kernel - Fix proc_reparent() race/assertion panic
[dragonfly.git] / sys / kern / kern_exit.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1982, 1986, 1989, 1991, 1993
3 * The Regents of the University of California. All rights reserved.
4 * (c) UNIX System Laboratories, Inc.
5 * All or some portions of this file are derived from material licensed
6 * to the University of California by American Telephone and Telegraph
7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8 * the permission of UNIX System Laboratories, Inc.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 * may be used to endorse or promote products derived from this software
24 * without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 * @(#)kern_exit.c 8.7 (Berkeley) 2/12/94
39 * $FreeBSD: src/sys/kern/kern_exit.c,v 1.92.2.11 2003/01/13 22:51:16 dillon Exp $
40 */
41
42#include "opt_compat.h"
43#include "opt_ktrace.h"
44
45#include <sys/param.h>
46#include <sys/systm.h>
47#include <sys/sysproto.h>
48#include <sys/kernel.h>
49#include <sys/malloc.h>
50#include <sys/proc.h>
29f58392 51#include <sys/ktrace.h>
984263bc
MD
52#include <sys/pioctl.h>
53#include <sys/tty.h>
54#include <sys/wait.h>
55#include <sys/vnode.h>
56#include <sys/resourcevar.h>
57#include <sys/signalvar.h>
70d3d461 58#include <sys/taskqueue.h>
984263bc
MD
59#include <sys/ptrace.h>
60#include <sys/acct.h> /* for acct_process() function prototype */
61#include <sys/filedesc.h>
62#include <sys/shm.h>
63#include <sys/sem.h>
984263bc 64#include <sys/jail.h>
9697c509 65#include <sys/kern_syscall.h>
a722be49 66#include <sys/upcall.h>
d5f340eb 67#include <sys/unistd.h>
8ba5f7ef 68#include <sys/eventhandler.h>
2883d2d8 69#include <sys/dsched.h>
984263bc
MD
70
71#include <vm/vm.h>
72#include <vm/vm_param.h>
73#include <sys/lock.h>
74#include <vm/pmap.h>
75#include <vm/vm_map.h>
984263bc
MD
76#include <vm/vm_extern.h>
77#include <sys/user.h>
78
e955543c 79#include <sys/refcount.h>
e43a034f 80#include <sys/thread2.h>
e3161323 81#include <sys/sysref2.h>
684a93c4 82#include <sys/mplock2.h>
e3161323
MD
83
84static void reaplwps(void *context, int dummy);
3e291793 85static void reaplwp(struct lwp *lp);
dc52e1cc 86static void killlwps(struct lwp *lp);
e43a034f 87
984263bc 88static MALLOC_DEFINE(M_ATEXIT, "atexit", "atexit callback");
d511d5d5 89static MALLOC_DEFINE(M_ZOMBIE, "zombie", "zombie proc status");
984263bc 90
b5c4d81f
MD
91static struct lwkt_token deadlwp_token = LWKT_TOKEN_INITIALIZER(deadlwp_token);
92
984263bc
MD
93/*
94 * callout list for things to do at exit time
95 */
96struct exitlist {
97 exitlist_fn function;
98 TAILQ_ENTRY(exitlist) next;
99};
100
101TAILQ_HEAD(exit_list_head, exitlist);
102static struct exit_list_head exit_list = TAILQ_HEAD_INITIALIZER(exit_list);
103
70d3d461
SS
104/*
105 * LWP reaper data
106 */
107struct task *deadlwp_task[MAXCPU];
108struct lwplist deadlwp_list[MAXCPU];
109
984263bc
MD
110/*
111 * exit --
112 * Death of process.
41c20dac
MD
113 *
114 * SYS_EXIT_ARGS(int rval)
984263bc 115 */
753fd850
MD
116int
117sys_exit(struct exit_args *uap)
984263bc 118{
41c20dac 119 exit1(W_EXITCODE(uap->rval, 0));
984263bc
MD
120 /* NOTREACHED */
121}
122
d5f340eb
SS
123/*
124 * Extended exit --
125 * Death of a lwp or process with optional bells and whistles.
3919ced0
MD
126 *
127 * MPALMOSTSAFE
d5f340eb
SS
128 */
129int
130sys_extexit(struct extexit_args *uap)
131{
b5c4d81f 132 struct proc *p = curproc;
d5f340eb
SS
133 int action, who;
134 int error;
135
136 action = EXTEXIT_ACTION(uap->how);
137 who = EXTEXIT_WHO(uap->how);
138
139 /* Check parameters before we might perform some action */
140 switch (who) {
141 case EXTEXIT_PROC:
142 case EXTEXIT_LWP:
143 break;
d5f340eb
SS
144 default:
145 return (EINVAL);
146 }
147
148 switch (action) {
149 case EXTEXIT_SIMPLE:
150 break;
d5f340eb
SS
151 case EXTEXIT_SETINT:
152 error = copyout(&uap->status, uap->addr, sizeof(uap->status));
153 if (error)
154 return (error);
155 break;
d5f340eb
SS
156 default:
157 return (EINVAL);
158 }
159
b5c4d81f 160 lwkt_gettoken(&p->p_token);
3919ced0 161
d5f340eb
SS
162 switch (who) {
163 case EXTEXIT_LWP:
164 /*
165 * Be sure only to perform a simple lwp exit if there is at
166 * least one more lwp in the proc, which will call exit1()
167 * later, otherwise the proc will be an UNDEAD and not even a
168 * SZOMB!
169 */
b5c4d81f
MD
170 if (p->p_nthreads > 1) {
171 lwp_exit(0); /* called w/ p_token held */
e3161323
MD
172 /* NOT REACHED */
173 }
d5f340eb
SS
174 /* else last lwp in proc: do the real thing */
175 /* FALLTHROUGH */
d5f340eb
SS
176 default: /* to help gcc */
177 case EXTEXIT_PROC:
b5c4d81f 178 lwkt_reltoken(&p->p_token);
d5f340eb
SS
179 exit1(W_EXITCODE(uap->status, 0));
180 /* NOTREACHED */
181 }
182
183 /* NOTREACHED */
b5c4d81f 184 lwkt_reltoken(&p->p_token); /* safety */
d5f340eb
SS
185}
186
dc52e1cc
MD
187/*
188 * Kill all lwps associated with the current process except the
189 * current lwp. Return an error if we race another thread trying to
190 * do the same thing and lose the race.
191 *
192 * If forexec is non-zero the current thread and process flags are
193 * cleaned up so they can be reused.
616516c8
MD
194 *
195 * Caller must hold curproc->p_token
dc52e1cc
MD
196 */
197int
198killalllwps(int forexec)
199{
200 struct lwp *lp = curthread->td_lwp;
201 struct proc *p = lp->lwp_proc;
202
203 /*
204 * Interlock against P_WEXIT. Only one of the process's thread
205 * is allowed to do the master exit.
206 */
4643740a 207 if (p->p_flags & P_WEXIT)
dc52e1cc 208 return (EALREADY);
4643740a 209 p->p_flags |= P_WEXIT;
dc52e1cc
MD
210
211 /*
4643740a 212 * Interlock with LWP_MP_WEXIT and kill any remaining LWPs
dc52e1cc 213 */
4643740a 214 atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
dc52e1cc
MD
215 if (p->p_nthreads > 1)
216 killlwps(lp);
217
218 /*
219 * If doing this for an exec, clean up the remaining thread
220 * (us) for continuing operation after all the other threads
221 * have been killed.
222 */
223 if (forexec) {
4643740a
MD
224 atomic_clear_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
225 p->p_flags &= ~P_WEXIT;
dc52e1cc
MD
226 }
227 return(0);
228}
229
e3161323
MD
230/*
231 * Kill all LWPs except the current one. Do not try to signal
232 * LWPs which have exited on their own or have already been
233 * signaled.
234 */
dc52e1cc 235static void
70d3d461
SS
236killlwps(struct lwp *lp)
237{
238 struct proc *p = lp->lwp_proc;
239 struct lwp *tlp;
240
e3161323 241 /*
89d9d449 242 * Kill the remaining LWPs. We must send the signal before setting
4643740a 243 * LWP_MP_WEXIT. The setting of WEXIT is optional but helps reduce
89d9d449
MD
244 * races. tlp must be held across the call as it might block and
245 * allow the target lwp to rip itself out from under our loop.
e3161323 246 */
70d3d461 247 FOREACH_LWP_IN_PROC(tlp, p) {
89d9d449 248 LWPHOLD(tlp);
e2b148c6 249 lwkt_gettoken(&tlp->lwp_token);
4643740a 250 if ((tlp->lwp_mpflags & LWP_MP_WEXIT) == 0) {
73e40cb2 251 lwpsignal(p, tlp, SIGKILL);
4643740a 252 atomic_set_int(&tlp->lwp_mpflags, LWP_MP_WEXIT);
e3161323 253 }
e2b148c6 254 lwkt_reltoken(&tlp->lwp_token);
89d9d449 255 LWPRELE(tlp);
70d3d461
SS
256 }
257
e3161323
MD
258 /*
259 * Wait for everything to clear out.
260 */
70d3d461 261 while (p->p_nthreads > 1) {
ef1c4d7f 262 tsleep(&p->p_nthreads, 0, "killlwps", 0);
70d3d461
SS
263 }
264}
265
984263bc
MD
266/*
267 * Exit: deallocate address space and other resources, change proc state
268 * to zombie, and unlink proc from allproc and parent's lists. Save exit
269 * status and rusage for wait(). Check for child processes and orphan them.
270 */
271void
41c20dac 272exit1(int rv)
984263bc 273{
bb3cd951
SS
274 struct thread *td = curthread;
275 struct proc *p = td->td_proc;
276 struct lwp *lp = td->td_lwp;
41c20dac
MD
277 struct proc *q, *nq;
278 struct vmspace *vm;
984263bc
MD
279 struct vnode *vtmp;
280 struct exitlist *ep;
dc52e1cc 281 int error;
984263bc 282
b5c4d81f
MD
283 lwkt_gettoken(&p->p_token);
284
984263bc 285 if (p->p_pid == 1) {
6ea70f76 286 kprintf("init died (signal %d, exit %d)\n",
984263bc
MD
287 WTERMSIG(rv), WEXITSTATUS(rv));
288 panic("Going nowhere without my init!");
289 }
9d7a637e
AE
290 varsymset_clean(&p->p_varsymset);
291 lockuninit(&p->p_varsymset.vx_lock);
2af9d75d 292
70d3d461 293 /*
dc52e1cc
MD
294 * Kill all lwps associated with the current process, return an
295 * error if we race another thread trying to do the same thing
296 * and lose the race.
70d3d461 297 */
dc52e1cc
MD
298 error = killalllwps(0);
299 if (error) {
e3161323
MD
300 lwp_exit(0);
301 /* NOT REACHED */
222b18cd 302 }
81eea9f4 303
984263bc 304 /* are we a task leader? */
e3161323 305 if (p == p->p_leader) {
984263bc
MD
306 struct kill_args killArgs;
307 killArgs.signum = SIGKILL;
308 q = p->p_peers;
309 while(q) {
310 killArgs.pid = q->p_pid;
311 /*
312 * The interface for kill is better
313 * than the internal signal
314 */
753fd850 315 sys_kill(&killArgs);
984263bc
MD
316 nq = q;
317 q = q->p_peers;
318 }
319 while (p->p_peers)
e3161323 320 tsleep((caddr_t)p, 0, "exit1", 0);
8ba5f7ef 321 }
984263bc
MD
322
323#ifdef PGINPROF
324 vmsizmon();
325#endif
326 STOPEVENT(p, S_EXIT, rv);
b2a6ad87 327 p->p_flags |= P_POSTEXIT; /* stop procfs stepping */
984263bc
MD
328
329 /*
330 * Check if any loadable modules need anything done at process exit.
331 * e.g. SYSV IPC stuff
332 * XXX what if one of these generates an error?
333 */
8ba5f7ef
AH
334 p->p_xstat = rv;
335 EVENTHANDLER_INVOKE(process_exit, p);
336
337 /*
338 * XXX: imho, the eventhandler stuff is much cleaner than this.
339 * Maybe we should move everything to use eventhandler.
340 */
984263bc 341 TAILQ_FOREACH(ep, &exit_list, next)
bb3cd951 342 (*ep->function)(td);
984263bc 343
4643740a 344 if (p->p_flags & P_PROFIL)
984263bc 345 stopprofclock(p);
82354ad8 346
984263bc 347 SIGEMPTYSET(p->p_siglist);
aa6c3de6 348 SIGEMPTYSET(lp->lwp_siglist);
984263bc 349 if (timevalisset(&p->p_realtimer.it_value))
a471eac5 350 callout_stop_sync(&p->p_ithandle);
984263bc
MD
351
352 /*
353 * Reset any sigio structures pointing to us as a result of
354 * F_SETOWN with our pid.
355 */
356 funsetownlst(&p->p_sigiolst);
357
358 /*
359 * Close open files and release open-file table.
360 * This may block!
361 */
0a4a9c77 362 fdfree(p, NULL);
984263bc
MD
363
364 if(p->p_leader->p_peers) {
365 q = p->p_leader;
366 while(q->p_peers != p)
367 q = q->p_peers;
368 q->p_peers = p->p_peers;
369 wakeup((caddr_t)p->p_leader);
370 }
371
372 /*
373 * XXX Shutdown SYSV semaphores
374 */
375 semexit(p);
376
06ecca5a
MD
377 KKASSERT(p->p_numposixlocks == 0);
378
984263bc
MD
379 /* The next two chunks should probably be moved to vmspace_exit. */
380 vm = p->p_vmspace;
a722be49
MD
381
382 /*
383 * Release upcalls associated with this process
384 */
385 if (vm->vm_upcalls)
08f2f1bb 386 upc_release(vm, lp);
a722be49 387
39005e16
MD
388 /*
389 * Clean up data related to virtual kernel operation. Clean up
390 * any vkernel context related to the current lwp now so we can
391 * destroy p_vkernel.
392 */
393 if (p->p_vkernel) {
394 vkernel_lwp_exit(lp);
4a22e893 395 vkernel_exit(p);
39005e16 396 }
0daa37a5 397
984263bc
MD
398 /*
399 * Release user portion of address space.
400 * This releases references to vnodes,
401 * which could cause I/O if the file has been unlinked.
402 * Need to do this early enough that we can still sleep.
403 * Can't free the entire vmspace as the kernel stack
404 * may be mapped within that space also.
405 *
406 * Processes sharing the same vmspace may exit in one order, and
407 * get cleaned up by vmspace_exit() in a different order. The
408 * last exiting process to reach this point releases as much of
409 * the environment as it can, and the last process cleaned up
410 * by vmspace_exit() (which decrements exitingcnt) cleans up the
411 * remainder.
412 */
46754a20 413 vmspace_exitbump(vm);
e3161323 414 sysref_put(&vm->vm_sysref);
984263bc
MD
415
416 if (SESS_LEADER(p)) {
1fd87d54 417 struct session *sp = p->p_session;
984263bc
MD
418
419 if (sp->s_ttyvp) {
420 /*
1fbb5fc0
MD
421 * We are the controlling process. Signal the
422 * foreground process group, drain the controlling
423 * terminal, and revoke access to the controlling
424 * terminal.
425 *
426 * NOTE: while waiting for the process group to exit
427 * it is possible that one of the processes in the
f1aeb0c0
MD
428 * group will revoke the tty, so the ttyclosesession()
429 * function will re-check sp->s_ttyvp.
984263bc
MD
430 */
431 if (sp->s_ttyp && (sp->s_ttyp->t_session == sp)) {
432 if (sp->s_ttyp->t_pgrp)
433 pgsignal(sp->s_ttyp->t_pgrp, SIGHUP, 1);
f1aeb0c0
MD
434 ttywait(sp->s_ttyp);
435 ttyclosesession(sp, 1); /* also revoke */
984263bc 436 }
5fd012e0
MD
437 /*
438 * Release the tty. If someone has it open via
439 * /dev/tty then close it (since they no longer can
440 * once we've NULL'd it out).
441 */
f1aeb0c0
MD
442 ttyclosesession(sp, 0);
443
984263bc
MD
444 /*
445 * s_ttyp is not zero'd; we use this to indicate
446 * that the session once had a controlling terminal.
447 * (for logging and informational purposes)
448 */
449 }
450 sp->s_leader = NULL;
451 }
452 fixjobc(p, p->p_pgrp, 0);
453 (void)acct_process(p);
454#ifdef KTRACE
455 /*
456 * release trace file
457 */
29f58392
MD
458 if (p->p_tracenode)
459 ktrdestroy(&p->p_tracenode);
460 p->p_traceflag = 0;
984263bc
MD
461#endif
462 /*
463 * Release reference to text vnode
464 */
465 if ((vtmp = p->p_textvp) != NULL) {
466 p->p_textvp = NULL;
467 vrele(vtmp);
468 }
469
8ba5f7ef
AH
470 /* Release namecache handle to text file */
471 if (p->p_textnch.ncp)
472 cache_drop(&p->p_textnch);
473
82354ad8
MD
474 /*
475 * We have to handle PPWAIT here or proc_move_allproc_zombie()
476 * will block on the PHOLD() the parent is doing.
477 */
478 if (p->p_flags & P_PPWAIT) {
479 p->p_flags &= ~P_PPWAIT;
480 wakeup(p->p_pptr);
481 }
482
ae8050a4 483 /*
5bf0d9b5
MD
484 * Move the process to the zombie list. This will block
485 * until the process p_lock count reaches 0. The process will
486 * not be reaped until TDF_EXITING is set by cpu_thread_exit(),
487 * which is called from cpu_proc_exit().
ae8050a4 488 */
5bf0d9b5 489 proc_move_allproc_zombie(p);
984263bc 490
7e90d791
MD
491 /*
492 * Reparent all of this process's children to the init process.
493 * We must hold initproc->p_token in order to mess with
494 * initproc->p_children. We already hold p->p_token (to remove
495 * the children from our list).
496 */
984263bc 497 q = LIST_FIRST(&p->p_children);
7e90d791
MD
498 if (q) {
499 lwkt_gettoken(&initproc->p_token);
0730ed66
MD
500 while ((q = LIST_FIRST(&p->p_children)) != NULL) {
501 PHOLD(q);
502 lwkt_gettoken(&q->p_token);
503 if (q != LIST_FIRST(&p->p_children)) {
504 lwkt_reltoken(&q->p_token);
505 PRELE(q);
506 continue;
507 }
7e90d791
MD
508 LIST_REMOVE(q, p_sibling);
509 LIST_INSERT_HEAD(&initproc->p_children, q, p_sibling);
510 q->p_pptr = initproc;
511 q->p_sigparent = SIGCHLD;
0730ed66 512
7e90d791
MD
513 /*
514 * Traced processes are killed
515 * since their existence means someone is screwing up.
516 */
4643740a
MD
517 if (q->p_flags & P_TRACED) {
518 q->p_flags &= ~P_TRACED;
7e90d791
MD
519 ksignal(q, SIGKILL);
520 }
0730ed66
MD
521 lwkt_reltoken(&q->p_token);
522 PRELE(q);
984263bc 523 }
7e90d791
MD
524 lwkt_reltoken(&initproc->p_token);
525 wakeup(initproc);
984263bc
MD
526 }
527
528 /*
529 * Save exit status and final rusage info, adding in child rusage
530 * info and self times.
531 */
fde7ac71
SS
532 calcru_proc(p, &p->p_ru);
533 ruadd(&p->p_ru, &p->p_cru);
984263bc 534
984263bc
MD
535 /*
536 * notify interested parties of our demise.
537 */
538 KNOTE(&p->p_klist, NOTE_EXIT);
539
540 /*
541 * Notify parent that we're gone. If parent has the PS_NOCLDWAIT
19af1870
MR
542 * flag set, or if the handler is set to SIG_IGN, notify process 1
543 * instead (and hope it will handle this situation).
984263bc 544 */
a0ae03a7 545 if (p->p_pptr->p_sigacts->ps_flag & (PS_NOCLDWAIT | PS_CLDSIGIGN)) {
984263bc 546 proc_reparent(p, initproc);
984263bc
MD
547 }
548
f2f3db5c
MD
549 /* lwkt_gettoken(&proc_token); */
550 q = p->p_pptr;
58c2553a 551 PHOLD(q);
f2f3db5c 552 if (p->p_sigparent && q != initproc) {
f2f3db5c 553 ksignal(q, p->p_sigparent);
984263bc 554 } else {
f2f3db5c 555 ksignal(q, SIGCHLD);
984263bc 556 }
82354ad8
MD
557
558 p->p_flags &= ~P_TRACED;
58c2553a 559 wakeup(p->p_pptr);
82354ad8 560
58c2553a 561 PRELE(q);
f2f3db5c
MD
562 /* lwkt_reltoken(&proc_token); */
563 /* NOTE: p->p_pptr can get ripped out */
984263bc 564 /*
8ad65e08
MD
565 * cpu_exit is responsible for clearing curproc, since
566 * it is heavily integrated with the thread/switching sequence.
567 *
984263bc
MD
568 * Other substructures are freed from wait().
569 */
8f1f6170 570 plimit_free(p);
984263bc 571
26a0694b 572 /*
0a3f9b47
MD
573 * Release the current user process designation on the process so
574 * the userland scheduler can work in someone else.
26a0694b 575 */
553ea3c8 576 p->p_usched->release_curproc(lp);
26a0694b 577
984263bc 578 /*
e3161323
MD
579 * Finally, call machine-dependent code to release as many of the
580 * lwp's resources as we can and halt execution of this thread.
984263bc 581 */
e3161323 582 lwp_exit(1);
c6880072
SS
583}
584
0d355d3b
MD
585/*
586 * Eventually called by every exiting LWP
b5c4d81f
MD
587 *
588 * p->p_token must be held. mplock may be held and will be released.
0d355d3b 589 */
c6880072 590void
e3161323 591lwp_exit(int masterexit)
c6880072 592{
d86a23e0
MD
593 struct thread *td = curthread;
594 struct lwp *lp = td->td_lwp;
c6880072 595 struct proc *p = lp->lwp_proc;
8c2bce60 596 int dowake = 0;
c6880072 597
e3161323 598 /*
4643740a 599 * lwp_exit() may be called without setting LWP_MP_WEXIT, so
e3161323
MD
600 * make sure it is set here.
601 */
b5c4d81f 602 ASSERT_LWKT_TOKEN_HELD(&p->p_token);
4643740a 603 atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
e3161323 604
39005e16
MD
605 /*
606 * Clean up any virtualization
607 */
608 if (lp->lwp_vkernel)
609 vkernel_lwp_exit(lp);
610
a591f597
MD
611 /*
612 * Clean up select/poll support
613 */
614 kqueue_terminate(&lp->lwp_kqueue);
615
0d355d3b
MD
616 /*
617 * Clean up any syscall-cached ucred
618 */
d86a23e0
MD
619 if (td->td_ucred) {
620 crfree(td->td_ucred);
621 td->td_ucred = NULL;
0d355d3b
MD
622 }
623
70d3d461
SS
624 /*
625 * Nobody actually wakes us when the lock
626 * count reaches zero, so just wait one tick.
627 */
628 while (lp->lwp_lock > 0)
629 tsleep(lp, 0, "lwpexit", 1);
630
631 /* Hand down resource usage to our proc */
632 ruadd(&p->p_ru, &lp->lwp_ru);
633
e3161323
MD
634 /*
635 * If we don't hold the process until the LWP is reaped wait*()
636 * may try to dispose of its vmspace before all the LWPs have
637 * actually terminated.
638 */
639 PHOLD(p);
640
2883d2d8
MD
641 /*
642 * Do any remaining work that might block on us. We should be
643 * coded such that further blocking is ok after decrementing
644 * p_nthreads but don't take the chance.
645 */
646 dsched_exit_thread(td);
647 biosched_done(curthread);
648
e3161323
MD
649 /*
650 * We have to use the reaper for all the LWPs except the one doing
651 * the master exit. The LWP doing the master exit can just be
652 * left on p_lwps and the process reaper will deal with it
653 * synchronously, which is much faster.
ce19c8fe
MD
654 *
655 * Wakeup anyone waiting on p_nthreads to drop to 1 or 0.
2af9d75d
MD
656 *
657 * The process is left held until the reaper calls lwp_dispose() on
658 * the lp (after calling lwp_wait()).
e3161323
MD
659 */
660 if (masterexit == 0) {
3e291793 661 lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
e3161323 662 --p->p_nthreads;
ce19c8fe 663 if (p->p_nthreads <= 1)
8c2bce60 664 dowake = 1;
b5c4d81f 665 lwkt_gettoken(&deadlwp_token);
3e291793 666 LIST_INSERT_HEAD(&deadlwp_list[mycpuid], lp, u.lwp_reap_entry);
2883d2d8
MD
667 taskqueue_enqueue(taskqueue_thread[mycpuid],
668 deadlwp_task[mycpuid]);
b5c4d81f 669 lwkt_reltoken(&deadlwp_token);
e3161323
MD
670 } else {
671 --p->p_nthreads;
ce19c8fe 672 if (p->p_nthreads <= 1)
8c2bce60 673 dowake = 1;
e3161323 674 }
b5c4d81f
MD
675
676 /*
8c2bce60
MD
677 * Release p_token. Issue the wakeup() on p_nthreads if necessary,
678 * as late as possible to give us a chance to actually deschedule and
679 * switch away before another cpu core hits reaplwp().
b5c4d81f
MD
680 */
681 lwkt_reltoken(&p->p_token);
8c2bce60
MD
682 if (dowake)
683 wakeup(&p->p_nthreads);
e28d8b15
MD
684
685 /*
686 * Tell the userland scheduler that we are going away
687 */
688 p->p_usched->heuristic_exiting(lp, p);
689
c6880072
SS
690 cpu_lwp_exit();
691}
692
693/*
2af9d75d
MD
694 * Wait until a lwp is completely dead. The final interlock in this drama
695 * is when TDF_EXITING is set in cpu_thread_exit() just before the final
696 * switchout.
c6880072 697 *
2af9d75d 698 * At the point TDF_EXITING is set a complete exit is accomplished when
2b07d9aa
MD
699 * TDF_RUNNING and TDF_PREEMPT_LOCK are both clear. td_mpflags has two
700 * post-switch interlock flags that can be used to wait for the TDF_
701 * flags to clear.
c6880072 702 *
2af9d75d
MD
703 * Returns non-zero on success, and zero if the caller needs to retry
704 * the lwp_wait().
c6880072
SS
705 */
706static int
707lwp_wait(struct lwp *lp)
708{
3598cc14 709 struct thread *td = lp->lwp_thread;
2b07d9aa 710 u_int mpflags;
c6880072
SS
711
712 KKASSERT(lwkt_preempted_proc() != lp);
713
2af9d75d 714 /*
2b07d9aa
MD
715 * This bit of code uses the thread destruction interlock
716 * managed by lwkt_switch_return() to wait for the lwp's
717 * thread to completely disengage.
718 *
719 * It is possible for us to race another cpu core so we
720 * have to do this correctly.
721 */
722 for (;;) {
723 mpflags = td->td_mpflags;
724 cpu_ccfence();
725 if (mpflags & TDF_MP_EXITSIG)
726 break;
727 tsleep_interlock(td, 0);
728 if (atomic_cmpset_int(&td->td_mpflags, mpflags,
729 mpflags | TDF_MP_EXITWAIT)) {
730 tsleep(td, PINTERLOCKED, "lwpxt", 0);
731 }
732 }
733
734 /*
735 * We've already waited for the core exit but there can still
736 * be other refs from e.g. process scans and such.
2af9d75d
MD
737 */
738 if (lp->lwp_lock > 0) {
c6880072 739 tsleep(lp, 0, "lwpwait1", 1);
2af9d75d
MD
740 return(0);
741 }
2af9d75d
MD
742 if (td->td_refs) {
743 tsleep(td, 0, "lwpwait2", 1);
744 return(0);
745 }
c6880072
SS
746
747 /*
2b07d9aa
MD
748 * Now that we have the thread destruction interlock these flags
749 * really should already be cleaned up, keep a check for safety.
c6880072 750 *
2b07d9aa
MD
751 * We can't rip its stack out from under it until TDF_EXITING is
752 * set and both TDF_RUNNING and TDF_PREEMPT_LOCK are clear.
753 * TDF_PREEMPT_LOCK must be checked because TDF_RUNNING
754 * will be cleared temporarily if a thread gets preempted.
755 */
756 while ((td->td_flags & (TDF_RUNNING |
757 TDF_PREEMPT_LOCK |
758 TDF_EXITING)) != TDF_EXITING) {
759 tsleep(lp, 0, "lwpwait3", 1);
c6880072 760 return (0);
cf709dd2 761 }
2b07d9aa 762
2af9d75d
MD
763 KASSERT((td->td_flags & (TDF_RUNQ|TDF_TSLEEPQ)) == 0,
764 ("lwp_wait: td %p (%s) still on run or sleep queue",
765 td, td->td_comm));
c6880072
SS
766 return (1);
767}
768
769/*
770 * Release the resources associated with a lwp.
771 * The lwp must be completely dead.
772 */
773void
774lwp_dispose(struct lwp *lp)
775{
3598cc14 776 struct thread *td = lp->lwp_thread;
c6880072
SS
777
778 KKASSERT(lwkt_preempted_proc() != lp);
779 KKASSERT(td->td_refs == 0);
2af9d75d
MD
780 KKASSERT((td->td_flags & (TDF_RUNNING |
781 TDF_PREEMPT_LOCK |
782 TDF_EXITING)) == TDF_EXITING);
c6880072 783
e3161323
MD
784 PRELE(lp->lwp_proc);
785 lp->lwp_proc = NULL;
c6880072
SS
786 if (td != NULL) {
787 td->td_proc = NULL;
788 td->td_lwp = NULL;
789 lp->lwp_thread = NULL;
790 lwkt_free_thread(td);
791 }
f6c36234 792 kfree(lp, M_LWP);
984263bc
MD
793}
794
3919ced0
MD
795/*
796 * MPSAFE
797 */
984263bc 798int
753fd850 799sys_wait4(struct wait_args *uap)
984263bc 800{
9697c509
DRJ
801 struct rusage rusage;
802 int error, status;
984263bc 803
3919ced0
MD
804 error = kern_wait(uap->pid, (uap->status ? &status : NULL),
805 uap->options, (uap->rusage ? &rusage : NULL),
806 &uap->sysmsg_result);
984263bc 807
9697c509
DRJ
808 if (error == 0 && uap->status)
809 error = copyout(&status, uap->status, sizeof(*uap->status));
810 if (error == 0 && uap->rusage)
811 error = copyout(&rusage, uap->rusage, sizeof(*uap->rusage));
812 return (error);
984263bc
MD
813}
814
41c20dac
MD
815/*
816 * wait1()
817 *
818 * wait_args(int pid, int *status, int options, struct rusage *rusage)
3919ced0
MD
819 *
820 * MPALMOSTSAFE
41c20dac 821 */
9697c509
DRJ
822int
823kern_wait(pid_t pid, int *status, int options, struct rusage *rusage, int *res)
984263bc 824{
9697c509 825 struct thread *td = curthread;
3e291793 826 struct lwp *lp;
9697c509 827 struct proc *q = td->td_proc;
41c20dac 828 struct proc *p, *t;
e955543c 829 struct pargs *pa;
6fa9e71a 830 struct sigacts *ps;
9697c509 831 int nfound, error;
984263bc 832
9697c509
DRJ
833 if (pid == 0)
834 pid = -q->p_pgid;
cc162105 835 if (options &~ (WUNTRACED|WNOHANG|WCONTINUED|WLINUXCLONE))
984263bc 836 return (EINVAL);
b5c4d81f
MD
837
838 lwkt_gettoken(&q->p_token);
984263bc 839loop:
6d5b152e 840 /*
b5c4d81f
MD
841 * All sorts of things can change due to blocking so we have to loop
842 * all the way back up here.
6d5b152e
MD
843 *
844 * The problem is that if a process group is stopped and the parent
845 * is doing a wait*(..., WUNTRACED, ...), it will see the STOP
846 * of the child and then stop itself when it tries to return from the
847 * system call. When the process group is resumed the parent will
848 * then get the STOP status even though the child has now resumed
849 * (a followup wait*() will get the CONT status).
850 *
851 * Previously the CONT would overwrite the STOP because the tstop
852 * was handled within tsleep(), and the parent would only see
b5c4d81f 853 * the CONT when both are stopped and continued together. This little
6d5b152e
MD
854 * two-line hack restores this effect.
855 */
164b8401 856 while (q->p_stat == SSTOP)
9a379a4a 857 tstop();
6d5b152e 858
984263bc 859 nfound = 0;
b5c4d81f 860
8c986a82
MD
861 /*
862 * Loop on children.
863 *
864 * NOTE: We don't want to break q's p_token in the loop for the
865 * case where no children are found or we risk breaking the
866 * interlock between child and parent.
867 */
984263bc 868 LIST_FOREACH(p, &q->p_children, p_sibling) {
9697c509 869 if (pid != WAIT_ANY &&
b5c4d81f 870 p->p_pid != pid && p->p_pgid != -pid) {
984263bc 871 continue;
b5c4d81f 872 }
984263bc 873
5686ec5a
MD
874 /*
875 * This special case handles a kthread spawned by linux_clone
352f5709
MD
876 * (see linux_misc.c). The linux_wait4 and linux_waitpid
877 * functions need to be able to distinguish between waiting
878 * on a process and waiting on a thread. It is a thread if
879 * p_sigparent is not SIGCHLD, and the WLINUXCLONE option
880 * signifies we want to wait for threads and not processes.
984263bc 881 */
352f5709
MD
882 if ((p->p_sigparent != SIGCHLD) ^
883 ((options & WLINUXCLONE) != 0)) {
984263bc 884 continue;
352f5709 885 }
984263bc
MD
886
887 nfound++;
416d05d7 888 if (p->p_stat == SZOMB) {
8f211c4b
MD
889 /*
890 * We may go into SZOMB with threads still present.
891 * We must wait for them to exit before we can reap
892 * the master thread, otherwise we may race reaping
893 * non-master threads.
0730ed66
MD
894 *
895 * Only this routine can remove a process from
896 * the zombie list and destroy it, use PACQUIREZOMB()
897 * to serialize us and loop if it blocks (interlocked
898 * by the parent's q->p_token).
899 *
900 * WARNING! (p) can be invalid when PHOLDZOMB(p)
901 * returns non-zero. Be sure not to
902 * mess with it.
8f211c4b 903 */
0730ed66
MD
904 if (PHOLDZOMB(p))
905 goto loop;
b5c4d81f 906 lwkt_gettoken(&p->p_token);
0730ed66
MD
907 if (p->p_pptr != q) {
908 lwkt_reltoken(&p->p_token);
909 PRELEZOMB(p);
910 goto loop;
911 }
8f211c4b
MD
912 while (p->p_nthreads > 0) {
913 tsleep(&p->p_nthreads, 0, "lwpzomb", hz);
914 }
915
c008d3ad 916 /*
e3161323
MD
917 * Reap any LWPs left in p->p_lwps. This is usually
918 * just the last LWP. This must be done before
919 * we loop on p_lock since the lwps hold a ref on
920 * it as a vmspace interlock.
921 *
922 * Once that is accomplished p_nthreads had better
923 * be zero.
924 */
3e291793
MD
925 while ((lp = RB_ROOT(&p->p_lwp_tree)) != NULL) {
926 lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
927 reaplwp(lp);
928 }
e3161323
MD
929 KKASSERT(p->p_nthreads == 0);
930
931 /*
932 * Don't do anything really bad until all references
933 * to the process go away. This may include other
934 * LWPs which are still in the process of being
935 * reaped. We can't just pull the rug out from under
936 * them because they may still be using the VM space.
937 *
938 * Certain kernel facilities such as /proc will also
939 * put a hold on the process for short periods of
940 * time.
c008d3ad 941 */
0730ed66 942 PRELE(p);
82354ad8 943 PSTALL(p, "reap3", 0);
c1102e9f 944
9697c509
DRJ
945 /* Take care of our return values. */
946 *res = p->p_pid;
52cac9fb 947
9697c509
DRJ
948 if (status)
949 *status = p->p_xstat;
950 if (rusage)
fde7ac71 951 *rusage = p->p_ru;
984263bc
MD
952 /*
953 * If we got the child via a ptrace 'attach',
954 * we need to give it back to the old parent.
955 */
58c2553a 956 if (p->p_oppid && (t = pfind(p->p_oppid)) != NULL) {
0730ed66 957 PHOLD(p);
984263bc
MD
958 p->p_oppid = 0;
959 proc_reparent(p, t);
84204577 960 ksignal(t, SIGCHLD);
984263bc 961 wakeup((caddr_t)t);
3919ced0 962 error = 0;
58c2553a 963 PRELE(t);
eb2adbf5 964 lwkt_reltoken(&p->p_token);
0730ed66 965 PRELEZOMB(p);
3919ced0 966 goto done;
984263bc 967 }
3c8687d6
SS
968
969 /*
970 * Unlink the proc from its process group so that
971 * the following operations won't lead to an
972 * inconsistent state for processes running down
973 * the zombie list.
974 */
3c8687d6 975 proc_remove_zombie(p);
eb2adbf5 976 lwkt_reltoken(&p->p_token);
3c8687d6
SS
977 leavepgrp(p);
978
984263bc 979 p->p_xstat = 0;
fde7ac71 980 ruadd(&q->p_cru, &p->p_ru);
984263bc
MD
981
982 /*
983 * Decrement the count of procs running with this uid.
984 */
9697c509 985 chgproccnt(p->p_ucred->cr_ruidinfo, -1, 0);
984263bc
MD
986
987 /*
988 * Free up credentials.
989 */
41c20dac
MD
990 crfree(p->p_ucred);
991 p->p_ucred = NULL;
984263bc
MD
992
993 /*
994 * Remove unused arguments
995 */
e955543c
MD
996 pa = p->p_args;
997 p->p_args = NULL;
e955543c
MD
998 if (pa && refcount_release(&pa->ar_ref)) {
999 kfree(pa, M_PARGS);
1000 pa = NULL;
1001 }
6fa9e71a
MD
1002
1003 ps = p->p_sigacts;
1004 p->p_sigacts = NULL;
1005 if (ps && refcount_release(&ps->ps_refcnt)) {
1006 kfree(ps, M_SUBPROC);
1007 ps = NULL;
984263bc
MD
1008 }
1009
49aa3df0 1010 /*
e22b17d7
MD
1011 * Our exitingcount was incremented when the process
1012 * became a zombie, now that the process has been
1013 * removed from (almost) all lists we should be able
1014 * to safely destroy its vmspace. Wait for any current
1015 * holders to go away (so the vmspace remains stable),
1016 * then scrap it.
49aa3df0 1017 */
82354ad8 1018 PSTALL(p, "reap4", 0);
e22b17d7 1019 vmspace_exitfree(p);
82354ad8 1020 PSTALL(p, "reap5", 0);
e22b17d7 1021
0730ed66
MD
1022 /*
1023 * NOTE: We have to officially release ZOMB in order
1024 * to ensure that a racing thread in kern_wait()
1025 * which blocked on ZOMB is woken up.
1026 */
1027 PHOLD(p);
1028 PRELEZOMB(p);
fb2a331e 1029 kfree(p, M_PROC);
8c2bce60 1030 atomic_add_int(&nprocs, -1);
3919ced0
MD
1031 error = 0;
1032 goto done;
984263bc 1033 }
4643740a
MD
1034 if (p->p_stat == SSTOP && (p->p_flags & P_WAITED) == 0 &&
1035 ((p->p_flags & P_TRACED) || (options & WUNTRACED))) {
0730ed66 1036 PHOLD(p);
8c986a82 1037 lwkt_gettoken(&p->p_token);
0730ed66
MD
1038 if (p->p_pptr != q) {
1039 lwkt_reltoken(&p->p_token);
1040 PRELE(p);
1041 goto loop;
1042 }
1043 if (p->p_stat != SSTOP ||
1044 (p->p_flags & P_WAITED) != 0 ||
1045 ((p->p_flags & P_TRACED) == 0 &&
1046 (options & WUNTRACED) == 0)) {
1047 lwkt_reltoken(&p->p_token);
1048 PRELE(p);
1049 goto loop;
1050 }
1051
4643740a 1052 p->p_flags |= P_WAITED;
9697c509
DRJ
1053
1054 *res = p->p_pid;
1055 if (status)
a89c93ee 1056 *status = W_STOPCODE(p->p_xstat);
9697c509
DRJ
1057 /* Zero rusage so we get something consistent. */
1058 if (rusage)
8075c3b8 1059 bzero(rusage, sizeof(*rusage));
3919ced0 1060 error = 0;
8c986a82 1061 lwkt_reltoken(&p->p_token);
0730ed66 1062 PRELE(p);
3919ced0 1063 goto done;
984263bc 1064 }
4643740a 1065 if ((options & WCONTINUED) && (p->p_flags & P_CONTINUED)) {
0730ed66 1066 PHOLD(p);
8c986a82 1067 lwkt_gettoken(&p->p_token);
0730ed66
MD
1068 if (p->p_pptr != q) {
1069 lwkt_reltoken(&p->p_token);
1070 PRELE(p);
1071 goto loop;
1072 }
1073 if ((p->p_flags & P_CONTINUED) == 0) {
1074 lwkt_reltoken(&p->p_token);
1075 PRELE(p);
1076 goto loop;
1077 }
1078
cc162105 1079 *res = p->p_pid;
4643740a 1080 p->p_flags &= ~P_CONTINUED;
cc162105
PA
1081
1082 if (status)
1083 *status = SIGCONT;
3919ced0 1084 error = 0;
8c986a82 1085 lwkt_reltoken(&p->p_token);
0730ed66 1086 PRELE(p);
3919ced0 1087 goto done;
cc162105 1088 }
984263bc 1089 }
3919ced0
MD
1090 if (nfound == 0) {
1091 error = ECHILD;
1092 goto done;
1093 }
9697c509
DRJ
1094 if (options & WNOHANG) {
1095 *res = 0;
3919ced0
MD
1096 error = 0;
1097 goto done;
984263bc 1098 }
58c2553a
MD
1099
1100 /*
1101 * Wait for signal - interlocked using q->p_token.
1102 */
1103 error = tsleep(q, PCATCH, "wait", 0);
3919ced0
MD
1104 if (error) {
1105done:
b5c4d81f 1106 lwkt_reltoken(&q->p_token);
984263bc 1107 return (error);
3919ced0 1108 }
984263bc
MD
1109 goto loop;
1110}
1111
1112/*
55c81f71 1113 * Change child's parent process to parent.
7e90d791
MD
1114 *
1115 * p_children/p_sibling requires the parent's token, and
1116 * changing pptr requires the child's token, so we have to
55c81f71
MD
1117 * get three tokens to do this operation. We also need to
1118 * hold pointers that might get ripped out from under us to
1119 * preserve structural integrity.
1120 *
1121 * It is possible to race another reparent or disconnect or other
1122 * similar operation. We must retry when this situation occurs.
1123 * Once we successfully reparent the process we no longer care
1124 * about any races.
984263bc
MD
1125 */
1126void
77153250 1127proc_reparent(struct proc *child, struct proc *parent)
984263bc 1128{
55c81f71 1129 struct proc *opp;
7e90d791 1130
b5c4d81f 1131 PHOLD(parent);
55c81f71
MD
1132 while ((opp = child->p_pptr) != parent) {
1133 PHOLD(opp);
1134 lwkt_gettoken(&opp->p_token);
1135 lwkt_gettoken(&child->p_token);
1136 lwkt_gettoken(&parent->p_token);
1137 if (child->p_pptr != opp) {
1138 lwkt_reltoken(&parent->p_token);
1139 lwkt_reltoken(&child->p_token);
1140 lwkt_reltoken(&opp->p_token);
1141 PRELE(opp);
1142 continue;
1143 }
1144 LIST_REMOVE(child, p_sibling);
1145 LIST_INSERT_HEAD(&parent->p_children, child, p_sibling);
1146 child->p_pptr = parent;
1147 lwkt_reltoken(&parent->p_token);
1148 lwkt_reltoken(&child->p_token);
1149 lwkt_reltoken(&opp->p_token);
1150 if (LIST_EMPTY(&opp->p_children))
1151 wakeup(opp);
1152 PRELE(opp);
1153 break;
1154 }
b5c4d81f 1155 PRELE(parent);
984263bc
MD
1156}
1157
1158/*
1159 * The next two functions are to handle adding/deleting items on the
1160 * exit callout list
1161 *
1162 * at_exit():
1163 * Take the arguments given and put them onto the exit callout list,
1164 * However first make sure that it's not already there.
1165 * returns 0 on success.
1166 */
1167
1168int
77153250 1169at_exit(exitlist_fn function)
984263bc
MD
1170{
1171 struct exitlist *ep;
1172
1173#ifdef INVARIANTS
1174 /* Be noisy if the programmer has lost track of things */
1175 if (rm_at_exit(function))
6ea70f76 1176 kprintf("WARNING: exit callout entry (%p) already present\n",
984263bc
MD
1177 function);
1178#endif
efda3bd0 1179 ep = kmalloc(sizeof(*ep), M_ATEXIT, M_NOWAIT);
984263bc
MD
1180 if (ep == NULL)
1181 return (ENOMEM);
1182 ep->function = function;
1183 TAILQ_INSERT_TAIL(&exit_list, ep, next);
1184 return (0);
1185}
1186
1187/*
1188 * Scan the exit callout list for the given item and remove it.
1189 * Returns the number of items removed (0 or 1)
1190 */
1191int
77153250 1192rm_at_exit(exitlist_fn function)
984263bc
MD
1193{
1194 struct exitlist *ep;
1195
1196 TAILQ_FOREACH(ep, &exit_list, next) {
1197 if (ep->function == function) {
1198 TAILQ_REMOVE(&exit_list, ep, next);
efda3bd0 1199 kfree(ep, M_ATEXIT);
984263bc
MD
1200 return(1);
1201 }
1202 }
1203 return (0);
1204}
1205
70d3d461
SS
1206/*
1207 * LWP reaper related code.
1208 */
70d3d461
SS
1209static void
1210reaplwps(void *context, int dummy)
1211{
1212 struct lwplist *lwplist = context;
1213 struct lwp *lp;
1214
b5c4d81f 1215 lwkt_gettoken(&deadlwp_token);
70d3d461 1216 while ((lp = LIST_FIRST(lwplist))) {
3e291793
MD
1217 LIST_REMOVE(lp, u.lwp_reap_entry);
1218 reaplwp(lp);
70d3d461 1219 }
b5c4d81f 1220 lwkt_reltoken(&deadlwp_token);
70d3d461
SS
1221}
1222
3e291793
MD
1223static void
1224reaplwp(struct lwp *lp)
1225{
2af9d75d
MD
1226 while (lwp_wait(lp) == 0)
1227 ;
3e291793
MD
1228 lwp_dispose(lp);
1229}
1230
70d3d461
SS
1231static void
1232deadlwp_init(void)
1233{
1234 int cpu;
1235
1236 for (cpu = 0; cpu < ncpus; cpu++) {
1237 LIST_INIT(&deadlwp_list[cpu]);
2af9d75d
MD
1238 deadlwp_task[cpu] = kmalloc(sizeof(*deadlwp_task[cpu]),
1239 M_DEVBUF, M_WAITOK);
70d3d461
SS
1240 TASK_INIT(deadlwp_task[cpu], 0, reaplwps, &deadlwp_list[cpu]);
1241 }
1242}
1243
1244SYSINIT(deadlwpinit, SI_SUB_CONFIGURE, SI_ORDER_ANY, deadlwp_init, NULL);