Added Interlocked*Pointer functions.
[wine/hacks.git] / scheduler / syslevel.c
blobf03d8dcd36ee247179ab1c3b93295bfb7e5f37eb
1 /*
2 * Win32 'syslevel' routines
4 * Copyright 1998 Ulrich Weigand
5 */
7 #include <unistd.h>
8 #include <sys/types.h>
9 #include "ntddk.h"
10 #include "syslevel.h"
11 #include "heap.h"
12 #include "stackframe.h"
13 #include "debugtools.h"
15 DEFAULT_DEBUG_CHANNEL(win32);
17 static SYSLEVEL Win16Mutex = { CRITICAL_SECTION_INIT, 1 };
19 /* Global variable to save current TEB while in 16-bit code */
20 WORD SYSLEVEL_Win16CurrentTeb = 0;
23 /************************************************************************
24 * GetpWin16Lock (KERNEL32.93)
26 VOID WINAPI GetpWin16Lock(SYSLEVEL **lock)
28 *lock = &Win16Mutex;
31 /************************************************************************
32 * GetpWin16Lock (KERNEL.449)
34 SEGPTR WINAPI GetpWin16Lock16(void)
36 static SEGPTR segpWin16Mutex;
37 if (!segpWin16Mutex)
39 SYSLEVEL **w16Mutex = SEGPTR_ALLOC(sizeof(SYSLEVEL *));
40 *w16Mutex = &Win16Mutex;
41 segpWin16Mutex = SEGPTR_GET(w16Mutex);
43 return segpWin16Mutex;
46 /************************************************************************
47 * _CreateSysLevel (KERNEL.438)
49 VOID WINAPI _CreateSysLevel(SYSLEVEL *lock, INT level)
51 InitializeCriticalSection( &lock->crst );
52 lock->level = level;
54 TRACE("(%p, %d): handle is %d\n",
55 lock, level, lock->crst.LockSemaphore );
58 /************************************************************************
59 * _EnterSysLevel (KERNEL32.97)
60 * _EnterSysLevel (KERNEL.439)
62 VOID WINAPI _EnterSysLevel(SYSLEVEL *lock)
64 TEB *teb = NtCurrentTeb();
65 int i;
67 TRACE("(%p, level %d): thread %p (fs %04x, pid %ld) count before %ld\n",
68 lock, lock->level, teb->tid, teb->teb_sel, (long) getpid(),
69 teb->sys_count[lock->level] );
71 for ( i = 3; i > lock->level; i-- )
72 if ( teb->sys_count[i] > 0 )
74 ERR("(%p, level %d): Holding %p, level %d. Expect deadlock!\n",
75 lock, lock->level, teb->sys_mutex[i], i );
78 EnterCriticalSection( &lock->crst );
80 teb->sys_count[lock->level]++;
81 teb->sys_mutex[lock->level] = lock;
83 TRACE("(%p, level %d): thread %p (fs %04x, pid %ld) count after %ld\n",
84 lock, lock->level, teb->tid, teb->teb_sel, (long) getpid(),
85 teb->sys_count[lock->level] );
87 if (lock == &Win16Mutex)
88 SYSLEVEL_Win16CurrentTeb = __get_fs();
91 /************************************************************************
92 * _LeaveSysLevel (KERNEL32.98)
93 * _LeaveSysLevel (KERNEL.440)
95 VOID WINAPI _LeaveSysLevel(SYSLEVEL *lock)
97 TEB *teb = NtCurrentTeb();
99 TRACE("(%p, level %d): thread %p (fs %04x, pid %ld) count before %ld\n",
100 lock, lock->level, teb->tid, teb->teb_sel, (long) getpid(),
101 teb->sys_count[lock->level] );
103 if ( teb->sys_count[lock->level] <= 0 || teb->sys_mutex[lock->level] != lock )
105 ERR("(%p, level %d): Invalid state: count %ld mutex %p.\n",
106 lock, lock->level, teb->sys_count[lock->level],
107 teb->sys_mutex[lock->level] );
109 else
111 if ( --teb->sys_count[lock->level] == 0 )
112 teb->sys_mutex[lock->level] = NULL;
115 LeaveCriticalSection( &lock->crst );
117 TRACE("(%p, level %d): thread %p (fs %04x, pid %ld) count after %ld\n",
118 lock, lock->level, teb->tid, teb->teb_sel, (long) getpid(),
119 teb->sys_count[lock->level] );
122 /************************************************************************
123 * @ (KERNEL32.86)
125 VOID WINAPI _KERNEL32_86(SYSLEVEL *lock)
127 _LeaveSysLevel(lock);
130 /************************************************************************
131 * _ConfirmSysLevel (KERNEL32.95)
132 * _ConfirmSysLevel (KERNEL.436)
134 DWORD WINAPI _ConfirmSysLevel(SYSLEVEL *lock)
136 if ( lock && lock->crst.OwningThread == GetCurrentThreadId() )
137 return lock->crst.RecursionCount;
138 else
139 return 0L;
142 /************************************************************************
143 * _CheckNotSysLevel (KERNEL32.94)
144 * _CheckNotSysLevel (KERNEL.437)
146 VOID WINAPI _CheckNotSysLevel(SYSLEVEL *lock)
148 FIXME("(%p)\n", lock);
152 /************************************************************************
153 * _EnterWin16Lock [KERNEL.480]
155 VOID WINAPI _EnterWin16Lock(void)
157 _EnterSysLevel(&Win16Mutex);
160 /************************************************************************
161 * _LeaveWin16Lock [KERNEL.481]
163 VOID WINAPI _LeaveWin16Lock(void)
165 _LeaveSysLevel(&Win16Mutex);
168 /************************************************************************
169 * _ConfirmWin16Lock (KERNEL32.96)
171 DWORD WINAPI _ConfirmWin16Lock(void)
173 return _ConfirmSysLevel(&Win16Mutex);
176 /************************************************************************
177 * ReleaseThunkLock (KERNEL32.48)
179 VOID WINAPI ReleaseThunkLock(DWORD *mutex_count)
181 DWORD count = _ConfirmSysLevel(&Win16Mutex);
182 *mutex_count = count;
184 while (count-- > 0)
185 _LeaveSysLevel(&Win16Mutex);
188 /************************************************************************
189 * RestoreThunkLock (KERNEL32.49)
191 VOID WINAPI RestoreThunkLock(DWORD mutex_count)
193 while (mutex_count-- > 0)
194 _EnterSysLevel(&Win16Mutex);
197 /************************************************************************
198 * SYSLEVEL_CheckNotLevel
200 VOID SYSLEVEL_CheckNotLevel( INT level )
202 INT i;
204 for ( i = 3; i >= level; i-- )
205 if ( NtCurrentTeb()->sys_count[i] > 0 )
207 ERR("(%d): Holding lock of level %d!\n",
208 level, i );
209 DbgBreakPoint();
210 break;