xref: /dragonfly/sys/kern/kern_exit.c (revision 0dace59e)
1 /*
2  * Copyright (c) 1982, 1986, 1989, 1991, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  * (c) UNIX System Laboratories, Inc.
5  * All or some portions of this file are derived from material licensed
6  * to the University of California by American Telephone and Telegraph
7  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8  * the permission of UNIX System Laboratories, Inc.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. Neither the name of the University nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  *
34  *	@(#)kern_exit.c	8.7 (Berkeley) 2/12/94
35  * $FreeBSD: src/sys/kern/kern_exit.c,v 1.92.2.11 2003/01/13 22:51:16 dillon Exp $
36  */
37 
38 #include "opt_compat.h"
39 #include "opt_ktrace.h"
40 
41 #include <sys/param.h>
42 #include <sys/systm.h>
43 #include <sys/sysproto.h>
44 #include <sys/kernel.h>
45 #include <sys/malloc.h>
46 #include <sys/proc.h>
47 #include <sys/ktrace.h>
48 #include <sys/pioctl.h>
49 #include <sys/tty.h>
50 #include <sys/wait.h>
51 #include <sys/vnode.h>
52 #include <sys/resourcevar.h>
53 #include <sys/signalvar.h>
54 #include <sys/taskqueue.h>
55 #include <sys/ptrace.h>
56 #include <sys/acct.h>		/* for acct_process() function prototype */
57 #include <sys/filedesc.h>
58 #include <sys/shm.h>
59 #include <sys/sem.h>
60 #include <sys/jail.h>
61 #include <sys/kern_syscall.h>
62 #include <sys/unistd.h>
63 #include <sys/eventhandler.h>
64 #include <sys/dsched.h>
65 
66 #include <vm/vm.h>
67 #include <vm/vm_param.h>
68 #include <sys/lock.h>
69 #include <vm/pmap.h>
70 #include <vm/vm_map.h>
71 #include <vm/vm_extern.h>
72 #include <sys/user.h>
73 
74 #include <sys/refcount.h>
75 #include <sys/thread2.h>
76 #include <sys/sysref2.h>
77 #include <sys/mplock2.h>
78 
79 #include <machine/vmm.h>
80 
81 static void reaplwps(void *context, int dummy);
82 static void reaplwp(struct lwp *lp);
83 static void killlwps(struct lwp *lp);
84 
85 static MALLOC_DEFINE(M_ATEXIT, "atexit", "atexit callback");
86 
87 static struct lwkt_token deadlwp_token = LWKT_TOKEN_INITIALIZER(deadlwp_token);
88 
89 /*
90  * callout list for things to do at exit time
91  */
92 struct exitlist {
93 	exitlist_fn function;
94 	TAILQ_ENTRY(exitlist) next;
95 };
96 
97 TAILQ_HEAD(exit_list_head, exitlist);
98 static struct exit_list_head exit_list = TAILQ_HEAD_INITIALIZER(exit_list);
99 
100 /*
101  * LWP reaper data
102  */
103 struct task *deadlwp_task[MAXCPU];
104 struct lwplist deadlwp_list[MAXCPU];
105 
106 /*
107  * exit --
108  *	Death of process.
109  *
110  * SYS_EXIT_ARGS(int rval)
111  */
112 int
113 sys_exit(struct exit_args *uap)
114 {
115 	exit1(W_EXITCODE(uap->rval, 0));
116 	/* NOTREACHED */
117 }
118 
119 /*
120  * Extended exit --
121  *	Death of a lwp or process with optional bells and whistles.
122  *
123  * MPALMOSTSAFE
124  */
125 int
126 sys_extexit(struct extexit_args *uap)
127 {
128 	struct proc *p = curproc;
129 	int action, who;
130 	int error;
131 
132 	action = EXTEXIT_ACTION(uap->how);
133 	who = EXTEXIT_WHO(uap->how);
134 
135 	/* Check parameters before we might perform some action */
136 	switch (who) {
137 	case EXTEXIT_PROC:
138 	case EXTEXIT_LWP:
139 		break;
140 	default:
141 		return (EINVAL);
142 	}
143 
144 	switch (action) {
145 	case EXTEXIT_SIMPLE:
146 		break;
147 	case EXTEXIT_SETINT:
148 		error = copyout(&uap->status, uap->addr, sizeof(uap->status));
149 		if (error)
150 			return (error);
151 		break;
152 	default:
153 		return (EINVAL);
154 	}
155 
156 	lwkt_gettoken(&p->p_token);
157 
158 	switch (who) {
159 	case EXTEXIT_LWP:
160 		/*
161 		 * Be sure only to perform a simple lwp exit if there is at
162 		 * least one more lwp in the proc, which will call exit1()
163 		 * later, otherwise the proc will be an UNDEAD and not even a
164 		 * SZOMB!
165 		 */
166 		if (p->p_nthreads > 1) {
167 			lwp_exit(0);	/* called w/ p_token held */
168 			/* NOT REACHED */
169 		}
170 		/* else last lwp in proc:  do the real thing */
171 		/* FALLTHROUGH */
172 	default:	/* to help gcc */
173 	case EXTEXIT_PROC:
174 		lwkt_reltoken(&p->p_token);
175 		exit1(W_EXITCODE(uap->status, 0));
176 		/* NOTREACHED */
177 	}
178 
179 	/* NOTREACHED */
180 	lwkt_reltoken(&p->p_token);	/* safety */
181 }
182 
183 /*
184  * Kill all lwps associated with the current process except the
185  * current lwp.   Return an error if we race another thread trying to
186  * do the same thing and lose the race.
187  *
188  * If forexec is non-zero the current thread and process flags are
189  * cleaned up so they can be reused.
190  *
191  * Caller must hold curproc->p_token
192  */
193 int
194 killalllwps(int forexec)
195 {
196 	struct lwp *lp = curthread->td_lwp;
197 	struct proc *p = lp->lwp_proc;
198 
199 	/*
200 	 * Interlock against P_WEXIT.  Only one of the process's thread
201 	 * is allowed to do the master exit.
202 	 */
203 	if (p->p_flags & P_WEXIT)
204 		return (EALREADY);
205 	p->p_flags |= P_WEXIT;
206 
207 	/*
208 	 * Interlock with LWP_MP_WEXIT and kill any remaining LWPs
209 	 */
210 	atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
211 	if (p->p_nthreads > 1)
212 		killlwps(lp);
213 
214 	/*
215 	 * If doing this for an exec, clean up the remaining thread
216 	 * (us) for continuing operation after all the other threads
217 	 * have been killed.
218 	 */
219 	if (forexec) {
220 		atomic_clear_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
221 		p->p_flags &= ~P_WEXIT;
222 	}
223 	return(0);
224 }
225 
226 /*
227  * Kill all LWPs except the current one.  Do not try to signal
228  * LWPs which have exited on their own or have already been
229  * signaled.
230  */
231 static void
232 killlwps(struct lwp *lp)
233 {
234 	struct proc *p = lp->lwp_proc;
235 	struct lwp *tlp;
236 
237 	/*
238 	 * Kill the remaining LWPs.  We must send the signal before setting
239 	 * LWP_MP_WEXIT.  The setting of WEXIT is optional but helps reduce
240 	 * races.  tlp must be held across the call as it might block and
241 	 * allow the target lwp to rip itself out from under our loop.
242 	 */
243 	FOREACH_LWP_IN_PROC(tlp, p) {
244 		LWPHOLD(tlp);
245 		lwkt_gettoken(&tlp->lwp_token);
246 		if ((tlp->lwp_mpflags & LWP_MP_WEXIT) == 0) {
247 			lwpsignal(p, tlp, SIGKILL);
248 			atomic_set_int(&tlp->lwp_mpflags, LWP_MP_WEXIT);
249 		}
250 		lwkt_reltoken(&tlp->lwp_token);
251 		LWPRELE(tlp);
252 	}
253 
254 	/*
255 	 * Wait for everything to clear out.
256 	 */
257 	while (p->p_nthreads > 1) {
258 		tsleep(&p->p_nthreads, 0, "killlwps", 0);
259 	}
260 }
261 
262 /*
263  * Exit: deallocate address space and other resources, change proc state
264  * to zombie, and unlink proc from allproc and parent's lists.  Save exit
265  * status and rusage for wait().  Check for child processes and orphan them.
266  */
267 void
268 exit1(int rv)
269 {
270 	struct thread *td = curthread;
271 	struct proc *p = td->td_proc;
272 	struct lwp *lp = td->td_lwp;
273 	struct proc *q;
274 	struct vmspace *vm;
275 	struct vnode *vtmp;
276 	struct exitlist *ep;
277 	int error;
278 
279 	lwkt_gettoken(&p->p_token);
280 
281 	if (p->p_pid == 1) {
282 		kprintf("init died (signal %d, exit %d)\n",
283 		    WTERMSIG(rv), WEXITSTATUS(rv));
284 		panic("Going nowhere without my init!");
285 	}
286 	varsymset_clean(&p->p_varsymset);
287 	lockuninit(&p->p_varsymset.vx_lock);
288 
289 	/*
290 	 * Kill all lwps associated with the current process, return an
291 	 * error if we race another thread trying to do the same thing
292 	 * and lose the race.
293 	 */
294 	error = killalllwps(0);
295 	if (error) {
296 		lwp_exit(0);
297 		/* NOT REACHED */
298 	}
299 
300 	/* are we a task leader? */
301 	if (p == p->p_leader) {
302         	struct kill_args killArgs;
303 		killArgs.signum = SIGKILL;
304 		q = p->p_peers;
305 		while(q) {
306 			killArgs.pid = q->p_pid;
307 			/*
308 		         * The interface for kill is better
309 			 * than the internal signal
310 			 */
311 			sys_kill(&killArgs);
312 			q = q->p_peers;
313 		}
314 		while (p->p_peers)
315 			tsleep((caddr_t)p, 0, "exit1", 0);
316 	}
317 
318 #ifdef PGINPROF
319 	vmsizmon();
320 #endif
321 	STOPEVENT(p, S_EXIT, rv);
322 	p->p_flags |= P_POSTEXIT;	/* stop procfs stepping */
323 
324 	/*
325 	 * Check if any loadable modules need anything done at process exit.
326 	 * e.g. SYSV IPC stuff
327 	 * XXX what if one of these generates an error?
328 	 */
329 	p->p_xstat = rv;
330 	EVENTHANDLER_INVOKE(process_exit, p);
331 
332 	/*
333 	 * XXX: imho, the eventhandler stuff is much cleaner than this.
334 	 *	Maybe we should move everything to use eventhandler.
335 	 */
336 	TAILQ_FOREACH(ep, &exit_list, next)
337 		(*ep->function)(td);
338 
339 	if (p->p_flags & P_PROFIL)
340 		stopprofclock(p);
341 
342 	SIGEMPTYSET(p->p_siglist);
343 	SIGEMPTYSET(lp->lwp_siglist);
344 	if (timevalisset(&p->p_realtimer.it_value))
345 		callout_stop_sync(&p->p_ithandle);
346 
347 	/*
348 	 * Reset any sigio structures pointing to us as a result of
349 	 * F_SETOWN with our pid.
350 	 */
351 	funsetownlst(&p->p_sigiolst);
352 
353 	/*
354 	 * Close open files and release open-file table.
355 	 * This may block!
356 	 */
357 	fdfree(p, NULL);
358 
359 	if(p->p_leader->p_peers) {
360 		q = p->p_leader;
361 		while(q->p_peers != p)
362 			q = q->p_peers;
363 		q->p_peers = p->p_peers;
364 		wakeup((caddr_t)p->p_leader);
365 	}
366 
367 	/*
368 	 * XXX Shutdown SYSV semaphores
369 	 */
370 	semexit(p);
371 
372 	KKASSERT(p->p_numposixlocks == 0);
373 
374 	/* The next two chunks should probably be moved to vmspace_exit. */
375 	vm = p->p_vmspace;
376 
377 	/*
378 	 * Clean up data related to virtual kernel operation.  Clean up
379 	 * any vkernel context related to the current lwp now so we can
380 	 * destroy p_vkernel.
381 	 */
382 	if (p->p_vkernel) {
383 		vkernel_lwp_exit(lp);
384 		vkernel_exit(p);
385 	}
386 
387 	/*
388 	 * Release user portion of address space.
389 	 * This releases references to vnodes,
390 	 * which could cause I/O if the file has been unlinked.
391 	 * Need to do this early enough that we can still sleep.
392 	 * Can't free the entire vmspace as the kernel stack
393 	 * may be mapped within that space also.
394 	 *
395 	 * Processes sharing the same vmspace may exit in one order, and
396 	 * get cleaned up by vmspace_exit() in a different order.  The
397 	 * last exiting process to reach this point releases as much of
398 	 * the environment as it can, and the last process cleaned up
399 	 * by vmspace_exit() (which decrements exitingcnt) cleans up the
400 	 * remainder.
401 	 */
402 	vmspace_exitbump(vm);
403 	sysref_put(&vm->vm_sysref);
404 
405 	if (SESS_LEADER(p)) {
406 		struct session *sp = p->p_session;
407 
408 		if (sp->s_ttyvp) {
409 			/*
410 			 * We are the controlling process.  Signal the
411 			 * foreground process group, drain the controlling
412 			 * terminal, and revoke access to the controlling
413 			 * terminal.
414 			 *
415 			 * NOTE: while waiting for the process group to exit
416 			 * it is possible that one of the processes in the
417 			 * group will revoke the tty, so the ttyclosesession()
418 			 * function will re-check sp->s_ttyvp.
419 			 */
420 			if (sp->s_ttyp && (sp->s_ttyp->t_session == sp)) {
421 				if (sp->s_ttyp->t_pgrp)
422 					pgsignal(sp->s_ttyp->t_pgrp, SIGHUP, 1);
423 				ttywait(sp->s_ttyp);
424 				ttyclosesession(sp, 1); /* also revoke */
425 			}
426 			/*
427 			 * Release the tty.  If someone has it open via
428 			 * /dev/tty then close it (since they no longer can
429 			 * once we've NULL'd it out).
430 			 */
431 			ttyclosesession(sp, 0);
432 
433 			/*
434 			 * s_ttyp is not zero'd; we use this to indicate
435 			 * that the session once had a controlling terminal.
436 			 * (for logging and informational purposes)
437 			 */
438 		}
439 		sp->s_leader = NULL;
440 	}
441 	fixjobc(p, p->p_pgrp, 0);
442 	(void)acct_process(p);
443 #ifdef KTRACE
444 	/*
445 	 * release trace file
446 	 */
447 	if (p->p_tracenode)
448 		ktrdestroy(&p->p_tracenode);
449 	p->p_traceflag = 0;
450 #endif
451 	/*
452 	 * Release reference to text vnode
453 	 */
454 	if ((vtmp = p->p_textvp) != NULL) {
455 		p->p_textvp = NULL;
456 		vrele(vtmp);
457 	}
458 
459 	/* Release namecache handle to text file */
460 	if (p->p_textnch.ncp)
461 		cache_drop(&p->p_textnch);
462 
463 	/*
464 	 * We have to handle PPWAIT here or proc_move_allproc_zombie()
465 	 * will block on the PHOLD() the parent is doing.
466 	 */
467 	if (p->p_flags & P_PPWAIT) {
468 		p->p_flags &= ~P_PPWAIT;
469 		wakeup(p->p_pptr);
470 	}
471 
472 	/*
473 	 * Move the process to the zombie list.  This will block
474 	 * until the process p_lock count reaches 0.  The process will
475 	 * not be reaped until TDF_EXITING is set by cpu_thread_exit(),
476 	 * which is called from cpu_proc_exit().
477 	 */
478 	proc_move_allproc_zombie(p);
479 
480 	/*
481 	 * Reparent all of this process's children to the init process.
482 	 * We must hold initproc->p_token in order to mess with
483 	 * initproc->p_children.  We already hold p->p_token (to remove
484 	 * the children from our list).
485 	 */
486 	q = LIST_FIRST(&p->p_children);
487 	if (q) {
488 		lwkt_gettoken(&initproc->p_token);
489 		while ((q = LIST_FIRST(&p->p_children)) != NULL) {
490 			PHOLD(q);
491 			lwkt_gettoken(&q->p_token);
492 			if (q != LIST_FIRST(&p->p_children)) {
493 				lwkt_reltoken(&q->p_token);
494 				PRELE(q);
495 				continue;
496 			}
497 			LIST_REMOVE(q, p_sibling);
498 			LIST_INSERT_HEAD(&initproc->p_children, q, p_sibling);
499 			q->p_pptr = initproc;
500 			q->p_sigparent = SIGCHLD;
501 
502 			/*
503 			 * Traced processes are killed
504 			 * since their existence means someone is screwing up.
505 			 */
506 			if (q->p_flags & P_TRACED) {
507 				q->p_flags &= ~P_TRACED;
508 				ksignal(q, SIGKILL);
509 			}
510 			lwkt_reltoken(&q->p_token);
511 			PRELE(q);
512 		}
513 		lwkt_reltoken(&initproc->p_token);
514 		wakeup(initproc);
515 	}
516 
517 	/*
518 	 * Save exit status and final rusage info, adding in child rusage
519 	 * info and self times.
520 	 */
521 	calcru_proc(p, &p->p_ru);
522 	ruadd(&p->p_ru, &p->p_cru);
523 
524 	/*
525 	 * notify interested parties of our demise.
526 	 */
527 	KNOTE(&p->p_klist, NOTE_EXIT);
528 
529 	/*
530 	 * Notify parent that we're gone.  If parent has the PS_NOCLDWAIT
531 	 * flag set, or if the handler is set to SIG_IGN, notify process 1
532 	 * instead (and hope it will handle this situation).
533 	 */
534 	if (p->p_pptr->p_sigacts->ps_flag & (PS_NOCLDWAIT | PS_CLDSIGIGN)) {
535 		proc_reparent(p, initproc);
536 	}
537 
538 	/* lwkt_gettoken(&proc_token); */
539 	q = p->p_pptr;
540 	PHOLD(q);
541 	if (p->p_sigparent && q != initproc) {
542 	        ksignal(q, p->p_sigparent);
543 	} else {
544 	        ksignal(q, SIGCHLD);
545 	}
546 
547 	p->p_flags &= ~P_TRACED;
548 	wakeup(p->p_pptr);
549 
550 	PRELE(q);
551 	/* lwkt_reltoken(&proc_token); */
552 	/* NOTE: p->p_pptr can get ripped out */
553 	/*
554 	 * cpu_exit is responsible for clearing curproc, since
555 	 * it is heavily integrated with the thread/switching sequence.
556 	 *
557 	 * Other substructures are freed from wait().
558 	 */
559 	plimit_free(p);
560 
561 	/*
562 	 * Finally, call machine-dependent code to release as many of the
563 	 * lwp's resources as we can and halt execution of this thread.
564 	 */
565 	lwp_exit(1);
566 }
567 
568 /*
569  * Eventually called by every exiting LWP
570  *
571  * p->p_token must be held.  mplock may be held and will be released.
572  */
573 void
574 lwp_exit(int masterexit)
575 {
576 	struct thread *td = curthread;
577 	struct lwp *lp = td->td_lwp;
578 	struct proc *p = lp->lwp_proc;
579 	int dowake = 0;
580 
581 	/*
582 	 * Release the current user process designation on the process so
583 	 * the userland scheduler can work in someone else.
584 	 */
585 	p->p_usched->release_curproc(lp);
586 
587 	/*
588 	 * lwp_exit() may be called without setting LWP_MP_WEXIT, so
589 	 * make sure it is set here.
590 	 */
591 	ASSERT_LWKT_TOKEN_HELD(&p->p_token);
592 	atomic_set_int(&lp->lwp_mpflags, LWP_MP_WEXIT);
593 
594 	/*
595 	 * Clean up any virtualization
596 	 */
597 	if (lp->lwp_vkernel)
598 		vkernel_lwp_exit(lp);
599 
600 	if (td->td_vmm)
601 		vmm_vmdestroy();
602 
603 	/*
604 	 * Clean up select/poll support
605 	 */
606 	kqueue_terminate(&lp->lwp_kqueue);
607 
608 	/*
609 	 * Clean up any syscall-cached ucred
610 	 */
611 	if (td->td_ucred) {
612 		crfree(td->td_ucred);
613 		td->td_ucred = NULL;
614 	}
615 
616 	/*
617 	 * Nobody actually wakes us when the lock
618 	 * count reaches zero, so just wait one tick.
619 	 */
620 	while (lp->lwp_lock > 0)
621 		tsleep(lp, 0, "lwpexit", 1);
622 
623 	/* Hand down resource usage to our proc */
624 	ruadd(&p->p_ru, &lp->lwp_ru);
625 
626 	/*
627 	 * If we don't hold the process until the LWP is reaped wait*()
628 	 * may try to dispose of its vmspace before all the LWPs have
629 	 * actually terminated.
630 	 */
631 	PHOLD(p);
632 
633 	/*
634 	 * Do any remaining work that might block on us.  We should be
635 	 * coded such that further blocking is ok after decrementing
636 	 * p_nthreads but don't take the chance.
637 	 */
638 	dsched_exit_thread(td);
639 	biosched_done(curthread);
640 
641 	/*
642 	 * We have to use the reaper for all the LWPs except the one doing
643 	 * the master exit.  The LWP doing the master exit can just be
644 	 * left on p_lwps and the process reaper will deal with it
645 	 * synchronously, which is much faster.
646 	 *
647 	 * Wakeup anyone waiting on p_nthreads to drop to 1 or 0.
648 	 *
649 	 * The process is left held until the reaper calls lwp_dispose() on
650 	 * the lp (after calling lwp_wait()).
651 	 */
652 	if (masterexit == 0) {
653 		lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
654 		--p->p_nthreads;
655 		if (p->p_nthreads <= 1)
656 			dowake = 1;
657 		lwkt_gettoken(&deadlwp_token);
658 		LIST_INSERT_HEAD(&deadlwp_list[mycpuid], lp, u.lwp_reap_entry);
659 		taskqueue_enqueue(taskqueue_thread[mycpuid],
660 				  deadlwp_task[mycpuid]);
661 		lwkt_reltoken(&deadlwp_token);
662 	} else {
663 		--p->p_nthreads;
664 		if (p->p_nthreads <= 1)
665 			dowake = 1;
666 	}
667 
668 	/*
669 	 * Release p_token.  Issue the wakeup() on p_nthreads if necessary,
670 	 * as late as possible to give us a chance to actually deschedule and
671 	 * switch away before another cpu core hits reaplwp().
672 	 */
673 	lwkt_reltoken(&p->p_token);
674 	if (dowake)
675 		wakeup(&p->p_nthreads);
676 
677 	/*
678 	 * Tell the userland scheduler that we are going away
679 	 */
680 	p->p_usched->heuristic_exiting(lp, p);
681 
682 	cpu_lwp_exit();
683 }
684 
685 /*
686  * Wait until a lwp is completely dead.  The final interlock in this drama
687  * is when TDF_EXITING is set in cpu_thread_exit() just before the final
688  * switchout.
689  *
690  * At the point TDF_EXITING is set a complete exit is accomplished when
691  * TDF_RUNNING and TDF_PREEMPT_LOCK are both clear.  td_mpflags has two
692  * post-switch interlock flags that can be used to wait for the TDF_
693  * flags to clear.
694  *
695  * Returns non-zero on success, and zero if the caller needs to retry
696  * the lwp_wait().
697  */
698 static int
699 lwp_wait(struct lwp *lp)
700 {
701 	struct thread *td = lp->lwp_thread;
702 	u_int mpflags;
703 
704 	KKASSERT(lwkt_preempted_proc() != lp);
705 
706 	/*
707 	 * This bit of code uses the thread destruction interlock
708 	 * managed by lwkt_switch_return() to wait for the lwp's
709 	 * thread to completely disengage.
710 	 *
711 	 * It is possible for us to race another cpu core so we
712 	 * have to do this correctly.
713 	 */
714 	for (;;) {
715 		mpflags = td->td_mpflags;
716 		cpu_ccfence();
717 		if (mpflags & TDF_MP_EXITSIG)
718 			break;
719 		tsleep_interlock(td, 0);
720 		if (atomic_cmpset_int(&td->td_mpflags, mpflags,
721 				      mpflags | TDF_MP_EXITWAIT)) {
722 			tsleep(td, PINTERLOCKED, "lwpxt", 0);
723 		}
724 	}
725 
726 	/*
727 	 * We've already waited for the core exit but there can still
728 	 * be other refs from e.g. process scans and such.
729 	 */
730 	if (lp->lwp_lock > 0) {
731 		tsleep(lp, 0, "lwpwait1", 1);
732 		return(0);
733 	}
734 	if (td->td_refs) {
735 		tsleep(td, 0, "lwpwait2", 1);
736 		return(0);
737 	}
738 
739 	/*
740 	 * Now that we have the thread destruction interlock these flags
741 	 * really should already be cleaned up, keep a check for safety.
742 	 *
743 	 * We can't rip its stack out from under it until TDF_EXITING is
744 	 * set and both TDF_RUNNING and TDF_PREEMPT_LOCK are clear.
745 	 * TDF_PREEMPT_LOCK must be checked because TDF_RUNNING
746 	 * will be cleared temporarily if a thread gets preempted.
747 	 */
748 	while ((td->td_flags & (TDF_RUNNING |
749 			        TDF_PREEMPT_LOCK |
750 			        TDF_EXITING)) != TDF_EXITING) {
751 		tsleep(lp, 0, "lwpwait3", 1);
752 		return (0);
753 	}
754 
755 	KASSERT((td->td_flags & (TDF_RUNQ|TDF_TSLEEPQ)) == 0,
756 		("lwp_wait: td %p (%s) still on run or sleep queue",
757 		td, td->td_comm));
758 	return (1);
759 }
760 
761 /*
762  * Release the resources associated with a lwp.
763  * The lwp must be completely dead.
764  */
765 void
766 lwp_dispose(struct lwp *lp)
767 {
768 	struct thread *td = lp->lwp_thread;
769 
770 	KKASSERT(lwkt_preempted_proc() != lp);
771 	KKASSERT(td->td_refs == 0);
772 	KKASSERT((td->td_flags & (TDF_RUNNING |
773 				  TDF_PREEMPT_LOCK |
774 				  TDF_EXITING)) == TDF_EXITING);
775 
776 	PRELE(lp->lwp_proc);
777 	lp->lwp_proc = NULL;
778 	if (td != NULL) {
779 		td->td_proc = NULL;
780 		td->td_lwp = NULL;
781 		lp->lwp_thread = NULL;
782 		lwkt_free_thread(td);
783 	}
784 	kfree(lp, M_LWP);
785 }
786 
787 /*
788  * MPSAFE
789  */
790 int
791 sys_wait4(struct wait_args *uap)
792 {
793 	struct rusage rusage;
794 	int error, status;
795 
796 	error = kern_wait(uap->pid, (uap->status ? &status : NULL),
797 			  uap->options, (uap->rusage ? &rusage : NULL),
798 			  &uap->sysmsg_result);
799 
800 	if (error == 0 && uap->status)
801 		error = copyout(&status, uap->status, sizeof(*uap->status));
802 	if (error == 0 && uap->rusage)
803 		error = copyout(&rusage, uap->rusage, sizeof(*uap->rusage));
804 	return (error);
805 }
806 
807 /*
808  * wait1()
809  *
810  * wait_args(int pid, int *status, int options, struct rusage *rusage)
811  *
812  * MPALMOSTSAFE
813  */
814 int
815 kern_wait(pid_t pid, int *status, int options, struct rusage *rusage, int *res)
816 {
817 	struct thread *td = curthread;
818 	struct lwp *lp;
819 	struct proc *q = td->td_proc;
820 	struct proc *p, *t;
821 	struct pargs *pa;
822 	struct sigacts *ps;
823 	int nfound, error;
824 
825 	if (pid == 0)
826 		pid = -q->p_pgid;
827 	if (options &~ (WUNTRACED|WNOHANG|WCONTINUED|WLINUXCLONE))
828 		return (EINVAL);
829 
830 	lwkt_gettoken(&q->p_token);
831 loop:
832 	/*
833 	 * All sorts of things can change due to blocking so we have to loop
834 	 * all the way back up here.
835 	 *
836 	 * The problem is that if a process group is stopped and the parent
837 	 * is doing a wait*(..., WUNTRACED, ...), it will see the STOP
838 	 * of the child and then stop itself when it tries to return from the
839 	 * system call.  When the process group is resumed the parent will
840 	 * then get the STOP status even though the child has now resumed
841 	 * (a followup wait*() will get the CONT status).
842 	 *
843 	 * Previously the CONT would overwrite the STOP because the tstop
844 	 * was handled within tsleep(), and the parent would only see
845 	 * the CONT when both are stopped and continued together.  This little
846 	 * two-line hack restores this effect.
847 	 */
848 	while (q->p_stat == SSTOP)
849             tstop();
850 
851 	nfound = 0;
852 
853 	/*
854 	 * Loop on children.
855 	 *
856 	 * NOTE: We don't want to break q's p_token in the loop for the
857 	 *	 case where no children are found or we risk breaking the
858 	 *	 interlock between child and parent.
859 	 */
860 	LIST_FOREACH(p, &q->p_children, p_sibling) {
861 		if (pid != WAIT_ANY &&
862 		    p->p_pid != pid && p->p_pgid != -pid) {
863 			continue;
864 		}
865 
866 		/*
867 		 * This special case handles a kthread spawned by linux_clone
868 		 * (see linux_misc.c).  The linux_wait4 and linux_waitpid
869 		 * functions need to be able to distinguish between waiting
870 		 * on a process and waiting on a thread.  It is a thread if
871 		 * p_sigparent is not SIGCHLD, and the WLINUXCLONE option
872 		 * signifies we want to wait for threads and not processes.
873 		 */
874 		if ((p->p_sigparent != SIGCHLD) ^
875 		    ((options & WLINUXCLONE) != 0)) {
876 			continue;
877 		}
878 
879 		nfound++;
880 		if (p->p_stat == SZOMB) {
881 			/*
882 			 * We may go into SZOMB with threads still present.
883 			 * We must wait for them to exit before we can reap
884 			 * the master thread, otherwise we may race reaping
885 			 * non-master threads.
886 			 *
887 			 * Only this routine can remove a process from
888 			 * the zombie list and destroy it, use PACQUIREZOMB()
889 			 * to serialize us and loop if it blocks (interlocked
890 			 * by the parent's q->p_token).
891 			 *
892 			 * WARNING!  (p) can be invalid when PHOLDZOMB(p)
893 			 *	     returns non-zero.  Be sure not to
894 			 *	     mess with it.
895 			 */
896 			if (PHOLDZOMB(p))
897 				goto loop;
898 			lwkt_gettoken(&p->p_token);
899 			if (p->p_pptr != q) {
900 				lwkt_reltoken(&p->p_token);
901 				PRELEZOMB(p);
902 				goto loop;
903 			}
904 			while (p->p_nthreads > 0) {
905 				tsleep(&p->p_nthreads, 0, "lwpzomb", hz);
906 			}
907 
908 			/*
909 			 * Reap any LWPs left in p->p_lwps.  This is usually
910 			 * just the last LWP.  This must be done before
911 			 * we loop on p_lock since the lwps hold a ref on
912 			 * it as a vmspace interlock.
913 			 *
914 			 * Once that is accomplished p_nthreads had better
915 			 * be zero.
916 			 */
917 			while ((lp = RB_ROOT(&p->p_lwp_tree)) != NULL) {
918 				lwp_rb_tree_RB_REMOVE(&p->p_lwp_tree, lp);
919 				reaplwp(lp);
920 			}
921 			KKASSERT(p->p_nthreads == 0);
922 
923 			/*
924 			 * Don't do anything really bad until all references
925 			 * to the process go away.  This may include other
926 			 * LWPs which are still in the process of being
927 			 * reaped.  We can't just pull the rug out from under
928 			 * them because they may still be using the VM space.
929 			 *
930 			 * Certain kernel facilities such as /proc will also
931 			 * put a hold on the process for short periods of
932 			 * time.
933 			 */
934 			PRELE(p);
935 			PSTALL(p, "reap3", 0);
936 
937 			/* Take care of our return values. */
938 			*res = p->p_pid;
939 
940 			if (status)
941 				*status = p->p_xstat;
942 			if (rusage)
943 				*rusage = p->p_ru;
944 			/*
945 			 * If we got the child via a ptrace 'attach',
946 			 * we need to give it back to the old parent.
947 			 */
948 			if (p->p_oppid && (t = pfind(p->p_oppid)) != NULL) {
949 				PHOLD(p);
950 				p->p_oppid = 0;
951 				proc_reparent(p, t);
952 				ksignal(t, SIGCHLD);
953 				wakeup((caddr_t)t);
954 				error = 0;
955 				PRELE(t);
956 				lwkt_reltoken(&p->p_token);
957 				PRELEZOMB(p);
958 				goto done;
959 			}
960 
961 			/*
962 			 * Unlink the proc from its process group so that
963 			 * the following operations won't lead to an
964 			 * inconsistent state for processes running down
965 			 * the zombie list.
966 			 */
967 			proc_remove_zombie(p);
968 			lwkt_reltoken(&p->p_token);
969 			leavepgrp(p);
970 
971 			p->p_xstat = 0;
972 			ruadd(&q->p_cru, &p->p_ru);
973 
974 			/*
975 			 * Decrement the count of procs running with this uid.
976 			 */
977 			chgproccnt(p->p_ucred->cr_ruidinfo, -1, 0);
978 
979 			/*
980 			 * Free up credentials.
981 			 */
982 			crfree(p->p_ucred);
983 			p->p_ucred = NULL;
984 
985 			/*
986 			 * Remove unused arguments
987 			 */
988 			pa = p->p_args;
989 			p->p_args = NULL;
990 			if (pa && refcount_release(&pa->ar_ref)) {
991 				kfree(pa, M_PARGS);
992 				pa = NULL;
993 			}
994 
995 			ps = p->p_sigacts;
996 			p->p_sigacts = NULL;
997 			if (ps && refcount_release(&ps->ps_refcnt)) {
998 				kfree(ps, M_SUBPROC);
999 				ps = NULL;
1000 			}
1001 
1002 			/*
1003 			 * Our exitingcount was incremented when the process
1004 			 * became a zombie, now that the process has been
1005 			 * removed from (almost) all lists we should be able
1006 			 * to safely destroy its vmspace.  Wait for any current
1007 			 * holders to go away (so the vmspace remains stable),
1008 			 * then scrap it.
1009 			 */
1010 			PSTALL(p, "reap4", 0);
1011 			vmspace_exitfree(p);
1012 			PSTALL(p, "reap5", 0);
1013 
1014 			/*
1015 			 * NOTE: We have to officially release ZOMB in order
1016 			 *	 to ensure that a racing thread in kern_wait()
1017 			 *	 which blocked on ZOMB is woken up.
1018 			 */
1019 			PHOLD(p);
1020 			PRELEZOMB(p);
1021 			kfree(p, M_PROC);
1022 			atomic_add_int(&nprocs, -1);
1023 			error = 0;
1024 			goto done;
1025 		}
1026 		if (p->p_stat == SSTOP && (p->p_flags & P_WAITED) == 0 &&
1027 		    ((p->p_flags & P_TRACED) || (options & WUNTRACED))) {
1028 			PHOLD(p);
1029 			lwkt_gettoken(&p->p_token);
1030 			if (p->p_pptr != q) {
1031 				lwkt_reltoken(&p->p_token);
1032 				PRELE(p);
1033 				goto loop;
1034 			}
1035 			if (p->p_stat != SSTOP ||
1036 			    (p->p_flags & P_WAITED) != 0 ||
1037 			    ((p->p_flags & P_TRACED) == 0 &&
1038 			     (options & WUNTRACED) == 0)) {
1039 				lwkt_reltoken(&p->p_token);
1040 				PRELE(p);
1041 				goto loop;
1042 			}
1043 
1044 			p->p_flags |= P_WAITED;
1045 
1046 			*res = p->p_pid;
1047 			if (status)
1048 				*status = W_STOPCODE(p->p_xstat);
1049 			/* Zero rusage so we get something consistent. */
1050 			if (rusage)
1051 				bzero(rusage, sizeof(*rusage));
1052 			error = 0;
1053 			lwkt_reltoken(&p->p_token);
1054 			PRELE(p);
1055 			goto done;
1056 		}
1057 		if ((options & WCONTINUED) && (p->p_flags & P_CONTINUED)) {
1058 			PHOLD(p);
1059 			lwkt_gettoken(&p->p_token);
1060 			if (p->p_pptr != q) {
1061 				lwkt_reltoken(&p->p_token);
1062 				PRELE(p);
1063 				goto loop;
1064 			}
1065 			if ((p->p_flags & P_CONTINUED) == 0) {
1066 				lwkt_reltoken(&p->p_token);
1067 				PRELE(p);
1068 				goto loop;
1069 			}
1070 
1071 			*res = p->p_pid;
1072 			p->p_flags &= ~P_CONTINUED;
1073 
1074 			if (status)
1075 				*status = SIGCONT;
1076 			error = 0;
1077 			lwkt_reltoken(&p->p_token);
1078 			PRELE(p);
1079 			goto done;
1080 		}
1081 	}
1082 	if (nfound == 0) {
1083 		error = ECHILD;
1084 		goto done;
1085 	}
1086 	if (options & WNOHANG) {
1087 		*res = 0;
1088 		error = 0;
1089 		goto done;
1090 	}
1091 
1092 	/*
1093 	 * Wait for signal - interlocked using q->p_token.
1094 	 */
1095 	error = tsleep(q, PCATCH, "wait", 0);
1096 	if (error) {
1097 done:
1098 		lwkt_reltoken(&q->p_token);
1099 		return (error);
1100 	}
1101 	goto loop;
1102 }
1103 
1104 /*
1105  * Change child's parent process to parent.
1106  *
1107  * p_children/p_sibling requires the parent's token, and
1108  * changing pptr requires the child's token, so we have to
1109  * get three tokens to do this operation.  We also need to
1110  * hold pointers that might get ripped out from under us to
1111  * preserve structural integrity.
1112  *
1113  * It is possible to race another reparent or disconnect or other
1114  * similar operation.  We must retry when this situation occurs.
1115  * Once we successfully reparent the process we no longer care
1116  * about any races.
1117  */
1118 void
1119 proc_reparent(struct proc *child, struct proc *parent)
1120 {
1121 	struct proc *opp;
1122 
1123 	PHOLD(parent);
1124 	while ((opp = child->p_pptr) != parent) {
1125 		PHOLD(opp);
1126 		lwkt_gettoken(&opp->p_token);
1127 		lwkt_gettoken(&child->p_token);
1128 		lwkt_gettoken(&parent->p_token);
1129 		if (child->p_pptr != opp) {
1130 			lwkt_reltoken(&parent->p_token);
1131 			lwkt_reltoken(&child->p_token);
1132 			lwkt_reltoken(&opp->p_token);
1133 			PRELE(opp);
1134 			continue;
1135 		}
1136 		LIST_REMOVE(child, p_sibling);
1137 		LIST_INSERT_HEAD(&parent->p_children, child, p_sibling);
1138 		child->p_pptr = parent;
1139 		lwkt_reltoken(&parent->p_token);
1140 		lwkt_reltoken(&child->p_token);
1141 		lwkt_reltoken(&opp->p_token);
1142 		if (LIST_EMPTY(&opp->p_children))
1143 			wakeup(opp);
1144 		PRELE(opp);
1145 		break;
1146 	}
1147 	PRELE(parent);
1148 }
1149 
1150 /*
1151  * The next two functions are to handle adding/deleting items on the
1152  * exit callout list
1153  *
1154  * at_exit():
1155  * Take the arguments given and put them onto the exit callout list,
1156  * However first make sure that it's not already there.
1157  * returns 0 on success.
1158  */
1159 
1160 int
1161 at_exit(exitlist_fn function)
1162 {
1163 	struct exitlist *ep;
1164 
1165 #ifdef INVARIANTS
1166 	/* Be noisy if the programmer has lost track of things */
1167 	if (rm_at_exit(function))
1168 		kprintf("WARNING: exit callout entry (%p) already present\n",
1169 		    function);
1170 #endif
1171 	ep = kmalloc(sizeof(*ep), M_ATEXIT, M_NOWAIT);
1172 	if (ep == NULL)
1173 		return (ENOMEM);
1174 	ep->function = function;
1175 	TAILQ_INSERT_TAIL(&exit_list, ep, next);
1176 	return (0);
1177 }
1178 
1179 /*
1180  * Scan the exit callout list for the given item and remove it.
1181  * Returns the number of items removed (0 or 1)
1182  */
1183 int
1184 rm_at_exit(exitlist_fn function)
1185 {
1186 	struct exitlist *ep;
1187 
1188 	TAILQ_FOREACH(ep, &exit_list, next) {
1189 		if (ep->function == function) {
1190 			TAILQ_REMOVE(&exit_list, ep, next);
1191 			kfree(ep, M_ATEXIT);
1192 			return(1);
1193 		}
1194 	}
1195 	return (0);
1196 }
1197 
1198 /*
1199  * LWP reaper related code.
1200  */
1201 static void
1202 reaplwps(void *context, int dummy)
1203 {
1204 	struct lwplist *lwplist = context;
1205 	struct lwp *lp;
1206 
1207 	lwkt_gettoken(&deadlwp_token);
1208 	while ((lp = LIST_FIRST(lwplist))) {
1209 		LIST_REMOVE(lp, u.lwp_reap_entry);
1210 		reaplwp(lp);
1211 	}
1212 	lwkt_reltoken(&deadlwp_token);
1213 }
1214 
1215 static void
1216 reaplwp(struct lwp *lp)
1217 {
1218 	while (lwp_wait(lp) == 0)
1219 		;
1220 	lwp_dispose(lp);
1221 }
1222 
1223 static void
1224 deadlwp_init(void)
1225 {
1226 	int cpu;
1227 
1228 	for (cpu = 0; cpu < ncpus; cpu++) {
1229 		LIST_INIT(&deadlwp_list[cpu]);
1230 		deadlwp_task[cpu] = kmalloc(sizeof(*deadlwp_task[cpu]),
1231 					    M_DEVBUF, M_WAITOK);
1232 		TASK_INIT(deadlwp_task[cpu], 0, reaplwps, &deadlwp_list[cpu]);
1233 	}
1234 }
1235 
1236 SYSINIT(deadlwpinit, SI_SUB_CONFIGURE, SI_ORDER_ANY, deadlwp_init, NULL);
1237