44 #include "kmp_debug.h"
54 #define KMP_PAD(type, sz) (sizeof(type) + (sz - ((sizeof(type) - 1) % (sz)) - 1))
55 #define KMP_GTID_DNE (-2)
76 #if KMP_OS_LINUX && defined(KMP_GOMP_COMPAT)
77 # define OMP_LOCK_T_SIZE sizeof(int)
78 # define OMP_NEST_LOCK_T_SIZE sizeof(void *)
80 # define OMP_LOCK_T_SIZE sizeof(void *)
81 # define OMP_NEST_LOCK_T_SIZE sizeof(void *)
89 #define OMP_CRITICAL_SIZE sizeof(void *)
90 #define INTEL_CRITICAL_SIZE 32
95 typedef kmp_uint32 kmp_lock_flags_t;
97 #define kmp_lf_critical_section 1
102 typedef kmp_uint32 kmp_lock_index_t;
108 struct kmp_lock_pool {
109 union kmp_user_lock *next;
110 kmp_lock_index_t index;
113 typedef struct kmp_lock_pool kmp_lock_pool_t;
116 extern void __kmp_validate_locks(
void );
160 struct kmp_base_tas_lock {
161 volatile kmp_int32 poll;
163 kmp_int32 depth_locked;
166 typedef struct kmp_base_tas_lock kmp_base_tas_lock_t;
169 kmp_base_tas_lock_t lk;
170 kmp_lock_pool_t pool;
175 typedef union kmp_tas_lock kmp_tas_lock_t;
181 #define KMP_TAS_LOCK_INITIALIZER( lock ) { { 0, 0 } }
183 extern void __kmp_acquire_tas_lock( kmp_tas_lock_t *lck, kmp_int32 gtid );
184 extern int __kmp_test_tas_lock( kmp_tas_lock_t *lck, kmp_int32 gtid );
185 extern void __kmp_release_tas_lock( kmp_tas_lock_t *lck, kmp_int32 gtid );
186 extern void __kmp_init_tas_lock( kmp_tas_lock_t *lck );
187 extern void __kmp_destroy_tas_lock( kmp_tas_lock_t *lck );
189 extern void __kmp_acquire_nested_tas_lock( kmp_tas_lock_t *lck, kmp_int32 gtid );
190 extern int __kmp_test_nested_tas_lock( kmp_tas_lock_t *lck, kmp_int32 gtid );
191 extern void __kmp_release_nested_tas_lock( kmp_tas_lock_t *lck, kmp_int32 gtid );
192 extern void __kmp_init_nested_tas_lock( kmp_tas_lock_t *lck );
193 extern void __kmp_destroy_nested_tas_lock( kmp_tas_lock_t *lck );
196 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_ARCH_ARM)
210 struct kmp_base_futex_lock {
211 volatile kmp_int32 poll;
214 kmp_int32 depth_locked;
217 typedef struct kmp_base_futex_lock kmp_base_futex_lock_t;
219 union kmp_futex_lock {
220 kmp_base_futex_lock_t lk;
221 kmp_lock_pool_t pool;
226 typedef union kmp_futex_lock kmp_futex_lock_t;
232 #define KMP_FUTEX_LOCK_INITIALIZER( lock ) { { 0, 0 } }
234 extern void __kmp_acquire_futex_lock( kmp_futex_lock_t *lck, kmp_int32 gtid );
235 extern int __kmp_test_futex_lock( kmp_futex_lock_t *lck, kmp_int32 gtid );
236 extern void __kmp_release_futex_lock( kmp_futex_lock_t *lck, kmp_int32 gtid );
237 extern void __kmp_init_futex_lock( kmp_futex_lock_t *lck );
238 extern void __kmp_destroy_futex_lock( kmp_futex_lock_t *lck );
240 extern void __kmp_acquire_nested_futex_lock( kmp_futex_lock_t *lck, kmp_int32 gtid );
241 extern int __kmp_test_nested_futex_lock( kmp_futex_lock_t *lck, kmp_int32 gtid );
242 extern void __kmp_release_nested_futex_lock( kmp_futex_lock_t *lck, kmp_int32 gtid );
243 extern void __kmp_init_nested_futex_lock( kmp_futex_lock_t *lck );
244 extern void __kmp_destroy_nested_futex_lock( kmp_futex_lock_t *lck );
246 #endif // KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_ARCH_ARM)
253 struct kmp_base_ticket_lock {
255 volatile union kmp_ticket_lock * initialized;
257 volatile kmp_uint32 next_ticket;
258 volatile kmp_uint32 now_serving;
259 volatile kmp_int32 owner_id;
260 kmp_int32 depth_locked;
261 kmp_lock_flags_t flags;
264 typedef struct kmp_base_ticket_lock kmp_base_ticket_lock_t;
266 union KMP_ALIGN_CACHE kmp_ticket_lock {
267 kmp_base_ticket_lock_t lk;
268 kmp_lock_pool_t pool;
270 char lk_pad[ KMP_PAD( kmp_base_ticket_lock_t, CACHE_LINE ) ];
273 typedef union kmp_ticket_lock kmp_ticket_lock_t;
280 #define KMP_TICKET_LOCK_INITIALIZER( lock ) { { (kmp_ticket_lock_t *) & (lock), NULL, 0, 0, 0, -1 } }
282 extern void __kmp_acquire_ticket_lock( kmp_ticket_lock_t *lck, kmp_int32 gtid );
283 extern int __kmp_test_ticket_lock( kmp_ticket_lock_t *lck, kmp_int32 gtid );
284 extern int __kmp_test_ticket_lock_with_cheks( kmp_ticket_lock_t *lck, kmp_int32 gtid );
285 extern void __kmp_release_ticket_lock( kmp_ticket_lock_t *lck, kmp_int32 gtid );
286 extern void __kmp_init_ticket_lock( kmp_ticket_lock_t *lck );
287 extern void __kmp_destroy_ticket_lock( kmp_ticket_lock_t *lck );
289 extern void __kmp_acquire_nested_ticket_lock( kmp_ticket_lock_t *lck, kmp_int32 gtid );
290 extern int __kmp_test_nested_ticket_lock( kmp_ticket_lock_t *lck, kmp_int32 gtid );
291 extern void __kmp_release_nested_ticket_lock( kmp_ticket_lock_t *lck, kmp_int32 gtid );
292 extern void __kmp_init_nested_ticket_lock( kmp_ticket_lock_t *lck );
293 extern void __kmp_destroy_nested_ticket_lock( kmp_ticket_lock_t *lck );
300 #if KMP_USE_ADAPTIVE_LOCKS
302 struct kmp_adaptive_lock_info;
304 typedef struct kmp_adaptive_lock_info kmp_adaptive_lock_info_t;
306 #if KMP_DEBUG_ADAPTIVE_LOCKS
308 struct kmp_adaptive_lock_statistics {
310 kmp_adaptive_lock_info_t * next;
311 kmp_adaptive_lock_info_t * prev;
314 kmp_uint32 successfulSpeculations;
315 kmp_uint32 hardFailedSpeculations;
316 kmp_uint32 softFailedSpeculations;
317 kmp_uint32 nonSpeculativeAcquires;
318 kmp_uint32 nonSpeculativeAcquireAttempts;
319 kmp_uint32 lemmingYields;
322 typedef struct kmp_adaptive_lock_statistics kmp_adaptive_lock_statistics_t;
324 extern void __kmp_print_speculative_stats();
325 extern void __kmp_init_speculative_stats();
327 #endif // KMP_DEBUG_ADAPTIVE_LOCKS
329 struct kmp_adaptive_lock_info
336 kmp_uint32
volatile badness;
337 kmp_uint32
volatile acquire_attempts;
339 kmp_uint32 max_badness;
340 kmp_uint32 max_soft_retries;
342 #if KMP_DEBUG_ADAPTIVE_LOCKS
343 kmp_adaptive_lock_statistics_t
volatile stats;
347 #endif // KMP_USE_ADAPTIVE_LOCKS
350 struct kmp_base_queuing_lock {
353 volatile union kmp_queuing_lock *initialized;
359 volatile kmp_int32 tail_id;
361 volatile kmp_int32 head_id;
364 volatile kmp_uint32 next_ticket;
365 volatile kmp_uint32 now_serving;
366 volatile kmp_int32 owner_id;
367 kmp_int32 depth_locked;
369 kmp_lock_flags_t flags;
372 typedef struct kmp_base_queuing_lock kmp_base_queuing_lock_t;
374 KMP_BUILD_ASSERT( offsetof( kmp_base_queuing_lock_t, tail_id ) % 8 == 0 );
376 union KMP_ALIGN_CACHE kmp_queuing_lock {
377 kmp_base_queuing_lock_t lk;
378 kmp_lock_pool_t pool;
380 char lk_pad[ KMP_PAD( kmp_base_queuing_lock_t, CACHE_LINE ) ];
383 typedef union kmp_queuing_lock kmp_queuing_lock_t;
385 extern void __kmp_acquire_queuing_lock( kmp_queuing_lock_t *lck, kmp_int32 gtid );
386 extern int __kmp_test_queuing_lock( kmp_queuing_lock_t *lck, kmp_int32 gtid );
387 extern void __kmp_release_queuing_lock( kmp_queuing_lock_t *lck, kmp_int32 gtid );
388 extern void __kmp_init_queuing_lock( kmp_queuing_lock_t *lck );
389 extern void __kmp_destroy_queuing_lock( kmp_queuing_lock_t *lck );
391 extern void __kmp_acquire_nested_queuing_lock( kmp_queuing_lock_t *lck, kmp_int32 gtid );
392 extern int __kmp_test_nested_queuing_lock( kmp_queuing_lock_t *lck, kmp_int32 gtid );
393 extern void __kmp_release_nested_queuing_lock( kmp_queuing_lock_t *lck, kmp_int32 gtid );
394 extern void __kmp_init_nested_queuing_lock( kmp_queuing_lock_t *lck );
395 extern void __kmp_destroy_nested_queuing_lock( kmp_queuing_lock_t *lck );
397 #if KMP_USE_ADAPTIVE_LOCKS
402 struct kmp_base_adaptive_lock {
403 kmp_base_queuing_lock qlk;
404 KMP_ALIGN(CACHE_LINE)
405 kmp_adaptive_lock_info_t adaptive;
408 typedef struct kmp_base_adaptive_lock kmp_base_adaptive_lock_t;
410 union KMP_ALIGN_CACHE kmp_adaptive_lock {
411 kmp_base_adaptive_lock_t lk;
412 kmp_lock_pool_t pool;
414 char lk_pad[ KMP_PAD(kmp_base_adaptive_lock_t, CACHE_LINE) ];
416 typedef union kmp_adaptive_lock kmp_adaptive_lock_t;
418 # define GET_QLK_PTR(l) ((kmp_queuing_lock_t *) & (l)->lk.qlk)
420 #endif // KMP_USE_ADAPTIVE_LOCKS
426 struct kmp_base_drdpa_lock {
437 volatile union kmp_drdpa_lock * initialized;
439 volatile struct kmp_lock_poll {
442 volatile kmp_uint64 mask;
443 kmp_uint64 cleanup_ticket;
444 volatile struct kmp_lock_poll * old_polls;
445 kmp_uint32 num_polls;
453 volatile kmp_uint64 next_ticket;
472 kmp_uint64 now_serving;
473 volatile kmp_uint32 owner_id;
474 kmp_int32 depth_locked;
475 kmp_lock_flags_t flags;
478 typedef struct kmp_base_drdpa_lock kmp_base_drdpa_lock_t;
480 union KMP_ALIGN_CACHE kmp_drdpa_lock {
481 kmp_base_drdpa_lock_t lk;
482 kmp_lock_pool_t pool;
484 char lk_pad[ KMP_PAD( kmp_base_drdpa_lock_t, CACHE_LINE ) ];
487 typedef union kmp_drdpa_lock kmp_drdpa_lock_t;
489 extern void __kmp_acquire_drdpa_lock( kmp_drdpa_lock_t *lck, kmp_int32 gtid );
490 extern int __kmp_test_drdpa_lock( kmp_drdpa_lock_t *lck, kmp_int32 gtid );
491 extern void __kmp_release_drdpa_lock( kmp_drdpa_lock_t *lck, kmp_int32 gtid );
492 extern void __kmp_init_drdpa_lock( kmp_drdpa_lock_t *lck );
493 extern void __kmp_destroy_drdpa_lock( kmp_drdpa_lock_t *lck );
495 extern void __kmp_acquire_nested_drdpa_lock( kmp_drdpa_lock_t *lck, kmp_int32 gtid );
496 extern int __kmp_test_nested_drdpa_lock( kmp_drdpa_lock_t *lck, kmp_int32 gtid );
497 extern void __kmp_release_nested_drdpa_lock( kmp_drdpa_lock_t *lck, kmp_int32 gtid );
498 extern void __kmp_init_nested_drdpa_lock( kmp_drdpa_lock_t *lck );
499 extern void __kmp_destroy_nested_drdpa_lock( kmp_drdpa_lock_t *lck );
517 typedef kmp_ticket_lock_t kmp_bootstrap_lock_t;
519 #define KMP_BOOTSTRAP_LOCK_INITIALIZER( lock ) KMP_TICKET_LOCK_INITIALIZER( (lock) )
522 __kmp_acquire_bootstrap_lock( kmp_bootstrap_lock_t *lck )
524 __kmp_acquire_ticket_lock( lck, KMP_GTID_DNE );
528 __kmp_test_bootstrap_lock( kmp_bootstrap_lock_t *lck )
530 return __kmp_test_ticket_lock( lck, KMP_GTID_DNE );
534 __kmp_release_bootstrap_lock( kmp_bootstrap_lock_t *lck )
536 __kmp_release_ticket_lock( lck, KMP_GTID_DNE );
540 __kmp_init_bootstrap_lock( kmp_bootstrap_lock_t *lck )
542 __kmp_init_ticket_lock( lck );
546 __kmp_destroy_bootstrap_lock( kmp_bootstrap_lock_t *lck )
548 __kmp_destroy_ticket_lock( lck );
564 typedef kmp_ticket_lock_t kmp_lock_t;
567 __kmp_acquire_lock( kmp_lock_t *lck, kmp_int32 gtid )
569 __kmp_acquire_ticket_lock( lck, gtid );
573 __kmp_test_lock( kmp_lock_t *lck, kmp_int32 gtid )
575 return __kmp_test_ticket_lock( lck, gtid );
579 __kmp_release_lock( kmp_lock_t *lck, kmp_int32 gtid )
581 __kmp_release_ticket_lock( lck, gtid );
585 __kmp_init_lock( kmp_lock_t *lck )
587 __kmp_init_ticket_lock( lck );
591 __kmp_destroy_lock( kmp_lock_t *lck )
593 __kmp_destroy_ticket_lock( lck );
612 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_ARCH_ARM)
618 #if KMP_USE_ADAPTIVE_LOCKS
620 #endif // KMP_USE_ADAPTIVE_LOCKS
623 typedef enum kmp_lock_kind kmp_lock_kind_t;
625 extern kmp_lock_kind_t __kmp_user_lock_kind;
627 union kmp_user_lock {
629 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_ARCH_ARM)
630 kmp_futex_lock_t futex;
632 kmp_ticket_lock_t ticket;
633 kmp_queuing_lock_t queuing;
634 kmp_drdpa_lock_t drdpa;
635 #if KMP_USE_ADAPTIVE_LOCKS
636 kmp_adaptive_lock_t adaptive;
637 #endif // KMP_USE_ADAPTIVE_LOCKS
638 kmp_lock_pool_t pool;
641 typedef union kmp_user_lock *kmp_user_lock_p;
643 extern size_t __kmp_base_user_lock_size;
644 extern size_t __kmp_user_lock_size;
646 extern kmp_int32 ( *__kmp_get_user_lock_owner_ )( kmp_user_lock_p lck );
648 static inline kmp_int32
649 __kmp_get_user_lock_owner( kmp_user_lock_p lck )
651 KMP_DEBUG_ASSERT( __kmp_get_user_lock_owner_ != NULL );
652 return ( *__kmp_get_user_lock_owner_ )( lck );
655 extern void ( *__kmp_acquire_user_lock_with_checks_ )( kmp_user_lock_p lck, kmp_int32 gtid );
657 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_ARCH_ARM)
659 #define __kmp_acquire_user_lock_with_checks(lck,gtid) \
660 if (__kmp_user_lock_kind == lk_tas) { \
661 if ( __kmp_env_consistency_check ) { \
662 char const * const func = "omp_set_lock"; \
663 if ( ( sizeof ( kmp_tas_lock_t ) <= OMP_LOCK_T_SIZE ) \
664 && lck->tas.lk.depth_locked != -1 ) { \
665 KMP_FATAL( LockNestableUsedAsSimple, func ); \
667 if ( ( gtid >= 0 ) && ( lck->tas.lk.poll - 1 == gtid ) ) { \
668 KMP_FATAL( LockIsAlreadyOwned, func ); \
671 if ( ( lck->tas.lk.poll != 0 ) || \
672 ( ! KMP_COMPARE_AND_STORE_ACQ32( &(lck->tas.lk.poll), 0, gtid + 1 ) ) ) { \
674 KMP_FSYNC_PREPARE( lck ); \
675 KMP_INIT_YIELD( spins ); \
676 if ( TCR_4(__kmp_nth) > (__kmp_avail_proc ? __kmp_avail_proc : __kmp_xproc) ) { \
679 KMP_YIELD_SPIN( spins ); \
681 while ( ( lck->tas.lk.poll != 0 ) || \
682 ( ! KMP_COMPARE_AND_STORE_ACQ32( &(lck->tas.lk.poll), 0, gtid + 1 ) ) ) { \
683 if ( TCR_4(__kmp_nth) > (__kmp_avail_proc ? __kmp_avail_proc : __kmp_xproc) ) { \
686 KMP_YIELD_SPIN( spins ); \
690 KMP_FSYNC_ACQUIRED( lck ); \
692 KMP_DEBUG_ASSERT( __kmp_acquire_user_lock_with_checks_ != NULL ); \
693 ( *__kmp_acquire_user_lock_with_checks_ )( lck, gtid ); \
698 __kmp_acquire_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
700 KMP_DEBUG_ASSERT( __kmp_acquire_user_lock_with_checks_ != NULL );
701 ( *__kmp_acquire_user_lock_with_checks_ )( lck, gtid );
705 extern int ( *__kmp_test_user_lock_with_checks_ )( kmp_user_lock_p lck, kmp_int32 gtid );
707 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64 || KMP_ARCH_ARM)
709 #include "kmp_i18n.h"
710 extern int __kmp_env_consistency_check;
712 __kmp_test_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
714 if ( __kmp_user_lock_kind == lk_tas ) {
715 if ( __kmp_env_consistency_check ) {
716 char const *
const func =
"omp_test_lock";
717 if ( (
sizeof ( kmp_tas_lock_t ) <= OMP_LOCK_T_SIZE )
718 && lck->tas.lk.depth_locked != -1 ) {
719 KMP_FATAL( LockNestableUsedAsSimple, func );
722 return ( ( lck->tas.lk.poll == 0 ) &&
723 KMP_COMPARE_AND_STORE_ACQ32( &(lck->tas.lk.poll), 0, gtid + 1 ) );
725 KMP_DEBUG_ASSERT( __kmp_test_user_lock_with_checks_ != NULL );
726 return ( *__kmp_test_user_lock_with_checks_ )( lck, gtid );
731 __kmp_test_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
733 KMP_DEBUG_ASSERT( __kmp_test_user_lock_with_checks_ != NULL );
734 return ( *__kmp_test_user_lock_with_checks_ )( lck, gtid );
738 extern void ( *__kmp_release_user_lock_with_checks_ )( kmp_user_lock_p lck, kmp_int32 gtid );
741 __kmp_release_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
743 KMP_DEBUG_ASSERT( __kmp_release_user_lock_with_checks_ != NULL );
744 ( *__kmp_release_user_lock_with_checks_ ) ( lck, gtid );
747 extern void ( *__kmp_init_user_lock_with_checks_ )( kmp_user_lock_p lck );
750 __kmp_init_user_lock_with_checks( kmp_user_lock_p lck )
752 KMP_DEBUG_ASSERT( __kmp_init_user_lock_with_checks_ != NULL );
753 ( *__kmp_init_user_lock_with_checks_ )( lck );
760 extern void ( *__kmp_destroy_user_lock_ )( kmp_user_lock_p lck );
763 __kmp_destroy_user_lock( kmp_user_lock_p lck )
765 KMP_DEBUG_ASSERT( __kmp_destroy_user_lock_ != NULL );
766 ( *__kmp_destroy_user_lock_ )( lck );
769 extern void ( *__kmp_destroy_user_lock_with_checks_ )( kmp_user_lock_p lck );
772 __kmp_destroy_user_lock_with_checks( kmp_user_lock_p lck )
774 KMP_DEBUG_ASSERT( __kmp_destroy_user_lock_with_checks_ != NULL );
775 ( *__kmp_destroy_user_lock_with_checks_ )( lck );
778 extern void ( *__kmp_acquire_nested_user_lock_with_checks_ )( kmp_user_lock_p lck, kmp_int32 gtid );
780 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64)
782 #define __kmp_acquire_nested_user_lock_with_checks(lck,gtid) \
783 if (__kmp_user_lock_kind == lk_tas) { \
784 if ( __kmp_env_consistency_check ) { \
785 char const * const func = "omp_set_nest_lock"; \
786 if ( ( sizeof ( kmp_tas_lock_t ) <= OMP_NEST_LOCK_T_SIZE ) \
787 && lck->tas.lk.depth_locked == -1 ) { \
788 KMP_FATAL( LockSimpleUsedAsNestable, func ); \
791 if ( lck->tas.lk.poll - 1 == gtid ) { \
792 lck->tas.lk.depth_locked += 1; \
794 if ( ( lck->tas.lk.poll != 0 ) || \
795 ( ! KMP_COMPARE_AND_STORE_ACQ32( &(lck->tas.lk.poll), 0, gtid + 1 ) ) ) { \
797 KMP_FSYNC_PREPARE( lck ); \
798 KMP_INIT_YIELD( spins ); \
799 if ( TCR_4(__kmp_nth) > (__kmp_avail_proc ? __kmp_avail_proc : __kmp_xproc) ) { \
802 KMP_YIELD_SPIN( spins ); \
804 while ( ( lck->tas.lk.poll != 0 ) || \
805 ( ! KMP_COMPARE_AND_STORE_ACQ32( &(lck->tas.lk.poll), 0, gtid + 1 ) ) ) { \
806 if ( TCR_4(__kmp_nth) > (__kmp_avail_proc ? __kmp_avail_proc : __kmp_xproc) ) { \
809 KMP_YIELD_SPIN( spins ); \
813 lck->tas.lk.depth_locked = 1; \
815 KMP_FSYNC_ACQUIRED( lck ); \
817 KMP_DEBUG_ASSERT( __kmp_acquire_nested_user_lock_with_checks_ != NULL ); \
818 ( *__kmp_acquire_nested_user_lock_with_checks_ )( lck, gtid ); \
823 __kmp_acquire_nested_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
825 KMP_DEBUG_ASSERT( __kmp_acquire_nested_user_lock_with_checks_ != NULL );
826 ( *__kmp_acquire_nested_user_lock_with_checks_ )( lck, gtid );
830 extern int ( *__kmp_test_nested_user_lock_with_checks_ )( kmp_user_lock_p lck, kmp_int32 gtid );
832 #if KMP_OS_LINUX && (KMP_ARCH_X86 || KMP_ARCH_X86_64)
834 __kmp_test_nested_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
836 if ( __kmp_user_lock_kind == lk_tas ) {
838 if ( __kmp_env_consistency_check ) {
839 char const *
const func =
"omp_test_nest_lock";
840 if ( (
sizeof ( kmp_tas_lock_t ) <= OMP_NEST_LOCK_T_SIZE )
841 && lck->tas.lk.depth_locked == -1 ) {
842 KMP_FATAL( LockSimpleUsedAsNestable, func );
845 KMP_DEBUG_ASSERT( gtid >= 0 );
846 if ( lck->tas.lk.poll - 1 == gtid ) {
847 return ++lck->tas.lk.depth_locked;
849 retval = ( ( lck->tas.lk.poll == 0 ) &&
850 KMP_COMPARE_AND_STORE_ACQ32( &(lck->tas.lk.poll), 0, gtid + 1 ) );
853 lck->tas.lk.depth_locked = 1;
857 KMP_DEBUG_ASSERT( __kmp_test_nested_user_lock_with_checks_ != NULL );
858 return ( *__kmp_test_nested_user_lock_with_checks_ )( lck, gtid );
863 __kmp_test_nested_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
865 KMP_DEBUG_ASSERT( __kmp_test_nested_user_lock_with_checks_ != NULL );
866 return ( *__kmp_test_nested_user_lock_with_checks_ )( lck, gtid );
870 extern void ( *__kmp_release_nested_user_lock_with_checks_ )( kmp_user_lock_p lck, kmp_int32 gtid );
873 __kmp_release_nested_user_lock_with_checks( kmp_user_lock_p lck, kmp_int32 gtid )
875 KMP_DEBUG_ASSERT( __kmp_release_nested_user_lock_with_checks_ != NULL );
876 ( *__kmp_release_nested_user_lock_with_checks_ )( lck, gtid );
879 extern void ( *__kmp_init_nested_user_lock_with_checks_ )( kmp_user_lock_p lck );
881 static inline void __kmp_init_nested_user_lock_with_checks( kmp_user_lock_p lck )
883 KMP_DEBUG_ASSERT( __kmp_init_nested_user_lock_with_checks_ != NULL );
884 ( *__kmp_init_nested_user_lock_with_checks_ )( lck );
887 extern void ( *__kmp_destroy_nested_user_lock_with_checks_ )( kmp_user_lock_p lck );
890 __kmp_destroy_nested_user_lock_with_checks( kmp_user_lock_p lck )
892 KMP_DEBUG_ASSERT( __kmp_destroy_nested_user_lock_with_checks_ != NULL );
893 ( *__kmp_destroy_nested_user_lock_with_checks_ )( lck );
911 extern int ( *__kmp_is_user_lock_initialized_ )( kmp_user_lock_p lck );
915 extern const ident_t * ( *__kmp_get_user_lock_location_ )( kmp_user_lock_p lck );
918 __kmp_get_user_lock_location( kmp_user_lock_p lck )
920 if ( __kmp_get_user_lock_location_ != NULL ) {
921 return ( *__kmp_get_user_lock_location_ )( lck );
928 extern void ( *__kmp_set_user_lock_location_ )( kmp_user_lock_p lck,
const ident_t *loc );
931 __kmp_set_user_lock_location( kmp_user_lock_p lck,
const ident_t *loc )
933 if ( __kmp_set_user_lock_location_ != NULL ) {
934 ( *__kmp_set_user_lock_location_ )( lck, loc );
938 extern kmp_lock_flags_t ( *__kmp_get_user_lock_flags_ )( kmp_user_lock_p lck );
940 extern void ( *__kmp_set_user_lock_flags_ )( kmp_user_lock_p lck, kmp_lock_flags_t flags );
943 __kmp_set_user_lock_flags( kmp_user_lock_p lck, kmp_lock_flags_t flags )
945 if ( __kmp_set_user_lock_flags_ != NULL ) {
946 ( *__kmp_set_user_lock_flags_ )( lck, flags );
953 extern void __kmp_set_user_lock_vptrs( kmp_lock_kind_t user_lock_kind );
958 #define KMP_BIND_USER_LOCK_TEMPLATE(nest, kind, suffix) { \
959 __kmp_acquire##nest##user_lock_with_checks_ = ( void (*)( kmp_user_lock_p, kmp_int32 ) ) \
960 __kmp_acquire##nest##kind##_##suffix; \
961 __kmp_release##nest##user_lock_with_checks_ = ( void (*)( kmp_user_lock_p, kmp_int32 ) ) \
962 __kmp_release##nest##kind##_##suffix; \
963 __kmp_test##nest##user_lock_with_checks_ = ( int (*)( kmp_user_lock_p, kmp_int32 ) ) \
964 __kmp_test##nest##kind##_##suffix; \
965 __kmp_init##nest##user_lock_with_checks_ = ( void (*)( kmp_user_lock_p ) ) \
966 __kmp_init##nest##kind##_##suffix; \
967 __kmp_destroy##nest##user_lock_with_checks_ = ( void (*)( kmp_user_lock_p ) ) \
968 __kmp_destroy##nest##kind##_##suffix; \
971 #define KMP_BIND_USER_LOCK(kind) KMP_BIND_USER_LOCK_TEMPLATE(_, kind, lock)
972 #define KMP_BIND_USER_LOCK_WITH_CHECKS(kind) KMP_BIND_USER_LOCK_TEMPLATE(_, kind, lock_with_checks)
973 #define KMP_BIND_NESTED_USER_LOCK(kind) KMP_BIND_USER_LOCK_TEMPLATE(_nested_, kind, lock)
974 #define KMP_BIND_NESTED_USER_LOCK_WITH_CHECKS(kind) KMP_BIND_USER_LOCK_TEMPLATE(_nested_, kind, lock_with_checks)
1002 struct kmp_lock_table {
1003 kmp_lock_index_t used;
1004 kmp_lock_index_t allocated;
1005 kmp_user_lock_p * table;
1008 typedef struct kmp_lock_table kmp_lock_table_t;
1010 extern kmp_lock_table_t __kmp_user_lock_table;
1011 extern kmp_user_lock_p __kmp_lock_pool;
1013 struct kmp_block_of_locks {
1014 struct kmp_block_of_locks * next_block;
1018 typedef struct kmp_block_of_locks kmp_block_of_locks_t;
1020 extern kmp_block_of_locks_t *__kmp_lock_blocks;
1021 extern int __kmp_num_locks_in_block;
1023 extern kmp_user_lock_p __kmp_user_lock_allocate(
void **user_lock, kmp_int32 gtid, kmp_lock_flags_t flags );
1024 extern void __kmp_user_lock_free(
void **user_lock, kmp_int32 gtid, kmp_user_lock_p lck );
1025 extern kmp_user_lock_p __kmp_lookup_user_lock(
void **user_lock,
char const *func );
1026 extern void __kmp_cleanup_user_locks();
1028 #define KMP_CHECK_USER_LOCK_INIT() \
1030 if ( ! TCR_4( __kmp_init_user_locks ) ) { \
1031 __kmp_acquire_bootstrap_lock( &__kmp_initz_lock ); \
1032 if ( ! TCR_4( __kmp_init_user_locks ) ) { \
1033 TCW_4( __kmp_init_user_locks, TRUE ); \
1035 __kmp_release_bootstrap_lock( &__kmp_initz_lock ); \
1044 #endif // __cplusplus