xref: /illumos-gate/usr/src/cmd/mdb/common/kmdb/kmdb_kvm.c (revision 069e6b7e31ba5dcbc5441b98af272714d9a5455c)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
23  * Copyright (c) 2013 by Delphix. All rights reserved.
24  *
25  * Copyright 2019 Joyent, Inc.
26  */
27 
28 #include <kmdb/kmdb_kvm.h>
29 #include <kmdb/kvm.h>
30 #include <kmdb/kmdb_kdi.h>
31 #include <kmdb/kmdb_promif.h>
32 #include <kmdb/kmdb_module.h>
33 #include <kmdb/kmdb_asmutil.h>
34 #include <mdb/mdb_types.h>
35 #include <mdb/mdb_conf.h>
36 #include <mdb/mdb_err.h>
37 #include <mdb/mdb_modapi.h>
38 #include <mdb/mdb_target_impl.h>
39 #include <mdb/mdb_debug.h>
40 #include <mdb/mdb_string.h>
41 #include <mdb/mdb_ctf.h>
42 #include <mdb/mdb_kreg_impl.h>
43 #include <mdb/mdb_ks.h>
44 #include <mdb/mdb.h>
45 
46 #include <strings.h>
47 #include <dlfcn.h>
48 #include <sys/isa_defs.h>
49 #include <sys/kobj.h>
50 #include <sys/kobj_impl.h>
51 #include <sys/bitmap.h>
52 #include <sys/uuid.h>
53 #include <vm/as.h>
54 
55 static const char KMT_RTLD_NAME[] = "krtld";
56 static const char KMT_MODULE[] = "mdb_ks";
57 static const char KMT_CTFPARENT[] = "genunix";
58 
59 static mdb_list_t kmt_defbp_list;	/* List of current deferred bp's */
60 static int kmt_defbp_lock;		/* For list, running kernel holds */
61 static uint_t kmt_defbp_modchg_isload;	/* Whether mod change is load/unload */
62 static struct modctl *kmt_defbp_modchg_modctl; /* modctl for defbp checking */
63 static uint_t kmt_defbp_num;		/* Number of referenced def'd bp's */
64 static int kmt_defbp_bpspec;		/* vespec for def'd bp activation bp */
65 
66 static const mdb_se_ops_t kmt_brkpt_ops;
67 static const mdb_se_ops_t kmt_wapt_ops;
68 
69 static void kmt_sync(mdb_tgt_t *);
70 
71 typedef struct kmt_symarg {
72 	mdb_tgt_sym_f *sym_cb;		/* Caller's callback function */
73 	void *sym_data;			/* Callback function argument */
74 	uint_t sym_type;		/* Symbol type/binding filter */
75 	mdb_syminfo_t sym_info;		/* Symbol id and table id */
76 	const char *sym_obj;		/* Containing object */
77 } kmt_symarg_t;
78 
79 typedef struct kmt_maparg {
80 	mdb_tgt_t *map_target;		/* Target used for mapping iter */
81 	mdb_tgt_map_f *map_cb;		/* Caller's callback function */
82 	void *map_data;			/* Callback function argument */
83 } kmt_maparg_t;
84 
85 /*ARGSUSED*/
86 int
87 kmt_setflags(mdb_tgt_t *t, int flags)
88 {
89 	/*
90 	 * We only handle one flag (ALLOWIO), and we can't fail to set or clear
91 	 * it, so we just blindly replace the t_flags version with the one
92 	 * passed.
93 	 */
94 	t->t_flags = (t->t_flags & ~MDB_TGT_F_ALLOWIO) |
95 	    (flags & MDB_TGT_F_ALLOWIO);
96 
97 	return (0);
98 }
99 
100 /*ARGSUSED*/
101 const char *
102 kmt_name(mdb_tgt_t *t)
103 {
104 	return ("kmdb_kvm");
105 }
106 
107 /*ARGSUSED*/
108 static const char *
109 kmt_platform(mdb_tgt_t *t)
110 {
111 	static char platform[SYS_NMLN];
112 
113 	if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT)
114 		return (mdb_conf_platform());
115 
116 	if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, platform,
117 	    sizeof (platform), "unix", "platform") != sizeof (platform)) {
118 		warn("'platform' symbol is missing from kernel\n");
119 		return ("unknown");
120 	}
121 
122 	return (platform);
123 }
124 
125 static int
126 kmt_uname(mdb_tgt_t *t, struct utsname *utsp)
127 {
128 	return (mdb_tgt_readsym(t, MDB_TGT_AS_VIRT, utsp,
129 	    sizeof (struct utsname), MDB_TGT_OBJ_EXEC, "utsname"));
130 }
131 
132 /*ARGSUSED*/
133 static int
134 kmt_dmodel(mdb_tgt_t *t)
135 {
136 	return (MDB_TGT_MODEL_NATIVE);
137 }
138 
139 /*ARGSUSED*/
140 ssize_t
141 kmt_rw(mdb_tgt_t *t, void *buf, size_t nbytes, uint64_t addr,
142     ssize_t (*rw)(void *, size_t, uint64_t))
143 {
144 	/*
145 	 * chunksz needs to be volatile because of the use of setjmp() in this
146 	 * function.
147 	 */
148 	volatile size_t chunksz;
149 	size_t n, ndone;
150 	jmp_buf *oldpcb = NULL;
151 	jmp_buf pcb;
152 	ssize_t res;
153 
154 	kmdb_prom_check_interrupt();
155 
156 	if (nbytes == 0)
157 		return (0);
158 
159 	/*
160 	 * Try to process the entire buffer, as requested.  If we catch a fault,
161 	 * try smaller chunks.  This allows us to handle regions that cross
162 	 * mapping boundaries.
163 	 */
164 	chunksz = nbytes;
165 	ndone = 0;
166 	if (setjmp(pcb) != 0) {
167 		if (chunksz == 1) {
168 			/* We failed with the smallest chunk - give up */
169 			kmdb_dpi_restore_fault_hdlr(oldpcb);
170 			return (ndone > 0 ? ndone : -1); /* errno set for us */
171 		} else if (chunksz > 4)
172 			chunksz = 4;
173 		else
174 			chunksz = 1;
175 	}
176 
177 	oldpcb = kmdb_dpi_set_fault_hdlr(&pcb);
178 	while (nbytes > 0) {
179 		n = MIN(chunksz, nbytes);
180 
181 		if ((res = rw(buf, n, addr)) != n)
182 			return (res < 0 ? res : ndone + res);
183 
184 		addr += n;
185 		nbytes -= n;
186 		ndone += n;
187 		buf = ((caddr_t)buf + n);
188 	}
189 
190 	kmdb_dpi_restore_fault_hdlr(oldpcb);
191 
192 	return (ndone);
193 }
194 
195 static void
196 kmt_bcopy(const void *s1, void *s2, size_t n)
197 {
198 	/*
199 	 * We need to guarantee atomic accesses for certain sizes.  bcopy won't
200 	 * make that guarantee, so we need to do it ourselves.
201 	 */
202 #ifdef	_LP64
203 	if (n == 8 && ((uintptr_t)s1 & 7) == 0 && ((uintptr_t)s2 & 7) == 0)
204 		*(uint64_t *)s2 = *(uint64_t *)s1;
205 	else
206 #endif
207 	if (n == 4 && ((uintptr_t)s1 & 3) == 0 && ((uintptr_t)s2 & 3) == 0)
208 		*(uint32_t *)s2 = *(uint32_t *)s1;
209 	else if (n == 2 && ((uintptr_t)s1 & 1) == 0 && ((uintptr_t)s2 & 1) == 0)
210 		*(uint16_t *)s2 = *(uint16_t *)s1;
211 	else if (n == 1)
212 		*(uint8_t *)s2 = *(uint8_t *)s1;
213 	else
214 		bcopy(s1, s2, n);
215 }
216 
217 static ssize_t
218 kmt_reader(void *buf, size_t nbytes, uint64_t addr)
219 {
220 	kmt_bcopy((void *)(uintptr_t)addr, buf, nbytes);
221 	return (nbytes);
222 }
223 
224 ssize_t
225 kmt_writer(void *buf, size_t nbytes, uint64_t addr)
226 {
227 	kmt_bcopy(buf, (void *)(uintptr_t)addr, nbytes);
228 	return (nbytes);
229 }
230 
231 /*ARGSUSED*/
232 static ssize_t
233 kmt_read(mdb_tgt_t *t, void *buf, size_t nbytes, uintptr_t addr)
234 {
235 	/*
236 	 * We don't want to allow reads of I/O-mapped memory.  Multi-page reads
237 	 * that cross into I/O-mapped memory should be restricted to the initial
238 	 * non-I/O region.  Reads that begin in I/O-mapped memory are failed
239 	 * outright.
240 	 */
241 	if (!(t->t_flags & MDB_TGT_F_ALLOWIO) &&
242 	    (nbytes = kmdb_kdi_range_is_nontoxic(addr, nbytes, 0)) == 0)
243 		return (set_errno(EMDB_NOMAP));
244 
245 	return (kmt_rw(t, buf, nbytes, addr, kmt_reader));
246 }
247 
248 /*ARGSUSED*/
249 static ssize_t
250 kmt_pread(mdb_tgt_t *t, void *buf, size_t nbytes, physaddr_t addr)
251 {
252 	return (kmt_rw(t, buf, nbytes, addr, kmdb_kdi_pread));
253 }
254 
255 /*ARGSUSED*/
256 ssize_t
257 kmt_pwrite(mdb_tgt_t *t, const void *buf, size_t nbytes, physaddr_t addr)
258 {
259 	return (kmt_rw(t, (void *)buf, nbytes, addr, kmdb_kdi_pwrite));
260 }
261 
262 static uintptr_t
263 kmt_read_kas(mdb_tgt_t *t)
264 {
265 	GElf_Sym sym;
266 
267 	if (mdb_tgt_lookup_by_name(t, "unix", "kas", &sym, NULL) < 0) {
268 		warn("'kas' symbol is missing from kernel\n");
269 		(void) set_errno(EMDB_NOSYM);
270 		return (0);
271 	}
272 
273 	return ((uintptr_t)sym.st_value);
274 }
275 
276 static int
277 kmt_vtop(mdb_tgt_t *t, mdb_tgt_as_t as, uintptr_t va, physaddr_t *pap)
278 {
279 	mdb_module_t *mod;
280 	struct as *asp;
281 	mdb_var_t *v;
282 
283 	switch ((uintptr_t)as) {
284 	case (uintptr_t)MDB_TGT_AS_PHYS:
285 	case (uintptr_t)MDB_TGT_AS_FILE:
286 	case (uintptr_t)MDB_TGT_AS_IO:
287 		return (set_errno(EINVAL));
288 	case (uintptr_t)MDB_TGT_AS_VIRT:
289 	case (uintptr_t)MDB_TGT_AS_VIRT_I:
290 	case (uintptr_t)MDB_TGT_AS_VIRT_S:
291 		if ((asp = (struct as *)kmt_read_kas(t)) == NULL)
292 			return (-1); /* errno is set for us */
293 		break;
294 	default:
295 		asp = (struct as *)as;
296 
297 		/* We don't support non-kas vtop */
298 		if (asp != (struct as *)kmt_read_kas(t))
299 			return (set_errno(EMDB_TGTNOTSUP));
300 	}
301 
302 	if (kmdb_prom_vtop(va, pap) == 0)
303 		return (0);
304 
305 	if ((v = mdb_nv_lookup(&mdb.m_modules, "unix")) != NULL &&
306 	    (mod = mdb_nv_get_cookie(v)) != NULL) {
307 		int (*fptr)(uintptr_t, struct as *, physaddr_t *);
308 
309 		fptr = (int (*)(uintptr_t, struct as *, physaddr_t *))
310 		    dlsym(mod->mod_hdl, "platform_vtop");
311 
312 		if ((fptr != NULL) && ((*fptr)(va, asp, pap) == 0))
313 			return (0);
314 	}
315 
316 	return (set_errno(EMDB_NOMAP));
317 }
318 
319 /*ARGSUSED*/
320 static int
321 kmt_cpuregs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
322 {
323 	const mdb_tgt_gregset_t *gregs;
324 	intptr_t cpuid = DPI_MASTER_CPUID;
325 	int i;
326 
327 	if (flags & DCMD_ADDRSPEC) {
328 		if (argc != 0)
329 			return (DCMD_USAGE);
330 		if ((cpuid = mdb_cpu2cpuid(addr)) < 0) {
331 			(void) set_errno(EMDB_NOMAP);
332 			mdb_warn("failed to find cpuid for cpu at %p", addr);
333 			return (DCMD_ERR);
334 		}
335 	}
336 
337 	i = mdb_getopts(argc, argv,
338 	    'c', MDB_OPT_UINTPTR, &cpuid,
339 	    NULL);
340 
341 	argc -= i;
342 	argv += i;
343 
344 	if (argc != 0)
345 		return (DCMD_USAGE);
346 
347 	if ((gregs = kmdb_dpi_get_gregs(cpuid)) == NULL) {
348 		warn("failed to retrieve registers for cpu %d", (int)cpuid);
349 		return (DCMD_ERR);
350 	}
351 
352 	kmt_printregs(gregs);
353 
354 	return (DCMD_OK);
355 }
356 
357 static int
358 kmt_regs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
359 {
360 	if (flags & DCMD_ADDRSPEC)
361 		return (DCMD_USAGE);
362 
363 	return (kmt_cpuregs(addr, flags, argc, argv));
364 }
365 
366 static int
367 kmt_cpustack_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
368 {
369 	intptr_t cpuid = DPI_MASTER_CPUID;
370 	uint_t verbose = 0;
371 	int i;
372 
373 	if (flags & DCMD_ADDRSPEC) {
374 		if ((cpuid = mdb_cpu2cpuid(addr)) < 0) {
375 			(void) set_errno(EMDB_NOMAP);
376 			mdb_warn("failed to find cpuid for cpu at %p", addr);
377 			return (DCMD_ERR);
378 		}
379 		flags &= ~DCMD_ADDRSPEC;
380 	}
381 
382 	i = mdb_getopts(argc, argv,
383 	    'c', MDB_OPT_UINTPTR, &cpuid,
384 	    'v', MDB_OPT_SETBITS, 1, &verbose,
385 	    NULL);
386 
387 	argc -= i;
388 	argv += i;
389 
390 	return (kmt_cpustack(addr, flags, argc, argv, cpuid, verbose));
391 }
392 
393 /*
394  * Lasciate ogne speranza, voi ch'intrate.
395  */
396 static int
397 kmt_call(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
398 {
399 	uintptr_t *call_argv, rval;
400 	int parse_strings = 1;
401 	GElf_Sym sym;
402 	jmp_buf *oldpcb = NULL;
403 	jmp_buf pcb;
404 	int i;
405 
406 	if (!(flags & DCMD_ADDRSPEC))
407 		return (DCMD_USAGE);
408 
409 	if (mdb_tgt_lookup_by_addr(mdb.m_target, addr, MDB_TGT_SYM_EXACT,
410 	    NULL, 0, &sym, NULL) == 0 && GELF_ST_TYPE(sym.st_info) !=
411 	    STT_FUNC) {
412 		warn("%a is not a function\n", addr);
413 		return (DCMD_ERR);
414 	}
415 
416 	if (argc > 1 && argv[0].a_type == MDB_TYPE_STRING &&
417 	    strcmp(argv[0].a_un.a_str, "-s") == 0) {
418 		parse_strings = 0;
419 		argc--;
420 		argv++;
421 	}
422 
423 	call_argv = mdb_alloc(sizeof (uintptr_t) * argc, UM_SLEEP);
424 
425 	for (i = 0; i < argc; i++) {
426 		switch (argv[i].a_type) {
427 		case MDB_TYPE_STRING:
428 			/*
429 			 * mdb_strtoull doesn't return on error, so we have to
430 			 * pre-check strings suspected to contain numbers.
431 			 */
432 			if (parse_strings && strisbasenum(argv[i].a_un.a_str)) {
433 				call_argv[i] = (uintptr_t)mdb_strtoull(
434 				    argv[i].a_un.a_str);
435 			} else
436 				call_argv[i] = (uintptr_t)argv[i].a_un.a_str;
437 
438 			break;
439 
440 		case MDB_TYPE_IMMEDIATE:
441 			call_argv[i] = argv[i].a_un.a_val;
442 			break;
443 
444 		default:
445 			mdb_free(call_argv,
446 			    sizeof (uintptr_t) * argc);
447 			return (DCMD_USAGE);
448 		}
449 	}
450 
451 	if (setjmp(pcb) != 0) {
452 		warn("call failed: caught a trap\n");
453 
454 		kmdb_dpi_restore_fault_hdlr(oldpcb);
455 		mdb_free(call_argv, sizeof (uintptr_t) * argc);
456 		return (DCMD_ERR);
457 	}
458 
459 	oldpcb = kmdb_dpi_set_fault_hdlr(&pcb);
460 	rval = kmdb_dpi_call(addr, argc, call_argv);
461 	kmdb_dpi_restore_fault_hdlr(oldpcb);
462 
463 	if (flags & DCMD_PIPE_OUT) {
464 		mdb_printf("%p\n", rval);
465 	} else {
466 		/* pretty-print the results */
467 		mdb_printf("%p = %a(", rval, addr);
468 		for (i = 0; i < argc; i++) {
469 			if (i > 0)
470 				mdb_printf(", ");
471 			if (argv[i].a_type == MDB_TYPE_STRING) {
472 				/* I'm ashamed but amused */
473 				char *quote = &("\""[parse_strings &&
474 				    strisbasenum(argv[i].a_un.a_str)]);
475 
476 				mdb_printf("%s%s%s", quote, argv[i].a_un.a_str,
477 				    quote);
478 			} else
479 				mdb_printf("%p", argv[i].a_un.a_val);
480 		}
481 		mdb_printf(");\n");
482 	}
483 
484 	mdb_free(call_argv, sizeof (uintptr_t) * argc);
485 
486 	return (DCMD_OK);
487 }
488 
489 /*ARGSUSED*/
490 int
491 kmt_dump_crumbs(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
492 {
493 	intptr_t cpu = -1;
494 
495 	if (flags & DCMD_ADDRSPEC) {
496 		if (argc != 0)
497 			return (DCMD_USAGE);
498 	} else {
499 		addr = 0;
500 
501 		if (mdb_getopts(argc, argv,
502 		    'c', MDB_OPT_UINTPTR, &cpu,
503 		    NULL) != argc)
504 			return (DCMD_USAGE);
505 	}
506 
507 	kmdb_dpi_dump_crumbs(addr, cpu);
508 
509 	return (DCMD_OK);
510 }
511 
512 /*ARGSUSED*/
513 static int
514 kmt_noducttape(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
515 {
516 	int a = 0;
517 
518 	return (a/a);
519 }
520 
521 static int
522 kmt_dmod_status(char *msg, int state)
523 {
524 	kmdb_modctl_t *kmc;
525 	mdb_var_t *v;
526 	int first = 1, n = 0;
527 
528 	mdb_nv_rewind(&mdb.m_dmodctl);
529 	while ((v = mdb_nv_advance(&mdb.m_dmodctl)) != NULL) {
530 		kmc = MDB_NV_COOKIE(v);
531 
532 		if (kmc->kmc_state != state)
533 			continue;
534 
535 		n++;
536 
537 		if (msg != NULL) {
538 			if (first) {
539 				mdb_printf(msg, NULL);
540 				first = 0;
541 			}
542 
543 			mdb_printf(" %s", kmc->kmc_modname);
544 		}
545 	}
546 
547 	if (!first && msg != NULL)
548 		mdb_printf("\n");
549 
550 	return (n);
551 }
552 
553 /*ARGSUSED*/
554 static int
555 kmt_status_dcmd(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
556 {
557 	struct utsname uts;
558 	char uuid[UUID_PRINTABLE_STRING_LENGTH];
559 	kreg_t tt;
560 
561 	if (mdb_tgt_readsym(mdb.m_target, MDB_TGT_AS_VIRT, &uts, sizeof (uts),
562 	    "unix", "utsname") != sizeof (uts)) {
563 		warn("failed to read 'utsname' struct from kernel\n");
564 		bzero(&uts, sizeof (uts));
565 		(void) strcpy(uts.nodename, "unknown machine");
566 	}
567 
568 	mdb_printf("debugging live kernel (%d-bit) on %s\n",
569 	    (int)(sizeof (void *) * NBBY),
570 	    (*uts.nodename == '\0' ? "(not set)" : uts.nodename));
571 	mdb_printf("operating system: %s %s (%s)\n",
572 	    uts.release, uts.version, uts.machine);
573 
574 	mdb_print_buildversion();
575 
576 	if (mdb_readsym(uuid, sizeof (uuid),
577 	    "dump_osimage_uuid") == sizeof (uuid) &&
578 	    uuid[sizeof (uuid) - 1] == '\0') {
579 		mdb_printf("image uuid: %s\n", uuid[0] != '\0' ?
580 		    uuid : "(not set)");
581 	}
582 
583 	mdb_printf("DTrace state: %s\n", (kmdb_kdi_dtrace_get_state() ==
584 	    KDI_DTSTATE_DTRACE_ACTIVE ? "active (debugger breakpoints cannot "
585 	    "be armed)" : "inactive"));
586 
587 	(void) kmdb_dpi_get_register("tt", &tt);
588 	mdb_printf("stopped on: %s\n", kmt_trapname(tt));
589 
590 	(void) kmt_dmod_status("pending dmod loads:", KMDB_MC_STATE_LOADING);
591 	(void) kmt_dmod_status("pending dmod unloads:",
592 	    KMDB_MC_STATE_UNLOADING);
593 
594 	return (DCMD_OK);
595 }
596 
597 /*ARGSUSED*/
598 static int
599 kmt_switch(uintptr_t addr, uint_t flags, int argc, const mdb_arg_t *argv)
600 {
601 	if (!(flags & DCMD_ADDRSPEC) || argc != 0)
602 		return (DCMD_USAGE);
603 
604 	if (kmdb_dpi_switch_master((int)addr) < 0) {
605 		warn("failed to switch to CPU %d", (int)addr);
606 		return (DCMD_ERR);
607 	}
608 
609 	return (DCMD_OK);
610 }
611 
612 static const mdb_dcmd_t kmt_dcmds[] = {
613 	{ "$c", "?[cnt]", "print stack backtrace", kmt_stack },
614 	{ "$C", "?[cnt]", "print stack backtrace", kmt_stackv },
615 	{ "$r", NULL, "print general-purpose registers", kmt_regs },
616 	{ "$?", NULL, "print status and registers", kmt_regs },
617 	{ ":x", ":", "change the active CPU", kmt_switch },
618 	{ "call", ":[arg ...]", "call a kernel function", kmt_call },
619 	{ "cpustack", "?[-v] [-c cpuid] [cnt]", "print stack backtrace for a "
620 	    "specific CPU", kmt_cpustack_dcmd },
621 	{ "cpuregs", "?[-c cpuid]", "print general-purpose registers for a "
622 	    "specific CPU", kmt_cpuregs },
623 	{ "crumbs", NULL, NULL, kmt_dump_crumbs },
624 #if defined(__i386) || defined(__amd64)
625 	{ "in", ":[-L len]", "read from I/O port", kmt_in_dcmd },
626 	{ "out", ":[-L len] val", "write to I/O port", kmt_out_dcmd },
627 	{ "rdmsr", ":", "read an MSR", kmt_rdmsr },
628 	{ "wrmsr", ": val", "write an MSR", kmt_wrmsr },
629 	{ "rdpcicfg", ": bus dev func", "read a register in PCI config space",
630 	kmt_rdpcicfg },
631 	{ "wrpcicfg", ": bus dev func val", "write a register in PCI config "
632 	"space", kmt_wrpcicfg },
633 #endif
634 	{ "noducttape", NULL, NULL, kmt_noducttape },
635 	{ "regs", NULL, "print general-purpose registers", kmt_regs },
636 	{ "stack", "?[cnt]", "print stack backtrace", kmt_stack },
637 	{ "stackregs", "?", "print stack backtrace and registers", kmt_stackr },
638 	{ "status", NULL, "print summary of current target", kmt_status_dcmd },
639 	{ "switch", ":", "change the active CPU", kmt_switch },
640 	{ NULL }
641 };
642 
643 static uintmax_t
644 kmt_reg_disc_get(const mdb_var_t *v)
645 {
646 	mdb_tgt_reg_t r = 0;
647 
648 	(void) mdb_tgt_getareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), &r);
649 
650 	return (r);
651 }
652 
653 static void
654 kmt_reg_disc_set(mdb_var_t *v, uintmax_t r)
655 {
656 	if (mdb_tgt_putareg(MDB_NV_COOKIE(v), 0, mdb_nv_get_name(v), r) == -1)
657 		warn("failed to modify %%%s register", mdb_nv_get_name(v));
658 }
659 
660 static const mdb_nv_disc_t kmt_reg_disc = {
661 	kmt_reg_disc_set,
662 	kmt_reg_disc_get
663 };
664 
665 /*ARGSUSED*/
666 static int
667 kmt_getareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname,
668     mdb_tgt_reg_t *rp)
669 {
670 	kreg_t val;
671 
672 	if (kmdb_dpi_get_register(rname, &val) < 0)
673 		return (set_errno(EMDB_BADREG));
674 
675 	*rp = val;
676 	return (0);
677 }
678 
679 /*ARGSUSED*/
680 static int
681 kmt_putareg(mdb_tgt_t *t, mdb_tgt_tid_t tid, const char *rname, mdb_tgt_reg_t r)
682 {
683 	if (kmdb_dpi_set_register(rname, r) < 0)
684 		return (set_errno(EMDB_BADREG));
685 
686 	return (0);
687 }
688 
689 static void
690 kmt_mod_destroy(kmt_module_t *km)
691 {
692 	if (km->km_name != NULL)
693 		strfree(km->km_name);
694 	if (km->km_symtab != NULL)
695 		mdb_gelf_symtab_destroy(km->km_symtab);
696 	if (km->km_ctfp != NULL)
697 		mdb_ctf_close(km->km_ctfp);
698 }
699 
700 static kmt_module_t *
701 kmt_mod_create(mdb_tgt_t *t, struct modctl *ctlp, char *name)
702 {
703 	kmt_module_t *km = mdb_zalloc(sizeof (kmt_module_t), UM_SLEEP);
704 	struct module *mod;
705 
706 	km->km_name = mdb_alloc(strlen(name) + 1, UM_SLEEP);
707 	(void) strcpy(km->km_name, name);
708 
709 	bcopy(ctlp, &km->km_modctl, sizeof (struct modctl));
710 
711 	if (mdb_tgt_vread(t, &km->km_module, sizeof (struct module),
712 	    (uintptr_t)km->km_modctl.mod_mp) != sizeof (struct module))
713 		goto create_module_cleanup;
714 	mod = &km->km_module;
715 
716 	if (mod->symhdr != NULL && mod->strhdr != NULL && mod->symtbl != NULL &&
717 	    mod->strings != NULL) {
718 		mdb_gelf_ehdr_to_gehdr(&mod->hdr, &km->km_ehdr);
719 
720 		km->km_symtab = mdb_gelf_symtab_create_raw(&km->km_ehdr,
721 		    mod->symhdr, mod->symtbl, mod->strhdr, mod->strings,
722 		    MDB_TGT_SYMTAB);
723 
724 		km->km_symtab_va = mod->symtbl;
725 		km->km_strtab_va = mod->strings;
726 
727 		if (mdb_tgt_vread(t, &km->km_symtab_hdr, sizeof (Shdr),
728 		    (uintptr_t)mod->symhdr) != sizeof (Shdr) ||
729 		    mdb_tgt_vread(t, &km->km_strtab_hdr, sizeof (Shdr),
730 		    (uintptr_t)mod->strhdr) != sizeof (Shdr))
731 			goto create_module_cleanup;
732 	}
733 
734 	/*
735 	 * We don't want everyone rooting around in the module structure, so we
736 	 * make copies of the interesting members.
737 	 */
738 	km->km_text_va = (uintptr_t)mod->text;
739 	km->km_text_size = mod->text_size;
740 	km->km_data_va = (uintptr_t)mod->data;
741 	km->km_data_size = mod->data_size;
742 	km->km_bss_va = (uintptr_t)mod->bss;
743 	km->km_bss_size = mod->bss_size;
744 	km->km_ctf_va = mod->ctfdata;
745 	km->km_ctf_size = mod->ctfsize;
746 
747 	if (mod->flags & KOBJ_PRIM)
748 		km->km_flags |= KM_F_PRIMARY;
749 
750 	return (km);
751 
752 create_module_cleanup:
753 	warn("failed to read module %s\n", name);
754 	kmt_mod_destroy(km);
755 	return (NULL);
756 }
757 
758 static void
759 kmt_mod_remove(kmt_data_t *kmt, kmt_module_t *km)
760 {
761 	mdb_var_t *v = mdb_nv_lookup(&kmt->kmt_modules, km->km_name);
762 
763 	ASSERT(v != NULL);
764 
765 	mdb_dprintf(MDB_DBG_KMOD, "removing module %s\n", km->km_name);
766 
767 	mdb_list_delete(&kmt->kmt_modlist, km);
768 	mdb_nv_remove(&kmt->kmt_modules, v);
769 	kmt_mod_destroy(km);
770 }
771 
772 static int
773 kmt_modlist_update_cb(struct modctl *modp, void *arg)
774 {
775 	mdb_tgt_t *t = arg;
776 	kmt_data_t *kmt = t->t_data;
777 	kmt_module_t *km;
778 	mdb_var_t *v;
779 	char name[MAXNAMELEN];
780 
781 	if (mdb_tgt_readstr(t, MDB_TGT_AS_VIRT, name, MAXNAMELEN,
782 	    (uintptr_t)modp->mod_modname) <= 0) {
783 		warn("failed to read module name at %p",
784 		    (void *)modp->mod_modname);
785 	}
786 
787 	/* We only care about modules that are actually loaded */
788 	if (!kmdb_kdi_mod_isloaded(modp))
789 		return (0);
790 
791 	/*
792 	 * Skip the modules we already know about and that haven't
793 	 * changed since last time we were here.
794 	 */
795 	if ((v = mdb_nv_lookup(&kmt->kmt_modules, name)) != NULL) {
796 		km = MDB_NV_COOKIE(v);
797 
798 		if (kmdb_kdi_mod_haschanged(&km->km_modctl, &km->km_module,
799 		    modp, modp->mod_mp)) {
800 			/*
801 			 * The module has changed since last we saw it.  For
802 			 * safety, remove our old version, and treat it as a
803 			 * new module.
804 			 */
805 			mdb_dprintf(MDB_DBG_KMOD, "stutter module %s\n", name);
806 			kmt_mod_remove(kmt, km);
807 		} else {
808 			km->km_seen = 1;
809 			return (0);
810 		}
811 	}
812 
813 	mdb_dprintf(MDB_DBG_KMOD, "found new module %s\n", name);
814 
815 	if ((km = kmt_mod_create(t, modp, name)) != NULL) {
816 		mdb_list_append(&kmt->kmt_modlist, km);
817 		(void) mdb_nv_insert(&kmt->kmt_modules, name, NULL,
818 		    (uintptr_t)km, 0);
819 		km->km_seen = 1;
820 	}
821 
822 	return (0);
823 }
824 
825 static void
826 kmt_modlist_update(mdb_tgt_t *t)
827 {
828 	kmt_data_t *kmt = t->t_data;
829 	kmt_module_t *km, *kmn;
830 
831 	if (kmdb_kdi_mod_iter(kmt_modlist_update_cb, t) < 0) {
832 		warn("failed to complete update of kernel module list\n");
833 		return;
834 	}
835 
836 	km = mdb_list_next(&kmt->kmt_modlist);
837 	while (km != NULL) {
838 		kmn = mdb_list_next(km);
839 
840 		if (km->km_seen == 1) {
841 			/* Reset the mark for next time */
842 			km->km_seen = 0;
843 		} else {
844 			/*
845 			 * We didn't see it on the kernel's module list, so
846 			 * remove it from our view of the world.
847 			 */
848 			kmt_mod_remove(kmt, km);
849 		}
850 
851 		km = kmn;
852 	}
853 }
854 
855 static void
856 kmt_periodic(mdb_tgt_t *t)
857 {
858 	(void) mdb_tgt_status(t, &t->t_status);
859 }
860 
861 int
862 kmt_lookup_by_addr(mdb_tgt_t *t, uintptr_t addr, uint_t flags,
863     char *buf, size_t nbytes, GElf_Sym *symp, mdb_syminfo_t *sip)
864 {
865 	kmt_data_t *kmt = t->t_data;
866 	kmt_module_t *km = mdb_list_next(&kmt->kmt_modlist);
867 	kmt_module_t *sym_km = NULL;
868 	kmt_module_t prmod;
869 	GElf_Sym sym;
870 	uint_t symid;
871 	const char *name;
872 
873 	/*
874 	 * We look through the private symbols (if any), then through the module
875 	 * symbols.  We can simplify the loop if we pretend the private symbols
876 	 * come from a module.
877 	 */
878 	if (mdb.m_prsym != NULL) {
879 		bzero(&prmod, sizeof (kmt_module_t));
880 		prmod.km_name = "<<<prmod>>>";
881 		prmod.km_symtab = mdb.m_prsym;
882 		prmod.km_list.ml_next = (mdb_list_t *)km;
883 		km = &prmod;
884 	}
885 
886 	/* Symbol resolution isn't available during initialization */
887 	if (kmdb_dpi_get_state(NULL) == DPI_STATE_INIT)
888 		return (set_errno(EMDB_NOSYM));
889 
890 	for (; km != NULL; km = mdb_list_next(km)) {
891 		if (km != &prmod && !kmt->kmt_symavail)
892 			continue;
893 
894 		if (km->km_symtab == NULL)
895 			continue;
896 
897 		if (mdb_gelf_symtab_lookup_by_addr(km->km_symtab, addr, flags,
898 		    buf, nbytes, symp, &sip->sym_id) != 0 ||
899 		    symp->st_value == 0)
900 			continue;
901 
902 		if (flags & MDB_TGT_SYM_EXACT) {
903 			sym_km = km;
904 			goto found;
905 		}
906 
907 		/*
908 		 * If this is the first match we've found, or if this symbol is
909 		 * closer to the specified address than the last one we found,
910 		 * use it.
911 		 */
912 		if (sym_km == NULL || mdb_gelf_sym_closer(symp, &sym, addr)) {
913 			sym_km = km;
914 			sym = *symp;
915 			symid = sip->sym_id;
916 		}
917 	}
918 
919 	/*
920 	 * kmdb dmods are normal kernel modules, loaded by krtld as such.  To
921 	 * avoid polluting modinfo, and to keep from confusing the module
922 	 * subsystem (many dmods have the same names as real kernel modules),
923 	 * kmdb keeps their modctls separate, and doesn't allow their loading
924 	 * to be broadcast via the krtld module load/unload mechanism.  As a
925 	 * result, kmdb_kvm doesn't find out about them, and can't turn their
926 	 * addresses into symbols.  This can be most inconvenient during
927 	 * debugger faults, as the dmod frames will show up without names.
928 	 * We weren't able to turn the requested address into a symbol, so we'll
929 	 * take a spin through the dmods, trying to match our address against
930 	 * their symbols.
931 	 */
932 	if (sym_km == NULL) {
933 		return (kmdb_module_lookup_by_addr(addr, flags, buf, nbytes,
934 		    symp, sip));
935 	}
936 
937 	*symp = sym;
938 	sip->sym_id = symid;
939 
940 found:
941 	/*
942 	 * Once we've found something, copy the final name into the caller's
943 	 * buffer and prefix it with the load object name if appropriate.
944 	 */
945 	name = mdb_gelf_sym_name(sym_km->km_symtab, symp);
946 
947 	if (sym_km == &prmod) {
948 		if (buf != NULL) {
949 			(void) strncpy(buf, name, nbytes);
950 			buf[nbytes - 1] = '\0';
951 		}
952 		sip->sym_table = MDB_TGT_PRVSYM;
953 	} else {
954 		if (buf != NULL) {
955 			if (sym_km->km_flags & KM_F_PRIMARY) {
956 				(void) strncpy(buf, name, nbytes);
957 				buf[nbytes - 1] = '\0';
958 			} else {
959 				(void) mdb_snprintf(buf, nbytes, "%s`%s",
960 				    sym_km->km_name, name);
961 			}
962 		}
963 		sip->sym_table = MDB_TGT_SYMTAB;
964 	}
965 
966 	return (0);
967 }
968 
969 static int
970 kmt_lookup_by_name(mdb_tgt_t *t, const char *obj, const char *name,
971     GElf_Sym *symp, mdb_syminfo_t *sip)
972 {
973 	kmt_data_t *kmt = t->t_data;
974 	kmt_module_t *km;
975 	mdb_var_t *v;
976 	GElf_Sym sym;
977 	uint_t symid;
978 	int n;
979 
980 	if (!kmt->kmt_symavail)
981 		return (set_errno(EMDB_NOSYM));
982 
983 	switch ((uintptr_t)obj) {
984 	case (uintptr_t)MDB_TGT_OBJ_EXEC:
985 	case (uintptr_t)MDB_TGT_OBJ_EVERY:
986 		km = mdb_list_next(&kmt->kmt_modlist);
987 		n = mdb_nv_size(&kmt->kmt_modules);
988 		break;
989 
990 	case (uintptr_t)MDB_TGT_OBJ_RTLD:
991 		obj = kmt->kmt_rtld_name;
992 		/*FALLTHROUGH*/
993 
994 	default:
995 		/*
996 		 * If this is a request for a dmod symbol, let kmdb_module
997 		 * handle it.
998 		 */
999 		if (obj != NULL && strncmp(obj, "DMOD`", 5) == 0) {
1000 			return (kmdb_module_lookup_by_name(obj + 5, name,
1001 			    symp, sip));
1002 		}
1003 
1004 		if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL)
1005 			return (set_errno(EMDB_NOOBJ));
1006 
1007 		km = mdb_nv_get_cookie(v);
1008 		n = 1;
1009 	}
1010 
1011 	/*
1012 	 * kmdb's kvm target is at a bit of a disadvantage compared to mdb's
1013 	 * kvm target when it comes to global symbol lookups.  mdb has ksyms,
1014 	 * which hides pesky things like symbols that are undefined in unix,
1015 	 * but which are defined in genunix.  We don't have such a facility -
1016 	 * we simply iterate through the modules, looking for a given symbol
1017 	 * in each.  Unless we're careful, we'll return the undef in the
1018 	 * aforementioned case.
1019 	 */
1020 	for (; n > 0; n--, km = mdb_list_next(km)) {
1021 		if (mdb_gelf_symtab_lookup_by_name(km->km_symtab, name,
1022 		    &sym, &symid) == 0 && sym.st_shndx != SHN_UNDEF)
1023 			break;
1024 	}
1025 
1026 	if (n == 0)
1027 		return (set_errno(EMDB_NOSYM));
1028 
1029 found:
1030 	bcopy(&sym, symp, sizeof (GElf_Sym));
1031 	sip->sym_id = symid;
1032 	sip->sym_table = MDB_TGT_SYMTAB;
1033 
1034 	return (0);
1035 }
1036 
1037 static int
1038 kmt_symtab_func(void *data, const GElf_Sym *sym, const char *name, uint_t id)
1039 {
1040 	kmt_symarg_t *arg = data;
1041 
1042 	if (mdb_tgt_sym_match(sym, arg->sym_type)) {
1043 		arg->sym_info.sym_id = id;
1044 
1045 		return (arg->sym_cb(arg->sym_data, sym, name, &arg->sym_info,
1046 		    arg->sym_obj));
1047 	}
1048 
1049 	return (0);
1050 }
1051 
1052 static void
1053 kmt_symtab_iter(mdb_gelf_symtab_t *gst, uint_t type, const char *obj,
1054     mdb_tgt_sym_f *cb, void *p)
1055 {
1056 	kmt_symarg_t arg;
1057 
1058 	arg.sym_cb = cb;
1059 	arg.sym_data = p;
1060 	arg.sym_type = type;
1061 	arg.sym_info.sym_table = gst->gst_tabid;
1062 	arg.sym_obj = obj;
1063 
1064 	mdb_gelf_symtab_iter(gst, kmt_symtab_func, &arg);
1065 }
1066 
1067 static int
1068 kmt_symbol_iter(mdb_tgt_t *t, const char *obj, uint_t which, uint_t type,
1069     mdb_tgt_sym_f *cb, void *data)
1070 {
1071 	kmt_data_t *kmt = t->t_data;
1072 	kmt_module_t *km;
1073 
1074 	mdb_gelf_symtab_t *symtab = NULL;
1075 	mdb_var_t *v;
1076 
1077 	if (which == MDB_TGT_DYNSYM)
1078 		return (set_errno(EMDB_TGTNOTSUP));
1079 
1080 	switch ((uintptr_t)obj) {
1081 	case (uintptr_t)MDB_TGT_OBJ_EXEC:
1082 	case (uintptr_t)MDB_TGT_OBJ_EVERY:
1083 		mdb_nv_rewind(&kmt->kmt_modules);
1084 		while ((v = mdb_nv_advance(&kmt->kmt_modules)) != NULL) {
1085 			km = mdb_nv_get_cookie(v);
1086 
1087 			if (km->km_symtab != NULL) {
1088 				kmt_symtab_iter(km->km_symtab, type,
1089 				    km->km_name, cb, data);
1090 			}
1091 		}
1092 		return (0);
1093 
1094 	case (uintptr_t)MDB_TGT_OBJ_RTLD:
1095 		obj = kmt->kmt_rtld_name;
1096 		/*FALLTHROUGH*/
1097 
1098 	default:
1099 		if (strncmp(obj, "DMOD`", 5) == 0) {
1100 			return (kmdb_module_symbol_iter(obj + 5, type,
1101 			    cb, data));
1102 		}
1103 
1104 		if ((v = mdb_nv_lookup(&kmt->kmt_modules, obj)) == NULL)
1105 			return (set_errno(EMDB_NOOBJ));
1106 		km = mdb_nv_get_cookie(v);
1107 
1108 		symtab = km->km_symtab;
1109 	}
1110 
1111 	if (symtab != NULL)
1112 		kmt_symtab_iter(symtab, type, obj, cb, data);
1113 
1114 	return (0);
1115 }
1116 
1117 static int
1118 kmt_mapping_walk(uintptr_t addr, const void *data, kmt_maparg_t *marg)
1119 {
1120 	/*
1121 	 * This is a bit sketchy but avoids problematic compilation of this
1122 	 * target against the current VM implementation.  Now that we have
1123 	 * vmem, we can make this less broken and more informative by changing
1124 	 * this code to invoke the vmem walker in the near future.
1125 	 */
1126 	const struct kmt_seg {
1127 		caddr_t s_base;
1128 		size_t s_size;
1129 	} *segp = (const struct kmt_seg *)data;
1130 
1131 	mdb_map_t map;
1132 	GElf_Sym sym;
1133 	mdb_syminfo_t info;
1134 
1135 	map.map_base = (uintptr_t)segp->s_base;
1136 	map.map_size = segp->s_size;
1137 	map.map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X;
1138 
1139 	if (kmt_lookup_by_addr(marg->map_target, addr, MDB_TGT_SYM_EXACT,
1140 	    map.map_name, MDB_TGT_MAPSZ, &sym, &info) == -1) {
1141 
1142 		(void) mdb_iob_snprintf(map.map_name, MDB_TGT_MAPSZ,
1143 		    "%lr", addr);
1144 	}
1145 
1146 	return (marg->map_cb(marg->map_data, &map, map.map_name));
1147 }
1148 
1149 static int
1150 kmt_mapping_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private)
1151 {
1152 	kmt_maparg_t m;
1153 	uintptr_t kas;
1154 
1155 	m.map_target = t;
1156 	m.map_cb = func;
1157 	m.map_data = private;
1158 
1159 	if ((kas = kmt_read_kas(t)) == 0)
1160 		return (-1); /* errno is set for us */
1161 
1162 	return (mdb_pwalk("seg", (mdb_walk_cb_t)kmt_mapping_walk, &m, kas));
1163 }
1164 
1165 static const mdb_map_t *
1166 kmt_mod_to_map(kmt_module_t *km, mdb_map_t *map)
1167 {
1168 	(void) strncpy(map->map_name, km->km_name, MDB_TGT_MAPSZ);
1169 	map->map_name[MDB_TGT_MAPSZ - 1] = '\0';
1170 	map->map_base = km->km_text_va;
1171 	map->map_size = km->km_text_size;
1172 	map->map_flags = MDB_TGT_MAP_R | MDB_TGT_MAP_W | MDB_TGT_MAP_X;
1173 
1174 	return (map);
1175 }
1176 
1177 static int
1178 kmt_object_iter(mdb_tgt_t *t, mdb_tgt_map_f *func, void *private)
1179 {
1180 	kmt_data_t *kmt = t->t_data;
1181 	kmt_module_t *km;
1182 	mdb_map_t m;
1183 
1184 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1185 	    km = mdb_list_next(km)) {
1186 		if (func(private, kmt_mod_to_map(km, &m), km->km_name) == -1)
1187 			break;
1188 	}
1189 
1190 	return (0);
1191 }
1192 
1193 static const mdb_map_t *
1194 kmt_addr_to_map(mdb_tgt_t *t, uintptr_t addr)
1195 {
1196 	kmt_data_t *kmt = t->t_data;
1197 	kmt_module_t *km;
1198 
1199 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1200 	    km = mdb_list_next(km)) {
1201 		if (addr - km->km_text_va < km->km_text_size ||
1202 		    addr - km->km_data_va < km->km_data_size ||
1203 		    addr - km->km_bss_va < km->km_bss_size)
1204 			return (kmt_mod_to_map(km, &kmt->kmt_map));
1205 	}
1206 
1207 	(void) set_errno(EMDB_NOMAP);
1208 	return (NULL);
1209 }
1210 
1211 static kmt_module_t *
1212 kmt_module_by_name(kmt_data_t *kmt, const char *name)
1213 {
1214 	kmt_module_t *km;
1215 
1216 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1217 	    km = mdb_list_next(km)) {
1218 		if (strcmp(name, km->km_name) == 0)
1219 			return (km);
1220 	}
1221 
1222 	return (NULL);
1223 }
1224 
1225 static const mdb_map_t *
1226 kmt_name_to_map(mdb_tgt_t *t, const char *name)
1227 {
1228 	kmt_data_t *kmt = t->t_data;
1229 	kmt_module_t *km;
1230 	mdb_map_t m;
1231 
1232 	/*
1233 	 * If name is MDB_TGT_OBJ_EXEC, return the first module on the list,
1234 	 * which will be unix since we keep kmt_modlist in load order.
1235 	 */
1236 	if (name == MDB_TGT_OBJ_EXEC) {
1237 		return (kmt_mod_to_map(mdb_list_next(&kmt->kmt_modlist),
1238 		    &m));
1239 	}
1240 
1241 	if (name == MDB_TGT_OBJ_RTLD)
1242 		name = kmt->kmt_rtld_name;
1243 
1244 	if ((km = kmt_module_by_name(kmt, name)) != NULL)
1245 		return (kmt_mod_to_map(km, &m));
1246 
1247 	(void) set_errno(EMDB_NOOBJ);
1248 	return (NULL);
1249 }
1250 
1251 static ctf_file_t *
1252 kmt_load_ctfdata(mdb_tgt_t *t, kmt_module_t *km)
1253 {
1254 	kmt_data_t *kmt = t->t_data;
1255 	int err;
1256 
1257 	if (km->km_ctfp != NULL)
1258 		return (km->km_ctfp);
1259 
1260 	if (km->km_ctf_va == NULL || km->km_symtab == NULL) {
1261 		(void) set_errno(EMDB_NOCTF);
1262 		return (NULL);
1263 	}
1264 
1265 	if ((km->km_ctfp = mdb_ctf_bufopen(km->km_ctf_va, km->km_ctf_size,
1266 	    km->km_symtab_va, &km->km_symtab_hdr, km->km_strtab_va,
1267 	    &km->km_strtab_hdr, &err)) == NULL) {
1268 		(void) set_errno(ctf_to_errno(err));
1269 		return (NULL);
1270 	}
1271 
1272 	mdb_dprintf(MDB_DBG_KMOD, "loaded %lu bytes of CTF data for %s\n",
1273 	    (ulong_t)km->km_ctf_size, km->km_name);
1274 
1275 	if (ctf_parent_name(km->km_ctfp) != NULL) {
1276 		mdb_var_t *v;
1277 
1278 		if ((v = mdb_nv_lookup(&kmt->kmt_modules,
1279 		    ctf_parent_name(km->km_ctfp))) != NULL) {
1280 			kmt_module_t *pm = mdb_nv_get_cookie(v);
1281 
1282 			if (pm->km_ctfp == NULL)
1283 				(void) kmt_load_ctfdata(t, pm);
1284 
1285 			if (pm->km_ctfp != NULL && ctf_import(km->km_ctfp,
1286 			    pm->km_ctfp) == CTF_ERR) {
1287 				warn("failed to import parent types into "
1288 				    "%s: %s\n", km->km_name,
1289 				    ctf_errmsg(ctf_errno(km->km_ctfp)));
1290 			}
1291 		} else {
1292 			warn("failed to load CTF data for %s - parent %s not "
1293 			    "loaded\n", km->km_name,
1294 			    ctf_parent_name(km->km_ctfp));
1295 		}
1296 	}
1297 
1298 	return (km->km_ctfp);
1299 }
1300 
1301 ctf_file_t *
1302 kmt_addr_to_ctf(mdb_tgt_t *t, uintptr_t addr)
1303 {
1304 	kmt_data_t *kmt = t->t_data;
1305 	kmt_module_t *km;
1306 
1307 	for (km = mdb_list_next(&kmt->kmt_modlist); km != NULL;
1308 	    km = mdb_list_next(km)) {
1309 		if (addr - km->km_text_va < km->km_text_size ||
1310 		    addr - km->km_data_va < km->km_data_size ||
1311 		    addr - km->km_bss_va < km->km_bss_size)
1312 			return (kmt_load_ctfdata(t, km));
1313 	}
1314 
1315 	return (kmdb_module_addr_to_ctf(addr));
1316 }
1317 
1318 ctf_file_t *
1319 kmt_name_to_ctf(mdb_tgt_t *t, const char *name)
1320 {
1321 	kmt_data_t *kt = t->t_data;
1322 	kmt_module_t *km;
1323 
1324 	if (name == MDB_TGT_OBJ_EXEC) {
1325 		name = KMT_CTFPARENT;
1326 	} else if (name == MDB_TGT_OBJ_RTLD) {
1327 		name = kt->kmt_rtld_name;
1328 	} else if (strncmp(name, "DMOD`", 5) == 0) {
1329 		/* Request for CTF data for a DMOD symbol */
1330 		return (kmdb_module_name_to_ctf(name + 5));
1331 	}
1332 
1333 	if ((km = kmt_module_by_name(kt, name)) != NULL)
1334 		return (kmt_load_ctfdata(t, km));
1335 
1336 	(void) set_errno(EMDB_NOOBJ);
1337 	return (NULL);
1338 }
1339 
1340 /*ARGSUSED*/
1341 static int
1342 kmt_status(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1343 {
1344 	int state;
1345 
1346 	bzero(tsp, sizeof (mdb_tgt_status_t));
1347 
1348 	switch ((state = kmdb_dpi_get_state(NULL))) {
1349 	case DPI_STATE_INIT:
1350 		tsp->st_state = MDB_TGT_RUNNING;
1351 		tsp->st_pc = 0;
1352 		break;
1353 
1354 	case DPI_STATE_STOPPED:
1355 		tsp->st_state = MDB_TGT_STOPPED;
1356 
1357 		(void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1358 		break;
1359 
1360 	case DPI_STATE_FAULTED:
1361 		tsp->st_state = MDB_TGT_STOPPED;
1362 
1363 		(void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1364 
1365 		tsp->st_flags |= MDB_TGT_ISTOP;
1366 		break;
1367 
1368 	case DPI_STATE_LOST:
1369 		tsp->st_state = MDB_TGT_LOST;
1370 
1371 		(void) kmdb_dpi_get_register("pc", &tsp->st_pc);
1372 		break;
1373 	}
1374 
1375 	mdb_dprintf(MDB_DBG_KMOD, "kmt_status, dpi: %d tsp: %d, pc = %p %A\n",
1376 	    state, tsp->st_state, (void *)tsp->st_pc, tsp->st_pc);
1377 
1378 	return (0);
1379 }
1380 
1381 /*
1382  * Invoked when kmt_defbp_enter_debugger is called, this routine activates and
1383  * deactivates deferred breakpoints in response to module load and unload
1384  * events.
1385  */
1386 /*ARGSUSED*/
1387 static void
1388 kmt_defbp_event(mdb_tgt_t *t, int vid, void *private)
1389 {
1390 	if (kmt_defbp_modchg_isload) {
1391 		if (!mdb_tgt_sespec_activate_all(t) &&
1392 		    (mdb.m_flags & MDB_FL_BPTNOSYMSTOP)) {
1393 			/*
1394 			 * We weren't able to activate the breakpoints.
1395 			 * If so requested, we'll return without calling
1396 			 * continue, thus throwing the user into the debugger.
1397 			 */
1398 			return;
1399 		}
1400 
1401 	} else {
1402 		mdb_sespec_t *sep, *nsep;
1403 		const mdb_map_t *map, *bpmap;
1404 		mdb_map_t modmap;
1405 
1406 		if ((map = kmt_addr_to_map(t,
1407 		    (uintptr_t)kmt_defbp_modchg_modctl->mod_text)) == NULL) {
1408 			warn("module unload notification for unknown module %s",
1409 			    kmt_defbp_modchg_modctl->mod_modname);
1410 			return; /* drop into the debugger */
1411 		}
1412 
1413 		bcopy(map, &modmap, sizeof (mdb_map_t));
1414 
1415 		for (sep = mdb_list_next(&t->t_active); sep; sep = nsep) {
1416 			nsep = mdb_list_next(sep);
1417 
1418 			if (sep->se_ops == &kmt_brkpt_ops) {
1419 				kmt_brkpt_t *kb = sep->se_data;
1420 
1421 				if ((bpmap = kmt_addr_to_map(t,
1422 				    kb->kb_addr)) == NULL ||
1423 				    (bpmap->map_base == modmap.map_base &&
1424 				    bpmap->map_size == modmap.map_size)) {
1425 					mdb_tgt_sespec_idle_one(t, sep,
1426 					    EMDB_NOMAP);
1427 				}
1428 			}
1429 		}
1430 	}
1431 
1432 	(void) mdb_tgt_continue(t, NULL);
1433 }
1434 
1435 static void
1436 kmt_defbp_enter_debugger(void)
1437 {
1438 	/*
1439 	 * The debugger places a breakpoint here.  We can't have a simple
1440 	 * nop function here, because GCC knows much more than we do, and
1441 	 * will optimize away the call to it.
1442 	 */
1443 	(void) get_fp();
1444 }
1445 
1446 /*
1447  * This routine is called while the kernel is running.  It attempts to determine
1448  * whether any deferred breakpoints exist for the module being changed (loaded
1449  * or unloaded).  If any such breakpoints exist, the debugger will be entered to
1450  * process them.
1451  */
1452 static void
1453 kmt_defbp_modchg(struct modctl *mctl, int isload)
1454 {
1455 	kmt_defbp_t *dbp;
1456 
1457 	kmt_defbp_lock = 1;
1458 
1459 	for (dbp = mdb_list_next(&kmt_defbp_list); dbp;
1460 	    dbp = mdb_list_next(dbp)) {
1461 		if (!dbp->dbp_ref)
1462 			continue;
1463 
1464 		if (strcmp(mctl->mod_modname, dbp->dbp_objname) == 0) {
1465 			/*
1466 			 * Activate the breakpoint
1467 			 */
1468 			kmt_defbp_modchg_isload = isload;
1469 			kmt_defbp_modchg_modctl = mctl;
1470 
1471 			kmt_defbp_enter_debugger();
1472 			break;
1473 		}
1474 	}
1475 
1476 	kmt_defbp_lock = 0;
1477 }
1478 
1479 /*ARGSUSED*/
1480 static int
1481 kmt_continue(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1482 {
1483 	int n;
1484 
1485 	kmdb_dpi_resume();
1486 
1487 	/*
1488 	 * The order of the following two calls is important.  If there are
1489 	 * load acks on the work queue, we'll initialize the dmods they
1490 	 * represent.  This will involve a call to _mdb_init, which may very
1491 	 * well result in a symbol lookup.  If we haven't resynced our view
1492 	 * of symbols with the current state of the world, this lookup could
1493 	 * end very badly.  We therefore make sure to sync before processing
1494 	 * the work queue.
1495 	 */
1496 	kmt_sync(t);
1497 	kmdb_dpi_process_work_queue();
1498 
1499 	if (kmdb_kdi_get_unload_request())
1500 		t->t_flags |= MDB_TGT_F_UNLOAD;
1501 
1502 	(void) mdb_tgt_status(t, &t->t_status);
1503 
1504 	if ((n = kmt_dmod_status(NULL, KMDB_MC_STATE_LOADING) +
1505 	    kmt_dmod_status(NULL, KMDB_MC_STATE_UNLOADING)) != 0) {
1506 		mdb_warn("%d dmod load%c/unload%c pending\n", n,
1507 		    "s"[n == 1], "s"[n == 1]);
1508 	}
1509 
1510 	return (0);
1511 }
1512 
1513 /*ARGSUSED*/
1514 static int
1515 kmt_step(mdb_tgt_t *t, mdb_tgt_status_t *tsp)
1516 {
1517 	int rc;
1518 
1519 	if ((rc = kmdb_dpi_step()) == 0)
1520 		(void) mdb_tgt_status(t, &t->t_status);
1521 
1522 	return (rc);
1523 }
1524 
1525 static int
1526 kmt_defbp_activate(mdb_tgt_t *t)
1527 {
1528 	kmdb_dpi_modchg_register(kmt_defbp_modchg);
1529 
1530 	/*
1531 	 * The routines that add and arm breakpoints will check for the proper
1532 	 * DTrace state, but they'll just put this breakpoint on the idle list
1533 	 * if DTrace is active.  It'll correctly move to the active list when
1534 	 * DTrace deactivates, but that's insufficient for our purposes -- we
1535 	 * need to do extra processing at that point.  We won't get to do said
1536 	 * processing with with a normal idle->active transition, so we just
1537 	 * won't add it add it until we're sure that it'll stick.
1538 	 */
1539 
1540 	if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1541 		return (set_errno(EMDB_DTACTIVE));
1542 
1543 	kmt_defbp_bpspec = mdb_tgt_add_vbrkpt(t,
1544 	    (uintptr_t)kmt_defbp_enter_debugger,
1545 	    MDB_TGT_SPEC_HIDDEN, kmt_defbp_event, NULL);
1546 
1547 	return (0);
1548 }
1549 
1550 static void
1551 kmt_defbp_deactivate(mdb_tgt_t *t)
1552 {
1553 	kmdb_dpi_modchg_cancel();
1554 
1555 	if (kmt_defbp_bpspec != 0) {
1556 		if (t != NULL)
1557 			(void) mdb_tgt_vespec_delete(t, kmt_defbp_bpspec);
1558 
1559 		kmt_defbp_bpspec = 0;
1560 	}
1561 }
1562 
1563 static kmt_defbp_t *
1564 kmt_defbp_create(mdb_tgt_t *t, const char *objname, const char *symname)
1565 {
1566 	kmt_defbp_t *dbp = mdb_alloc(sizeof (kmt_defbp_t), UM_SLEEP);
1567 
1568 	mdb_dprintf(MDB_DBG_KMOD, "defbp_create %s`%s\n", objname, symname);
1569 
1570 	dbp->dbp_objname = strdup(objname);
1571 	dbp->dbp_symname = strdup(symname);
1572 	dbp->dbp_ref = 1;
1573 
1574 	kmt_defbp_num++;
1575 
1576 	if (kmt_defbp_num == 1 || kmt_defbp_bpspec == 0) {
1577 		if (kmt_defbp_activate(t) < 0)
1578 			warn("failed to activate deferred breakpoints");
1579 	}
1580 
1581 	mdb_list_append(&kmt_defbp_list, dbp);
1582 
1583 	return (dbp);
1584 }
1585 
1586 static void
1587 kmt_defbp_destroy(kmt_defbp_t *dbp)
1588 {
1589 	mdb_dprintf(MDB_DBG_KMOD, "defbp_destroy %s`%s\n", dbp->dbp_objname,
1590 	    dbp->dbp_symname);
1591 
1592 	mdb_list_delete(&kmt_defbp_list, dbp);
1593 
1594 	strfree(dbp->dbp_objname);
1595 	strfree(dbp->dbp_symname);
1596 	mdb_free(dbp, sizeof (kmt_defbp_t));
1597 }
1598 
1599 static void
1600 kmt_defbp_prune_common(int all)
1601 {
1602 	kmt_defbp_t *dbp, *ndbp;
1603 
1604 	/* We can't remove items from the list while the driver is using it. */
1605 	if (kmt_defbp_lock)
1606 		return;
1607 
1608 	for (dbp = mdb_list_next(&kmt_defbp_list); dbp != NULL; dbp = ndbp) {
1609 		ndbp = mdb_list_next(dbp);
1610 
1611 		if (!all && dbp->dbp_ref)
1612 			continue;
1613 
1614 		kmt_defbp_destroy(dbp);
1615 	}
1616 }
1617 
1618 static void
1619 kmt_defbp_prune(void)
1620 {
1621 	kmt_defbp_prune_common(0);
1622 }
1623 
1624 static void
1625 kmt_defbp_destroy_all(void)
1626 {
1627 	kmt_defbp_prune_common(1);
1628 }
1629 
1630 static void
1631 kmt_defbp_delete(mdb_tgt_t *t, kmt_defbp_t *dbp)
1632 {
1633 	dbp->dbp_ref = 0;
1634 
1635 	ASSERT(kmt_defbp_num > 0);
1636 	kmt_defbp_num--;
1637 
1638 	if (kmt_defbp_num == 0)
1639 		kmt_defbp_deactivate(t);
1640 
1641 	kmt_defbp_prune();
1642 }
1643 
1644 static int
1645 kmt_brkpt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1646 {
1647 	mdb_tgt_status_t tsp;
1648 	kmt_bparg_t *ka = args;
1649 	kmt_brkpt_t *kb;
1650 	GElf_Sym s;
1651 	mdb_instr_t instr;
1652 
1653 	(void) mdb_tgt_status(t, &tsp);
1654 	if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED)
1655 		return (set_errno(EMDB_NOPROC));
1656 
1657 	if (ka->ka_symbol != NULL) {
1658 		if (mdb_tgt_lookup_by_scope(t, ka->ka_symbol, &s, NULL) == -1) {
1659 			if (errno != EMDB_NOOBJ && !(errno == EMDB_NOSYM &&
1660 			    !(mdb.m_flags & MDB_FL_BPTNOSYMSTOP))) {
1661 				warn("breakpoint %s activation failed",
1662 				    ka->ka_symbol);
1663 			}
1664 			return (-1); /* errno is set for us */
1665 		}
1666 
1667 		ka->ka_addr = (uintptr_t)s.st_value;
1668 	}
1669 
1670 #ifdef __sparc
1671 	if (ka->ka_addr & 3)
1672 		return (set_errno(EMDB_BPALIGN));
1673 #endif
1674 
1675 	if (mdb_vread(&instr, sizeof (instr), ka->ka_addr) != sizeof (instr))
1676 		return (-1); /* errno is set for us */
1677 
1678 	if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1679 		warn("breakpoint will not arm until DTrace is inactive\n");
1680 
1681 	kb = mdb_zalloc(sizeof (kmt_brkpt_t), UM_SLEEP);
1682 	kb->kb_addr = ka->ka_addr;
1683 	sep->se_data = kb;
1684 
1685 	return (0);
1686 }
1687 
1688 /*ARGSUSED*/
1689 static void
1690 kmt_brkpt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep)
1691 {
1692 	mdb_free(sep->se_data, sizeof (kmt_brkpt_t));
1693 }
1694 
1695 /*ARGSUSED*/
1696 static char *
1697 kmt_brkpt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
1698     mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
1699 {
1700 	uintptr_t addr = 0;
1701 
1702 	if (vep != NULL) {
1703 		kmt_bparg_t *ka = vep->ve_args;
1704 
1705 		if (ka->ka_symbol != NULL) {
1706 			(void) mdb_iob_snprintf(buf, nbytes, "stop at %s",
1707 			    ka->ka_symbol);
1708 		} else {
1709 			(void) mdb_iob_snprintf(buf, nbytes, "stop at %a",
1710 			    ka->ka_addr);
1711 			addr = ka->ka_addr;
1712 		}
1713 
1714 	} else {
1715 		addr = ((kmt_brkpt_t *)sep->se_data)->kb_addr;
1716 		(void) mdb_iob_snprintf(buf, nbytes, "stop at %a", addr);
1717 	}
1718 
1719 	sp->spec_base = addr;
1720 	sp->spec_size = sizeof (mdb_instr_t);
1721 
1722 	return (buf);
1723 }
1724 
1725 static int
1726 kmt_brkpt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1727 {
1728 	kmt_brkpt_t *kb = sep->se_data;
1729 	kmt_bparg_t *ka = args;
1730 	GElf_Sym sym;
1731 
1732 	if (ka->ka_symbol != NULL) {
1733 		return (mdb_tgt_lookup_by_scope(t, ka->ka_symbol,
1734 		    &sym, NULL) == 0 && sym.st_value == kb->kb_addr);
1735 	}
1736 
1737 	return (ka->ka_addr == kb->kb_addr);
1738 }
1739 
1740 /*ARGSUSED*/
1741 static int
1742 kmt_brkpt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args)
1743 {
1744 	kmt_bparg_t *ka1 = vep->ve_args;
1745 	kmt_bparg_t *ka2 = args;
1746 
1747 	if (ka1->ka_symbol != NULL && ka2->ka_symbol != NULL)
1748 		return (strcmp(ka1->ka_symbol, ka2->ka_symbol) == 0);
1749 
1750 	if (ka1->ka_symbol == NULL && ka2->ka_symbol == NULL)
1751 		return (ka1->ka_addr == ka2->ka_addr);
1752 
1753 	return (0); /* fail if one is symbolic, other is an explicit address */
1754 }
1755 
1756 static int
1757 kmt_brkpt_arm(mdb_tgt_t *t, mdb_sespec_t *sep)
1758 {
1759 	kmt_data_t *kmt = t->t_data;
1760 	kmt_brkpt_t *kb = sep->se_data;
1761 	int rv;
1762 
1763 	if (kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_DTRACE_ACTIVE)
1764 		return (set_errno(EMDB_DTACTIVE));
1765 
1766 	if ((rv = kmdb_dpi_brkpt_arm(kb->kb_addr, &kb->kb_oinstr)) != 0)
1767 		return (rv);
1768 
1769 	if (kmt->kmt_narmedbpts++ == 0)
1770 		(void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_ACTIVATE);
1771 
1772 	return (0);
1773 }
1774 
1775 static int
1776 kmt_brkpt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep)
1777 {
1778 	kmt_data_t *kmt = t->t_data;
1779 	kmt_brkpt_t *kb = sep->se_data;
1780 	int rv;
1781 
1782 	ASSERT(kmdb_kdi_dtrace_get_state() == KDI_DTSTATE_KMDB_BPT_ACTIVE);
1783 
1784 	if ((rv = kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr)) != 0)
1785 		return (rv);
1786 
1787 	if (--kmt->kmt_narmedbpts == 0)
1788 		(void) kmdb_kdi_dtrace_set(KDI_DTSET_KMDB_BPT_DEACTIVATE);
1789 
1790 	return (0);
1791 }
1792 
1793 /*
1794  * Determine whether the specified sespec is an armed watchpoint that overlaps
1795  * with the given breakpoint and has the given flags set.  We use this to find
1796  * conflicts with breakpoints, below.
1797  */
1798 static int
1799 kmt_wp_overlap(mdb_sespec_t *sep, kmt_brkpt_t *kb, int flags)
1800 {
1801 	const kmdb_wapt_t *wp = sep->se_data;
1802 
1803 	return (sep->se_state == MDB_TGT_SPEC_ARMED &&
1804 	    sep->se_ops == &kmt_wapt_ops && (wp->wp_wflags & flags) &&
1805 	    kb->kb_addr - wp->wp_addr < wp->wp_size);
1806 }
1807 
1808 /*
1809  * We step over breakpoints using our single-stepper.  If a conflicting
1810  * watchpoint is present, we must temporarily remove it before stepping over the
1811  * breakpoint so we don't immediately re-trigger the watchpoint.  We know the
1812  * watchpoint has already triggered on our trap instruction as part of fetching
1813  * it.  Before we return, we must re-install any disabled watchpoints.
1814  */
1815 static int
1816 kmt_brkpt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
1817 {
1818 	kmt_brkpt_t *kb = sep->se_data;
1819 	int status = -1;
1820 	int error;
1821 
1822 	for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
1823 		if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
1824 			(void) kmdb_dpi_wapt_disarm(sep->se_data);
1825 	}
1826 
1827 	if (kmdb_dpi_brkpt_disarm(kb->kb_addr, kb->kb_oinstr) == 0 &&
1828 	    kmt_step(t, tsp) == 0)
1829 		status = kmt_status(t, tsp);
1830 
1831 	error = errno; /* save errno from disarm, step, or status */
1832 
1833 	for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
1834 		if (kmt_wp_overlap(sep, kb, MDB_TGT_WA_X))
1835 			kmdb_dpi_wapt_arm(sep->se_data);
1836 	}
1837 
1838 	(void) set_errno(error);
1839 	return (status);
1840 }
1841 
1842 /*ARGSUSED*/
1843 static int
1844 kmt_brkpt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
1845 {
1846 	kmt_brkpt_t *kb = sep->se_data;
1847 	int state, why;
1848 	kreg_t pc;
1849 
1850 	state = kmdb_dpi_get_state(&why);
1851 	(void) kmdb_dpi_get_register("pc", &pc);
1852 
1853 	return (state == DPI_STATE_FAULTED && why == DPI_STATE_WHY_BKPT &&
1854 	    pc == kb->kb_addr);
1855 }
1856 
1857 static const mdb_se_ops_t kmt_brkpt_ops = {
1858 	kmt_brkpt_ctor,		/* se_ctor */
1859 	kmt_brkpt_dtor,		/* se_dtor */
1860 	kmt_brkpt_info,		/* se_info */
1861 	kmt_brkpt_secmp,	/* se_secmp */
1862 	kmt_brkpt_vecmp,	/* se_vecmp */
1863 	kmt_brkpt_arm,		/* se_arm */
1864 	kmt_brkpt_disarm,	/* se_disarm */
1865 	kmt_brkpt_cont,		/* se_cont */
1866 	kmt_brkpt_match		/* se_match */
1867 };
1868 
1869 static int
1870 kmt_wapt_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1871 {
1872 	mdb_tgt_status_t tsp;
1873 	kmdb_wapt_t *vwp = args;
1874 	kmdb_wapt_t *swp;
1875 
1876 	(void) mdb_tgt_status(t, &tsp);
1877 	if (tsp.st_state != MDB_TGT_RUNNING && tsp.st_state != MDB_TGT_STOPPED)
1878 		return (set_errno(EMDB_NOPROC));
1879 
1880 	swp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP);
1881 	bcopy(vwp, swp, sizeof (kmdb_wapt_t));
1882 
1883 	if (kmdb_dpi_wapt_reserve(swp) < 0) {
1884 		mdb_free(swp, sizeof (kmdb_wapt_t));
1885 		return (-1); /* errno is set for us */
1886 	}
1887 
1888 	sep->se_data = swp;
1889 
1890 	return (0);
1891 }
1892 
1893 /*ARGSUSED*/
1894 static void
1895 kmt_wapt_dtor(mdb_tgt_t *t, mdb_sespec_t *sep)
1896 {
1897 	kmdb_wapt_t *wp = sep->se_data;
1898 
1899 	kmdb_dpi_wapt_release(wp);
1900 	mdb_free(wp, sizeof (kmdb_wapt_t));
1901 }
1902 
1903 /*ARGSUSED*/
1904 static char *
1905 kmt_wapt_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
1906     mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
1907 {
1908 	kmdb_wapt_t *wp = vep != NULL ? vep->ve_args : sep->se_data;
1909 	const char *fmt;
1910 	char desc[24];
1911 
1912 	ASSERT(wp->wp_wflags != 0);
1913 	desc[0] = '\0';
1914 
1915 	switch (wp->wp_wflags) {
1916 	case MDB_TGT_WA_R:
1917 		(void) strcat(desc, "/read");
1918 		break;
1919 	case MDB_TGT_WA_W:
1920 		(void) strcat(desc, "/write");
1921 		break;
1922 	case MDB_TGT_WA_X:
1923 		(void) strcat(desc, "/exec");
1924 		break;
1925 	default:
1926 		if (wp->wp_wflags & MDB_TGT_WA_R)
1927 			(void) strcat(desc, "/r");
1928 		if (wp->wp_wflags & MDB_TGT_WA_W)
1929 			(void) strcat(desc, "/w");
1930 		if (wp->wp_wflags & MDB_TGT_WA_X)
1931 			(void) strcat(desc, "/x");
1932 	}
1933 
1934 	switch (wp->wp_type) {
1935 	case DPI_WAPT_TYPE_PHYS:
1936 		fmt = "stop on %s of phys [%p, %p)";
1937 		break;
1938 
1939 	case DPI_WAPT_TYPE_VIRT:
1940 		fmt = "stop on %s of [%la, %la)";
1941 		break;
1942 
1943 	case DPI_WAPT_TYPE_IO:
1944 		if (wp->wp_size == 1)
1945 			fmt = "stop on %s of I/O port %p";
1946 		else
1947 			fmt = "stop on %s of I/O port [%p, %p)";
1948 		break;
1949 	}
1950 
1951 	(void) mdb_iob_snprintf(buf, nbytes, fmt, desc + 1, wp->wp_addr,
1952 	    wp->wp_addr + wp->wp_size);
1953 
1954 	sp->spec_base = wp->wp_addr;
1955 	sp->spec_size = wp->wp_size;
1956 
1957 	return (buf);
1958 }
1959 
1960 /*ARGSUSED*/
1961 static int
1962 kmt_wapt_secmp(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
1963 {
1964 	kmdb_wapt_t *wp1 = sep->se_data;
1965 	kmdb_wapt_t *wp2 = args;
1966 
1967 	return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size &&
1968 	    wp1->wp_wflags == wp2->wp_wflags);
1969 }
1970 
1971 /*ARGSUSED*/
1972 static int
1973 kmt_wapt_vecmp(mdb_tgt_t *t, mdb_vespec_t *vep, void *args)
1974 {
1975 	kmdb_wapt_t *wp1 = vep->ve_args;
1976 	kmdb_wapt_t *wp2 = args;
1977 
1978 	return (wp1->wp_addr == wp2->wp_addr && wp1->wp_size == wp2->wp_size &&
1979 	    wp1->wp_wflags == wp2->wp_wflags);
1980 }
1981 
1982 /*ARGSUSED*/
1983 static int
1984 kmt_wapt_arm(mdb_tgt_t *t, mdb_sespec_t *sep)
1985 {
1986 	kmdb_dpi_wapt_arm(sep->se_data);
1987 
1988 	return (0);
1989 }
1990 
1991 /*ARGSUSED*/
1992 static int
1993 kmt_wapt_disarm(mdb_tgt_t *t, mdb_sespec_t *sep)
1994 {
1995 	kmdb_dpi_wapt_disarm(sep->se_data);
1996 
1997 	return (0);
1998 }
1999 
2000 /*
2001  * Determine whether the specified sespec is an armed breakpoint at the given
2002  * %pc.  We use this to find conflicts with watchpoints below.
2003  */
2004 static int
2005 kmt_bp_overlap(mdb_sespec_t *sep, uintptr_t pc)
2006 {
2007 	kmt_brkpt_t *kb = sep->se_data;
2008 
2009 	return (sep->se_state == MDB_TGT_SPEC_ARMED &&
2010 	    sep->se_ops == &kmt_brkpt_ops && kb->kb_addr == pc);
2011 }
2012 
2013 /*
2014  * We step over watchpoints using our single-stepper.  If a conflicting
2015  * breakpoint is present, we must temporarily disarm it before stepping over
2016  * the watchpoint so we do not immediately re-trigger the breakpoint.  This is
2017  * similar to the case handled in kmt_brkpt_cont(), above.
2018  */
2019 static int
2020 kmt_wapt_cont(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2021 {
2022 	mdb_sespec_t *bep = NULL;
2023 	int status = -1;
2024 	int error, why;
2025 
2026 	/*
2027 	 * If we stopped for anything other than a watchpoint, check to see
2028 	 * if there's a breakpoint here.
2029 	 */
2030 	if (!(kmdb_dpi_get_state(&why) == DPI_STATE_FAULTED &&
2031 	    (why == DPI_STATE_WHY_V_WAPT || why == DPI_STATE_WHY_P_WAPT))) {
2032 		kreg_t pc;
2033 
2034 		(void) kmdb_dpi_get_register("pc", &pc);
2035 
2036 		for (bep = mdb_list_next(&t->t_active); bep != NULL;
2037 		    bep = mdb_list_next(bep)) {
2038 			if (kmt_bp_overlap(bep, pc)) {
2039 				(void) bep->se_ops->se_disarm(t, bep);
2040 				bep->se_state = MDB_TGT_SPEC_ACTIVE;
2041 				break;
2042 			}
2043 		}
2044 	}
2045 
2046 	kmdb_dpi_wapt_disarm(sep->se_data);
2047 	if (kmt_step(t, tsp) == 0)
2048 		status = kmt_status(t, tsp);
2049 
2050 	error = errno; /* save errno from step or status */
2051 
2052 	if (bep != NULL)
2053 		mdb_tgt_sespec_arm_one(t, bep);
2054 
2055 	(void) set_errno(error);
2056 	return (status);
2057 }
2058 
2059 /*ARGSUSED*/
2060 static int
2061 kmt_wapt_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2062 {
2063 	return (kmdb_dpi_wapt_match(sep->se_data));
2064 }
2065 
2066 static const mdb_se_ops_t kmt_wapt_ops = {
2067 	kmt_wapt_ctor,		/* se_ctor */
2068 	kmt_wapt_dtor,		/* se_dtor */
2069 	kmt_wapt_info,		/* se_info */
2070 	kmt_wapt_secmp,		/* se_secmp */
2071 	kmt_wapt_vecmp,		/* se_vecmp */
2072 	kmt_wapt_arm,		/* se_arm */
2073 	kmt_wapt_disarm,	/* se_disarm */
2074 	kmt_wapt_cont,		/* se_cont */
2075 	kmt_wapt_match		/* se_match */
2076 };
2077 
2078 /*ARGSUSED*/
2079 static int
2080 kmt_trap_ctor(mdb_tgt_t *t, mdb_sespec_t *sep, void *args)
2081 {
2082 	sep->se_data = args; /* trap number */
2083 
2084 	return (0);
2085 }
2086 
2087 /*ARGSUSED*/
2088 static char *
2089 kmt_trap_info(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_vespec_t *vep,
2090     mdb_tgt_spec_desc_t *sp, char *buf, size_t nbytes)
2091 {
2092 	const char *name;
2093 	int trapnum;
2094 
2095 	if (vep != NULL)
2096 		trapnum = (intptr_t)vep->ve_args;
2097 	else
2098 		trapnum = (intptr_t)sep->se_data;
2099 
2100 	if (trapnum == KMT_TRAP_ALL)
2101 		name = "any trap";
2102 	else if (trapnum == KMT_TRAP_NOTENUM)
2103 		name = "miscellaneous trap";
2104 	else
2105 		name = kmt_trapname(trapnum);
2106 
2107 	(void) mdb_iob_snprintf(buf, nbytes, "single-step stop on %s", name);
2108 
2109 	return (buf);
2110 }
2111 
2112 /*ARGSUSED2*/
2113 static int
2114 kmt_trap_match(mdb_tgt_t *t, mdb_sespec_t *sep, mdb_tgt_status_t *tsp)
2115 {
2116 	int spectt = (intptr_t)sep->se_data;
2117 	kmt_data_t *kmt = t->t_data;
2118 	kreg_t tt;
2119 
2120 	(void) kmdb_dpi_get_register("tt", &tt);
2121 
2122 	switch (spectt) {
2123 	case KMT_TRAP_ALL:
2124 		return (1);
2125 	case KMT_TRAP_NOTENUM:
2126 		return (tt > kmt->kmt_trapmax ||
2127 		    !BT_TEST(kmt->kmt_trapmap, tt));
2128 	default:
2129 		return (tt == spectt);
2130 	}
2131 }
2132 
2133 static const mdb_se_ops_t kmt_trap_ops = {
2134 	kmt_trap_ctor,		/* se_ctor */
2135 	no_se_dtor,		/* se_dtor */
2136 	kmt_trap_info,		/* se_info */
2137 	no_se_secmp,		/* se_secmp */
2138 	no_se_vecmp,		/* se_vecmp */
2139 	no_se_arm,		/* se_arm */
2140 	no_se_disarm,		/* se_disarm */
2141 	no_se_cont,		/* se_cont */
2142 	kmt_trap_match		/* se_match */
2143 };
2144 
2145 static void
2146 kmt_bparg_dtor(mdb_vespec_t *vep)
2147 {
2148 	kmt_bparg_t *ka = vep->ve_args;
2149 
2150 	if (ka->ka_symbol != NULL)
2151 		strfree(ka->ka_symbol);
2152 
2153 	if (ka->ka_defbp != NULL)
2154 		kmt_defbp_delete(mdb.m_target, ka->ka_defbp);
2155 
2156 	mdb_free(ka, sizeof (kmt_bparg_t));
2157 }
2158 
2159 static int
2160 kmt_add_vbrkpt(mdb_tgt_t *t, uintptr_t addr,
2161     int spec_flags, mdb_tgt_se_f *func, void *data)
2162 {
2163 	kmt_bparg_t *ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP);
2164 
2165 	ka->ka_addr = addr;
2166 	ka->ka_symbol = NULL;
2167 	ka->ka_defbp = NULL;
2168 
2169 	return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags,
2170 	    func, data, ka, kmt_bparg_dtor));
2171 }
2172 
2173 static int
2174 kmt_add_sbrkpt(mdb_tgt_t *t, const char *fullname,
2175     int spec_flags, mdb_tgt_se_f *func, void *data)
2176 {
2177 	kmt_bparg_t *ka;
2178 	kmt_defbp_t *dbp;
2179 	GElf_Sym sym;
2180 	char *tick, *objname, *symname;
2181 	int serrno;
2182 
2183 	if ((tick = strchr(fullname, '`')) == fullname) {
2184 		(void) set_errno(EMDB_NOOBJ);
2185 		return (0);
2186 	}
2187 
2188 	/*
2189 	 * Deferred breakpoints are always scoped.  If we didn't find a tick,
2190 	 * there's no scope.  We'll create a vbrkpt, but only if we can turn the
2191 	 * provided string into an address.
2192 	 */
2193 	if (tick == NULL) {
2194 		uintptr_t addr;
2195 
2196 		if (strisbasenum(fullname)) {
2197 			addr = mdb_strtoull(fullname); /* a bare address */
2198 		} else if (mdb_tgt_lookup_by_name(t, MDB_TGT_OBJ_EVERY,
2199 		    fullname, &sym, NULL) < 0) {
2200 			(void) set_errno(EMDB_NOSYM);
2201 			return (0);
2202 		} else {
2203 			addr = (uintptr_t)sym.st_value; /* unscoped sym name */
2204 		}
2205 
2206 		return (kmt_add_vbrkpt(t, addr, spec_flags, func, data));
2207 	}
2208 
2209 	if (*(tick + 1) == '\0') {
2210 		(void) set_errno(EMDB_NOSYM);
2211 		return (0);
2212 	}
2213 
2214 	objname = strndup(fullname, tick - fullname);
2215 	symname = tick + 1;
2216 
2217 	if (mdb_tgt_lookup_by_name(t, objname, symname, NULL, NULL) < 0 &&
2218 	    errno != EMDB_NOOBJ) {
2219 		serrno = errno;
2220 		strfree(objname);
2221 
2222 		(void) set_errno(serrno);
2223 		return (0); /* errno is set for us */
2224 	}
2225 
2226 	dbp = kmt_defbp_create(t, objname, symname);
2227 	strfree(objname);
2228 
2229 	ka = mdb_alloc(sizeof (kmt_bparg_t), UM_SLEEP);
2230 	ka->ka_symbol = strdup(fullname);
2231 	ka->ka_addr = 0;
2232 	ka->ka_defbp = dbp;
2233 
2234 	return (mdb_tgt_vespec_insert(t, &kmt_brkpt_ops, spec_flags,
2235 	    func, data, ka, kmt_bparg_dtor));
2236 }
2237 
2238 static int
2239 kmt_wparg_overlap(const kmdb_wapt_t *wp1, const kmdb_wapt_t *wp2)
2240 {
2241 	/* Assume the watchpoint spaces don't overlap */
2242 	if (wp1->wp_type != wp2->wp_type)
2243 		return (0);
2244 
2245 	if (wp2->wp_addr + wp2->wp_size <= wp1->wp_addr)
2246 		return (0); /* no range overlap */
2247 
2248 	if (wp1->wp_addr + wp1->wp_size <= wp2->wp_addr)
2249 		return (0); /* no range overlap */
2250 
2251 	return (wp1->wp_addr != wp2->wp_addr || wp1->wp_size != wp2->wp_size ||
2252 	    wp1->wp_wflags != wp2->wp_wflags);
2253 }
2254 
2255 static void
2256 kmt_wparg_dtor(mdb_vespec_t *vep)
2257 {
2258 	mdb_free(vep->ve_args, sizeof (kmdb_wapt_t));
2259 }
2260 
2261 static int
2262 kmt_add_wapt_common(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2263     int spec_flags, mdb_tgt_se_f *func, void *data, int type)
2264 {
2265 	kmdb_wapt_t *wp = mdb_alloc(sizeof (kmdb_wapt_t), UM_SLEEP);
2266 	mdb_sespec_t *sep;
2267 
2268 	wp->wp_addr = addr;
2269 	wp->wp_size = len;
2270 	wp->wp_type = type;
2271 	wp->wp_wflags = wflags;
2272 
2273 	if (kmdb_dpi_wapt_validate(wp) < 0)
2274 		return (0); /* errno is set for us */
2275 
2276 	for (sep = mdb_list_next(&t->t_active); sep; sep = mdb_list_next(sep)) {
2277 		if (sep->se_ops == &kmt_wapt_ops &&
2278 		    mdb_list_next(&sep->se_velist) != NULL &&
2279 		    kmt_wparg_overlap(wp, sep->se_data))
2280 			goto wapt_dup;
2281 	}
2282 
2283 	for (sep = mdb_list_next(&t->t_idle); sep; sep = mdb_list_next(sep)) {
2284 		if (sep->se_ops == &kmt_wapt_ops && kmt_wparg_overlap(wp,
2285 		    ((mdb_vespec_t *)mdb_list_next(&sep->se_velist))->ve_args))
2286 			goto wapt_dup;
2287 	}
2288 
2289 	return (mdb_tgt_vespec_insert(t, &kmt_wapt_ops, spec_flags,
2290 	    func, data, wp, kmt_wparg_dtor));
2291 
2292 wapt_dup:
2293 	mdb_free(wp, sizeof (kmdb_wapt_t));
2294 	(void) set_errno(EMDB_WPDUP);
2295 	return (0);
2296 }
2297 
2298 static int
2299 kmt_add_pwapt(mdb_tgt_t *t, physaddr_t addr, size_t len, uint_t wflags,
2300     int spec_flags, mdb_tgt_se_f *func, void *data)
2301 {
2302 	return (kmt_add_wapt_common(t, (uintptr_t)addr, len, wflags, spec_flags,
2303 	    func, data, DPI_WAPT_TYPE_PHYS));
2304 }
2305 
2306 static int
2307 kmt_add_vwapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2308     int spec_flags, mdb_tgt_se_f *func, void *data)
2309 {
2310 	return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func,
2311 	    data, DPI_WAPT_TYPE_VIRT));
2312 }
2313 
2314 static int
2315 kmt_add_iowapt(mdb_tgt_t *t, uintptr_t addr, size_t len, uint_t wflags,
2316     int spec_flags, mdb_tgt_se_f *func, void *data)
2317 {
2318 	return (kmt_add_wapt_common(t, addr, len, wflags, spec_flags, func,
2319 	    data, DPI_WAPT_TYPE_IO));
2320 }
2321 
2322 static int
2323 kmt_add_trap(mdb_tgt_t *t, int trapnum, int spec_flags, mdb_tgt_se_f *func,
2324     void *data)
2325 {
2326 	kmt_data_t *kmt = t->t_data;
2327 
2328 	if (trapnum != KMT_TRAP_ALL && trapnum != KMT_TRAP_NOTENUM) {
2329 		if (trapnum < 0 || trapnum > kmt->kmt_trapmax) {
2330 			(void) set_errno(EMDB_BADFLTNUM);
2331 			return (0);
2332 		}
2333 
2334 		BT_SET(kmt->kmt_trapmap, trapnum);
2335 	}
2336 
2337 	return (mdb_tgt_vespec_insert(t, &kmt_trap_ops, spec_flags, func, data,
2338 	    (void *)(uintptr_t)trapnum, no_ve_dtor));
2339 }
2340 
2341 /*ARGSUSED*/
2342 static uintmax_t
2343 kmt_cpuid_disc_get(const mdb_var_t *v)
2344 {
2345 	return (kmdb_dpi_get_master_cpuid());
2346 }
2347 
2348 static const mdb_nv_disc_t kmt_cpuid_disc = {
2349 	NULL,
2350 	kmt_cpuid_disc_get
2351 };
2352 
2353 /*
2354  * This routine executes while the kernel is running.
2355  */
2356 void
2357 kmt_activate(mdb_tgt_t *t)
2358 {
2359 	kmt_data_t *kmt = t->t_data;
2360 
2361 	mdb_prop_postmortem = FALSE;
2362 	mdb_prop_kernel = TRUE;
2363 
2364 	(void) mdb_tgt_register_dcmds(t, &kmt_dcmds[0], MDB_MOD_FORCE);
2365 	mdb_tgt_register_regvars(t, kmt->kmt_rds, &kmt_reg_disc, 0);
2366 
2367 	/*
2368 	 * Force load of the MDB krtld module, in case it's been rolled into
2369 	 * unix.
2370 	 */
2371 	(void) mdb_module_load(KMT_RTLD_NAME, MDB_MOD_SILENT | MDB_MOD_DEFER);
2372 }
2373 
2374 static void
2375 kmt_destroy(mdb_tgt_t *t)
2376 {
2377 	kmt_data_t *kmt = t->t_data;
2378 	kmt_module_t *km, *pkm;
2379 
2380 	mdb_nv_destroy(&kmt->kmt_modules);
2381 	for (km = mdb_list_prev(&kmt->kmt_modlist); km != NULL; km = pkm) {
2382 		pkm = mdb_list_prev(km);
2383 		mdb_free(km, sizeof (kmt_module_t));
2384 	}
2385 
2386 	if (!kmt_defbp_lock)
2387 		kmt_defbp_destroy_all();
2388 
2389 	if (kmt->kmt_trapmap != NULL)
2390 		mdb_free(kmt->kmt_trapmap, BT_SIZEOFMAP(kmt->kmt_trapmax));
2391 
2392 	mdb_free(kmt, sizeof (kmt_data_t));
2393 }
2394 
2395 static const mdb_tgt_ops_t kmt_ops = {
2396 	kmt_setflags,				/* t_setflags */
2397 	(int (*)())(uintptr_t) mdb_tgt_notsup,	/* t_setcontext */
2398 	kmt_activate,				/* t_activate */
2399 	(void (*)())(uintptr_t) mdb_tgt_nop,	/* t_deactivate */
2400 	kmt_periodic,				/* t_periodic */
2401 	kmt_destroy,				/* t_destroy */
2402 	kmt_name,				/* t_name */
2403 	(const char *(*)()) mdb_conf_isa,	/* t_isa */
2404 	kmt_platform,				/* t_platform */
2405 	kmt_uname,				/* t_uname */
2406 	kmt_dmodel,				/* t_dmodel */
2407 	(ssize_t (*)()) mdb_tgt_notsup,		/* t_aread */
2408 	(ssize_t (*)()) mdb_tgt_notsup,		/* t_awrite */
2409 	kmt_read,				/* t_vread */
2410 	kmt_write,				/* t_vwrite */
2411 	kmt_pread,				/* t_pread */
2412 	kmt_pwrite,				/* t_pwrite */
2413 	kmt_read,				/* t_fread */
2414 	kmt_write,				/* t_fwrite */
2415 	kmt_ioread,				/* t_ioread */
2416 	kmt_iowrite,				/* t_iowrite */
2417 	kmt_vtop,				/* t_vtop */
2418 	kmt_lookup_by_name,			/* t_lookup_by_name */
2419 	kmt_lookup_by_addr,			/* t_lookup_by_addr */
2420 	kmt_symbol_iter,			/* t_symbol_iter */
2421 	kmt_mapping_iter,			/* t_mapping_iter */
2422 	kmt_object_iter,			/* t_object_iter */
2423 	kmt_addr_to_map,			/* t_addr_to_map */
2424 	kmt_name_to_map,			/* t_name_to_map */
2425 	kmt_addr_to_ctf,			/* t_addr_to_ctf */
2426 	kmt_name_to_ctf,			/* t_name_to_ctf */
2427 	kmt_status,				/* t_status */
2428 	(int (*)())(uintptr_t) mdb_tgt_notsup,	/* t_run */
2429 	kmt_step,				/* t_step */
2430 	kmt_step_out,				/* t_step_out */
2431 	kmt_next,				/* t_next */
2432 	kmt_continue,				/* t_cont */
2433 	(int (*)())(uintptr_t) mdb_tgt_notsup,	/* t_signal */
2434 	kmt_add_vbrkpt,				/* t_add_vbrkpt */
2435 	kmt_add_sbrkpt,				/* t_add_sbrkpt */
2436 	kmt_add_pwapt,				/* t_add_pwapt */
2437 	kmt_add_vwapt,				/* t_add_vwapt */
2438 	kmt_add_iowapt,				/* t_add_iowapt */
2439 	(int (*)())(uintptr_t) mdb_tgt_null,	/* t_add_sysenter */
2440 	(int (*)())(uintptr_t) mdb_tgt_null,	/* t_add_sysexit */
2441 	(int (*)())(uintptr_t) mdb_tgt_null,	/* t_add_signal */
2442 	kmt_add_trap,				/* t_add_fault */
2443 	kmt_getareg,				/* t_getareg */
2444 	kmt_putareg,				/* t_putareg */
2445 	(int (*)())(uintptr_t) mdb_tgt_nop,	/* XXX t_stack_iter */
2446 	(int (*)())(uintptr_t) mdb_tgt_notsup	/* t_auxv */
2447 };
2448 
2449 /*
2450  * Called immediately upon resumption of the system after a step or continue.
2451  * Allows us to synchronize kmt's view of the world with reality.
2452  */
2453 /*ARGSUSED*/
2454 static void
2455 kmt_sync(mdb_tgt_t *t)
2456 {
2457 	kmt_data_t *kmt = t->t_data;
2458 	int symavail;
2459 
2460 	mdb_dprintf(MDB_DBG_KMOD, "synchronizing with kernel\n");
2461 
2462 	symavail = kmt->kmt_symavail;
2463 	kmt->kmt_symavail = FALSE;
2464 
2465 	/*
2466 	 * Resync our view of the world if the modules have changed, or if we
2467 	 * didn't have any symbols coming into this function.  The latter will
2468 	 * only happen on startup.
2469 	 */
2470 	if (kmdb_kdi_mods_changed() || !symavail)
2471 		kmt_modlist_update(t);
2472 
2473 	/*
2474 	 * It would be nice if we could run this less frequently, perhaps
2475 	 * after a dvec-initiated trigger.
2476 	 */
2477 	kmdb_module_sync();
2478 
2479 	kmt->kmt_symavail = TRUE;
2480 
2481 	mdb_dprintf(MDB_DBG_KMOD, "synchronization complete\n");
2482 
2483 	kmt_defbp_prune();
2484 
2485 	if (kmt_defbp_num > 0 && kmt_defbp_bpspec == 0 &&
2486 	    kmdb_kdi_dtrace_get_state() != KDI_DTSTATE_DTRACE_ACTIVE) {
2487 		/*
2488 		 * Deferred breakpoints were created while DTrace was active,
2489 		 * and consequently the deferred breakpoint enabling mechanism
2490 		 * wasn't activated.  Activate it now, and then try to activate
2491 		 * the deferred breakpoints.  We do this so that we can catch
2492 		 * the ones which may apply to modules that have been loaded
2493 		 * while they were waiting for DTrace to deactivate.
2494 		 */
2495 		(void) kmt_defbp_activate(t);
2496 		(void) mdb_tgt_sespec_activate_all(t);
2497 	}
2498 
2499 	(void) mdb_tgt_status(t, &t->t_status);
2500 }
2501 
2502 /*
2503  * This routine executes while the kernel is running.
2504  */
2505 /*ARGSUSED*/
2506 int
2507 kmdb_kvm_create(mdb_tgt_t *t, int argc, const char *argv[])
2508 {
2509 	kmt_data_t *kmt;
2510 
2511 	if (argc != 0)
2512 		return (set_errno(EINVAL));
2513 
2514 	kmt = mdb_zalloc(sizeof (kmt_data_t), UM_SLEEP);
2515 	t->t_data = kmt;
2516 	t->t_ops = &kmt_ops;
2517 	t->t_flags |= MDB_TGT_F_RDWR;	/* kmdb is always r/w */
2518 
2519 	(void) mdb_nv_insert(&mdb.m_nv, "cpuid", &kmt_cpuid_disc, 0,
2520 	    MDB_NV_PERSIST | MDB_NV_RDONLY);
2521 
2522 	(void) mdb_nv_create(&kmt->kmt_modules, UM_SLEEP);
2523 
2524 	kmt_init_isadep(t);
2525 
2526 	kmt->kmt_symavail = FALSE;
2527 
2528 	bzero(&kmt_defbp_list, sizeof (mdb_list_t));
2529 
2530 	return (0);
2531 
2532 create_err:
2533 	kmt_destroy(t);
2534 
2535 	return (-1);
2536 }
2537 
2538 /*
2539  * This routine is called once, when kmdb first has control of the world.
2540  */
2541 void
2542 kmdb_kvm_startup(void)
2543 {
2544 	kmt_data_t *kmt = mdb.m_target->t_data;
2545 
2546 	mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm startup\n");
2547 
2548 	kmt_sync(mdb.m_target);
2549 	(void) mdb_module_load_builtin(KMT_MODULE);
2550 	kmt_startup_isadep(mdb.m_target);
2551 
2552 	/*
2553 	 * This is here because we need to write the deferred breakpoint
2554 	 * breakpoint when the debugger starts.  Our normal r/o write routines
2555 	 * don't work when the kernel is running, so we have to do it during
2556 	 * startup.
2557 	 */
2558 	(void) mdb_tgt_sespec_activate_all(mdb.m_target);
2559 
2560 	kmt->kmt_rtld_name = KMT_RTLD_NAME;
2561 
2562 	if (kmt_module_by_name(kmt, KMT_RTLD_NAME) == NULL)
2563 		kmt->kmt_rtld_name = "unix";
2564 }
2565 
2566 /*
2567  * This routine is called after kmdb has loaded its initial set of modules.
2568  */
2569 void
2570 kmdb_kvm_poststartup(void)
2571 {
2572 	mdb_dprintf(MDB_DBG_KMOD, "kmdb_kvm post-startup\n");
2573 
2574 	(void) mdb_dis_select(kmt_def_dismode());
2575 }
2576