Remove upc_{control,register} syscalls and everything that has to do with it.
[dragonfly.git] / sys / kern / kern_exit.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1982, 1986, 1989, 1991, 1993
3 * The Regents of the University of California. All rights reserved.
4 * (c) UNIX System Laboratories, Inc.
5 * All or some portions of this file are derived from material licensed
6 * to the University of California by American Telephone and Telegraph
7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8 * the permission of UNIX System Laboratories, Inc.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 * may be used to endorse or promote products derived from this software
24 * without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 * @(#)kern_exit.c 8.7 (Berkeley) 2/12/94
39 * $FreeBSD: src/sys/kern/kern_exit.c,v 1.92.2.11 2003/01/13 22:51:16 dillon Exp $
40 */
41
42#include "opt_compat.h"
43#include "opt_ktrace.h"
44
45#include <sys/param.h>
46#include <sys/systm.h>
47#include <sys/sysproto.h>
48#include <sys/kernel.h>
49#include <sys/malloc.h>
50#include <sys/proc.h>
29f58392 51#include <sys/ktrace.h>
984263bc
MD
52#include <sys/pioctl.h>
53#include <sys/tty.h>
54#include <sys/wait.h>
55#include <sys/vnode.h>
56#include <sys/resourcevar.h>
57#include <sys/signalvar.h>
70d3d461 58#include <sys/taskqueue.h>
984263bc
MD
59#include <sys/ptrace.h>
60#include <sys/acct.h> /* for acct_process() function prototype */
61#include <sys/filedesc.h>
62#include <sys/shm.h>
63#include <sys/sem.h>
984263bc 64#include <sys/jail.h>
9697c509 65#include <sys/kern_syscall.h>
d5f340eb 66#include <sys/unistd.h>
8ba5f7ef 67#include <sys/eventhandler.h>
2883d2d8 68#include <sys/dsched.h>
984263bc
MD
69
70#include <vm/vm.h>
71#include <vm/vm_param.h>
72#include <sys/lock.h>
73#include <vm/pmap.h>
74#include <vm/vm_map.h>
984263bc
MD
75#include <vm/vm_extern.h>
76#include <sys/user.h>
77
e955543c 78#include <sys/refcount.h>
e43a034f 79#include <sys/thread2.h>
e3161323 80#include <sys/sysref2.h>
684a93c4 81#include <sys/mplock2.h>
e3161323
MD
82
83static void reaplwps(void *context, int dummy);
3e291793 84static void reaplwp(struct lwp *lp);
dc52e1cc 85static void killlwps(struct lwp *lp);
e43a034f 86
984263bc 87static MALLOC_DEFINE(M_ATEXIT, "atexit", "atexit callback");
d511d5d5 88static MALLOC_DEFINE(M_ZOMBIE, "zombie", "zombie proc status");
984263bc 89
b5c4d81f
MD
90static struct lwkt_token deadlwp_token = LWKT_TOKEN_INITIALIZER(deadlwp_token);
91
984263bc
MD
92/*
93 * callout list for things to do at exit time
94 */
95struct exitlist {
96 exitlist_fn function;
97 TAILQ_ENTRY(exitlist) next;
98};
99
100TAILQ_HEAD(exit_list_head, exitlist);
101static struct exit_list_head exit_list = TAILQ_HEAD_INITIALIZER(exit_list);
102
103/*
70d3d461
SS
104 * LWP reaper data
105 */
106struct task *deadlwp_task[MAXCPU];
107struct lwplist deadlwp_list[MAXCPU];
108
109/*
984263bc
MD
110 * exit --
111 * Death of process.
41c20dac
MD
112 *
113 * SYS_EXIT_ARGS(int rval)
984263bc 114 */
753fd850
MD
115int
116sys_exit(struct exit_args *uap)
984263bc 117{
41c20dac 118 exit1(W_EXITCODE(uap->rval, 0));
984263bc
MD
119 /* NOTREACHED */
120}
121
d5f340eb
SS
122/*
123 * Extended exit --
124 * Death of a lwp or process with optional bells and whistles.
3919ced0
MD
125 *
126 * MPALMOSTSAFE
d5f340eb
SS
127 */
128int
129sys_extexit(struct extexit_args *uap)
130{
b5c4d81f 131 struct proc *p = curproc;
d5f340eb
SS
132 int action, who;
133 int error;
134
135 action = EXTEXIT_ACTION(uap->how);
136 who = EXTEXIT_WHO(uap->how);
137
138 /* Check parameters before we might perform some action */
139 switch (who) {
140 case EXTEXIT_PROC:
141 case EXTEXIT_LWP:
142 break;
d5f340eb
SS
143 default:
144 return (EINVAL);
145 }
146
147 switch (action) {
148 case EXTEXIT_SIMPLE:
149 break;
d5f340eb
SS
150 case EXTEXIT_SETINT:
151 error = copyout(&uap->status, uap->addr, sizeof(uap->status));
152 if (error)
153 return (error);
154 break;
d5f340eb
SS
155 default:
156 return (EINVAL);
157 }
158
b5c4d81f 159 lwkt_gettoken(&p->p_token);
3919ced0 160
d5f340eb
SS
161 switch (who) {
162 case EXTEXIT_LWP:
163 /*
164 * Be sure only to perform a simple lwp exit if there is at
165 * least one more lwp in the proc, which will call exit1()
166 * later, otherwise the proc will be an UNDEAD and not even a
167 * SZOMB!
168 */
b5c4d81f
MD
169 if (p->p_nthreads > 1) {
170 lwp_exit(0); /* called w/ p_token held */
e3161323
MD
171 /* NOT REACHED */
172 }
d5f340eb
SS
173 /* else last lwp in proc: do the real thing */
174 /* FALLTHROUGH */
d5f340eb
SS
175 default: /* to help gcc */
176 case EXTEXIT_PROC:
b5c4d81f 177 lwkt_reltoken(&p->p_token);
d5f340eb
SS
178 exit1(W_EXITCODE(uap->status, 0));
179 /* NOTREACHED */
180 }
181
182 /* NOTREACHED */
b5c4d81f 183 lwkt_reltoken(&p->p_token); /* safety */
d5f340eb
SS
184}
185
e3161323 186/*
dc52e1cc
MD
187 * Kill all lwps associated with the current process except the
188 * current lwp. Return an error if we race another thread trying to
189 * do the same thing and lose the race.
190 *
191 * If forexec is non-zero the current thread and process flags are
192 * cleaned up so they can be reused.
616516c8
MD
193 *
194 * Caller must hold curproc->p_token
dc52e1cc
MD
195 */
196int
197killalllwps(int forexec)
198{
199 struct lwp *lp = curthread->td_lwp;
200 struct proc *p = lp->lwp_proc;
201
202 /*
203 * Interlock against P_WEXIT. Only one of the process's thread
204 * is allowed to do the master exit.
205 */
4643740a 206 if (p->p_flags & P_WEXIT)
dc52e1cc 207 return (EALREADY);
4643740a 208 p->p_flags |= P_WEXIT;
dc52e1cc
MD
209
210 /*
4643740a 211 * Interlock with LWP_MP_WEXIT and kill any remaining LWPs
dc52e1cc 212 */
4643740a 213 atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
dc52e1cc
MD
214 if (p->p_nthreads > 1)
215 killlwps(lp);
216
217 /*
218 * If doing this for an exec, clean up the remaining thread
219 * (us) for continuing operation after all the other threads
220 * have been killed.
221 */
222 if (forexec) {
4643740a
MD
223 atomic_clear_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
224 p->p_flags &= ~P_WEXIT;
dc52e1cc
MD
225 }
226 return(0);
227}
228
229/*
e3161323
MD
230 * Kill all LWPs except the current one. Do not try to signal
231 * LWPs which have exited on their own or have already been
232 * signaled.
233 */
dc52e1cc 234static void
70d3d461
SS
235killlwps(struct lwp *lp)
236{
237 struct proc *p = lp->lwp_proc;
238 struct lwp *tlp;
239
e3161323 240 /*
89d9d449 241 * Kill the remaining LWPs. We must send the signal before setting
4643740a 242 * LWP_MP_WEXIT. The setting of WEXIT is optional but helps reduce
89d9d449
MD
243 * races. tlp must be held across the call as it might block and
244 * allow the target lwp to rip itself out from under our loop.
e3161323 245 */
70d3d461 246 FOREACH_LWP_IN_PROC(tlp, p) {
89d9d449 247 LWPHOLD(tlp);
e2b148c6 248 lwkt_gettoken(&tlp->lwp_token);
4643740a 249 if ((tlp->lwp_mpflags & LWP_MP_WEXIT) == 0) {
73e40cb2 250 lwpsignal(p, tlp, SIGKILL);
4643740a 251 atomic_set_int(&tlp->lwp_mpflags, LWP_MP_WEXIT);
e3161323 252 }
e2b148c6 253 lwkt_reltoken(&tlp->lwp_token);
89d9d449 254 LWPRELE(tlp);
70d3d461
SS
255 }
256
e3161323
MD
257 /*
258 * Wait for everything to clear out.
259 */
70d3d461 260 while (p->p_nthreads > 1) {
ef1c4d7f 261 tsleep(&p->p_nthreads, 0, "killlwps", 0);
70d3d461
SS
262 }
263}
264
984263bc
MD
265/*
266 * Exit: deallocate address space and other resources, change proc state
267 * to zombie, and unlink proc from allproc and parent's lists. Save exit
268 * status and rusage for wait(). Check for child processes and orphan them.
269 */
270void
41c20dac 271exit1(int rv)
984263bc 272{
bb3cd951
SS
273 struct thread *td = curthread;
274 struct proc *p = td->td_proc;
275 struct lwp *lp = td->td_lwp;
41c20dac
MD
276 struct proc *q, *nq;
277 struct vmspace *vm;
984263bc
MD
278 struct vnode *vtmp;
279 struct exitlist *ep;
dc52e1cc 280 int error;
984263bc 281
b5c4d81f
MD
282 lwkt_gettoken(&p->p_token);
283
984263bc 284 if (p->p_pid == 1) {
6ea70f76 285 kprintf("init died (signal %d, exit %d)\n",
984263bc
MD
286 WTERMSIG(rv), WEXITSTATUS(rv));
287 panic("Going nowhere without my init!");
288 }
9d7a637e
AE
289 varsymset_clean(&p->p_varsymset);
290 lockuninit(&p->p_varsymset.vx_lock);
2af9d75d 291
70d3d461 292 /*
dc52e1cc
MD
293 * Kill all lwps associated with the current process, return an
294 * error if we race another thread trying to do the same thing
295 * and lose the race.
70d3d461 296 */
dc52e1cc
MD
297 error = killalllwps(0);
298 if (error) {
e3161323
MD
299 lwp_exit(0);
300 /* NOT REACHED */
222b18cd 301 }
81eea9f4 302
984263bc 303 /* are we a task leader? */
e3161323 304 if (p == p->p_leader) {
984263bc
MD
305 struct kill_args killArgs;
306 killArgs.signum = SIGKILL;
307 q = p->p_peers;
308 while(q) {
309 killArgs.pid = q->p_pid;
310 /*
311 * The interface for kill is better
312 * than the internal signal
313 */
753fd850 314 sys_kill(&killArgs);
984263bc
MD
315 nq = q;
316 q = q->p_peers;
317 }
318 while (p->p_peers)
e3161323 319 tsleep((caddr_t)p, 0, "exit1", 0);
8ba5f7ef 320 }
984263bc
MD
321
322#ifdef PGINPROF
323 vmsizmon();
324#endif
325 STOPEVENT(p, S_EXIT, rv);
b2a6ad87 326 p->p_flags |= P_POSTEXIT; /* stop procfs stepping */
984263bc
MD
327
328 /*
329 * Check if any loadable modules need anything done at process exit.
330 * e.g. SYSV IPC stuff
331 * XXX what if one of these generates an error?
332 */
8ba5f7ef
AH
333 p->p_xstat = rv;
334 EVENTHANDLER_INVOKE(process_exit, p);
335
336 /*
337 * XXX: imho, the eventhandler stuff is much cleaner than this.
338 * Maybe we should move everything to use eventhandler.
339 */
984263bc 340 TAILQ_FOREACH(ep, &exit_list, next)
bb3cd951 341 (*ep->function)(td);
984263bc 342
4643740a 343 if (p->p_flags & P_PROFIL)
984263bc 344 stopprofclock(p);
82354ad8 345
984263bc 346 SIGEMPTYSET(p->p_siglist);
aa6c3de6 347 SIGEMPTYSET(lp->lwp_siglist);
984263bc 348 if (timevalisset(&p->p_realtimer.it_value))
a471eac5 349 callout_stop_sync(&p->p_ithandle);
984263bc
MD
350
351 /*
352 * Reset any sigio structures pointing to us as a result of
353 * F_SETOWN with our pid.
354 */
355 funsetownlst(&p->p_sigiolst);
356
357 /*
358 * Close open files and release open-file table.
359 * This may block!
360 */
0a4a9c77 361 fdfree(p, NULL);
984263bc
MD
362
363 if(p->p_leader->p_peers) {
364 q = p->p_leader;
365 while(q->p_peers != p)
366 q = q->p_peers;
367 q->p_peers = p->p_peers;
368 wakeup((caddr_t)p->p_leader);
369 }
370
371 /*
372 * XXX Shutdown SYSV semaphores
373 */
374 semexit(p);
375
06ecca5a
MD
376 KKASSERT(p->p_numposixlocks == 0);
377
984263bc
MD
378 /* The next two chunks should probably be moved to vmspace_exit. */
379 vm = p->p_vmspace;
a722be49
MD
380
381 /*
39005e16
MD
382 * Clean up data related to virtual kernel operation. Clean up
383 * any vkernel context related to the current lwp now so we can
384 * destroy p_vkernel.
385 */
386 if (p->p_vkernel) {
387 vkernel_lwp_exit(lp);
4a22e893 388 vkernel_exit(p);
39005e16 389 }
0daa37a5 390
984263bc
MD
391 /*
392 * Release user portion of address space.
393 * This releases references to vnodes,
394 * which could cause I/O if the file has been unlinked.
395 * Need to do this early enough that we can still sleep.
396 * Can't free the entire vmspace as the kernel stack
397 * may be mapped within that space also.
398 *
399 * Processes sharing the same vmspace may exit in one order, and
400 * get cleaned up by vmspace_exit() in a different order. The
401 * last exiting process to reach this point releases as much of
402 * the environment as it can, and the last process cleaned up
403 * by vmspace_exit() (which decrements exitingcnt) cleans up the
404 * remainder.
405 */
46754a20 406 vmspace_exitbump(vm);
e3161323 407 sysref_put(&vm->vm_sysref);
984263bc
MD
408
409 if (SESS_LEADER(p)) {
1fd87d54 410 struct session *sp = p->p_session;
984263bc
MD
411
412 if (sp->s_ttyvp) {
413 /*
1fbb5fc0
MD
414 * We are the controlling process. Signal the
415 * foreground process group, drain the controlling
416 * terminal, and revoke access to the controlling
417 * terminal.
418 *
419 * NOTE: while waiting for the process group to exit
420 * it is possible that one of the processes in the
f1aeb0c0
MD
421 * group will revoke the tty, so the ttyclosesession()
422 * function will re-check sp->s_ttyvp.
984263bc
MD
423 */
424 if (sp->s_ttyp && (sp->s_ttyp->t_session == sp)) {
425 if (sp->s_ttyp->t_pgrp)
426 pgsignal(sp->s_ttyp->t_pgrp, SIGHUP, 1);
f1aeb0c0
MD
427 ttywait(sp->s_ttyp);
428 ttyclosesession(sp, 1); /* also revoke */
984263bc 429 }
5fd012e0
MD
430 /*
431 * Release the tty. If someone has it open via
432 * /dev/tty then close it (since they no longer can
433 * once we've NULL'd it out).
434 */
f1aeb0c0
MD
435 ttyclosesession(sp, 0);
436
984263bc
MD
437 /*
438 * s_ttyp is not zero'd; we use this to indicate
439 * that the session once had a controlling terminal.
440 * (for logging and informational purposes)
441 */
442 }
443 sp->s_leader = NULL;
444 }
445 fixjobc(p, p->p_pgrp, 0);
446 (void)acct_process(p);
447#ifdef KTRACE
448 /*
449 * release trace file
450 */
29f58392
MD
451 if (p->p_tracenode)
452 ktrdestroy(&p->p_tracenode);
453 p->p_traceflag = 0;
984263bc
MD
454#endif
455 /*
456 * Release reference to text vnode
457 */
458 if ((vtmp = p->p_textvp) != NULL) {
459 p->p_textvp = NULL;
460 vrele(vtmp);
461 }
462
8ba5f7ef
AH
463 /* Release namecache handle to text file */
464 if (p->p_textnch.ncp)
465 cache_drop(&p->p_textnch);
466
984263bc 467 /*
82354ad8
MD
468 * We have to handle PPWAIT here or proc_move_allproc_zombie()
469 * will block on the PHOLD() the parent is doing.
470 */
471 if (p->p_flags & P_PPWAIT) {
472 p->p_flags &= ~P_PPWAIT;
473 wakeup(p->p_pptr);
474 }
475
476 /*
5bf0d9b5
MD
477 * Move the process to the zombie list. This will block
478 * until the process p_lock count reaches 0. The process will
479 * not be reaped until TDF_EXITING is set by cpu_thread_exit(),
480 * which is called from cpu_proc_exit().
ae8050a4 481 */
5bf0d9b5 482 proc_move_allproc_zombie(p);
984263bc 483
7e90d791
MD
484 /*
485 * Reparent all of this process's children to the init process.
486 * We must hold initproc->p_token in order to mess with
487 * initproc->p_children. We already hold p->p_token (to remove
488 * the children from our list).
489 */
984263bc 490 q = LIST_FIRST(&p->p_children);
7e90d791
MD
491 if (q) {
492 lwkt_gettoken(&initproc->p_token);
0730ed66
MD
493 while ((q = LIST_FIRST(&p->p_children)) != NULL) {
494 PHOLD(q);
495 lwkt_gettoken(&q->p_token);
496 if (q != LIST_FIRST(&p->p_children)) {
497 lwkt_reltoken(&q->p_token);
498 PRELE(q);
499 continue;
500 }
7e90d791
MD
501 LIST_REMOVE(q, p_sibling);
502 LIST_INSERT_HEAD(&initproc->p_children, q, p_sibling);
503 q->p_pptr = initproc;
504 q->p_sigparent = SIGCHLD;
0730ed66 505
7e90d791
MD
506 /*
507 * Traced processes are killed
508 * since their existence means someone is screwing up.
509 */
4643740a
MD
510 if (q->p_flags & P_TRACED) {
511 q->p_flags &= ~P_TRACED;
7e90d791
MD
512 ksignal(q, SIGKILL);
513 }
0730ed66
MD
514 lwkt_reltoken(&q->p_token);
515 PRELE(q);
984263bc 516 }
7e90d791
MD
517 lwkt_reltoken(&initproc->p_token);
518 wakeup(initproc);
984263bc
MD
519 }
520
521 /*
522 * Save exit status and final rusage info, adding in child rusage
523 * info and self times.
524 */
fde7ac71
SS
525 calcru_proc(p, &p->p_ru);
526 ruadd(&p->p_ru, &p->p_cru);
984263bc
MD
527
528 /*
984263bc
MD
529 * notify interested parties of our demise.
530 */
531 KNOTE(&p->p_klist, NOTE_EXIT);
532
533 /*
534 * Notify parent that we're gone. If parent has the PS_NOCLDWAIT
19af1870
MR
535 * flag set, or if the handler is set to SIG_IGN, notify process 1
536 * instead (and hope it will handle this situation).
984263bc 537 */
a0ae03a7 538 if (p->p_pptr->p_sigacts->ps_flag & (PS_NOCLDWAIT | PS_CLDSIGIGN)) {
984263bc 539 proc_reparent(p, initproc);
984263bc
MD
540 }
541
f2f3db5c
MD
542 /* lwkt_gettoken(&proc_token); */
543 q = p->p_pptr;
58c2553a 544 PHOLD(q);
f2f3db5c 545 if (p->p_sigparent && q != initproc) {
f2f3db5c 546 ksignal(q, p->p_sigparent);
984263bc 547 } else {
f2f3db5c 548 ksignal(q, SIGCHLD);
984263bc 549 }
82354ad8
MD
550
551 p->p_flags &= ~P_TRACED;
58c2553a 552 wakeup(p->p_pptr);
82354ad8 553
58c2553a 554 PRELE(q);
f2f3db5c
MD
555 /* lwkt_reltoken(&proc_token); */
556 /* NOTE: p->p_pptr can get ripped out */
984263bc 557 /*
8ad65e08
MD
558 * cpu_exit is responsible for clearing curproc, since
559 * it is heavily integrated with the thread/switching sequence.
560 *
984263bc
MD
561 * Other substructures are freed from wait().
562 */
8f1f6170 563 plimit_free(p);
984263bc
MD
564
565 /*
0a3f9b47
MD
566 * Release the current user process designation on the process so
567 * the userland scheduler can work in someone else.
26a0694b 568 */
553ea3c8 569 p->p_usched->release_curproc(lp);
26a0694b
MD
570
571 /*
e3161323
MD
572 * Finally, call machine-dependent code to release as many of the
573 * lwp's resources as we can and halt execution of this thread.
984263bc 574 */
e3161323 575 lwp_exit(1);
c6880072
SS
576}
577
0d355d3b
MD
578/*
579 * Eventually called by every exiting LWP
b5c4d81f
MD
580 *
581 * p->p_token must be held. mplock may be held and will be released.
0d355d3b 582 */
c6880072 583void
e3161323 584lwp_exit(int masterexit)
c6880072 585{
d86a23e0
MD
586 struct thread *td = curthread;
587 struct lwp *lp = td->td_lwp;
c6880072 588 struct proc *p = lp->lwp_proc;
8c2bce60 589 int dowake = 0;
c6880072 590
70d3d461 591 /*
4643740a 592 * lwp_exit() may be called without setting LWP_MP_WEXIT, so
e3161323
MD
593 * make sure it is set here.
594 */
b5c4d81f 595 ASSERT_LWKT_TOKEN_HELD(&p->p_token);
4643740a 596 atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
e3161323
MD
597
598 /*
39005e16
MD
599 * Clean up any virtualization
600 */
601 if (lp->lwp_vkernel)
602 vkernel_lwp_exit(lp);
603
604 /*
a591f597
MD
605 * Clean up select/poll support
606 */
607 kqueue_terminate(&lp->lwp_kqueue);
608
609 /*
0d355d3b
MD
610 * Clean up any syscall-cached ucred
611 */
d86a23e0
MD
612 if (td->td_ucred) {
613 crfree(td->td_ucred);
614 td->td_ucred = NULL;
0d355d3b
MD
615 }
616
617 /*
70d3d461
SS
618 * Nobody actually wakes us when the lock
619 * count reaches zero, so just wait one tick.
620 */
621 while (lp->lwp_lock > 0)
622 tsleep(lp, 0, "lwpexit", 1);
623
624 /* Hand down resource usage to our proc */
625 ruadd(&p->p_ru, &lp->lwp_ru);
626
e3161323
MD
627 /*
628 * If we don't hold the process until the LWP is reaped wait*()
629 * may try to dispose of its vmspace before all the LWPs have
630 * actually terminated.
631 */
632 PHOLD(p);
633
634 /*
2883d2d8
MD
635 * Do any remaining work that might block on us. We should be
636 * coded such that further blocking is ok after decrementing
637 * p_nthreads but don't take the chance.
638 */
639 dsched_exit_thread(td);
640 biosched_done(curthread);
641
642 /*
e3161323
MD
643 * We have to use the reaper for all the LWPs except the one doing
644 * the master exit. The LWP doing the master exit can just be
645 * left on p_lwps and the process reaper will deal with it
646 * synchronously, which is much faster.
ce19c8fe
MD
647 *
648 * Wakeup anyone waiting on p_nthreads to drop to 1 or 0.
2af9d75d
MD
649 *
650 * The process is left held until the reaper calls lwp_dispose() on
651 * the lp (after calling lwp_wait()).
e3161323
MD
652 */
653 if (masterexit == 0) {
3e291793 654 lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
e3161323 655 --p->p_nthreads;
ce19c8fe 656 if (p->p_nthreads <= 1)
8c2bce60 657 dowake = 1;
b5c4d81f 658 lwkt_gettoken(&deadlwp_token);
3e291793 659 LIST_INSERT_HEAD(&deadlwp_list[mycpuid], lp, u.lwp_reap_entry);
2883d2d8
MD
660 taskqueue_enqueue(taskqueue_thread[mycpuid],
661 deadlwp_task[mycpuid]);
b5c4d81f 662 lwkt_reltoken(&deadlwp_token);
e3161323
MD
663 } else {
664 --p->p_nthreads;
ce19c8fe 665 if (p->p_nthreads <= 1)
8c2bce60 666 dowake = 1;
e3161323 667 }
b5c4d81f
MD
668
669 /*
8c2bce60
MD
670 * Release p_token. Issue the wakeup() on p_nthreads if necessary,
671 * as late as possible to give us a chance to actually deschedule and
672 * switch away before another cpu core hits reaplwp().
b5c4d81f
MD
673 */
674 lwkt_reltoken(&p->p_token);
8c2bce60
MD
675 if (dowake)
676 wakeup(&p->p_nthreads);
e28d8b15
MD
677
678 /*
679 * Tell the userland scheduler that we are going away
680 */
681 p->p_usched->heuristic_exiting(lp, p);
682
c6880072
SS
683 cpu_lwp_exit();
684}
685
686/*
2af9d75d
MD
687 * Wait until a lwp is completely dead. The final interlock in this drama
688 * is when TDF_EXITING is set in cpu_thread_exit() just before the final
689 * switchout.
c6880072 690 *
2af9d75d 691 * At the point TDF_EXITING is set a complete exit is accomplished when
2b07d9aa
MD
692 * TDF_RUNNING and TDF_PREEMPT_LOCK are both clear. td_mpflags has two
693 * post-switch interlock flags that can be used to wait for the TDF_
694 * flags to clear.
c6880072 695 *
2af9d75d
MD
696 * Returns non-zero on success, and zero if the caller needs to retry
697 * the lwp_wait().
c6880072
SS
698 */
699static int
700lwp_wait(struct lwp *lp)
701{
3598cc14 702 struct thread *td = lp->lwp_thread;
2b07d9aa 703 u_int mpflags;
c6880072
SS
704
705 KKASSERT(lwkt_preempted_proc() != lp);
706
2af9d75d 707 /*
2b07d9aa
MD
708 * This bit of code uses the thread destruction interlock
709 * managed by lwkt_switch_return() to wait for the lwp's
710 * thread to completely disengage.
711 *
712 * It is possible for us to race another cpu core so we
713 * have to do this correctly.
714 */
715 for (;;) {
716 mpflags = td->td_mpflags;
717 cpu_ccfence();
718 if (mpflags & TDF_MP_EXITSIG)
719 break;
720 tsleep_interlock(td, 0);
721 if (atomic_cmpset_int(&td->td_mpflags, mpflags,
722 mpflags | TDF_MP_EXITWAIT)) {
723 tsleep(td, PINTERLOCKED, "lwpxt", 0);
724 }
725 }
726
727 /*
728 * We've already waited for the core exit but there can still
729 * be other refs from e.g. process scans and such.
2af9d75d
MD
730 */
731 if (lp->lwp_lock > 0) {
c6880072 732 tsleep(lp, 0, "lwpwait1", 1);
2af9d75d
MD
733 return(0);
734 }
2af9d75d
MD
735 if (td->td_refs) {
736 tsleep(td, 0, "lwpwait2", 1);
737 return(0);
738 }
c6880072
SS
739
740 /*
2b07d9aa
MD
741 * Now that we have the thread destruction interlock these flags
742 * really should already be cleaned up, keep a check for safety.
c6880072 743 *
2b07d9aa
MD
744 * We can't rip its stack out from under it until TDF_EXITING is
745 * set and both TDF_RUNNING and TDF_PREEMPT_LOCK are clear.
746 * TDF_PREEMPT_LOCK must be checked because TDF_RUNNING
747 * will be cleared temporarily if a thread gets preempted.
748 */
749 while ((td->td_flags & (TDF_RUNNING |
750 TDF_PREEMPT_LOCK |
751 TDF_EXITING)) != TDF_EXITING) {
752 tsleep(lp, 0, "lwpwait3", 1);
c6880072 753 return (0);
cf709dd2 754 }
2b07d9aa 755
2af9d75d
MD
756 KASSERT((td->td_flags & (TDF_RUNQ|TDF_TSLEEPQ)) == 0,
757 ("lwp_wait: td %p (%s) still on run or sleep queue",
758 td, td->td_comm));
c6880072
SS
759 return (1);
760}
761
762/*
763 * Release the resources associated with a lwp.
764 * The lwp must be completely dead.
765 */
766void
767lwp_dispose(struct lwp *lp)
768{
3598cc14 769 struct thread *td = lp->lwp_thread;
c6880072
SS
770
771 KKASSERT(lwkt_preempted_proc() != lp);
772 KKASSERT(td->td_refs == 0);
2af9d75d
MD
773 KKASSERT((td->td_flags & (TDF_RUNNING |
774 TDF_PREEMPT_LOCK |
775 TDF_EXITING)) == TDF_EXITING);
c6880072 776
e3161323
MD
777 PRELE(lp->lwp_proc);
778 lp->lwp_proc = NULL;
c6880072
SS
779 if (td != NULL) {
780 td->td_proc = NULL;
781 td->td_lwp = NULL;
782 lp->lwp_thread = NULL;
783 lwkt_free_thread(td);
784 }
f6c36234 785 kfree(lp, M_LWP);
984263bc
MD
786}
787
3919ced0
MD
788/*
789 * MPSAFE
790 */
984263bc 791int
753fd850 792sys_wait4(struct wait_args *uap)
984263bc 793{
9697c509
DRJ
794 struct rusage rusage;
795 int error, status;
984263bc 796
3919ced0
MD
797 error = kern_wait(uap->pid, (uap->status ? &status : NULL),
798 uap->options, (uap->rusage ? &rusage : NULL),
799 &uap->sysmsg_result);
984263bc 800
9697c509
DRJ
801 if (error == 0 && uap->status)
802 error = copyout(&status, uap->status, sizeof(*uap->status));
803 if (error == 0 && uap->rusage)
804 error = copyout(&rusage, uap->rusage, sizeof(*uap->rusage));
805 return (error);
984263bc
MD
806}
807
41c20dac
MD
808/*
809 * wait1()
810 *
811 * wait_args(int pid, int *status, int options, struct rusage *rusage)
3919ced0
MD
812 *
813 * MPALMOSTSAFE
41c20dac 814 */
9697c509
DRJ
815int
816kern_wait(pid_t pid, int *status, int options, struct rusage *rusage, int *res)
984263bc 817{
9697c509 818 struct thread *td = curthread;
3e291793 819 struct lwp *lp;
9697c509 820 struct proc *q = td->td_proc;
41c20dac 821 struct proc *p, *t;
e955543c 822 struct pargs *pa;
6fa9e71a 823 struct sigacts *ps;
9697c509 824 int nfound, error;
984263bc 825
9697c509
DRJ
826 if (pid == 0)
827 pid = -q->p_pgid;
cc162105 828 if (options &~ (WUNTRACED|WNOHANG|WCONTINUED|WLINUXCLONE))
984263bc 829 return (EINVAL);
b5c4d81f
MD
830
831 lwkt_gettoken(&q->p_token);
984263bc 832loop:
6d5b152e 833 /*
b5c4d81f
MD
834 * All sorts of things can change due to blocking so we have to loop
835 * all the way back up here.
6d5b152e
MD
836 *
837 * The problem is that if a process group is stopped and the parent
838 * is doing a wait*(..., WUNTRACED, ...), it will see the STOP
839 * of the child and then stop itself when it tries to return from the
840 * system call. When the process group is resumed the parent will
841 * then get the STOP status even though the child has now resumed
842 * (a followup wait*() will get the CONT status).
843 *
844 * Previously the CONT would overwrite the STOP because the tstop
845 * was handled within tsleep(), and the parent would only see
b5c4d81f 846 * the CONT when both are stopped and continued together. This little
6d5b152e
MD
847 * two-line hack restores this effect.
848 */
164b8401 849 while (q->p_stat == SSTOP)
9a379a4a 850 tstop();
6d5b152e 851
984263bc 852 nfound = 0;
b5c4d81f 853
8c986a82
MD
854 /*
855 * Loop on children.
856 *
857 * NOTE: We don't want to break q's p_token in the loop for the
858 * case where no children are found or we risk breaking the
859 * interlock between child and parent.
860 */
984263bc 861 LIST_FOREACH(p, &q->p_children, p_sibling) {
9697c509 862 if (pid != WAIT_ANY &&
b5c4d81f 863 p->p_pid != pid && p->p_pgid != -pid) {
984263bc 864 continue;
b5c4d81f 865 }
984263bc 866
5686ec5a
MD
867 /*
868 * This special case handles a kthread spawned by linux_clone
352f5709
MD
869 * (see linux_misc.c). The linux_wait4 and linux_waitpid
870 * functions need to be able to distinguish between waiting
871 * on a process and waiting on a thread. It is a thread if
872 * p_sigparent is not SIGCHLD, and the WLINUXCLONE option
873 * signifies we want to wait for threads and not processes.
984263bc 874 */
352f5709
MD
875 if ((p->p_sigparent != SIGCHLD) ^
876 ((options & WLINUXCLONE) != 0)) {
984263bc 877 continue;
352f5709 878 }
984263bc
MD
879
880 nfound++;
416d05d7 881 if (p->p_stat == SZOMB) {
ae8050a4 882 /*
8f211c4b
MD
883 * We may go into SZOMB with threads still present.
884 * We must wait for them to exit before we can reap
885 * the master thread, otherwise we may race reaping
886 * non-master threads.
0730ed66
MD
887 *
888 * Only this routine can remove a process from
889 * the zombie list and destroy it, use PACQUIREZOMB()
890 * to serialize us and loop if it blocks (interlocked
891 * by the parent's q->p_token).
892 *
893 * WARNING! (p) can be invalid when PHOLDZOMB(p)
894 * returns non-zero. Be sure not to
895 * mess with it.
8f211c4b 896 */
0730ed66
MD
897 if (PHOLDZOMB(p))
898 goto loop;
b5c4d81f 899 lwkt_gettoken(&p->p_token);
0730ed66
MD
900 if (p->p_pptr != q) {
901 lwkt_reltoken(&p->p_token);
902 PRELEZOMB(p);
903 goto loop;
904 }
8f211c4b
MD
905 while (p->p_nthreads > 0) {
906 tsleep(&p->p_nthreads, 0, "lwpzomb", hz);
907 }
908
909 /*
e3161323
MD
910 * Reap any LWPs left in p->p_lwps. This is usually
911 * just the last LWP. This must be done before
912 * we loop on p_lock since the lwps hold a ref on
913 * it as a vmspace interlock.
914 *
915 * Once that is accomplished p_nthreads had better
916 * be zero.
917 */
3e291793
MD
918 while ((lp = RB_ROOT(&p->p_lwp_tree)) != NULL) {
919 lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
920 reaplwp(lp);
921 }
e3161323
MD
922 KKASSERT(p->p_nthreads == 0);
923
924 /*
925 * Don't do anything really bad until all references
926 * to the process go away. This may include other
927 * LWPs which are still in the process of being
928 * reaped. We can't just pull the rug out from under
929 * them because they may still be using the VM space.
930 *
931 * Certain kernel facilities such as /proc will also
932 * put a hold on the process for short periods of
933 * time.
c008d3ad 934 */
0730ed66 935 PRELE(p);
82354ad8 936 PSTALL(p, "reap3", 0);
c1102e9f 937
9697c509
DRJ
938 /* Take care of our return values. */
939 *res = p->p_pid;
52cac9fb 940
9697c509
DRJ
941 if (status)
942 *status = p->p_xstat;
943 if (rusage)
fde7ac71 944 *rusage = p->p_ru;
984263bc
MD
945 /*
946 * If we got the child via a ptrace 'attach',
947 * we need to give it back to the old parent.
948 */
58c2553a 949 if (p->p_oppid && (t = pfind(p->p_oppid)) != NULL) {
0730ed66 950 PHOLD(p);
984263bc
MD
951 p->p_oppid = 0;
952 proc_reparent(p, t);
84204577 953 ksignal(t, SIGCHLD);
984263bc 954 wakeup((caddr_t)t);
3919ced0 955 error = 0;
58c2553a 956 PRELE(t);
eb2adbf5 957 lwkt_reltoken(&p->p_token);
0730ed66 958 PRELEZOMB(p);
3919ced0 959 goto done;
984263bc 960 }
3c8687d6
SS
961
962 /*
963 * Unlink the proc from its process group so that
964 * the following operations won't lead to an
965 * inconsistent state for processes running down
966 * the zombie list.
967 */
3c8687d6 968 proc_remove_zombie(p);
eb2adbf5 969 lwkt_reltoken(&p->p_token);
3c8687d6
SS
970 leavepgrp(p);
971
984263bc 972 p->p_xstat = 0;
fde7ac71 973 ruadd(&q->p_cru, &p->p_ru);
984263bc
MD
974
975 /*
976 * Decrement the count of procs running with this uid.
977 */
9697c509 978 chgproccnt(p->p_ucred->cr_ruidinfo, -1, 0);
984263bc
MD
979
980 /*
981 * Free up credentials.
982 */
41c20dac
MD
983 crfree(p->p_ucred);
984 p->p_ucred = NULL;
984263bc
MD
985
986 /*
987 * Remove unused arguments
988 */
e955543c
MD
989 pa = p->p_args;
990 p->p_args = NULL;
e955543c
MD
991 if (pa && refcount_release(&pa->ar_ref)) {
992 kfree(pa, M_PARGS);
993 pa = NULL;
994 }
6fa9e71a
MD
995
996 ps = p->p_sigacts;
997 p->p_sigacts = NULL;
998 if (ps && refcount_release(&ps->ps_refcnt)) {
999 kfree(ps, M_SUBPROC);
1000 ps = NULL;
984263bc
MD
1001 }
1002
49aa3df0 1003 /*
e22b17d7
MD
1004 * Our exitingcount was incremented when the process
1005 * became a zombie, now that the process has been
1006 * removed from (almost) all lists we should be able
1007 * to safely destroy its vmspace. Wait for any current
1008 * holders to go away (so the vmspace remains stable),
1009 * then scrap it.
49aa3df0 1010 */
82354ad8 1011 PSTALL(p, "reap4", 0);
e22b17d7 1012 vmspace_exitfree(p);
82354ad8 1013 PSTALL(p, "reap5", 0);
e22b17d7 1014
0730ed66
MD
1015 /*
1016 * NOTE: We have to officially release ZOMB in order
1017 * to ensure that a racing thread in kern_wait()
1018 * which blocked on ZOMB is woken up.
1019 */
1020 PHOLD(p);
1021 PRELEZOMB(p);
fb2a331e 1022 kfree(p, M_PROC);
8c2bce60 1023 atomic_add_int(&nprocs, -1);
3919ced0
MD
1024 error = 0;
1025 goto done;
984263bc 1026 }
4643740a
MD
1027 if (p->p_stat == SSTOP && (p->p_flags & P_WAITED) == 0 &&
1028 ((p->p_flags & P_TRACED) || (options & WUNTRACED))) {
0730ed66 1029 PHOLD(p);
8c986a82 1030 lwkt_gettoken(&p->p_token);
0730ed66
MD
1031 if (p->p_pptr != q) {
1032 lwkt_reltoken(&p->p_token);
1033 PRELE(p);
1034 goto loop;
1035 }
1036 if (p->p_stat != SSTOP ||
1037 (p->p_flags & P_WAITED) != 0 ||
1038 ((p->p_flags & P_TRACED) == 0 &&
1039 (options & WUNTRACED) == 0)) {
1040 lwkt_reltoken(&p->p_token);
1041 PRELE(p);
1042 goto loop;
1043 }
1044
4643740a 1045 p->p_flags |= P_WAITED;
9697c509
DRJ
1046
1047 *res = p->p_pid;
1048 if (status)
a89c93ee 1049 *status = W_STOPCODE(p->p_xstat);
9697c509
DRJ
1050 /* Zero rusage so we get something consistent. */
1051 if (rusage)
8075c3b8 1052 bzero(rusage, sizeof(*rusage));
3919ced0 1053 error = 0;
8c986a82 1054 lwkt_reltoken(&p->p_token);
0730ed66 1055 PRELE(p);
3919ced0 1056 goto done;
984263bc 1057 }
4643740a 1058 if ((options & WCONTINUED) && (p->p_flags & P_CONTINUED)) {
0730ed66 1059 PHOLD(p);
8c986a82 1060 lwkt_gettoken(&p->p_token);
0730ed66
MD
1061 if (p->p_pptr != q) {
1062 lwkt_reltoken(&p->p_token);
1063 PRELE(p);
1064 goto loop;
1065 }
1066 if ((p->p_flags & P_CONTINUED) == 0) {
1067 lwkt_reltoken(&p->p_token);
1068 PRELE(p);
1069 goto loop;
1070 }
1071
cc162105 1072 *res = p->p_pid;
4643740a 1073 p->p_flags &= ~P_CONTINUED;
cc162105
PA
1074
1075 if (status)
1076 *status = SIGCONT;
3919ced0 1077 error = 0;
8c986a82 1078 lwkt_reltoken(&p->p_token);
0730ed66 1079 PRELE(p);
3919ced0 1080 goto done;
cc162105 1081 }
984263bc 1082 }
3919ced0
MD
1083 if (nfound == 0) {
1084 error = ECHILD;
1085 goto done;
1086 }
9697c509
DRJ
1087 if (options & WNOHANG) {
1088 *res = 0;
3919ced0
MD
1089 error = 0;
1090 goto done;
984263bc 1091 }
58c2553a
MD
1092
1093 /*
1094 * Wait for signal - interlocked using q->p_token.
1095 */
1096 error = tsleep(q, PCATCH, "wait", 0);
3919ced0
MD
1097 if (error) {
1098done:
b5c4d81f 1099 lwkt_reltoken(&q->p_token);
984263bc 1100 return (error);
3919ced0 1101 }
984263bc
MD
1102 goto loop;
1103}
1104
1105/*
55c81f71 1106 * Change child's parent process to parent.
7e90d791
MD
1107 *
1108 * p_children/p_sibling requires the parent's token, and
1109 * changing pptr requires the child's token, so we have to
55c81f71
MD
1110 * get three tokens to do this operation. We also need to
1111 * hold pointers that might get ripped out from under us to
1112 * preserve structural integrity.
1113 *
1114 * It is possible to race another reparent or disconnect or other
1115 * similar operation. We must retry when this situation occurs.
1116 * Once we successfully reparent the process we no longer care
1117 * about any races.
984263bc
MD
1118 */
1119void
77153250 1120proc_reparent(struct proc *child, struct proc *parent)
984263bc 1121{
55c81f71 1122 struct proc *opp;
7e90d791 1123
b5c4d81f 1124 PHOLD(parent);
55c81f71
MD
1125 while ((opp = child->p_pptr) != parent) {
1126 PHOLD(opp);
1127 lwkt_gettoken(&opp->p_token);
1128 lwkt_gettoken(&child->p_token);
1129 lwkt_gettoken(&parent->p_token);
1130 if (child->p_pptr != opp) {
1131 lwkt_reltoken(&parent->p_token);
1132 lwkt_reltoken(&child->p_token);
1133 lwkt_reltoken(&opp->p_token);
1134 PRELE(opp);
1135 continue;
1136 }
1137 LIST_REMOVE(child, p_sibling);
1138 LIST_INSERT_HEAD(&parent->p_children, child, p_sibling);
1139 child->p_pptr = parent;
1140 lwkt_reltoken(&parent->p_token);
1141 lwkt_reltoken(&child->p_token);
1142 lwkt_reltoken(&opp->p_token);
1143 if (LIST_EMPTY(&opp->p_children))
1144 wakeup(opp);
1145 PRELE(opp);
1146 break;
1147 }
b5c4d81f 1148 PRELE(parent);
984263bc
MD
1149}
1150
1151/*
1152 * The next two functions are to handle adding/deleting items on the
1153 * exit callout list
1154 *
1155 * at_exit():
1156 * Take the arguments given and put them onto the exit callout list,
1157 * However first make sure that it's not already there.
1158 * returns 0 on success.
1159 */
1160
1161int
77153250 1162at_exit(exitlist_fn function)
984263bc
MD
1163{
1164 struct exitlist *ep;
1165
1166#ifdef INVARIANTS
1167 /* Be noisy if the programmer has lost track of things */
1168 if (rm_at_exit(function))
6ea70f76 1169 kprintf("WARNING: exit callout entry (%p) already present\n",
984263bc
MD
1170 function);
1171#endif
efda3bd0 1172 ep = kmalloc(sizeof(*ep), M_ATEXIT, M_NOWAIT);
984263bc
MD
1173 if (ep == NULL)
1174 return (ENOMEM);
1175 ep->function = function;
1176 TAILQ_INSERT_TAIL(&exit_list, ep, next);
1177 return (0);
1178}
1179
1180/*
1181 * Scan the exit callout list for the given item and remove it.
1182 * Returns the number of items removed (0 or 1)
1183 */
1184int
77153250 1185rm_at_exit(exitlist_fn function)
984263bc
MD
1186{
1187 struct exitlist *ep;
1188
1189 TAILQ_FOREACH(ep, &exit_list, next) {
1190 if (ep->function == function) {
1191 TAILQ_REMOVE(&exit_list, ep, next);
efda3bd0 1192 kfree(ep, M_ATEXIT);
984263bc
MD
1193 return(1);
1194 }
1195 }
1196 return (0);
1197}
1198
70d3d461
SS
1199/*
1200 * LWP reaper related code.
1201 */
70d3d461
SS
1202static void
1203reaplwps(void *context, int dummy)
1204{
1205 struct lwplist *lwplist = context;
1206 struct lwp *lp;
1207
b5c4d81f 1208 lwkt_gettoken(&deadlwp_token);
70d3d461 1209 while ((lp = LIST_FIRST(lwplist))) {
3e291793
MD
1210 LIST_REMOVE(lp, u.lwp_reap_entry);
1211 reaplwp(lp);
70d3d461 1212 }
b5c4d81f 1213 lwkt_reltoken(&deadlwp_token);
70d3d461
SS
1214}
1215
1216static void
3e291793
MD
1217reaplwp(struct lwp *lp)
1218{
2af9d75d
MD
1219 while (lwp_wait(lp) == 0)
1220 ;
3e291793
MD
1221 lwp_dispose(lp);
1222}
1223
1224static void
70d3d461
SS
1225deadlwp_init(void)
1226{
1227 int cpu;
1228
1229 for (cpu = 0; cpu < ncpus; cpu++) {
1230 LIST_INIT(&deadlwp_list[cpu]);
2af9d75d
MD
1231 deadlwp_task[cpu] = kmalloc(sizeof(*deadlwp_task[cpu]),
1232 M_DEVBUF, M_WAITOK);
70d3d461
SS
1233 TASK_INIT(deadlwp_task[cpu], 0, reaplwps, &deadlwp_list[cpu]);
1234 }
1235}
1236
1237SYSINIT(deadlwpinit, SI_SUB_CONFIGURE, SI_ORDER_ANY, deadlwp_init, NULL);