Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1787 lines
44 KiB

/*==========================================================================
*
* Copyright (C) 1999-2000 Microsoft Corporation. All Rights Reserved.
*
* File: OSInd.cpp
* Content: OS indirection functions to abstract OS specific items.
*
* History:
* Date By Reason
* ==== == ======
* 07/12/99 jtk Created
* 09/21/99 rodtoll Fixed for retail builds
* 09/22/99 jtk Added callstacks to memory allocations
* 08/28/2000 masonb Voice Merge: Allow new and delete with size of 0
* 11/28/2000 rodtoll: WinBug #206257 - Retail DPNET.DLL links to DebugBreak()
* 12/22/2000 aarono: ManBug # 190380 use process heap for retail.
***************************************************************************/
#include "dncmni.h"
#define PROF_SECT "DirectPlay8"
//**********************************************************************
// Constant definitions
//**********************************************************************
//
// CRC key for validating memory linkages
// Signature for validating memory blocks
//
#ifdef _WIN64
#define MEMORY_CRC 0X5AA55AA55AA55AA5
#define GUARD_SIGNATURE 0x0F1E2D3C4B5A6978
#else
#define MEMORY_CRC 0X5AA55AA5
#define GUARD_SIGNATURE 0x0F1E2D3C
#endif // _WIN64
static CRITICAL_SECTION g_AllocatedMemoryLock;
//
// signature for validating memory blocks
//
//
// enumerated values to indicate how to report memory leaks
//
#if defined( DN_MEMORY_TRACKING ) || defined( DN_CRITICAL_SECTION_TRACKING )
#define MEMORY_LEAK_REPORT_NONE 0x00000000
#define MEMORY_LEAK_REPORT_DPF 0x00000001
#define MEMORY_LEAK_REPORT_DIALOG 0x00000002
#endif
//**********************************************************************
// Macro definitions
//**********************************************************************
//
// Macro to compute the offset of an element inside of a larger structure.
// Copied from MSDEV's STDLIB.H and modified to return INT_PTR
//
#define OFFSETOF(s,m) ( ( INT_PTR ) &( ( (s*) 0 )->m ) )
//
// macro for length of array
//
#define LENGTHOF( arg ) ( sizeof( arg ) / sizeof( arg[ 0 ] ) )
//
// ASSERT macro
//
#ifdef _DEBUG
#ifdef _X86_
#define ASSERT( arg ) if ( arg == FALSE ) { _asm { int 3 }; }
#else
#define ASSERT( arg ) if ( arg == FALSE ) { DebugBreak(); }
#endif
#else // _DEBUG
#define ASSERT( arg )
#endif //_DEBUG
//**********************************************************************
// Structure definitions
//**********************************************************************
//**********************************************************************
// Variable definitions
//**********************************************************************
//
// debug variable to make sure we're initialized before having any functions
// called
//
DEBUG_ONLY( static BOOL g_fOSIndirectionLayerInitialized = FALSE );
//
// time variables
//
static DNCRITICAL_SECTION g_TimeLock;
static DWORD g_dwLastTimeCall = 0;
#ifdef DN_CRITICAL_SECTION_TRACKING
CBilink g_blCritSecs;
DNCRITICAL_SECTION g_CSLock;
#endif
#ifdef DN_MEMORY_TRACKING
DWORD g_dwMemLeakDisplayFlags = MEMORY_LEAK_REPORT_DPF;
#endif
//
// OS items
//
static OSVERSIONINFO g_OSVersionInfo;
static HINSTANCE g_hApplicationInstance;
//
// memory heap
//
HANDLE g_hMemoryHeap = NULL;
PSECURITY_ATTRIBUTES g_psa = NULL;
SECURITY_ATTRIBUTES g_sa;
BYTE g_pSD[SECURITY_DESCRIPTOR_MIN_LENGTH];
BOOL g_fDaclInited = FALSE;
//**********************************************************************
// Function prototypes
//**********************************************************************
#ifdef DN_MEMORY_TRACKING
static int DisplayMemoryLeaks( void );
BOOL DNMemoryTrackInitialize( void );
#endif
#if defined( DN_MEMORY_TRACKING ) || defined( DN_CRITICAL_SECTION_TRACKING )
static int DisplayCallStack( const char *const pszMsg,
const char *const pszTitle,
const char *const pCallStack );
#endif
//**********************************************************************
// Function definitions
//**********************************************************************
typedef BOOL (WINAPI *PFNINITCRITSECANDSPINCOUNT)(LPCRITICAL_SECTION lpCriticalSection, DWORD dwSpinCount);
PFNINITCRITSECANDSPINCOUNT g_pfnInitializeCriticalSectionAndSpinCount = NULL;
//**********************************************************************
// ------------------------------
// DNOSIndirectionInit - initialize the OS indirection layer
//
// Entry: Nothing
//
// Exit: Boolean indicating success
// TRUE = initialization successful
// FALSE = initialization unsuccessful
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSIndirectionInit"
BOOL DNOSIndirectionInit( void )
{
BOOL fReturn;
DNASSERT( g_fOSIndirectionLayerInitialized == FALSE );
//
// initialize
//
fReturn = TRUE;
//
// note OS version
//
memset( &g_OSVersionInfo, 0x00, sizeof( g_OSVersionInfo ) );
g_OSVersionInfo.dwOSVersionInfoSize = sizeof( g_OSVersionInfo );
if ( GetVersionEx( &g_OSVersionInfo ) == FALSE )
{
return FALSE;
}
HMODULE hKernel32 = GetModuleHandleA("kernel32.dll");
if (hKernel32 != NULL)
{
g_pfnInitializeCriticalSectionAndSpinCount = (PFNINITCRITSECANDSPINCOUNT) GetProcAddress(hKernel32, "InitializeCriticalSectionAndSpinCount");
}
//
// note application instance
//
g_hApplicationInstance = GetModuleHandle( NULL );
if ( g_hApplicationInstance == NULL )
{
DWORD dwError;
dwError = GetLastError();
DPFX(DPFPREP, 0, "Failed to GetModuleHandle: 0x%x", dwError );
goto Failure;
}
#ifdef DN_MEMORY_TRACKING
g_dwMemLeakDisplayFlags = GetProfileIntA( PROF_SECT, "MemoryLeakOutput", MEMORY_LEAK_REPORT_DPF );
#endif
//
// intialize critical section tracking code before anything else!
//
#ifdef DN_CRITICAL_SECTION_TRACKING
g_blCritSecs.Initialize();
if ( DNInitializeCriticalSection(&g_CSLock) == FALSE )
{
DPFX(DPFPREP, 0, "Failed to initialize critical section tracking code!" );
DNASSERT( FALSE );
goto Failure;
}
#endif // DN_CRITICAL_SECTION_TRACKING
//
// intiailize memory tracking before creating new memory heap
//
#ifdef DN_MEMORY_TRACKING
if ( DNMemoryTrackInitialize() == FALSE )
{
DPFX(DPFPREP, 0, "Failed to initialize memory tracking code!" );
DNASSERT( FALSE );
goto Failure;
}
#endif // DN_MEMORY_TRACKING
DNASSERT( g_hMemoryHeap == NULL );
#ifdef _DEBUG
g_hMemoryHeap = HeapCreate( 0, // flags (none)
0, // initial size (default)
0 // maximum heap size (allow heap to grow)
);
#else
g_hMemoryHeap = GetProcessHeap();
#endif
if ( g_hMemoryHeap == NULL )
{
DPFX(DPFPREP, 0, "Failed to create memory heap!" );
goto Failure;
}
//
// get initial time for timebase
//
g_dwLastTimeCall = GETTIMESTAMP();
if ( DNInitializeCriticalSection( &g_TimeLock ) == FALSE )
{
goto Failure;
}
goto Exit;
Exit:
if ( fReturn != FALSE )
{
DEBUG_ONLY( g_fOSIndirectionLayerInitialized = TRUE );
}
return fReturn;
Failure:
fReturn = FALSE;
DNOSIndirectionDeinit();
goto Exit;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNOSIndirectionDeinit - deinitialize OS indirection layer
//
// Entry: Nothing
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSIndirectionDeinit"
void DNOSIndirectionDeinit( void )
{
//
// clean up time management resources
//
DNDeleteCriticalSection( &g_TimeLock );
#ifdef DN_CRITICAL_SECTION_TRACKING
//
// Display CritSec leaks before displaying memory leaks, because displaying memory leaks
// may free the memory for the CritSec and corrupt the CritSec bilink
//
BOOL fDisplayLeaks = TRUE;
DNEnterCriticalSection(&g_CSLock);
CBilink* pblCS = g_blCritSecs.GetNext();
while (pblCS != &g_blCritSecs)
{
UINT_PTR MessageReturn;
char CallStackBuffer[ CALLSTACK_BUFFER_SIZE ];
char LeakSizeString[ 50 ];
char DialogTitle[ 1000 ];
DNCRITICAL_SECTION* pCS = CONTAINING_RECORD(pblCS, DNCRITICAL_SECTION, blCritSec);
#ifdef _IA64_
wsprintf( LeakSizeString, "Critical Section leaked at address 0x%p!\n", pCS );
#else
wsprintf( LeakSizeString, "Critical Section leaked at address 0x%08x!\n", pCS );
#endif
strcpy( DialogTitle, "DirectPlay8 critical section leak detected!");
pCS->AllocCallStack.GetCallStackString( CallStackBuffer );
if ( ( g_dwMemLeakDisplayFlags & MEMORY_LEAK_REPORT_DPF ) != 0 )
{
DPFX(DPFPREP, 0, "%s%s%s\n", DialogTitle, LeakSizeString, CallStackBuffer );
}
if ( ( g_dwMemLeakDisplayFlags & MEMORY_LEAK_REPORT_DIALOG ) != 0 )
{
if ( fDisplayLeaks != FALSE )
{
MessageReturn = DisplayCallStack( LeakSizeString, DialogTitle, CallStackBuffer );
switch ( MessageReturn )
{
//
// stop application now
//
case IDABORT:
{
fDisplayLeaks = FALSE;
break;
}
//
// display next leak
//
case IDIGNORE:
{
break;
}
//
// stop in the debugger
//
case IDRETRY:
{
DNASSERT( FALSE );
break;
}
//
// unknown
//
default:
{
DNASSERT( FALSE );
break;
}
}
}
}
pblCS = pblCS->GetNext();
}
DNLeaveCriticalSection(&g_CSLock);
DNDeleteCriticalSection( &g_CSLock );
#endif // DN_CRITICAL_SECTION_TRACKING
//
// Report memory leaks, validate the heap if we're on NT and then destroy
// the heap.
//
if ( g_hMemoryHeap != NULL )
{
//
// report memory leaks, if applicable
//
#ifdef DN_MEMORY_TRACKING
DNMemoryTrackDisplayMemoryLeaks();
DeleteCriticalSection( &g_AllocatedMemoryLock );
#endif // DN_MEMORY_TRACKING
//
// Validate heap contents before shutdown. This code only works on NT.
//
#ifdef _DEBUG
if ( DNGetOSType() == VER_PLATFORM_WIN32_NT)
{
//
// Check heap
//
if ( HeapValidate( g_hMemoryHeap, 0, NULL ) == FALSE )
{
DPFX(DPFPREP, 0, "Problem validating heap on destroy!" );
}
}
//
// destroy heap - debug only, we use the process heap for retail.
//
if ( HeapDestroy( g_hMemoryHeap ) == FALSE )
{
DWORD dwErrorReturn;
dwErrorReturn = GetLastError();
DPFX(DPFPREP, 0, "Problem destroying heap in DNOSIndirectionDeinit!" );
DisplayErrorCode( 0, dwErrorReturn );
}
#endif _DEBUG
g_hMemoryHeap = NULL;
}
//
// clean critical section management resources
//
DEBUG_ONLY( g_fOSIndirectionLayerInitialized = FALSE );
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNGetOSType - get OS type
//
// Entry: Nothing
//
// Exit: OS type
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetOSType"
UINT_PTR DNGetOSType( void )
{
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
return g_OSVersionInfo.dwPlatformId;
}
//**********************************************************************
// ------------------------------
// DNOSIsXPOrGreater - return TRUE if OS is WindowsXP or later or NT flavor
//
// Entry: Nothing
//
// Exit: BOOL
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNOSIsXPOrGreater"
BOOL DNOSIsXPOrGreater( void )
{
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
return ((g_OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT) &&
((g_OSVersionInfo.dwMajorVersion > 5) || ((g_OSVersionInfo.dwMajorVersion == 5) && (g_OSVersionInfo.dwMinorVersion >= 1)))
);
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNGetNullDacl - get a SECURITY_ATTRIBUTE structure that specifies a
// NULL DACL which is accesible by all users.
//
// Entry: Nothing
//
// Exit: PSECURITY_ATTRIBUTES
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetNullDacl"
PSECURITY_ATTRIBUTES DNGetNullDacl()
{
// This is done to make this function independent of DNOSIndirectionInit so that the debug
// layer can call it before the indirection layer is initialized.
if (!g_fDaclInited)
{
if (!InitializeSecurityDescriptor((SECURITY_DESCRIPTOR*)g_pSD, SECURITY_DESCRIPTOR_REVISION))
{
DPFX(DPFPREP, 0, "Failed to initialize security descriptor" );
}
else
{
// Add a NULL DACL to the security descriptor..
if (!SetSecurityDescriptorDacl((SECURITY_DESCRIPTOR*)g_pSD, TRUE, (PACL) NULL, FALSE))
{
DPFX(DPFPREP, 0, "Failed to set NULL DACL on security descriptor" );
}
else
{
g_sa.nLength = sizeof(SECURITY_ATTRIBUTES);
g_sa.lpSecurityDescriptor = g_pSD;
g_sa.bInheritHandle = FALSE;
g_psa = &g_sa;
}
}
g_fDaclInited = TRUE;
}
return g_psa;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNGetApplcationInstance - application instance
//
// Entry: Nothing
//
// Exit: Application instance
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNGetApplicationInstance"
HINSTANCE DNGetApplicationInstance( void )
{
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
return g_hApplicationInstance;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNTimeGet - get time in milliseconds
//
// Entry: Pointer to destination time
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNTimeGet"
void DNTimeGet( DN_TIME *const pTimeDestination )
{
static DN_TIME Time = { 0 };
DN_TIME DeltaT;
DWORD dwCurrentTime;
DNASSERT( pTimeDestination != NULL );
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
DNEnterCriticalSection( &g_TimeLock );
//
// we'll assume that we're getting called more than once every 40 days
// so time wraps can be easily accounted for
//
dwCurrentTime = GETTIMESTAMP();
DeltaT.Time32.TimeHigh = 0;
DeltaT.Time32.TimeLow = dwCurrentTime - g_dwLastTimeCall;
if ( DeltaT.Time32.TimeLow > 0x7FFFFFFF )
{
DNASSERT( FALSE );
DeltaT.Time32.TimeLow = -static_cast<INT>( DeltaT.Time32.TimeLow );
}
g_dwLastTimeCall = dwCurrentTime;
DNTimeAdd( &Time, &DeltaT, &Time );
DBG_CASSERT( sizeof( *pTimeDestination ) == sizeof( Time ) );
memcpy( pTimeDestination, &Time, sizeof( *pTimeDestination ) );
DNLeaveCriticalSection( &g_TimeLock );
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNTimeCompare - compare two times
//
// Entry: Pointer to time1
// Pointer to time2
//
// Exit: Value indicating relative magnitude
// -1 = *pTime1 < *pTime2
// 0 = *pTime1 == *pTime2
// 1 = *pTime1 > *pTime2
//
// Notes: This function comes in 32-bit and 64-bit flavors. This function
// will result in a compile error if compiled on an unsupported platform.
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNTimeCompare"
INT_PTR DNTimeCompare( const DN_TIME *const pTime1, const DN_TIME *const pTime2 )
{
UINT_PTR iReturnValue;
DNASSERT( pTime1 != NULL );
DNASSERT( pTime2 != NULL );
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#pragma TODO( johnkan, "Should this be inlined?" )
//#ifdef _WIN32
if ( pTime1->Time32.TimeHigh < pTime2->Time32.TimeHigh )
{
iReturnValue = -1;
}
else
{
if ( pTime1->Time32.TimeHigh > pTime2->Time32.TimeHigh )
{
iReturnValue = 1;
}
else
{
if ( pTime1->Time32.TimeLow < pTime2->Time32.TimeLow )
{
iReturnValue = -1;
}
else
{
if ( pTime1->Time32.TimeLow == pTime2->Time32.TimeLow )
{
iReturnValue = 0;
}
else
{
iReturnValue = 1;
}
}
}
}
//#endif // _WIN32
//#ifdef _WIN64
// // debug me!
// DNASSERT( FALSE );
//
// if ( pTime1->Time < pTime2->Time )
// {
// iReturnValue = -1;
// }
// else
// {
// if ( pTime1->Time == pTime2->Time )
// {
// iReturnValue = 0;
// }
// else
// {
// iReturnValue = 1;
// }
// }
//#endif // _WIN64
return iReturnValue;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNTimeAdd - add two times
//
// Entry: Pointer to time1
// Pointer to time2
// Pointer to time result
//
// Exit: Nothing
//
// Note: This function assumes that the time calculation won't wrap!
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNTimeAdd"
void DNTimeAdd( const DN_TIME *const pTime1, const DN_TIME *const pTime2, DN_TIME *const pTimeResult )
{
DNASSERT( pTime1 != NULL );
DNASSERT( pTime2 != NULL );
DNASSERT( pTimeResult != NULL );
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#pragma TODO( johnkan, "Should this be inlined?" )
#ifdef _X86_
_asm { mov ecx, pTime1
mov eax, ( DN_TIME [ ecx ] ).Time32.TimeLow;
mov edx, ( DN_TIME [ ecx ] ).Time32.TimeHigh
mov ecx, pTime2
add eax, ( DN_TIME [ ecx ] ).Time32.TimeLow
adc edx, ( DN_TIME [ ecx ] ).Time32.TimeHigh
mov ecx, pTimeResult
mov ( DN_TIME [ ecx ] ).Time32.TimeLow, eax
mov ( DN_TIME [ ecx ] ).Time32.TimeHigh, edx
};
#else // _X86_
/*
#ifdef _ALPHA_
// debug me
DebugBreak();
__asm{ mov $t0, *pTime1
mov $t1, *pTime2
addq $t0, $t1
mov *pTimeResult, $t0
};
#else // _ALPHA_
*/
//#ifdef _WIN32
DWORD dwTempLowTime;
dwTempLowTime = pTime1->Time32.TimeLow;
pTimeResult->Time32.TimeLow = pTime1->Time32.TimeLow + pTime2->Time32.TimeLow;
pTimeResult->Time32.TimeHigh = pTime1->Time32.TimeHigh + pTime2->Time32.TimeHigh;
//
// check for overflow in low 32-bits and increment high value if applicable
//
if ( pTimeResult->Time32.TimeLow < dwTempLowTime )
{
pTimeResult->Time32.TimeHigh++;
}
//#endif // _WIN32
//#ifdef _WIN64
// DEBUG_ONLY( UINT_PTR ReferenceTime );
//
// // debug me!
// DNASSERT( FALSE );
//
// DEBUG_ONLY( ReferenceTime = pTime1->Time );
// *pTimeResult = pTime1->Time + pTime2->Time;
// DNASSERT( *pTimeResult >= ReferenceTime );
//
//#endif // _WIN64
// #endif // _ALPHA_
#endif // _X86_
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNTimeSubtract - subtract two times
//
// Entry: Pointer to time1
// Pointer to time2
// Pointer to time result
//
// Exit: Nothing
//
// Notes: This function assumes no underflow!
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNTimeSubtract"
void DNTimeSubtract( const DN_TIME *const pTime1, const DN_TIME *const pTime2, DN_TIME *const pTimeResult )
{
DNASSERT( pTime1 != NULL );
DNASSERT( pTime2 != NULL );
DNASSERT( pTimeResult != NULL );
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#pragma TODO( johnkan, "Should this be inlined?" )
#ifdef _X86_
_asm { mov ecx, pTime1
mov eax, ( DN_TIME [ ecx ] ).Time32.TimeLow
mov edx, ( DN_TIME [ ecx ] ).Time32.TimeHigh
mov ecx, pTime2
sub eax, ( DN_TIME [ ecx ] ).Time32.TimeLow
sbb edx, ( DN_TIME [ ecx ] ).Time32.TimeHigh
mov ecx, pTimeResult
mov ( DN_TIME [ ecx ] ).Time32.TimeLow, eax
mov ( DN_TIME [ ecx ] ).Time32.TimeHigh, edx
};
#else // _X86_
/*
#ifdef _ALPHA_
// debug me
DebugBreak();
mov $t0, *pTime1
mov $t1, *pTime2
addq $t0, $t1
mov *pTimeResult, $t0
#else // _ALPHA_
*/
//#ifdef _WIN32
DWORD dwTempLowTime;
dwTempLowTime = pTime1->Time32.TimeLow;
pTimeResult->Time32.TimeLow = pTime1->Time32.TimeLow - pTime2->Time32.TimeLow;
pTimeResult->Time32.TimeHigh = pTime1->Time32.TimeHigh - pTime2->Time32.TimeHigh;
//
// check for underflow in low 32-bits and decrement high value if applicable
//
if ( pTimeResult->Time32.TimeLow > dwTempLowTime )
{
pTimeResult->Time32.TimeHigh--;
}
//#endif // _WIN32
//#ifdef _WIN64
// // debug me!
// DNASSERT( FALSE );
//
// DNASSERT( pTime1->Time > pTime2->Time );
// pTimeResult = pTime1->Time - pTime2->Time;
//#endif // _WIN64
// #endif // _ALPHA_
#endif // _X86_
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNInitializeCriticalSection - initialize a critical section
//
// Entry: Pointer to critical section
//
// Exit: Boolean indicating success
// TRUE = success
// FALSE = failue
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNInitializeCriticalSection"
BOOL DNInitializeCriticalSection( DNCRITICAL_SECTION *const pCriticalSection )
{
BOOL fReturn;
DNASSERT( pCriticalSection != NULL );
fReturn = TRUE;
memset( pCriticalSection, 0x00, sizeof( *pCriticalSection ) );
#ifdef DN_CRITICAL_SECTION_TRACKING
pCriticalSection->OwningThreadID = DN_INVALID_THREAD_ID;
pCriticalSection->MaxLockCount = -1;
#endif // DN_CRITICAL_SECTION_TRACKING
//
// attempt to enter the critical section once
//
_try
{
// Do this for Win95 support only
if (g_pfnInitializeCriticalSectionAndSpinCount)
{
// Pre-allocate the critsec event by setting the high bit of the spin count and set spin to 1000
// Win98 and up map calls to this function to InitializeCriticalSection which makes sense since
// 9x only uses one processor. NT also converts the spin to 0 for single proc machines.
fReturn = g_pfnInitializeCriticalSectionAndSpinCount( &pCriticalSection->CriticalSection , 0x80000000 | 1000);
// Believe it or not Win9x defines this function as returning VOID so its return value is garbage
if (g_OSVersionInfo.dwPlatformId != VER_PLATFORM_WIN32_NT)
{
fReturn = TRUE;
}
}
else
{
InitializeCriticalSection( &pCriticalSection->CriticalSection );
}
}
_except( EXCEPTION_EXECUTE_HANDLER )
{
fReturn = FALSE;
}
_try
{
if (fReturn)
{
EnterCriticalSection( &pCriticalSection->CriticalSection );
}
}
_except( EXCEPTION_EXECUTE_HANDLER )
{
DeleteCriticalSection(&pCriticalSection->CriticalSection);
fReturn = FALSE;
}
//
// if we didn't fail on entering the critical section, make sure
// we release it
//
if ( fReturn != FALSE )
{
LeaveCriticalSection( &pCriticalSection->CriticalSection );
#ifdef DN_CRITICAL_SECTION_TRACKING
pCriticalSection->AllocCallStack.NoteCurrentCallStack();
// NOTE: We will not add g_CSLock to our list
if (pCriticalSection != &g_CSLock)
{
DNEnterCriticalSection(&g_CSLock);
pCriticalSection->blCritSec.InsertBefore(&g_blCritSecs);
DNLeaveCriticalSection(&g_CSLock);
}
#endif
}
return fReturn;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNDeleteCriticalSection - delete a critical section
//
// Entry: Pointer to critical section
//
// Exit: Nothing
//
// Notes: This function wrapping is overkill, but we're closing down so
// the overhead is negligible.
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNDeleteCriticalSection"
void DNDeleteCriticalSection( DNCRITICAL_SECTION *const pCriticalSection )
{
DNASSERT( pCriticalSection != NULL );
DNASSERT( g_fOSIndirectionLayerInitialized != FALSE );
#ifdef DN_CRITICAL_SECTION_TRACKING
DNASSERT( pCriticalSection->LockCount == 0 );
// NOTE: We will not remove g_CSLock from our list since we never added it
if (pCriticalSection != &g_CSLock)
{
DNEnterCriticalSection(&g_CSLock);
pCriticalSection->blCritSec.RemoveFromList();
DNLeaveCriticalSection(&g_CSLock);
}
#endif
DeleteCriticalSection( &pCriticalSection->CriticalSection );
memset( &pCriticalSection->CriticalSection, 0x00, sizeof( pCriticalSection->CriticalSection ) );
}
//**********************************************************************
#ifdef DN_MEMORY_TRACKING
//**********************************************************************
//**
//** THIS IS THE MEMORY TRACKING SECTION. ONLY ADD FUNCTIONS HERE THAT ARE
//** FOR MEMORY TRACKING!!
//**
//**********************************************************************
//
// Structure prepended to memory allocations to check for leaks.
// Disable warning 4200 (zero sized structure elements).
//
#pragma warning ( disable : 4200 )
typedef struct _MEMORY_LINK
{
public:
void Initialize( void )
{
m_pNext = this;
m_pPrev = this;
}
BOOL IsValid( void ) const
{
return ( m_Checksum == ( reinterpret_cast<UINT_PTR>( m_pPrev ) ^
reinterpret_cast<UINT_PTR>( m_pNext ) ^
m_Size ^
MEMORY_CRC ) );
}
void UpdateCRC( void )
{
m_Checksum = reinterpret_cast<UINT_PTR>( m_pPrev ) ^
reinterpret_cast<UINT_PTR>( m_pNext ) ^
m_Size ^
MEMORY_CRC;
}
BOOL IsEmpty( void ) { return ( ( m_pNext == this ) && ( m_pPrev == this ) ); }
_MEMORY_LINK *GetNext( void ) const { return m_pNext; }
_MEMORY_LINK *GetPrev( void ) const { return m_pPrev; }
void *GetDataPointer( void ) { return &m_Data[ sizeof( DWORD_PTR ) ]; }
static _MEMORY_LINK *PointerFromData( void *const pData )
{
return reinterpret_cast<_MEMORY_LINK*>( &( reinterpret_cast<BYTE*>( pData )[ - ( OFFSETOF( MEMORY_LINK, m_Data ) + static_cast<int>( sizeof( DWORD_PTR ) ) ) ] ) );
}
void SetSize( const UINT_PTR Size ){ m_Size = Size; }
UINT_PTR GetSize( void ) const { return m_Size; }
#undef DPF_MODNAME
#define DPF_MODNAME "_MEMORY_LINK::LinkAfterOther"
void LinkAfterOther( _MEMORY_LINK &OtherLink )
{
ASSERT( OtherLink.IsValid() != FALSE );
if ( OtherLink.m_pNext != NULL )
{
ASSERT( OtherLink.m_pNext->IsValid() != FALSE );
OtherLink.m_pNext->m_pPrev = this;
OtherLink.m_pNext->UpdateCRC();
}
m_pNext = OtherLink.m_pNext;
m_pPrev = &OtherLink;
UpdateCRC();
OtherLink.m_pNext = this;
OtherLink.UpdateCRC();
}
#undef DPF_MODNAME
#define DPF_MODNAME "_MEMORY_LINK::RemoveFromList"
void RemoveFromList( void )
{
ASSERT( IsValid() != FALSE );
ASSERT( m_pPrev != NULL );
if ( m_pNext != NULL )
{
ASSERT( m_pNext->IsValid() != FALSE );
m_pNext->m_pPrev = m_pPrev;
m_pNext->UpdateCRC();
}
ASSERT( m_pPrev->IsValid() != FALSE );
m_pPrev->m_pNext = m_pNext;
m_pPrev->UpdateCRC();
m_pNext = NULL;
m_pPrev = NULL;
}
void NoteCurrentCallStack( void ) { m_CallStack.NoteCurrentCallStack(); }
void GetCallStack( char *const pBuffer ) const { m_CallStack.GetCallStackString( pBuffer ); }
void SetOverrunSignatures( void )
{
*reinterpret_cast<DWORD_PTR*>( m_Data ) = GUARD_SIGNATURE;
// 6/30/2000(RichGr) - IA64: Specifying UNALIGNED generates the correct IA64 code for non-8-byte alignment.
*reinterpret_cast<UNALIGNED DWORD_PTR*>( &m_Data[ m_Size + sizeof( DWORD_PTR ) ] ) = GUARD_SIGNATURE;
}
BOOL UnderrunDetected( void ) const { return ( *reinterpret_cast<const DWORD_PTR*>( m_Data ) != GUARD_SIGNATURE ); }
// 6/30/2000(RichGr) - IA64: Specifying UNALIGNED generates the correct IA64 code for non-8-byte alignment.
BOOL OverrunDetected( void ) const { return ( *reinterpret_cast<const UNALIGNED DWORD_PTR*>( &m_Data[ m_Size + sizeof( DWORD_PTR ) ] ) != GUARD_SIGNATURE ); }
BOOL IsCorrupted( void ) const { return ( !IsValid() || UnderrunDetected() || OverrunDetected() ); }
protected:
private:
UINT_PTR m_Checksum;
UINT_PTR m_Size;
_MEMORY_LINK *m_pPrev;
_MEMORY_LINK *m_pNext;
CCallStack<DN_MEMORY_CALL_STACK_DEPTH> m_CallStack;
BYTE m_Data[];
} MEMORY_LINK;
#pragma warning ( default : 4200 )
//
// forward structure references
//
typedef struct _MEMORY_LINK MEMORY_LINK;
//
// memory tracking variables
//
static UINT_PTR g_uAllocatedMemoryCount;
static MEMORY_LINK g_AllocatedMemory;
//**********************************************************************
// ------------------------------
// DNMemoryTrackInitialize - initialize memory tracking
//
// Entry: Nothing
//
// Exit: Error code
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNMemoryTrackInitialize"
static BOOL DNMemoryTrackInitialize( void )
{
BOOL fReturn;
fReturn = TRUE;
memset( &g_AllocatedMemory, 0x00, sizeof ( g_AllocatedMemory ) );
g_uAllocatedMemoryCount = 0;
g_AllocatedMemory.Initialize();
g_AllocatedMemory.UpdateCRC();
InitializeCriticalSection( &g_AllocatedMemoryLock );
return fReturn;
}
//**********************************************************************
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNMemoryTrackHeapAlloc - allocate from heap and track allocations
//
// Entry: Size of memory to allocate
//
// Exit: Pointer to allocated memory
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNMemoryTrackHeapAlloc"
void *DNMemoryTrackHeapAlloc( const UINT_PTR Size )
{
UINT_PTR RequiredSize;
MEMORY_LINK *pMemoryLink;
void *pReturn;
//
// Voice and lobby currently try allocating 0 byte buffers, can't enable this check yet.
//
//ASSERT( Size > 0 );
RequiredSize = Size + sizeof( MEMORY_LINK ) + ( sizeof( DWORD_PTR ) * 2 );
DNMemoryTrackingValidateMemory();
pMemoryLink = static_cast<MEMORY_LINK*>( HeapAlloc( g_hMemoryHeap, 0, RequiredSize ) );
if ( pMemoryLink != NULL )
{
pMemoryLink->Initialize();
EnterCriticalSection( &g_AllocatedMemoryLock );
g_uAllocatedMemoryCount++;
pMemoryLink->SetSize( Size );
pMemoryLink->LinkAfterOther( g_AllocatedMemory );
pMemoryLink->NoteCurrentCallStack();
pMemoryLink->SetOverrunSignatures();
LeaveCriticalSection( &g_AllocatedMemoryLock );
pReturn = pMemoryLink->GetDataPointer();
}
else
{
pReturn = NULL;
}
return pReturn;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNMemoryTrackHeapReAlloc - reallocate from heap and track allocations
//
// Entry: Pointer to old memory
// Size of memory to allocate
//
// Exit: Pointer to allocated memory
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNMemoryTrackHeapReAlloc"
void *DNMemoryTrackHeapReAlloc( void *const pMemory, const UINT_PTR MemorySize )
{
UINT_PTR RequiredSize;
MEMORY_LINK *pMemoryLink;
void *pReturn;
ASSERT( pMemory != NULL );
//
// Voice and lobby currently try allocating 0 byte buffers, can't enable this check yet.
//
//ASSERT( MemorySize > 0 );
pMemoryLink = MEMORY_LINK::PointerFromData( pMemory );
DNMemoryTrackingValidateMemory();
EnterCriticalSection( &g_AllocatedMemoryLock );
g_uAllocatedMemoryCount--;
pMemoryLink->RemoveFromList();
pMemoryLink->SetSize( 0 );
LeaveCriticalSection( &g_AllocatedMemoryLock );
RequiredSize = MemorySize + sizeof( MEMORY_LINK ) + ( sizeof( DWORD_PTR ) * 2 );
pMemoryLink = static_cast<MEMORY_LINK*>( HeapReAlloc( g_hMemoryHeap, 0, pMemoryLink, RequiredSize ) );
if ( pMemoryLink != NULL )
{
EnterCriticalSection( &g_AllocatedMemoryLock );
g_uAllocatedMemoryCount++;
pMemoryLink->SetSize( MemorySize );
pMemoryLink->LinkAfterOther( g_AllocatedMemory );
pMemoryLink->SetOverrunSignatures();
LeaveCriticalSection( & g_AllocatedMemoryLock );
pReturn = pMemoryLink->GetDataPointer();
}
else
{
pReturn = NULL;
}
return pReturn;
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNMemoryTrackHeapFree - free from heap and track memory
//
// Entry: Pointer to old memory
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNMemoryTrackHeapFree"
void DNMemoryTrackHeapFree( void *const pMemory )
{
MEMORY_LINK *pMemoryLink;
ASSERT( pMemory != NULL );
DNMemoryTrackingValidateMemory();
pMemoryLink = MEMORY_LINK::PointerFromData( pMemory );
EnterCriticalSection( &g_AllocatedMemoryLock );
g_uAllocatedMemoryCount--;
pMemoryLink->RemoveFromList();
pMemoryLink->SetSize( 0 );
LeaveCriticalSection( &g_AllocatedMemoryLock );
HeapFree( g_hMemoryHeap, 0, pMemoryLink );
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNMemoryTrackValidateMemory - validate allocated memory
//
// Entry: Nothing
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNMemoryTrackingValidateMemory"
void DNMemoryTrackingValidateMemory( void )
{
MEMORY_LINK *pMemoryLink;
char CallStackBuffer[ CALLSTACK_BUFFER_SIZE ];
//
// validate all of the allocated memory
//
EnterCriticalSection( &g_AllocatedMemoryLock );
pMemoryLink = g_AllocatedMemory.GetNext();
while ( pMemoryLink != &g_AllocatedMemory )
{
if ( pMemoryLink->IsCorrupted() != FALSE )
{
UINT_PTR MessageReturn;
char MessageString[ 1000 ];
wsprintf( MessageString,
// 7/28/2000(a-JiTay): IA64: Use %p format specifier for 32/64-bit pointers and handles.
#ifdef _IA64_
// 8/05/2000(RichGr) - IA64: GetSize() returns UINT_PTR (64-bit), so we may as well handle in hex as %d expects a DWORD.
"Memory block: 0x%p\tAllocated size: 0x%p bytes\nCorruption Type: ",
#else
"Memory block: 0x%08x\tAllocated size: %d bytes\nCorruption Type: ",
#endif
pMemoryLink->GetDataPointer(),
pMemoryLink->GetSize() );
if ( !pMemoryLink->IsValid() )
{
strcat( MessageString, " ,INVALID LINK");
}
if ( pMemoryLink->UnderrunDetected() )
{
strcat( MessageString, " ,UNDERRUN DETECTED");
}
if ( pMemoryLink->OverrunDetected() )
{
strcat( MessageString, " ,OVERRUN DETECTED");
}
pMemoryLink->GetCallStack( CallStackBuffer );
MessageReturn = DisplayCallStack( MessageString, "Memory Corruption!", CallStackBuffer );
switch ( MessageReturn )
{
case IDABORT:
{
DNASSERT( FALSE );
break;
}
case IDIGNORE:
{
//
// You're probably going to get stopped in the heap
// manager!!!
//
break;
}
case IDRETRY:
{
DNASSERT( FALSE );
break;
}
}
}
pMemoryLink = pMemoryLink->GetNext();
}
LeaveCriticalSection( &g_AllocatedMemoryLock );
//
// ask the OS to validate the heap
//
if ( HeapValidate( g_hMemoryHeap, 0, NULL ) == FALSE )
{
DNASSERT( FALSE );
}
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNMemoryTrackDisplayMemoryLeaks - display memory leaks
//
// Entry: Nothing
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNMemoryTrackDisplayMemoryLeaks"
static void DNMemoryTrackDisplayMemoryLeaks( void )
{
BOOL fDisplayLeaks;
UINT_PTR uMaxMemoryLeakCount;
UINT_PTR uMemoryLeakIndex;
//
// initialize
//
fDisplayLeaks = TRUE;
uMaxMemoryLeakCount = g_uAllocatedMemoryCount;
uMemoryLeakIndex = 0;
//
// Check for outstanding memory allocations.
//
while ( g_AllocatedMemory.IsEmpty() == FALSE )
{
MEMORY_LINK *pTemp;
UINT_PTR MessageReturn;
char CallStackBuffer[ CALLSTACK_BUFFER_SIZE ];
char LeakSizeString[ 50 ];
char DialogTitle[ 1000 ];
pTemp = g_AllocatedMemory.GetNext();
uMemoryLeakIndex++;
// 7/28/2000(a-JiTay): IA64: Use %p format specifier for 32/64-bit pointers and handles.
#ifdef _IA64_
// 8/05/2000(RichGr) - IA64: GetSize() returns UINT_PTR (64-bit), so we may as well handle in hex as %d expects a DWORD.
wsprintf( LeakSizeString, "0x%p bytes leaked at address 0x%p!\n", pTemp->GetSize(), pTemp->GetDataPointer() );
#else
wsprintf( LeakSizeString, "%d bytes leaked at address 0x%08x!\n", pTemp->GetSize(), pTemp->GetDataPointer() );
#endif
wsprintf( DialogTitle,
"DirectPlay8 memory leak detected! ( #%d of %d )",
uMemoryLeakIndex,
uMaxMemoryLeakCount );
pTemp->GetCallStack( CallStackBuffer );
if ( ( g_dwMemLeakDisplayFlags & MEMORY_LEAK_REPORT_DPF ) != 0 )
{
DPFX(DPFPREP, 0, "%s%s%s\n", DialogTitle, LeakSizeString, CallStackBuffer );
}
if ( ( g_dwMemLeakDisplayFlags & MEMORY_LEAK_REPORT_DIALOG ) != 0 )
{
if ( fDisplayLeaks != FALSE )
{
MessageReturn = DisplayCallStack( LeakSizeString, DialogTitle, CallStackBuffer );
switch ( MessageReturn )
{
//
// stop application now
//
case IDABORT:
{
fDisplayLeaks = FALSE;
break;
}
//
// display next leak
//
case IDIGNORE:
{
break;
}
//
// stop in the debugger
//
case IDRETRY:
{
DNASSERT( FALSE );
break;
}
//
// unknown
//
default:
{
DNASSERT( FALSE );
break;
}
}
}
}
DNFree( pTemp->GetDataPointer() );
}
}
//**********************************************************************
//**********************************************************************
//**
//** THIS IS THE END OF THE MEMORY LOGGING SECTION.
//**
//**********************************************************************
#endif // DN_MEMORY_TRACKING
#if defined( DN_MEMORY_TRACKING ) || defined( DN_CRITICAL_SECTION_TRACKING )
//**********************************************************************
// ------------------------------
// DisplayCallStack - display a call stack message box
//
// Entry: Pointer to information string
// Pointer to title string
// Pointer to call stack string
//
// Exit: Dialog return code
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DisplayCallStack"
static int DisplayCallStack( const char *const pszMsg, const char *const pszTitle, const char *const pCallStackString )
{
MSGBOXPARAMS MessageBoxParams;
char szStackTraceMsg[ CALLSTACK_BUFFER_SIZE ];
_snprintf(szStackTraceMsg, CALLSTACK_BUFFER_SIZE-1, "%s%s", pszMsg, pCallStackString);
//
// display message box
//
memset( &MessageBoxParams, 0x00, sizeof( MessageBoxParams ) );
MessageBoxParams.cbSize = sizeof( MessageBoxParams );
MessageBoxParams.lpszText = szStackTraceMsg;
MessageBoxParams.lpszCaption = pszTitle;
MessageBoxParams.dwStyle = MB_ABORTRETRYIGNORE | MB_SETFOREGROUND | MB_TOPMOST | MB_DEFBUTTON2;
MessageBoxParams.hInstance = NULL;
return MessageBoxIndirect( &MessageBoxParams );
}
//**********************************************************************
//**********************************************************************
//**
//** END OF CALL STACK TRACKING SECTION.
//**
//**********************************************************************
#endif // defined( DN_MEMORY_TRACKING ) || defined( DN_CRITICAL_SECTION_TRACKING )
#ifdef DN_CRITICAL_SECTION_TRACKING
//**********************************************************************
//**
//** THIS IS THE CRITICAL-SECTION TRACKING SECTION. DON'T ADD FUNCTIONS HERE
//** THAT ARE NOT FOR CRITICAL SECTIONS!!
//**
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNCSTrackInitialize - initialize critical section tracking code
//
// Entry: Nothing
//
// Exit: Boolean indicating success
// TRUE = initialization succeeded
// FALSE = initialization failed
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNCSTrackInitialize"
static BOOL DNCSTrackInitialize( void )
{
g_blCritSecs.Initialize();
return DNInitializeCriticalSection(&g_CSLock);
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNCSTrackSetCriticalSectionRecursionCount - set the maximum recursion depth
// allowed by a DNCRITICAL_SECTION.
//
// Entry: Pointer to critical section
// Recursion count
//
// Exit: Nothing
//
// Note: The recursion count is the number of times we allow reentry so
// we need to bais by one to allow the user to take the lock at
// least once.
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNCSTrackSetCriticalRecursionCount"
void DNCSTrackSetCriticalSectionRecursionCount( DNCRITICAL_SECTION *const pCriticalSection, const UINT_PTR RecursionCount )
{
UINT_PTR LocalRecursionCount;
DNASSERT( pCriticalSection != NULL );
//
// make sure we don't overflow
//
LocalRecursionCount = RecursionCount;
if ( LocalRecursionCount == -1 )
{
LocalRecursionCount--;
}
pCriticalSection->MaxLockCount = LocalRecursionCount + 1;
DNASSERT( pCriticalSection->MaxLockCount != 0 );
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNCSTrackEnterCriticalSection - enter a debug critical section
//
// Entry: Pointer to critical section
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNCSTrackEnterCriticalSection"
void DNCSTrackEnterCriticalSection( DNCRITICAL_SECTION *const pCriticalSection )
{
UINT_PTR ThisThreadID;
static BOOL fDisplayCallStacks = TRUE;
DNASSERT( pCriticalSection != NULL );
EnterCriticalSection( &pCriticalSection->CriticalSection );
ThisThreadID = GetCurrentThreadId();
if ( pCriticalSection->OwningThreadID != ThisThreadID )
{
DNASSERT( pCriticalSection->OwningThreadID == DN_INVALID_THREAD_ID );
pCriticalSection->OwningThreadID = ThisThreadID;
DNASSERT( pCriticalSection->LockCount == 0 );
}
else
{
DNASSERT( pCriticalSection->LockCount != 0 );
}
if ( pCriticalSection->LockCount == 0 )
{
pCriticalSection->CallStack.NoteCurrentCallStack();
}
pCriticalSection->LockCount++;
if ( pCriticalSection->LockCount > pCriticalSection->MaxLockCount )
{
if ( pCriticalSection->MaxLockCount == 1 )
{
if ( fDisplayCallStacks != FALSE )
{
char CallStackBuffer[ CALLSTACK_BUFFER_SIZE ];
//
// Exceeded recursion depth of 1, display stack of call orignally
// holding the lock.
//
pCriticalSection->CallStack.GetCallStackString( CallStackBuffer );
switch ( DisplayCallStack( "Stack trace of function that originally held the lock:",
"DNCritical section has been reentered!",
CallStackBuffer ) )
{
//
// don't display any more critical section warnings!
//
case IDABORT:
{
fDisplayCallStacks = FALSE;
break;
}
//
// acknowledged
//
case IDIGNORE:
{
break;
}
//
// stop in debugger
//
case IDRETRY:
{
DNASSERT( FALSE );
break;
}
}
}
}
else
{
//
// exceeded recursion depth, check your code!!
//
DNASSERT( FALSE );
}
}
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNCSTrackLeaveCriticalSection - leave a debug critical section
//
// Entry: Pointer to critical section
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNCSTrackLeaveCriticalSection"
void DNCSTrackLeaveCriticalSection( DNCRITICAL_SECTION *const pCriticalSection )
{
DNASSERT( pCriticalSection != NULL );
DNASSERT( pCriticalSection->OwningThreadID == GetCurrentThreadId() );
DNASSERT( pCriticalSection->LockCount <= pCriticalSection->MaxLockCount );
DNASSERT( pCriticalSection->LockCount != 0 );
pCriticalSection->LockCount--;
if ( pCriticalSection->LockCount == 0 )
{
memset( &pCriticalSection->CallStack, 0x00, sizeof( pCriticalSection->CallStack ) );
pCriticalSection->OwningThreadID = DN_INVALID_THREAD_ID;
}
LeaveCriticalSection( &pCriticalSection->CriticalSection );
}
//**********************************************************************
//**********************************************************************
// ------------------------------
// DNCSTrackCriticalSectionIsTakenByThisThread - determine if this thread has taken a
// specific critical section
//
// Entry: Pointer to critical section
// Boolean condition to test for
//
// Exit: Nothing
// ------------------------------
#undef DPF_MODNAME
#define DPF_MODNAME "DNCSTrackCriticalSectionIsTakenByThisThread"
void DNCSTrackCriticalSectionIsTakenByThisThread( const DNCRITICAL_SECTION *const pCriticalSection, const BOOL fFlag )
{
ASSERT( fFlag == ( pCriticalSection->OwningThreadID == GetCurrentThreadId() ) )
}
//**********************************************************************
//**********************************************************************
//**
//** THIS IS THE END OF THE CRITICAL-SECTION TRACKING CODE.
//**
//**********************************************************************
#endif // DN_CRITICAL_SECTION_TRACKING