEX_HELD(&xnbp->xnb_state_lock));
386 
387 	if (xnbop->o_mh == NULL)
388 		return;
389 
390 	if (xnbop->o_running)
391 		xnbop->o_running = B_FALSE;
392 
393 	if (!locked)
394 		mutex_enter(&xnbp->xnb_state_lock);
395 	loop = xnbop->o_mca;
396 	xnbop->o_mca = NULL;
397 	if (!locked)
398 		mutex_exit(&xnbp->xnb_state_lock);
399 
400 	while (loop != NULL) {
401 		xmca_t *next = loop->next;
402 
403 		DTRACE_PROBE3(mcast_remove,
404 		    (char *), "close",
405 		    (void *), xnbp,
406 		    (etheraddr_t *), loop->addr);
407 		(void) mac_multicast_remove(xnbop->o_mch, loop->addr);
408 		kmem_free(loop, sizeof (*loop));
409 		loop = next;
410 	}
411 
412 	if (xnbop->o_promiscuous) {
413 		if (xnbop->o_mphp != NULL) {
414 			mac_promisc_remove(xnbop->o_mphp);
415 			xnbop->o_mphp = NULL;
416 		}
417 		xnbop->o_promiscuous = B_FALSE;
418 	} else {
419 		if (xnbop->o_mch != NULL)
420 			mac_rx_clear(xnbop->o_mch);
421 	}
422 
423 	if (xnbop->o_mah != NULL) {
424 		(void) mac_unicast_remove(xnbop->o_mch, xnbop->o_mah);
425 		xnbop->o_mah = NULL;
426 	}
427 
428 	if (xnbop->o_mch != NULL) {
429 		mac_client_close(xnbop->o_mch, 0);
430 		xnbop->o_mch = NULL;
431 	}
432 
433 	mac_close(xnbop->o_mh);
434 	xnbop->o_mh = NULL;
435 }
436 
437 /*
438  * Hotplug has completed and we are connected to the peer. We have all
439  * the information we need to exchange traffic, so open the MAC device
440  * and configure it appropriately.
441  */
442 static boolean_t
443 xnbo_start_connect(xnb_t *xnbp)
444 {
445 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
446 
447 	return (xnbo_open_mac(xnbp, xnbop->o_link_name));
448 }
449 
450 /*
451  * The guest has successfully synchronize with this instance. We read
452  * the configuration of the guest from xenstore to check whether the
453  * guest requests multicast control. If not (the default) we make a
454  * note that the MAC device needs to be used in promiscious mode.
455  */
456 static boolean_t
457 xnbo_peer_connected(xnb_t *xnbp)
458 {
459 	char *oename;
460 	int request;
461 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
462 
463 	oename = xvdi_get_oename(xnbp->xnb_devinfo);
464 
465 	if (xenbus_scanf(XBT_NULL, oename,
466 	    "request-multicast-control", "%d", &request) != 0)
467 		request = 0;
468 	xnbop->o_multicast_control = (request > 0);
469 
470 	return (B_TRUE);
471 }
472 
473 /*
474  * The guest domain has closed down the inter-domain connection. We
475  * close the underlying MAC device.
476  */
477 static void
478 xnbo_peer_disconnected(xnb_t *xnbp)
479 {
480 	xnbo_close_mac(xnbp);
481 }
482 
483 /*
484  * The hotplug script has completed. We read information from xenstore
485  * about our configuration, most notably the name of the MAC device we
486  * should use.
487  */
488 static boolean_t
489 xnbo_hotplug_connected(xnb_t *xnbp)
490 {
491 	char *xsname;
492 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
493 	int need;
494 
495 	xsname = xvdi_get_xsname(xnbp->xnb_devinfo);
496 
497 	if (xenbus_scanf(XBT_NULL, xsname,
498 	    "nic", "%s", xnbop->o_link_name) != 0) {
499 		cmn_err(CE_WARN, "xnbo_connect: "
500 		    "cannot read nic name from %s", xsname);
501 		return (B_FALSE);
502 	}
503 
504 	if (xenbus_scanf(XBT_NULL, xsname,
505 	    "SUNW-need-rx-filter", "%d", &need) != 0)
506 		need = 0;
507 	xnbop->o_need_rx_filter = (need > 0);
508 
509 	if (xenbus_scanf(XBT_NULL, xsname,
510 	    "SUNW-need-set-physaddr", "%d", &need) != 0)
511 		need = 0;
512 	xnbop->o_need_setphysaddr = (need > 0);
513 
514 	return (B_TRUE);
515 }
516 
517 /*
518  * Find the multicast address `addr', return B_TRUE if it is one that
519  * we receive. If `remove', remove it from the set received.
520  */
521 static boolean_t
522 xnbo_mcast_find(xnb_t *xnbp, ether_addr_t *addr, boolean_t remove)
523 {
524 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
525 	xmca_t *prev, *del, *this;
526 
527 	ASSERT(MUTEX_HELD(&xnbp->xnb_state_lock));
528 	ASSERT(xnbop->o_promiscuous == B_FALSE);
529 
530 	prev = del = NULL;
531 
532 	this = xnbop->o_mca;
533 
534 	while (this != NULL) {
535 		if (bcmp(&this->addr, addr, sizeof (this->addr)) == 0) {
536 			del = this;
537 			if (remove) {
538 				if (prev == NULL)
539 					xnbop->o_mca = this->next;
540 				else
541 					prev->next = this->next;
542 			}
543 			break;
544 		}
545 
546 		prev = this;
547 		this = this->next;
548 	}
549 
550 	if (del == NULL)
551 		return (B_FALSE);
552 
553 	if (remove) {
554 		DTRACE_PROBE3(mcast_remove,
555 		    (char *), "remove",
556 		    (void *), xnbp,
557 		    (etheraddr_t *), del->addr);
558 		mac_multicast_remove(xnbop->o_mch, del->addr);
559 		kmem_free(del, sizeof (*del));
560 	}
561 
562 	return (B_TRUE);
563 }
564 
565 /*
566  * Add the multicast address `addr' to the set received.
567  */
568 static boolean_t
569 xnbo_mcast_add(xnb_t *xnbp, ether_addr_t *addr)
570 {
571 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
572 	boolean_t r = B_FALSE;
573 
574 	ASSERT(xnbop->o_promiscuous == B_FALSE);
575 
576 	mutex_enter(&xnbp->xnb_state_lock);
577 
578 	if (xnbo_mcast_find(xnbp, addr, B_FALSE)) {
579 		r = B_TRUE;
580 	} else if (mac_multicast_add(xnbop->o_mch,
581 	    (const uint8_t *)addr) == 0) {
582 		xmca_t *mca;
583 
584 		DTRACE_PROBE3(mcast_add,
585 		    (char *), "add",
586 		    (void *), xnbp,
587 		    (etheraddr_t *), addr);
588 
589 		mca = kmem_alloc(sizeof (*mca), KM_SLEEP);
590 		bcopy(addr, &mca->addr, sizeof (mca->addr));
591 
592 		mca->next = xnbop->o_mca;
593 		xnbop->o_mca = mca;
594 
595 		r = B_TRUE;
596 	}
597 
598 	mutex_exit(&xnbp->xnb_state_lock);
599 
600 	return (r);
601 }
602 
603 /*
604  * Remove the multicast address `addr' from the set received.
605  */
606 static boolean_t
607 xnbo_mcast_del(xnb_t *xnbp, ether_addr_t *addr)
608 {
609 	boolean_t r;
610 
611 	mutex_enter(&xnbp->xnb_state_lock);
612 	r = xnbo_mcast_find(xnbp, addr, B_TRUE);
613 	mutex_exit(&xnbp->xnb_state_lock);
614 
615 	return (r);
616 }
617 
618 static int
619 xnbo_attach(dev_info_t *dip, ddi_attach_cmd_t cmd)
620 {
621 	static xnb_flavour_t flavour = {
622 		xnbo_to_mac, xnbo_peer_connected, xnbo_peer_disconnected,
623 		xnbo_hotplug_connected, xnbo_start_connect,
624 		xnbo_cksum_from_peer, xnbo_cksum_to_peer,
625 		xnbo_mcast_add, xnbo_mcast_del,
626 	};
627 	xnbo_t *xnbop;
628 
629 	switch (cmd) {
630 	case DDI_ATTACH:
631 		break;
632 	case DDI_RESUME:
633 		return (DDI_SUCCESS);
634 	default:
635 		return (DDI_FAILURE);
636 	}
637 
638 	xnbop = kmem_zalloc(sizeof (*xnbop), KM_SLEEP);
639 
640 	if (xnb_attach(dip, &flavour, xnbop) != DDI_SUCCESS) {
641 		kmem_free(xnbop, sizeof (*xnbop));
642 		return (DDI_FAILURE);
643 	}
644 
645 	return (DDI_SUCCESS);
646 }
647 
648 static int
649 xnbo_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
650 {
651 	xnb_t *xnbp = ddi_get_driver_private(dip);
652 	xnbo_t *xnbop = xnbp->xnb_flavour_data;
653 
654 	switch (cmd) {
655 	case DDI_DETACH:
656 		break;
657 	case DDI_SUSPEND:
658 		return (DDI_SUCCESS);
659 	default:
660 		return (DDI_FAILURE);
661 	}
662 
663 	mutex_enter(&xnbp->xnb_tx_lock);
664 	mutex_enter(&xnbp->xnb_rx_lock);
665 
666 	if (!xnbp->xnb_detachable || xnbp->xnb_connected ||
667 	    (xnbp->xnb_tx_buf_count > 0)) {
668 		mutex_exit(&xnbp->xnb_rx_lock);
669 		mutex_exit(&xnbp->xnb_tx_lock);
670 
671 		return (DDI_FAILURE);
672 	}
673 
674 	mutex_exit(&xnbp->xnb_rx_lock);
675 	mutex_exit(&xnbp->xnb_tx_lock);
676 
677 	xnbo_close_mac(xnbp);
678 	kmem_free(xnbop, sizeof (*xnbop));
679 
680 	xnb_detach(dip);
681 
682 	return (DDI_SUCCESS);
683 }
684 
685 static struct cb_ops cb_ops = {
686 	nulldev,		/* open */
687 	nulldev,		/* close */
688 	nodev,			/* strategy */
689 	nodev,			/* print */
690 	nodev,			/* dump */
691 	nodev,			/* read */
692 	nodev,			/* write */
693 	nodev,			/* ioctl */
694 	nodev,			/* devmap */
695 	nodev,			/* mmap */
696 	nodev,			/* segmap */
697 	nochpoll,		/* poll */
698 	ddi_prop_op,		/* cb_prop_op */
699 	0,			/* streamtab  */
700 	D_NEW | D_MP | D_64BIT	/* Driver compatibility flag */
701 };
702 
703 static struct dev_ops ops = {
704 	DEVO_REV,		/* devo_rev */
705 	0,			/* devo_refcnt  */
706 	nulldev,		/* devo_getinfo */
707 	nulldev,		/* devo_identify */
708 	nulldev,		/* devo_probe */
709 	xnbo_attach,		/* devo_attach */
710 	xnbo_detach,		/* devo_detach */
711 	nodev,			/* devo_reset */
712 	&cb_ops,		/* devo_cb_ops */
713 	(struct bus_ops *)0,	/* devo_bus_ops */
714 	NULL,			/* devo_power */
715 	ddi_quiesce_not_needed,		/* devo_quiesce */
716 };
717 
718 static struct modldrv modldrv = {
719 	&mod_driverops, "xnbo driver", &ops,
720 };
721 
722 static struct modlinkage modlinkage = {
723 	MODREV_1, &modldrv, NULL
724 };
725 
726 int
727 _init(void)
728 {
729 	return (mod_install(&modlinkage));
730 }
731 
732 int
733 _info(struct modinfo *modinfop)
734 {
735 	return (mod_info(&modlinkage, modinfop));
736 }
737 
738 int
739 _fini(void)
740 {
741 	return (mod_remove(&modlinkage));
742 }
743