1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21
22/*
23 * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
24 * Use is subject to license terms.
25 */
26
27/*
28 * Xen network backend - mac client edition.
29 *
30 * A driver that sits above an existing GLDv3/Nemo MAC driver and
31 * relays packets to/from that driver from/to a guest domain.
32 */
33
34#ifdef DEBUG
35#define	XNBO_DEBUG 1
36#endif /* DEBUG */
37
38#include "xnb.h"
39
40#include <sys/sunddi.h>
41#include <sys/ddi.h>
42#include <sys/modctl.h>
43#include <sys/strsubr.h>
44#include <sys/mac_client.h>
45#include <sys/mac_provider.h>
46#include <sys/mac_client_priv.h>
47#include <sys/mac.h>
48#include <net/if.h>
49#include <sys/dlpi.h>
50#include <sys/pattr.h>
51#include <xen/sys/xenbus_impl.h>
52#include <xen/sys/xendev.h>
53#include <sys/sdt.h>
54#include <sys/note.h>
55
56#ifdef XNBO_DEBUG
57boolean_t xnbo_cksum_offload_to_peer = B_TRUE;
58boolean_t xnbo_cksum_offload_from_peer = B_TRUE;
59#endif /* XNBO_DEBUG */
60
61/* Track multicast addresses. */
62typedef struct xmca {
63	struct xmca *next;
64	ether_addr_t addr;
65} xmca_t;
66
67/* State about this device instance. */
68typedef struct xnbo {
69	mac_handle_t		o_mh;
70	mac_client_handle_t	o_mch;
71	mac_unicast_handle_t	o_mah;
72	mac_promisc_handle_t	o_mphp;
73	boolean_t		o_running;
74	boolean_t		o_promiscuous;
75	uint32_t		o_hcksum_capab;
76	xmca_t			*o_mca;
77	char			o_link_name[LIFNAMSIZ];
78	boolean_t		o_need_rx_filter;
79	boolean_t		o_need_setphysaddr;
80	boolean_t		o_multicast_control;
81} xnbo_t;
82
83static void xnbo_close_mac(xnb_t *);
84static void i_xnbo_close_mac(xnb_t *, boolean_t);
85
86/*
87 * Packets from the peer come here.  We pass them to the mac device.
88 */
89static void
90xnbo_to_mac(xnb_t *xnbp, mblk_t *mp)
91{
92	xnbo_t *xnbop = xnbp->xnb_flavour_data;
93
94	ASSERT(mp != NULL);
95
96	if (!xnbop->o_running) {
97		xnbp->xnb_stat_tx_too_early++;
98		goto fail;
99	}
100
101	if (mac_tx(xnbop->o_mch, mp, 0,
102	    MAC_DROP_ON_NO_DESC, NULL) != NULL) {
103		xnbp->xnb_stat_mac_full++;
104	}
105
106	return;
107
108fail:
109	freemsgchain(mp);
110}
111
112/*
113 * Process the checksum flags `flags' provided by the peer for the
114 * packet `mp'.
115 */
116static mblk_t *
117xnbo_cksum_from_peer(xnb_t *xnbp, mblk_t *mp, uint16_t flags)
118{
119	xnbo_t *xnbop = xnbp->xnb_flavour_data;
120
121	ASSERT(mp->b_next == NULL);
122
123	if ((flags & NETTXF_csum_blank) != 0) {
124		uint32_t capab = xnbop->o_hcksum_capab;
125
126#ifdef XNBO_DEBUG
127		if (!xnbo_cksum_offload_from_peer)
128			capab = 0;
129#endif /* XNBO_DEBUG */
130
131		/*
132		 * The checksum in the packet is blank.  Determine
133		 * whether we can do hardware offload and, if so,
134		 * update the flags on the mblk according.  If not,
135		 * calculate and insert the checksum using software.
136		 */
137		mp = xnb_process_cksum_flags(xnbp, mp, capab);
138	}
139
140	return (mp);
141}
142
143/*
144 * Calculate the checksum flags to be relayed to the peer for the
145 * packet `mp'.
146 */
147static uint16_t
148xnbo_cksum_to_peer(xnb_t *xnbp, mblk_t *mp)
149{
150	_NOTE(ARGUNUSED(xnbp));
151	uint16_t r = 0;
152	uint32_t pflags, csum;
153
154#ifdef XNBO_DEBUG
155	if (!xnbo_cksum_offload_to_peer)
156		return (0);
157#endif /* XNBO_DEBUG */
158
159	/*
160	 * We might also check for HCK_PARTIALCKSUM here and,
161	 * providing that the partial checksum covers the TCP/UDP
162	 * payload, return NETRXF_data_validated.
163	 *
164	 * It seems that it's probably not worthwhile, as even MAC
165	 * devices which advertise HCKSUM_INET_PARTIAL in their
166	 * capabilities tend to use HCK_FULLCKSUM on the receive side
167	 * - they are actually saying that in the output path the
168	 * caller must use HCK_PARTIALCKSUM.
169	 *
170	 * Then again, if a NIC supports HCK_PARTIALCKSUM in its'
171	 * output path, the host IP stack will use it. If such packets
172	 * are destined for the peer (i.e. looped around) we would
173	 * gain some advantage.
174	 */
175
176	mac_hcksum_get(mp, NULL, NULL, NULL, &csum, &pflags);
177
178	/*
179	 * If the MAC driver has asserted that the checksum is
180	 * good, let the peer know.
181	 */
182	if (((pflags & HCK_FULLCKSUM) != 0) &&
183	    (((pflags & HCK_FULLCKSUM_OK) != 0) ||
184	    (csum == 0xffff)))
185		r |= NETRXF_data_validated;
186
187	return (r);
188}
189
190/*
191 * Packets from the mac device come here.  We pass them to the peer.
192 */
193/*ARGSUSED*/
194static void
195xnbo_from_mac(void *arg, mac_resource_handle_t mrh, mblk_t *mp,
196    boolean_t loopback)
197{
198	xnb_t *xnbp = arg;
199
200	mp = xnb_copy_to_peer(xnbp, mp);
201
202	if (mp != NULL)
203		freemsgchain(mp);
204}
205
206/*
207 * Packets from the mac device come here. We pass them to the peer if
208 * the destination mac address matches or it's a multicast/broadcast
209 * address.
210 */
211static void
212xnbo_from_mac_filter(void *arg, mac_resource_handle_t mrh, mblk_t *mp,
213    boolean_t loopback)
214{
215	_NOTE(ARGUNUSED(loopback));
216	xnb_t *xnbp = arg;
217	xnbo_t *xnbop = xnbp->xnb_flavour_data;
218	mblk_t *next, *keep, *keep_head, *free, *free_head;
219
220	keep = keep_head = free = free_head = NULL;
221
222#define	ADD(list, bp)				\
223	if (list != NULL)			\
224		list->b_next = bp;		\
225	else					\
226		list##_head = bp;		\
227	list = bp;
228
229	for (; mp != NULL; mp = next) {
230		mac_header_info_t hdr_info;
231
232		next = mp->b_next;
233		mp->b_next = NULL;
234
235		if (mac_header_info(xnbop->o_mh, mp, &hdr_info) != 0) {
236			ADD(free, mp);
237			continue;
238		}
239
240		if ((hdr_info.mhi_dsttype == MAC_ADDRTYPE_BROADCAST) ||
241		    (hdr_info.mhi_dsttype == MAC_ADDRTYPE_MULTICAST)) {
242			ADD(keep, mp);
243			continue;
244		}
245
246		if (bcmp(hdr_info.mhi_daddr, xnbp->xnb_mac_addr,
247		    sizeof (xnbp->xnb_mac_addr)) == 0) {
248			ADD(keep, mp);
249			continue;
250		}
251
252		ADD(free, mp);
253	}
254#undef	ADD
255
256	if (keep_head != NULL)
257		xnbo_from_mac(xnbp, mrh, keep_head, B_FALSE);
258
259	if (free_head != NULL)
260		freemsgchain(free_head);
261}
262
263static boolean_t
264xnbo_open_mac(xnb_t *xnbp, char *mac)
265{
266	xnbo_t *xnbop = xnbp->xnb_flavour_data;
267	int err;
268	const mac_info_t *mi;
269	void (*rx_fn)(void *, mac_resource_handle_t, mblk_t *, boolean_t);
270	struct ether_addr ea;
271	uint_t max_sdu;
272	mac_diag_t diag;
273
274	if ((err = mac_open_by_linkname(mac, &xnbop->o_mh)) != 0) {
275		cmn_err(CE_WARN, "xnbo_open_mac: "
276		    "cannot open mac for link %s (%d)", mac, err);
277		return (B_FALSE);
278	}
279	ASSERT(xnbop->o_mh != NULL);
280
281	mi = mac_info(xnbop->o_mh);
282	ASSERT(mi != NULL);
283
284	if (mi->mi_media != DL_ETHER) {
285		cmn_err(CE_WARN, "xnbo_open_mac: "
286		    "device is not DL_ETHER (%d)", mi->mi_media);
287		i_xnbo_close_mac(xnbp, B_TRUE);
288		return (B_FALSE);
289	}
290	if (mi->mi_media != mi->mi_nativemedia) {
291		cmn_err(CE_WARN, "xnbo_open_mac: "
292		    "device media and native media mismatch (%d != %d)",
293		    mi->mi_media, mi->mi_nativemedia);
294		i_xnbo_close_mac(xnbp, B_TRUE);
295		return (B_FALSE);
296	}
297
298	mac_sdu_get(xnbop->o_mh, NULL, &max_sdu);
299	if (max_sdu > XNBMAXPKT) {
300		cmn_err(CE_WARN, "xnbo_open_mac: mac device SDU too big (%d)",
301		    max_sdu);
302		i_xnbo_close_mac(xnbp, B_TRUE);
303		return (B_FALSE);
304	}
305
306	/*
307	 * MAC_OPEN_FLAGS_MULTI_PRIMARY is relevant when we are migrating a
308	 * guest on the localhost itself. In this case we would have the MAC
309	 * client open for the guest being migrated *and* also for the
310	 * migrated guest (i.e. the former will be active till the migration
311	 * is complete when the latter will be activated). This flag states
312	 * that it is OK for mac_unicast_add to add the primary MAC unicast
313	 * address multiple times.
314	 */
315	if (mac_client_open(xnbop->o_mh, &xnbop->o_mch, NULL,
316	    MAC_OPEN_FLAGS_USE_DATALINK_NAME |
317	    MAC_OPEN_FLAGS_MULTI_PRIMARY) != 0) {
318		cmn_err(CE_WARN, "xnbo_open_mac: "
319		    "error (%d) opening mac client", err);
320		i_xnbo_close_mac(xnbp, B_TRUE);
321		return (B_FALSE);
322	}
323
324	if (xnbop->o_need_rx_filter)
325		rx_fn = xnbo_from_mac_filter;
326	else
327		rx_fn = xnbo_from_mac;
328
329	err = mac_unicast_add_set_rx(xnbop->o_mch, NULL, MAC_UNICAST_PRIMARY,
330	    &xnbop->o_mah, 0, &diag, xnbop->o_multicast_control ? rx_fn : NULL,
331	    xnbp);
332	if (err != 0) {
333		cmn_err(CE_WARN, "xnbo_open_mac: failed to get the primary "
334		    "MAC address of %s: %d", mac, err);
335		i_xnbo_close_mac(xnbp, B_TRUE);
336		return (B_FALSE);
337	}
338	if (!xnbop->o_multicast_control) {
339		err = mac_promisc_add(xnbop->o_mch, MAC_CLIENT_PROMISC_ALL,
340		    rx_fn, xnbp, &xnbop->o_mphp, MAC_PROMISC_FLAGS_NO_TX_LOOP |
341		    MAC_PROMISC_FLAGS_VLAN_TAG_STRIP);
342		if (err != 0) {
343			cmn_err(CE_WARN, "xnbo_open_mac: "
344			    "cannot enable promiscuous mode of %s: %d",
345			    mac, err);
346			i_xnbo_close_mac(xnbp, B_TRUE);
347			return (B_FALSE);
348		}
349		xnbop->o_promiscuous = B_TRUE;
350	}
351
352	if (xnbop->o_need_setphysaddr) {
353		err = mac_unicast_primary_set(xnbop->o_mh, xnbp->xnb_mac_addr);
354		/* Warn, but continue on. */
355		if (err != 0) {
356			bcopy(xnbp->xnb_mac_addr, ea.ether_addr_octet,
357			    ETHERADDRL);
358			cmn_err(CE_WARN, "xnbo_open_mac: "
359			    "cannot set MAC address of %s to "
360			    "%s: %d", mac, ether_sprintf(&ea), err);
361		}
362	}
363
364	if (!mac_capab_get(xnbop->o_mh, MAC_CAPAB_HCKSUM,
365	    &xnbop->o_hcksum_capab))
366		xnbop->o_hcksum_capab = 0;
367
368	xnbop->o_running = B_TRUE;
369
370	return (B_TRUE);
371}
372
373static void
374xnbo_close_mac(xnb_t *xnbp)
375{
376	i_xnbo_close_mac(xnbp, B_FALSE);
377}
378
379static void
380i_xnbo_close_mac(xnb_t *xnbp, boolean_t locked)
381{
382	xnbo_t *xnbop = xnbp->xnb_flavour_data;
383	xmca_t *loop;
384
385	ASSERT(!locked || MUTEX_HELD(&xnbp->xnb_state_lock));
386
387	if (xnbop->o_mh == NULL)
388		return;
389
390	if (xnbop->o_running)
391		xnbop->o_running = B_FALSE;
392
393	if (!locked)
394		mutex_enter(&xnbp->xnb_state_lock);
395	loop = xnbop->o_mca;
396	xnbop->o_mca = NULL;
397	if (!locked)
398		mutex_exit(&xnbp->xnb_state_lock);
399
400	while (loop != NULL) {
401		xmca_t *next = loop->next;
402
403		DTRACE_PROBE3(mcast_remove,
404		    (char *), "close",
405		    (void *), xnbp,
406		    (etheraddr_t *), loop->addr);
407		(void) mac_multicast_remove(xnbop->o_mch, loop->addr);
408		kmem_free(loop, sizeof (*loop));
409		loop = next;
410	}
411
412	if (xnbop->o_promiscuous) {
413		if (xnbop->o_mphp != NULL) {
414			mac_promisc_remove(xnbop->o_mphp);
415			xnbop->o_mphp = NULL;
416		}
417		xnbop->o_promiscuous = B_FALSE;
418	} else {
419		if (xnbop->o_mch != NULL)
420			mac_rx_clear(xnbop->o_mch);
421	}
422
423	if (xnbop->o_mah != NULL) {
424		(void) mac_unicast_remove(xnbop->o_mch, xnbop->o_mah);
425		xnbop->o_mah = NULL;
426	}
427
428	if (xnbop->o_mch != NULL) {
429		mac_client_close(xnbop->o_mch, 0);
430		xnbop->o_mch = NULL;
431	}
432
433	mac_close(xnbop->o_mh);
434	xnbop->o_mh = NULL;
435}
436
437/*
438 * Hotplug has completed and we are connected to the peer. We have all
439 * the information we need to exchange traffic, so open the MAC device
440 * and configure it appropriately.
441 */
442static boolean_t
443xnbo_start_connect(xnb_t *xnbp)
444{
445	xnbo_t *xnbop = xnbp->xnb_flavour_data;
446
447	return (xnbo_open_mac(xnbp, xnbop->o_link_name));
448}
449
450/*
451 * The guest has successfully synchronize with this instance. We read
452 * the configuration of the guest from xenstore to check whether the
453 * guest requests multicast control. If not (the default) we make a
454 * note that the MAC device needs to be used in promiscious mode.
455 */
456static boolean_t
457xnbo_peer_connected(xnb_t *xnbp)
458{
459	char *oename;
460	int request;
461	xnbo_t *xnbop = xnbp->xnb_flavour_data;
462
463	oename = xvdi_get_oename(xnbp->xnb_devinfo);
464
465	if (xenbus_scanf(XBT_NULL, oename,
466	    "request-multicast-control", "%d", &request) != 0)
467		request = 0;
468	xnbop->o_multicast_control = (request > 0);
469
470	return (B_TRUE);
471}
472
473/*
474 * The guest domain has closed down the inter-domain connection. We
475 * close the underlying MAC device.
476 */
477static void
478xnbo_peer_disconnected(xnb_t *xnbp)
479{
480	xnbo_close_mac(xnbp);
481}
482
483/*
484 * The hotplug script has completed. We read information from xenstore
485 * about our configuration, most notably the name of the MAC device we
486 * should use.
487 */
488static boolean_t
489xnbo_hotplug_connected(xnb_t *xnbp)
490{
491	char *xsname;
492	xnbo_t *xnbop = xnbp->xnb_flavour_data;
493	int need;
494
495	xsname = xvdi_get_xsname(xnbp->xnb_devinfo);
496
497	if (xenbus_scanf(XBT_NULL, xsname,
498	    "nic", "%s", xnbop->o_link_name) != 0) {
499		cmn_err(CE_WARN, "xnbo_connect: "
500		    "cannot read nic name from %s", xsname);
501		return (B_FALSE);
502	}
503
504	if (xenbus_scanf(XBT_NULL, xsname,
505	    "SUNW-need-rx-filter", "%d", &need) != 0)
506		need = 0;
507	xnbop->o_need_rx_filter = (need > 0);
508
509	if (xenbus_scanf(XBT_NULL, xsname,
510	    "SUNW-need-set-physaddr", "%d", &need) != 0)
511		need = 0;
512	xnbop->o_need_setphysaddr = (need > 0);
513
514	return (B_TRUE);
515}
516
517/*
518 * Find the multicast address `addr', return B_TRUE if it is one that
519 * we receive. If `remove', remove it from the set received.
520 */
521static boolean_t
522xnbo_mcast_find(xnb_t *xnbp, ether_addr_t *addr, boolean_t remove)
523{
524	xnbo_t *xnbop = xnbp->xnb_flavour_data;
525	xmca_t *prev, *del, *this;
526
527	ASSERT(MUTEX_HELD(&xnbp->xnb_state_lock));
528	ASSERT(xnbop->o_promiscuous == B_FALSE);
529
530	prev = del = NULL;
531
532	this = xnbop->o_mca;
533
534	while (this != NULL) {
535		if (bcmp(&this->addr, addr, sizeof (this->addr)) == 0) {
536			del = this;
537			if (remove) {
538				if (prev == NULL)
539					xnbop->o_mca = this->next;
540				else
541					prev->next = this->next;
542			}
543			break;
544		}
545
546		prev = this;
547		this = this->next;
548	}
549
550	if (del == NULL)
551		return (B_FALSE);
552
553	if (remove) {
554		DTRACE_PROBE3(mcast_remove,
555		    (char *), "remove",
556		    (void *), xnbp,
557		    (etheraddr_t *), del->addr);
558		mac_multicast_remove(xnbop->o_mch, del->addr);
559		kmem_free(del, sizeof (*del));
560	}
561
562	return (B_TRUE);
563}
564
565/*
566 * Add the multicast address `addr' to the set received.
567 */
568static boolean_t
569xnbo_mcast_add(xnb_t *xnbp, ether_addr_t *addr)
570{
571	xnbo_t *xnbop = xnbp->xnb_flavour_data;
572	boolean_t r = B_FALSE;
573
574	ASSERT(xnbop->o_promiscuous == B_FALSE);
575
576	mutex_enter(&xnbp->xnb_state_lock);
577
578	if (xnbo_mcast_find(xnbp, addr, B_FALSE)) {
579		r = B_TRUE;
580	} else if (mac_multicast_add(xnbop->o_mch,
581	    (const uint8_t *)addr) == 0) {
582		xmca_t *mca;
583
584		DTRACE_PROBE3(mcast_add,
585		    (char *), "add",
586		    (void *), xnbp,
587		    (etheraddr_t *), addr);
588
589		mca = kmem_alloc(sizeof (*mca), KM_SLEEP);
590		bcopy(addr, &mca->addr, sizeof (mca->addr));
591
592		mca->next = xnbop->o_mca;
593		xnbop->o_mca = mca;
594
595		r = B_TRUE;
596	}
597
598	mutex_exit(&xnbp->xnb_state_lock);
599
600	return (r);
601}
602
603/*
604 * Remove the multicast address `addr' from the set received.
605 */
606static boolean_t
607xnbo_mcast_del(xnb_t *xnbp, ether_addr_t *addr)
608{
609	boolean_t r;
610
611	mutex_enter(&xnbp->xnb_state_lock);
612	r = xnbo_mcast_find(xnbp, addr, B_TRUE);
613	mutex_exit(&xnbp->xnb_state_lock);
614
615	return (r);
616}
617
618static int
619xnbo_attach(dev_info_t *dip, ddi_attach_cmd_t cmd)
620{
621	static xnb_flavour_t flavour = {
622		xnbo_to_mac, xnbo_peer_connected, xnbo_peer_disconnected,
623		xnbo_hotplug_connected, xnbo_start_connect,
624		xnbo_cksum_from_peer, xnbo_cksum_to_peer,
625		xnbo_mcast_add, xnbo_mcast_del,
626	};
627	xnbo_t *xnbop;
628
629	switch (cmd) {
630	case DDI_ATTACH:
631		break;
632	case DDI_RESUME:
633		return (DDI_SUCCESS);
634	default:
635		return (DDI_FAILURE);
636	}
637
638	xnbop = kmem_zalloc(sizeof (*xnbop), KM_SLEEP);
639
640	if (xnb_attach(dip, &flavour, xnbop) != DDI_SUCCESS) {
641		kmem_free(xnbop, sizeof (*xnbop));
642		return (DDI_FAILURE);
643	}
644
645	return (DDI_SUCCESS);
646}
647
648static int
649xnbo_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
650{
651	xnb_t *xnbp = ddi_get_driver_private(dip);
652	xnbo_t *xnbop = xnbp->xnb_flavour_data;
653
654	switch (cmd) {
655	case DDI_DETACH:
656		break;
657	case DDI_SUSPEND:
658		return (DDI_SUCCESS);
659	default:
660		return (DDI_FAILURE);
661	}
662
663	mutex_enter(&xnbp->xnb_tx_lock);
664	mutex_enter(&xnbp->xnb_rx_lock);
665
666	if (!xnbp->xnb_detachable || xnbp->xnb_connected ||
667	    (xnbp->xnb_tx_buf_count > 0)) {
668		mutex_exit(&xnbp->xnb_rx_lock);
669		mutex_exit(&xnbp->xnb_tx_lock);
670
671		return (DDI_FAILURE);
672	}
673
674	mutex_exit(&xnbp->xnb_rx_lock);
675	mutex_exit(&xnbp->xnb_tx_lock);
676
677	xnbo_close_mac(xnbp);
678	kmem_free(xnbop, sizeof (*xnbop));
679
680	xnb_detach(dip);
681
682	return (DDI_SUCCESS);
683}
684
685static struct cb_ops cb_ops = {
686	nulldev,		/* open */
687	nulldev,		/* close */
688	nodev,			/* strategy */
689	nodev,			/* print */
690	nodev,			/* dump */
691	nodev,			/* read */
692	nodev,			/* write */
693	nodev,			/* ioctl */
694	nodev,			/* devmap */
695	nodev,			/* mmap */
696	nodev,			/* segmap */
697	nochpoll,		/* poll */
698	ddi_prop_op,		/* cb_prop_op */
699	0,			/* streamtab  */
700	D_NEW | D_MP | D_64BIT	/* Driver compatibility flag */
701};
702
703static struct dev_ops ops = {
704	DEVO_REV,		/* devo_rev */
705	0,			/* devo_refcnt  */
706	nulldev,		/* devo_getinfo */
707	nulldev,		/* devo_identify */
708	nulldev,		/* devo_probe */
709	xnbo_attach,		/* devo_attach */
710	xnbo_detach,		/* devo_detach */
711	nodev,			/* devo_reset */
712	&cb_ops,		/* devo_cb_ops */
713	(struct bus_ops *)0,	/* devo_bus_ops */
714	NULL,			/* devo_power */
715	ddi_quiesce_not_needed,		/* devo_quiesce */
716};
717
718static struct modldrv modldrv = {
719	&mod_driverops, "xnbo driver", &ops,
720};
721
722static struct modlinkage modlinkage = {
723	MODREV_1, &modldrv, NULL
724};
725
726int
727_init(void)
728{
729	return (mod_install(&modlinkage));
730}
731
732int
733_info(struct modinfo *modinfop)
734{
735	return (mod_info(&modlinkage, modinfop));
736}
737
738int
739_fini(void)
740{
741	return (mod_remove(&modlinkage));
742}
743