kernel - Fix exit races which can lead to a corrupt p_children list
[dragonfly.git] / sys / kern / kern_exit.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1982, 1986, 1989, 1991, 1993
3 * The Regents of the University of California. All rights reserved.
4 * (c) UNIX System Laboratories, Inc.
5 * All or some portions of this file are derived from material licensed
6 * to the University of California by American Telephone and Telegraph
7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8 * the permission of UNIX System Laboratories, Inc.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 * may be used to endorse or promote products derived from this software
24 * without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 * @(#)kern_exit.c 8.7 (Berkeley) 2/12/94
39 * $FreeBSD: src/sys/kern/kern_exit.c,v 1.92.2.11 2003/01/13 22:51:16 dillon Exp $
f6c36234 40 * $DragonFly: src/sys/kern/kern_exit.c,v 1.91 2008/05/18 20:02:02 nth Exp $
984263bc
MD
41 */
42
43#include "opt_compat.h"
44#include "opt_ktrace.h"
45
46#include <sys/param.h>
47#include <sys/systm.h>
48#include <sys/sysproto.h>
49#include <sys/kernel.h>
50#include <sys/malloc.h>
51#include <sys/proc.h>
29f58392 52#include <sys/ktrace.h>
984263bc
MD
53#include <sys/pioctl.h>
54#include <sys/tty.h>
55#include <sys/wait.h>
56#include <sys/vnode.h>
57#include <sys/resourcevar.h>
58#include <sys/signalvar.h>
70d3d461 59#include <sys/taskqueue.h>
984263bc
MD
60#include <sys/ptrace.h>
61#include <sys/acct.h> /* for acct_process() function prototype */
62#include <sys/filedesc.h>
63#include <sys/shm.h>
64#include <sys/sem.h>
984263bc 65#include <sys/jail.h>
9697c509 66#include <sys/kern_syscall.h>
a722be49 67#include <sys/upcall.h>
f6bf3af1 68#include <sys/caps.h>
d5f340eb 69#include <sys/unistd.h>
8ba5f7ef 70#include <sys/eventhandler.h>
2883d2d8 71#include <sys/dsched.h>
984263bc
MD
72
73#include <vm/vm.h>
74#include <vm/vm_param.h>
75#include <sys/lock.h>
76#include <vm/pmap.h>
77#include <vm/vm_map.h>
984263bc
MD
78#include <vm/vm_extern.h>
79#include <sys/user.h>
80
e955543c 81#include <sys/refcount.h>
e43a034f 82#include <sys/thread2.h>
e3161323 83#include <sys/sysref2.h>
684a93c4 84#include <sys/mplock2.h>
e3161323
MD
85
86static void reaplwps(void *context, int dummy);
3e291793 87static void reaplwp(struct lwp *lp);
dc52e1cc 88static void killlwps(struct lwp *lp);
e43a034f 89
984263bc 90static MALLOC_DEFINE(M_ATEXIT, "atexit", "atexit callback");
d511d5d5 91static MALLOC_DEFINE(M_ZOMBIE, "zombie", "zombie proc status");
984263bc 92
b5c4d81f
MD
93static struct lwkt_token deadlwp_token = LWKT_TOKEN_INITIALIZER(deadlwp_token);
94
984263bc
MD
95/*
96 * callout list for things to do at exit time
97 */
98struct exitlist {
99 exitlist_fn function;
100 TAILQ_ENTRY(exitlist) next;
101};
102
103TAILQ_HEAD(exit_list_head, exitlist);
104static struct exit_list_head exit_list = TAILQ_HEAD_INITIALIZER(exit_list);
105
106/*
70d3d461
SS
107 * LWP reaper data
108 */
109struct task *deadlwp_task[MAXCPU];
110struct lwplist deadlwp_list[MAXCPU];
111
112/*
984263bc
MD
113 * exit --
114 * Death of process.
41c20dac
MD
115 *
116 * SYS_EXIT_ARGS(int rval)
984263bc 117 */
753fd850
MD
118int
119sys_exit(struct exit_args *uap)
984263bc 120{
41c20dac 121 exit1(W_EXITCODE(uap->rval, 0));
984263bc
MD
122 /* NOTREACHED */
123}
124
d5f340eb
SS
125/*
126 * Extended exit --
127 * Death of a lwp or process with optional bells and whistles.
3919ced0
MD
128 *
129 * MPALMOSTSAFE
d5f340eb
SS
130 */
131int
132sys_extexit(struct extexit_args *uap)
133{
b5c4d81f 134 struct proc *p = curproc;
d5f340eb
SS
135 int action, who;
136 int error;
137
138 action = EXTEXIT_ACTION(uap->how);
139 who = EXTEXIT_WHO(uap->how);
140
141 /* Check parameters before we might perform some action */
142 switch (who) {
143 case EXTEXIT_PROC:
144 case EXTEXIT_LWP:
145 break;
d5f340eb
SS
146 default:
147 return (EINVAL);
148 }
149
150 switch (action) {
151 case EXTEXIT_SIMPLE:
152 break;
d5f340eb
SS
153 case EXTEXIT_SETINT:
154 error = copyout(&uap->status, uap->addr, sizeof(uap->status));
155 if (error)
156 return (error);
157 break;
d5f340eb
SS
158 default:
159 return (EINVAL);
160 }
161
b5c4d81f 162 lwkt_gettoken(&p->p_token);
3919ced0 163
d5f340eb
SS
164 switch (who) {
165 case EXTEXIT_LWP:
166 /*
167 * Be sure only to perform a simple lwp exit if there is at
168 * least one more lwp in the proc, which will call exit1()
169 * later, otherwise the proc will be an UNDEAD and not even a
170 * SZOMB!
171 */
b5c4d81f
MD
172 if (p->p_nthreads > 1) {
173 lwp_exit(0); /* called w/ p_token held */
e3161323
MD
174 /* NOT REACHED */
175 }
d5f340eb
SS
176 /* else last lwp in proc: do the real thing */
177 /* FALLTHROUGH */
d5f340eb
SS
178 default: /* to help gcc */
179 case EXTEXIT_PROC:
b5c4d81f 180 lwkt_reltoken(&p->p_token);
d5f340eb
SS
181 exit1(W_EXITCODE(uap->status, 0));
182 /* NOTREACHED */
183 }
184
185 /* NOTREACHED */
b5c4d81f 186 lwkt_reltoken(&p->p_token); /* safety */
d5f340eb
SS
187}
188
e3161323 189/*
dc52e1cc
MD
190 * Kill all lwps associated with the current process except the
191 * current lwp. Return an error if we race another thread trying to
192 * do the same thing and lose the race.
193 *
194 * If forexec is non-zero the current thread and process flags are
195 * cleaned up so they can be reused.
616516c8
MD
196 *
197 * Caller must hold curproc->p_token
dc52e1cc
MD
198 */
199int
200killalllwps(int forexec)
201{
202 struct lwp *lp = curthread->td_lwp;
203 struct proc *p = lp->lwp_proc;
204
205 /*
206 * Interlock against P_WEXIT. Only one of the process's thread
207 * is allowed to do the master exit.
208 */
4643740a 209 if (p->p_flags & P_WEXIT)
dc52e1cc 210 return (EALREADY);
4643740a 211 p->p_flags |= P_WEXIT;
dc52e1cc
MD
212
213 /*
4643740a 214 * Interlock with LWP_MP_WEXIT and kill any remaining LWPs
dc52e1cc 215 */
4643740a 216 atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
dc52e1cc
MD
217 if (p->p_nthreads > 1)
218 killlwps(lp);
219
220 /*
221 * If doing this for an exec, clean up the remaining thread
222 * (us) for continuing operation after all the other threads
223 * have been killed.
224 */
225 if (forexec) {
4643740a
MD
226 atomic_clear_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
227 p->p_flags &= ~P_WEXIT;
dc52e1cc
MD
228 }
229 return(0);
230}
231
232/*
e3161323
MD
233 * Kill all LWPs except the current one. Do not try to signal
234 * LWPs which have exited on their own or have already been
235 * signaled.
236 */
dc52e1cc 237static void
70d3d461
SS
238killlwps(struct lwp *lp)
239{
240 struct proc *p = lp->lwp_proc;
241 struct lwp *tlp;
242
e3161323 243 /*
89d9d449 244 * Kill the remaining LWPs. We must send the signal before setting
4643740a 245 * LWP_MP_WEXIT. The setting of WEXIT is optional but helps reduce
89d9d449
MD
246 * races. tlp must be held across the call as it might block and
247 * allow the target lwp to rip itself out from under our loop.
e3161323 248 */
70d3d461 249 FOREACH_LWP_IN_PROC(tlp, p) {
89d9d449 250 LWPHOLD(tlp);
e2b148c6 251 lwkt_gettoken(&tlp->lwp_token);
4643740a 252 if ((tlp->lwp_mpflags & LWP_MP_WEXIT) == 0) {
73e40cb2 253 lwpsignal(p, tlp, SIGKILL);
4643740a 254 atomic_set_int(&tlp->lwp_mpflags, LWP_MP_WEXIT);
e3161323 255 }
e2b148c6 256 lwkt_reltoken(&tlp->lwp_token);
89d9d449 257 LWPRELE(tlp);
70d3d461
SS
258 }
259
e3161323
MD
260 /*
261 * Wait for everything to clear out.
262 */
70d3d461 263 while (p->p_nthreads > 1) {
ef1c4d7f 264 tsleep(&p->p_nthreads, 0, "killlwps", 0);
70d3d461
SS
265 }
266}
267
984263bc
MD
268/*
269 * Exit: deallocate address space and other resources, change proc state
270 * to zombie, and unlink proc from allproc and parent's lists. Save exit
271 * status and rusage for wait(). Check for child processes and orphan them.
272 */
273void
41c20dac 274exit1(int rv)
984263bc 275{
bb3cd951
SS
276 struct thread *td = curthread;
277 struct proc *p = td->td_proc;
278 struct lwp *lp = td->td_lwp;
41c20dac
MD
279 struct proc *q, *nq;
280 struct vmspace *vm;
984263bc
MD
281 struct vnode *vtmp;
282 struct exitlist *ep;
dc52e1cc 283 int error;
984263bc 284
b5c4d81f
MD
285 lwkt_gettoken(&p->p_token);
286
984263bc 287 if (p->p_pid == 1) {
6ea70f76 288 kprintf("init died (signal %d, exit %d)\n",
984263bc
MD
289 WTERMSIG(rv), WEXITSTATUS(rv));
290 panic("Going nowhere without my init!");
291 }
9d7a637e
AE
292 varsymset_clean(&p->p_varsymset);
293 lockuninit(&p->p_varsymset.vx_lock);
2af9d75d 294
70d3d461 295 /*
dc52e1cc
MD
296 * Kill all lwps associated with the current process, return an
297 * error if we race another thread trying to do the same thing
298 * and lose the race.
70d3d461 299 */
dc52e1cc
MD
300 error = killalllwps(0);
301 if (error) {
e3161323
MD
302 lwp_exit(0);
303 /* NOT REACHED */
222b18cd 304 }
81eea9f4 305
81eea9f4 306 caps_exit(lp->lwp_thread);
984263bc
MD
307
308 /* are we a task leader? */
e3161323 309 if (p == p->p_leader) {
984263bc
MD
310 struct kill_args killArgs;
311 killArgs.signum = SIGKILL;
312 q = p->p_peers;
313 while(q) {
314 killArgs.pid = q->p_pid;
315 /*
316 * The interface for kill is better
317 * than the internal signal
318 */
753fd850 319 sys_kill(&killArgs);
984263bc
MD
320 nq = q;
321 q = q->p_peers;
322 }
323 while (p->p_peers)
e3161323 324 tsleep((caddr_t)p, 0, "exit1", 0);
8ba5f7ef 325 }
984263bc
MD
326
327#ifdef PGINPROF
328 vmsizmon();
329#endif
330 STOPEVENT(p, S_EXIT, rv);
7c37ea07 331 p->p_flags |= P_POSTEXIT; /* stop procfs stepping */
984263bc
MD
332
333 /*
334 * Check if any loadable modules need anything done at process exit.
335 * e.g. SYSV IPC stuff
336 * XXX what if one of these generates an error?
337 */
8ba5f7ef
AH
338 p->p_xstat = rv;
339 EVENTHANDLER_INVOKE(process_exit, p);
340
341 /*
342 * XXX: imho, the eventhandler stuff is much cleaner than this.
343 * Maybe we should move everything to use eventhandler.
344 */
984263bc 345 TAILQ_FOREACH(ep, &exit_list, next)
bb3cd951 346 (*ep->function)(td);
984263bc 347
4643740a 348 if (p->p_flags & P_PROFIL)
984263bc 349 stopprofclock(p);
82354ad8 350
984263bc 351 SIGEMPTYSET(p->p_siglist);
aa6c3de6 352 SIGEMPTYSET(lp->lwp_siglist);
984263bc 353 if (timevalisset(&p->p_realtimer.it_value))
a471eac5 354 callout_stop_sync(&p->p_ithandle);
984263bc
MD
355
356 /*
357 * Reset any sigio structures pointing to us as a result of
358 * F_SETOWN with our pid.
359 */
360 funsetownlst(&p->p_sigiolst);
361
362 /*
363 * Close open files and release open-file table.
364 * This may block!
365 */
0a4a9c77 366 fdfree(p, NULL);
984263bc
MD
367
368 if(p->p_leader->p_peers) {
369 q = p->p_leader;
370 while(q->p_peers != p)
371 q = q->p_peers;
372 q->p_peers = p->p_peers;
373 wakeup((caddr_t)p->p_leader);
374 }
375
376 /*
377 * XXX Shutdown SYSV semaphores
378 */
379 semexit(p);
380
06ecca5a
MD
381 KKASSERT(p->p_numposixlocks == 0);
382
984263bc
MD
383 /* The next two chunks should probably be moved to vmspace_exit. */
384 vm = p->p_vmspace;
a722be49
MD
385
386 /*
387 * Release upcalls associated with this process
388 */
389 if (vm->vm_upcalls)
08f2f1bb 390 upc_release(vm, lp);
a722be49 391
39005e16
MD
392 /*
393 * Clean up data related to virtual kernel operation. Clean up
394 * any vkernel context related to the current lwp now so we can
395 * destroy p_vkernel.
396 */
397 if (p->p_vkernel) {
398 vkernel_lwp_exit(lp);
4a22e893 399 vkernel_exit(p);
39005e16 400 }
0daa37a5 401
984263bc
MD
402 /*
403 * Release user portion of address space.
404 * This releases references to vnodes,
405 * which could cause I/O if the file has been unlinked.
406 * Need to do this early enough that we can still sleep.
407 * Can't free the entire vmspace as the kernel stack
408 * may be mapped within that space also.
409 *
410 * Processes sharing the same vmspace may exit in one order, and
411 * get cleaned up by vmspace_exit() in a different order. The
412 * last exiting process to reach this point releases as much of
413 * the environment as it can, and the last process cleaned up
414 * by vmspace_exit() (which decrements exitingcnt) cleans up the
415 * remainder.
416 */
46754a20 417 vmspace_exitbump(vm);
e3161323 418 sysref_put(&vm->vm_sysref);
984263bc
MD
419
420 if (SESS_LEADER(p)) {
1fd87d54 421 struct session *sp = p->p_session;
984263bc
MD
422
423 if (sp->s_ttyvp) {
424 /*
1fbb5fc0
MD
425 * We are the controlling process. Signal the
426 * foreground process group, drain the controlling
427 * terminal, and revoke access to the controlling
428 * terminal.
429 *
430 * NOTE: while waiting for the process group to exit
431 * it is possible that one of the processes in the
f1aeb0c0
MD
432 * group will revoke the tty, so the ttyclosesession()
433 * function will re-check sp->s_ttyvp.
984263bc
MD
434 */
435 if (sp->s_ttyp && (sp->s_ttyp->t_session == sp)) {
436 if (sp->s_ttyp->t_pgrp)
437 pgsignal(sp->s_ttyp->t_pgrp, SIGHUP, 1);
f1aeb0c0
MD
438 ttywait(sp->s_ttyp);
439 ttyclosesession(sp, 1); /* also revoke */
984263bc 440 }
5fd012e0
MD
441 /*
442 * Release the tty. If someone has it open via
443 * /dev/tty then close it (since they no longer can
444 * once we've NULL'd it out).
445 */
f1aeb0c0
MD
446 ttyclosesession(sp, 0);
447
984263bc
MD
448 /*
449 * s_ttyp is not zero'd; we use this to indicate
450 * that the session once had a controlling terminal.
451 * (for logging and informational purposes)
452 */
453 }
454 sp->s_leader = NULL;
455 }
456 fixjobc(p, p->p_pgrp, 0);
457 (void)acct_process(p);
458#ifdef KTRACE
459 /*
460 * release trace file
461 */
29f58392
MD
462 if (p->p_tracenode)
463 ktrdestroy(&p->p_tracenode);
464 p->p_traceflag = 0;
984263bc
MD
465#endif
466 /*
467 * Release reference to text vnode
468 */
469 if ((vtmp = p->p_textvp) != NULL) {
470 p->p_textvp = NULL;
471 vrele(vtmp);
472 }
473
8ba5f7ef
AH
474 /* Release namecache handle to text file */
475 if (p->p_textnch.ncp)
476 cache_drop(&p->p_textnch);
477
984263bc 478 /*
82354ad8
MD
479 * We have to handle PPWAIT here or proc_move_allproc_zombie()
480 * will block on the PHOLD() the parent is doing.
481 */
482 if (p->p_flags & P_PPWAIT) {
483 p->p_flags &= ~P_PPWAIT;
484 wakeup(p->p_pptr);
485 }
486
487 /*
5bf0d9b5
MD
488 * Move the process to the zombie list. This will block
489 * until the process p_lock count reaches 0. The process will
490 * not be reaped until TDF_EXITING is set by cpu_thread_exit(),
491 * which is called from cpu_proc_exit().
ae8050a4 492 */
5bf0d9b5 493 proc_move_allproc_zombie(p);
984263bc 494
7e90d791
MD
495 /*
496 * Reparent all of this process's children to the init process.
497 * We must hold initproc->p_token in order to mess with
498 * initproc->p_children. We already hold p->p_token (to remove
499 * the children from our list).
500 */
984263bc 501 q = LIST_FIRST(&p->p_children);
7e90d791
MD
502 if (q) {
503 lwkt_gettoken(&initproc->p_token);
1a3fa08b
MD
504 while ((q = LIST_FIRST(&p->p_children)) != NULL) {
505 PHOLD(q);
506 lwkt_gettoken(&q->p_token);
507 if (q != LIST_FIRST(&p->p_children)) {
508 lwkt_reltoken(&q->p_token);
509 PRELE(q);
510 continue;
511 }
7e90d791
MD
512 LIST_REMOVE(q, p_sibling);
513 LIST_INSERT_HEAD(&initproc->p_children, q, p_sibling);
514 q->p_pptr = initproc;
515 q->p_sigparent = SIGCHLD;
1a3fa08b 516
7e90d791
MD
517 /*
518 * Traced processes are killed
519 * since their existence means someone is screwing up.
520 */
4643740a
MD
521 if (q->p_flags & P_TRACED) {
522 q->p_flags &= ~P_TRACED;
7e90d791
MD
523 ksignal(q, SIGKILL);
524 }
1a3fa08b
MD
525 lwkt_reltoken(&q->p_token);
526 PRELE(q);
984263bc 527 }
7e90d791
MD
528 lwkt_reltoken(&initproc->p_token);
529 wakeup(initproc);
984263bc
MD
530 }
531
532 /*
533 * Save exit status and final rusage info, adding in child rusage
534 * info and self times.
535 */
fde7ac71
SS
536 calcru_proc(p, &p->p_ru);
537 ruadd(&p->p_ru, &p->p_cru);
984263bc
MD
538
539 /*
984263bc
MD
540 * notify interested parties of our demise.
541 */
542 KNOTE(&p->p_klist, NOTE_EXIT);
543
544 /*
545 * Notify parent that we're gone. If parent has the PS_NOCLDWAIT
b8aacf5e
MR
546 * flag set, or if the handler is set to SIG_IGN, notify process 1
547 * instead (and hope it will handle this situation).
984263bc 548 */
b8aacf5e
MR
549 if (p->p_pptr->p_sigacts->ps_flag &
550 (PS_NOCLDWAIT | PS_CLDSIGIGN)) {
984263bc 551 struct proc *pp = p->p_pptr;
58c2553a
MD
552
553 PHOLD(pp);
984263bc 554 proc_reparent(p, initproc);
58c2553a 555
984263bc
MD
556 /*
557 * If this was the last child of our parent, notify
558 * parent, so in case he was wait(2)ing, he will
58c2553a 559 * continue. This function interlocks with pptr->p_token.
984263bc
MD
560 */
561 if (LIST_EMPTY(&pp->p_children))
562 wakeup((caddr_t)pp);
58c2553a 563 PRELE(pp);
984263bc
MD
564 }
565
f2f3db5c
MD
566 /* lwkt_gettoken(&proc_token); */
567 q = p->p_pptr;
58c2553a 568 PHOLD(q);
f2f3db5c 569 if (p->p_sigparent && q != initproc) {
f2f3db5c 570 ksignal(q, p->p_sigparent);
984263bc 571 } else {
f2f3db5c 572 ksignal(q, SIGCHLD);
984263bc 573 }
82354ad8
MD
574
575 p->p_flags &= ~P_TRACED;
58c2553a 576 wakeup(p->p_pptr);
82354ad8 577
58c2553a 578 PRELE(q);
f2f3db5c
MD
579 /* lwkt_reltoken(&proc_token); */
580 /* NOTE: p->p_pptr can get ripped out */
984263bc 581 /*
8ad65e08
MD
582 * cpu_exit is responsible for clearing curproc, since
583 * it is heavily integrated with the thread/switching sequence.
584 *
984263bc
MD
585 * Other substructures are freed from wait().
586 */
8f1f6170 587 plimit_free(p);
984263bc
MD
588
589 /*
0a3f9b47
MD
590 * Release the current user process designation on the process so
591 * the userland scheduler can work in someone else.
26a0694b 592 */
553ea3c8 593 p->p_usched->release_curproc(lp);
26a0694b
MD
594
595 /*
e3161323
MD
596 * Finally, call machine-dependent code to release as many of the
597 * lwp's resources as we can and halt execution of this thread.
984263bc 598 */
e3161323 599 lwp_exit(1);
c6880072
SS
600}
601
0d355d3b
MD
602/*
603 * Eventually called by every exiting LWP
b5c4d81f
MD
604 *
605 * p->p_token must be held. mplock may be held and will be released.
0d355d3b 606 */
c6880072 607void
e3161323 608lwp_exit(int masterexit)
c6880072 609{
d86a23e0
MD
610 struct thread *td = curthread;
611 struct lwp *lp = td->td_lwp;
c6880072 612 struct proc *p = lp->lwp_proc;
8c2bce60 613 int dowake = 0;
c6880072 614
70d3d461 615 /*
4643740a 616 * lwp_exit() may be called without setting LWP_MP_WEXIT, so
e3161323
MD
617 * make sure it is set here.
618 */
b5c4d81f 619 ASSERT_LWKT_TOKEN_HELD(&p->p_token);
4643740a 620 atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
e3161323
MD
621
622 /*
39005e16
MD
623 * Clean up any virtualization
624 */
625 if (lp->lwp_vkernel)
626 vkernel_lwp_exit(lp);
627
628 /*
a591f597
MD
629 * Clean up select/poll support
630 */
631 kqueue_terminate(&lp->lwp_kqueue);
632
633 /*
0d355d3b
MD
634 * Clean up any syscall-cached ucred
635 */
d86a23e0
MD
636 if (td->td_ucred) {
637 crfree(td->td_ucred);
638 td->td_ucred = NULL;
0d355d3b
MD
639 }
640
641 /*
70d3d461
SS
642 * Nobody actually wakes us when the lock
643 * count reaches zero, so just wait one tick.
644 */
645 while (lp->lwp_lock > 0)
646 tsleep(lp, 0, "lwpexit", 1);
647
648 /* Hand down resource usage to our proc */
649 ruadd(&p->p_ru, &lp->lwp_ru);
650
e3161323
MD
651 /*
652 * If we don't hold the process until the LWP is reaped wait*()
653 * may try to dispose of its vmspace before all the LWPs have
654 * actually terminated.
655 */
656 PHOLD(p);
657
658 /*
2883d2d8
MD
659 * Do any remaining work that might block on us. We should be
660 * coded such that further blocking is ok after decrementing
661 * p_nthreads but don't take the chance.
662 */
663 dsched_exit_thread(td);
664 biosched_done(curthread);
665
666 /*
e3161323
MD
667 * We have to use the reaper for all the LWPs except the one doing
668 * the master exit. The LWP doing the master exit can just be
669 * left on p_lwps and the process reaper will deal with it
670 * synchronously, which is much faster.
ce19c8fe
MD
671 *
672 * Wakeup anyone waiting on p_nthreads to drop to 1 or 0.
2af9d75d
MD
673 *
674 * The process is left held until the reaper calls lwp_dispose() on
675 * the lp (after calling lwp_wait()).
e3161323
MD
676 */
677 if (masterexit == 0) {
3e291793 678 lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
e3161323 679 --p->p_nthreads;
ce19c8fe 680 if (p->p_nthreads <= 1)
8c2bce60 681 dowake = 1;
b5c4d81f 682 lwkt_gettoken(&deadlwp_token);
3e291793 683 LIST_INSERT_HEAD(&deadlwp_list[mycpuid], lp, u.lwp_reap_entry);
2883d2d8
MD
684 taskqueue_enqueue(taskqueue_thread[mycpuid],
685 deadlwp_task[mycpuid]);
b5c4d81f 686 lwkt_reltoken(&deadlwp_token);
e3161323
MD
687 } else {
688 --p->p_nthreads;
ce19c8fe 689 if (p->p_nthreads <= 1)
8c2bce60 690 dowake = 1;
e3161323 691 }
b5c4d81f
MD
692
693 /*
8c2bce60
MD
694 * Release p_token. Issue the wakeup() on p_nthreads if necessary,
695 * as late as possible to give us a chance to actually deschedule and
696 * switch away before another cpu core hits reaplwp().
b5c4d81f
MD
697 */
698 lwkt_reltoken(&p->p_token);
8c2bce60
MD
699 if (dowake)
700 wakeup(&p->p_nthreads);
c6880072
SS
701 cpu_lwp_exit();
702}
703
704/*
2af9d75d
MD
705 * Wait until a lwp is completely dead. The final interlock in this drama
706 * is when TDF_EXITING is set in cpu_thread_exit() just before the final
707 * switchout.
c6880072 708 *
2af9d75d
MD
709 * At the point TDF_EXITING is set a complete exit is accomplished when
710 * TDF_RUNNING and TDF_PREEMPT_LOCK are both clear.
c6880072 711 *
2af9d75d
MD
712 * Returns non-zero on success, and zero if the caller needs to retry
713 * the lwp_wait().
c6880072
SS
714 */
715static int
716lwp_wait(struct lwp *lp)
717{
718 struct thread *td = lp->lwp_thread;;
719
720 KKASSERT(lwkt_preempted_proc() != lp);
721
2af9d75d
MD
722 /*
723 * Wait until the lp has entered its low level exit and wait
724 * until other cores with refs on the lp (e.g. for ps or signaling)
725 * release them.
726 */
727 if (lp->lwp_lock > 0) {
c6880072 728 tsleep(lp, 0, "lwpwait1", 1);
2af9d75d
MD
729 return(0);
730 }
c6880072 731
2af9d75d
MD
732 /*
733 * Wait until the thread is no longer references and no longer
734 * runnable or preempted (i.e. finishes its low level exit).
735 */
736 if (td->td_refs) {
737 tsleep(td, 0, "lwpwait2", 1);
738 return(0);
739 }
c6880072
SS
740
741 /*
742 * The lwp's thread may still be in the middle
743 * of switching away, we can't rip its stack out from
744 * under it until TDF_EXITING is set and both
745 * TDF_RUNNING and TDF_PREEMPT_LOCK are clear.
746 * TDF_PREEMPT_LOCK must be checked because TDF_RUNNING
747 * will be cleared temporarily if a thread gets
748 * preempted.
749 *
750 * YYY no wakeup occurs, so we simply return failure
751 * and let the caller deal with sleeping and calling
752 * us again.
753 */
2af9d75d
MD
754 if ((td->td_flags & (TDF_RUNNING |
755 TDF_PREEMPT_LOCK |
756 TDF_EXITING)) != TDF_EXITING) {
757 tsleep(lp, 0, "lwpwait2", 1);
c6880072 758 return (0);
cf709dd2 759 }
2af9d75d
MD
760 KASSERT((td->td_flags & (TDF_RUNQ|TDF_TSLEEPQ)) == 0,
761 ("lwp_wait: td %p (%s) still on run or sleep queue",
762 td, td->td_comm));
c6880072
SS
763 return (1);
764}
765
766/*
767 * Release the resources associated with a lwp.
768 * The lwp must be completely dead.
769 */
770void
771lwp_dispose(struct lwp *lp)
772{
773 struct thread *td = lp->lwp_thread;;
774
775 KKASSERT(lwkt_preempted_proc() != lp);
776 KKASSERT(td->td_refs == 0);
2af9d75d
MD
777 KKASSERT((td->td_flags & (TDF_RUNNING |
778 TDF_PREEMPT_LOCK |
779 TDF_EXITING)) == TDF_EXITING);
c6880072 780
e3161323
MD
781 PRELE(lp->lwp_proc);
782 lp->lwp_proc = NULL;
c6880072
SS
783 if (td != NULL) {
784 td->td_proc = NULL;
785 td->td_lwp = NULL;
786 lp->lwp_thread = NULL;
787 lwkt_free_thread(td);
788 }
f6c36234 789 kfree(lp, M_LWP);
984263bc
MD
790}
791
3919ced0
MD
792/*
793 * MPSAFE
794 */
984263bc 795int
753fd850 796sys_wait4(struct wait_args *uap)
984263bc 797{
9697c509
DRJ
798 struct rusage rusage;
799 int error, status;
984263bc 800
3919ced0
MD
801 error = kern_wait(uap->pid, (uap->status ? &status : NULL),
802 uap->options, (uap->rusage ? &rusage : NULL),
803 &uap->sysmsg_result);
984263bc 804
9697c509
DRJ
805 if (error == 0 && uap->status)
806 error = copyout(&status, uap->status, sizeof(*uap->status));
807 if (error == 0 && uap->rusage)
808 error = copyout(&rusage, uap->rusage, sizeof(*uap->rusage));
809 return (error);
984263bc
MD
810}
811
41c20dac
MD
812/*
813 * wait1()
814 *
815 * wait_args(int pid, int *status, int options, struct rusage *rusage)
3919ced0
MD
816 *
817 * MPALMOSTSAFE
41c20dac 818 */
9697c509
DRJ
819int
820kern_wait(pid_t pid, int *status, int options, struct rusage *rusage, int *res)
984263bc 821{
9697c509 822 struct thread *td = curthread;
3e291793 823 struct lwp *lp;
9697c509 824 struct proc *q = td->td_proc;
41c20dac 825 struct proc *p, *t;
e955543c 826 struct pargs *pa;
6fa9e71a 827 struct sigacts *ps;
9697c509 828 int nfound, error;
984263bc 829
9697c509
DRJ
830 if (pid == 0)
831 pid = -q->p_pgid;
cc162105 832 if (options &~ (WUNTRACED|WNOHANG|WCONTINUED|WLINUXCLONE))
984263bc 833 return (EINVAL);
b5c4d81f
MD
834
835 lwkt_gettoken(&q->p_token);
984263bc 836loop:
6d5b152e 837 /*
b5c4d81f
MD
838 * All sorts of things can change due to blocking so we have to loop
839 * all the way back up here.
6d5b152e
MD
840 *
841 * The problem is that if a process group is stopped and the parent
842 * is doing a wait*(..., WUNTRACED, ...), it will see the STOP
843 * of the child and then stop itself when it tries to return from the
844 * system call. When the process group is resumed the parent will
845 * then get the STOP status even though the child has now resumed
846 * (a followup wait*() will get the CONT status).
847 *
848 * Previously the CONT would overwrite the STOP because the tstop
849 * was handled within tsleep(), and the parent would only see
b5c4d81f 850 * the CONT when both are stopped and continued together. This little
6d5b152e
MD
851 * two-line hack restores this effect.
852 */
164b8401 853 while (q->p_stat == SSTOP)
9a379a4a 854 tstop();
6d5b152e 855
984263bc 856 nfound = 0;
b5c4d81f 857
8c986a82
MD
858 /*
859 * Loop on children.
860 *
861 * NOTE: We don't want to break q's p_token in the loop for the
862 * case where no children are found or we risk breaking the
863 * interlock between child and parent.
864 */
984263bc 865 LIST_FOREACH(p, &q->p_children, p_sibling) {
9697c509 866 if (pid != WAIT_ANY &&
b5c4d81f 867 p->p_pid != pid && p->p_pgid != -pid) {
984263bc 868 continue;
b5c4d81f 869 }
984263bc 870
5686ec5a
MD
871 /*
872 * This special case handles a kthread spawned by linux_clone
352f5709
MD
873 * (see linux_misc.c). The linux_wait4 and linux_waitpid
874 * functions need to be able to distinguish between waiting
875 * on a process and waiting on a thread. It is a thread if
876 * p_sigparent is not SIGCHLD, and the WLINUXCLONE option
877 * signifies we want to wait for threads and not processes.
984263bc 878 */
352f5709
MD
879 if ((p->p_sigparent != SIGCHLD) ^
880 ((options & WLINUXCLONE) != 0)) {
984263bc 881 continue;
352f5709 882 }
984263bc
MD
883
884 nfound++;
416d05d7 885 if (p->p_stat == SZOMB) {
ae8050a4 886 /*
8f211c4b
MD
887 * We may go into SZOMB with threads still present.
888 * We must wait for them to exit before we can reap
889 * the master thread, otherwise we may race reaping
890 * non-master threads.
1a3fa08b
MD
891 *
892 * Only this routine can remove a process from
893 * the zombie list and destroy it, use PACQUIREZOMB()
894 * to serialize us and loop if it blocks (interlocked
895 * by the parent's q->p_token).
896 *
897 * WARNING! (p) can be invalid when PHOLDZOMB(p)
898 * returns non-zero. Be sure not to
899 * mess with it.
8f211c4b 900 */
1a3fa08b
MD
901 if (PHOLDZOMB(p))
902 goto loop;
b5c4d81f 903 lwkt_gettoken(&p->p_token);
1a3fa08b
MD
904 if (p->p_pptr != q) {
905 lwkt_reltoken(&p->p_token);
906 PRELEZOMB(p);
907 goto loop;
908 }
8f211c4b
MD
909 while (p->p_nthreads > 0) {
910 tsleep(&p->p_nthreads, 0, "lwpzomb", hz);
911 }
912
913 /*
e3161323
MD
914 * Reap any LWPs left in p->p_lwps. This is usually
915 * just the last LWP. This must be done before
916 * we loop on p_lock since the lwps hold a ref on
917 * it as a vmspace interlock.
918 *
919 * Once that is accomplished p_nthreads had better
920 * be zero.
921 */
3e291793
MD
922 while ((lp = RB_ROOT(&p->p_lwp_tree)) != NULL) {
923 lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
924 reaplwp(lp);
925 }
e3161323
MD
926 KKASSERT(p->p_nthreads == 0);
927
928 /*
929 * Don't do anything really bad until all references
930 * to the process go away. This may include other
931 * LWPs which are still in the process of being
932 * reaped. We can't just pull the rug out from under
933 * them because they may still be using the VM space.
934 *
935 * Certain kernel facilities such as /proc will also
936 * put a hold on the process for short periods of
937 * time.
c008d3ad 938 */
1a3fa08b 939 PRELE(p);
82354ad8 940 PSTALL(p, "reap3", 0);
c1102e9f 941
9697c509
DRJ
942 /* Take care of our return values. */
943 *res = p->p_pid;
52cac9fb
MD
944 p->p_usched->heuristic_exiting(td->td_lwp, p);
945
9697c509
DRJ
946 if (status)
947 *status = p->p_xstat;
948 if (rusage)
fde7ac71 949 *rusage = p->p_ru;
984263bc
MD
950 /*
951 * If we got the child via a ptrace 'attach',
952 * we need to give it back to the old parent.
953 */
58c2553a 954 if (p->p_oppid && (t = pfind(p->p_oppid)) != NULL) {
1a3fa08b 955 PHOLD(p);
984263bc
MD
956 p->p_oppid = 0;
957 proc_reparent(p, t);
84204577 958 ksignal(t, SIGCHLD);
984263bc 959 wakeup((caddr_t)t);
3919ced0 960 error = 0;
58c2553a 961 PRELE(t);
eb2adbf5 962 lwkt_reltoken(&p->p_token);
1a3fa08b 963 PRELEZOMB(p);
3919ced0 964 goto done;
984263bc 965 }
3c8687d6
SS
966
967 /*
968 * Unlink the proc from its process group so that
969 * the following operations won't lead to an
970 * inconsistent state for processes running down
971 * the zombie list.
972 */
3c8687d6 973 proc_remove_zombie(p);
eb2adbf5 974 lwkt_reltoken(&p->p_token);
3c8687d6
SS
975 leavepgrp(p);
976
984263bc 977 p->p_xstat = 0;
fde7ac71 978 ruadd(&q->p_cru, &p->p_ru);
984263bc
MD
979
980 /*
981 * Decrement the count of procs running with this uid.
982 */
9697c509 983 chgproccnt(p->p_ucred->cr_ruidinfo, -1, 0);
984263bc
MD
984
985 /*
986 * Free up credentials.
987 */
41c20dac
MD
988 crfree(p->p_ucred);
989 p->p_ucred = NULL;
984263bc
MD
990
991 /*
992 * Remove unused arguments
993 */
e955543c
MD
994 pa = p->p_args;
995 p->p_args = NULL;
e955543c
MD
996 if (pa && refcount_release(&pa->ar_ref)) {
997 kfree(pa, M_PARGS);
998 pa = NULL;
999 }
6fa9e71a
MD
1000
1001 ps = p->p_sigacts;
1002 p->p_sigacts = NULL;
1003 if (ps && refcount_release(&ps->ps_refcnt)) {
1004 kfree(ps, M_SUBPROC);
1005 ps = NULL;
984263bc
MD
1006 }
1007
49aa3df0 1008 /*
e22b17d7
MD
1009 * Our exitingcount was incremented when the process
1010 * became a zombie, now that the process has been
1011 * removed from (almost) all lists we should be able
1012 * to safely destroy its vmspace. Wait for any current
1013 * holders to go away (so the vmspace remains stable),
1014 * then scrap it.
49aa3df0 1015 */
82354ad8 1016 PSTALL(p, "reap4", 0);
e22b17d7 1017 vmspace_exitfree(p);
82354ad8 1018 PSTALL(p, "reap5", 0);
e22b17d7 1019
1a3fa08b
MD
1020 /*
1021 * NOTE: We have to officially release ZOMB in order
1022 * to ensure that a racing thread in kern_wait()
1023 * which blocked on ZOMB is woken up.
1024 */
1025 PHOLD(p);
1026 PRELEZOMB(p);
fb2a331e 1027 kfree(p, M_PROC);
8c2bce60 1028 atomic_add_int(&nprocs, -1);
3919ced0
MD
1029 error = 0;
1030 goto done;
984263bc 1031 }
4643740a
MD
1032 if (p->p_stat == SSTOP && (p->p_flags & P_WAITED) == 0 &&
1033 ((p->p_flags & P_TRACED) || (options & WUNTRACED))) {
1a3fa08b 1034 PHOLD(p);
8c986a82 1035 lwkt_gettoken(&p->p_token);
1a3fa08b
MD
1036 if (p->p_pptr != q) {
1037 lwkt_reltoken(&p->p_token);
1038 PRELE(p);
1039 goto loop;
1040 }
1041 if (p->p_stat != SSTOP ||
1042 (p->p_flags & P_WAITED) != 0 ||
1043 ((p->p_flags & P_TRACED) == 0 &&
1044 (options & WUNTRACED) == 0)) {
1045 lwkt_reltoken(&p->p_token);
1046 PRELE(p);
1047 goto loop;
1048 }
1049
4643740a 1050 p->p_flags |= P_WAITED;
9697c509
DRJ
1051
1052 *res = p->p_pid;
52cac9fb 1053 p->p_usched->heuristic_exiting(td->td_lwp, p);
9697c509 1054 if (status)
a89c93ee 1055 *status = W_STOPCODE(p->p_xstat);
9697c509
DRJ
1056 /* Zero rusage so we get something consistent. */
1057 if (rusage)
7eeb4207 1058 bzero(rusage, sizeof(*rusage));
3919ced0 1059 error = 0;
8c986a82 1060 lwkt_reltoken(&p->p_token);
1a3fa08b 1061 PRELE(p);
3919ced0 1062 goto done;
984263bc 1063 }
4643740a 1064 if ((options & WCONTINUED) && (p->p_flags & P_CONTINUED)) {
1a3fa08b 1065 PHOLD(p);
8c986a82 1066 lwkt_gettoken(&p->p_token);
1a3fa08b
MD
1067 if (p->p_pptr != q) {
1068 lwkt_reltoken(&p->p_token);
1069 PRELE(p);
1070 goto loop;
1071 }
1072 if ((p->p_flags & P_CONTINUED) == 0) {
1073 lwkt_reltoken(&p->p_token);
1074 PRELE(p);
1075 goto loop;
1076 }
1077
cc162105 1078 *res = p->p_pid;
52cac9fb 1079 p->p_usched->heuristic_exiting(td->td_lwp, p);
4643740a 1080 p->p_flags &= ~P_CONTINUED;
cc162105
PA
1081
1082 if (status)
1083 *status = SIGCONT;
3919ced0 1084 error = 0;
8c986a82 1085 lwkt_reltoken(&p->p_token);
1a3fa08b 1086 PRELE(p);
3919ced0 1087 goto done;
cc162105 1088 }
984263bc 1089 }
3919ced0
MD
1090 if (nfound == 0) {
1091 error = ECHILD;
1092 goto done;
1093 }
9697c509
DRJ
1094 if (options & WNOHANG) {
1095 *res = 0;
3919ced0
MD
1096 error = 0;
1097 goto done;
984263bc 1098 }
58c2553a
MD
1099
1100 /*
1101 * Wait for signal - interlocked using q->p_token.
1102 */
1103 error = tsleep(q, PCATCH, "wait", 0);
3919ced0
MD
1104 if (error) {
1105done:
b5c4d81f 1106 lwkt_reltoken(&q->p_token);
984263bc 1107 return (error);
3919ced0 1108 }
984263bc
MD
1109 goto loop;
1110}
1111
1112/*
b5c4d81f 1113 * Make process 'parent' the new parent of process 'child'.
7e90d791
MD
1114 *
1115 * p_children/p_sibling requires the parent's token, and
1116 * changing pptr requires the child's token, so we have to
1117 * get three tokens to do this operation.
984263bc
MD
1118 */
1119void
77153250 1120proc_reparent(struct proc *child, struct proc *parent)
984263bc 1121{
7e90d791
MD
1122 struct proc *opp = child->p_pptr;
1123
1124 if (opp == parent)
984263bc 1125 return;
7e90d791 1126 PHOLD(opp);
b5c4d81f 1127 PHOLD(parent);
7e90d791 1128 lwkt_gettoken(&opp->p_token);
b5c4d81f
MD
1129 lwkt_gettoken(&child->p_token);
1130 lwkt_gettoken(&parent->p_token);
7e90d791 1131 KKASSERT(child->p_pptr == opp);
984263bc
MD
1132 LIST_REMOVE(child, p_sibling);
1133 LIST_INSERT_HEAD(&parent->p_children, child, p_sibling);
1134 child->p_pptr = parent;
b5c4d81f
MD
1135 lwkt_reltoken(&parent->p_token);
1136 lwkt_reltoken(&child->p_token);
7e90d791 1137 lwkt_reltoken(&opp->p_token);
b5c4d81f 1138 PRELE(parent);
7e90d791 1139 PRELE(opp);
984263bc
MD
1140}
1141
1142/*
1143 * The next two functions are to handle adding/deleting items on the
1144 * exit callout list
1145 *
1146 * at_exit():
1147 * Take the arguments given and put them onto the exit callout list,
1148 * However first make sure that it's not already there.
1149 * returns 0 on success.
1150 */
1151
1152int
77153250 1153at_exit(exitlist_fn function)
984263bc
MD
1154{
1155 struct exitlist *ep;
1156
1157#ifdef INVARIANTS
1158 /* Be noisy if the programmer has lost track of things */
1159 if (rm_at_exit(function))
6ea70f76 1160 kprintf("WARNING: exit callout entry (%p) already present\n",
984263bc
MD
1161 function);
1162#endif
efda3bd0 1163 ep = kmalloc(sizeof(*ep), M_ATEXIT, M_NOWAIT);
984263bc
MD
1164 if (ep == NULL)
1165 return (ENOMEM);
1166 ep->function = function;
1167 TAILQ_INSERT_TAIL(&exit_list, ep, next);
1168 return (0);
1169}
1170
1171/*
1172 * Scan the exit callout list for the given item and remove it.
1173 * Returns the number of items removed (0 or 1)
1174 */
1175int
77153250 1176rm_at_exit(exitlist_fn function)
984263bc
MD
1177{
1178 struct exitlist *ep;
1179
1180 TAILQ_FOREACH(ep, &exit_list, next) {
1181 if (ep->function == function) {
1182 TAILQ_REMOVE(&exit_list, ep, next);
efda3bd0 1183 kfree(ep, M_ATEXIT);
984263bc
MD
1184 return(1);
1185 }
1186 }
1187 return (0);
1188}
1189
70d3d461
SS
1190/*
1191 * LWP reaper related code.
1192 */
70d3d461
SS
1193static void
1194reaplwps(void *context, int dummy)
1195{
1196 struct lwplist *lwplist = context;
1197 struct lwp *lp;
1198
b5c4d81f 1199 lwkt_gettoken(&deadlwp_token);
70d3d461 1200 while ((lp = LIST_FIRST(lwplist))) {
3e291793
MD
1201 LIST_REMOVE(lp, u.lwp_reap_entry);
1202 reaplwp(lp);
70d3d461 1203 }
b5c4d81f 1204 lwkt_reltoken(&deadlwp_token);
70d3d461
SS
1205}
1206
1207static void
3e291793
MD
1208reaplwp(struct lwp *lp)
1209{
2af9d75d
MD
1210 while (lwp_wait(lp) == 0)
1211 ;
3e291793
MD
1212 lwp_dispose(lp);
1213}
1214
1215static void
70d3d461
SS
1216deadlwp_init(void)
1217{
1218 int cpu;
1219
1220 for (cpu = 0; cpu < ncpus; cpu++) {
1221 LIST_INIT(&deadlwp_list[cpu]);
2af9d75d
MD
1222 deadlwp_task[cpu] = kmalloc(sizeof(*deadlwp_task[cpu]),
1223 M_DEVBUF, M_WAITOK);
70d3d461
SS
1224 TASK_INIT(deadlwp_task[cpu], 0, reaplwps, &deadlwp_list[cpu]);
1225 }
1226}
1227
1228SYSINIT(deadlwpinit, SI_SUB_CONFIGURE, SI_ORDER_ANY, deadlwp_init, NULL);