source: mainline/uspace/lib/c/generic/async.c@ 9233e9d

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 9233e9d was 9233e9d, checked in by Jiří Zárevúcky <zarevucky.jiri@…>, 8 years ago

Return capability handle in SYS_IPC_IRQ_SUBSCRIBE separately from error code.

  • Property mode set to 100644
File size: 79.9 KB
RevLine 
[06502f7d]1/*
[df4ed85]2 * Copyright (c) 2006 Ondrej Palkovsky
[06502f7d]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
[b2951e2]27 */
28
[a46da63]29/** @addtogroup libc
[b2951e2]30 * @{
31 */
32/** @file
[c07544d3]33 */
[06502f7d]34
[80649a91]35/**
36 * Asynchronous library
37 *
[c07544d3]38 * The aim of this library is to provide a facility for writing programs which
39 * utilize the asynchronous nature of HelenOS IPC, yet using a normal way of
40 * programming.
[80649a91]41 *
[79ae36dd]42 * You should be able to write very simple multithreaded programs. The async
43 * framework will automatically take care of most of the synchronization
44 * problems.
[80649a91]45 *
[9591265]46 * Example of use (pseudo C):
[c07544d3]47 *
[80649a91]48 * 1) Multithreaded client application
[9591265]49 *
[c07544d3]50 * fibril_create(fibril1, ...);
51 * fibril_create(fibril2, ...);
52 * ...
53 *
54 * int fibril1(void *arg)
55 * {
[79ae36dd]56 * conn = async_connect_me_to(...);
57 *
58 * exch = async_exchange_begin(conn);
59 * c1 = async_send(exch);
60 * async_exchange_end(exch);
61 *
62 * exch = async_exchange_begin(conn);
63 * c2 = async_send(exch);
64 * async_exchange_end(exch);
65 *
[c07544d3]66 * async_wait_for(c1);
67 * async_wait_for(c2);
68 * ...
69 * }
[80649a91]70 *
71 *
72 * 2) Multithreaded server application
73 *
[c07544d3]74 * main()
75 * {
76 * async_manager();
77 * }
78 *
[01c3bb4]79 * port_handler(ichandle, *icall)
[c07544d3]80 * {
81 * if (want_refuse) {
[01c3bb4]82 * async_answer_0(ichandle, ELIMIT);
[c07544d3]83 * return;
84 * }
[01c3bb4]85 * async_answer_0(ichandle, EOK);
[80649a91]86 *
[01c3bb4]87 * chandle = async_get_call(&call);
88 * somehow_handle_the_call(chandle, call);
89 * async_answer_2(chandle, 1, 2, 3);
[53ca318]90 *
[01c3bb4]91 * chandle = async_get_call(&call);
[c07544d3]92 * ...
93 * }
[a2cd194]94 *
[80649a91]95 */
[9591265]96
[64d2b10]97#define LIBC_ASYNC_C_
98#include <ipc/ipc.h>
[80649a91]99#include <async.h>
[b76a7329]100#include "private/async.h"
[64d2b10]101#undef LIBC_ASYNC_C_
102
[8820544]103#include <ipc/irq.h>
104#include <ipc/event.h>
[64d2b10]105#include <futex.h>
[bc1f1c2]106#include <fibril.h>
[d9c8c81]107#include <adt/hash_table.h>
[853802e]108#include <adt/hash.h>
[d9c8c81]109#include <adt/list.h>
[80649a91]110#include <assert.h>
111#include <errno.h>
[daa90e8]112#include <sys/time.h>
[c0699467]113#include <libarch/barrier.h>
[3e6a98c5]114#include <stdbool.h>
[38d150e]115#include <stdlib.h>
[79ae36dd]116#include <mem.h>
117#include <stdlib.h>
[e2ab36f1]118#include <macros.h>
[101516d]119#include <as.h>
[ae6021d]120#include <abi/mm/as.h>
[d7978525]121#include "private/libc.h"
[80649a91]122
[5da7199]123/** Session data */
124struct async_sess {
125 /** List of inactive exchanges */
126 list_t exch_list;
127
[566992e1]128 /** Session interface */
129 iface_t iface;
130
[5da7199]131 /** Exchange management style */
132 exch_mgmt_t mgmt;
133
134 /** Session identification */
135 int phone;
136
137 /** First clone connection argument */
138 sysarg_t arg1;
139
140 /** Second clone connection argument */
141 sysarg_t arg2;
142
143 /** Third clone connection argument */
144 sysarg_t arg3;
145
146 /** Exchange mutex */
147 fibril_mutex_t mutex;
148
149 /** Number of opened exchanges */
150 atomic_t refcnt;
151
152 /** Mutex for stateful connections */
153 fibril_mutex_t remote_state_mtx;
154
155 /** Data for stateful connections */
156 void *remote_state_data;
157};
158
159/** Exchange data */
160struct async_exch {
161 /** Link into list of inactive exchanges */
162 link_t sess_link;
163
164 /** Link into global list of inactive exchanges */
165 link_t global_link;
166
167 /** Session pointer */
168 async_sess_t *sess;
169
170 /** Exchange identification */
171 int phone;
172};
173
[79ae36dd]174/** Async framework global futex */
[927a181e]175futex_t async_futex = FUTEX_INITIALIZER;
[80649a91]176
[8619f25]177/** Number of threads waiting for IPC in the kernel. */
178atomic_t threads_in_ipc_wait = { 0 };
179
[79ae36dd]180/** Naming service session */
181async_sess_t *session_ns;
[01ff41c]182
[79ae36dd]183/** Call data */
[80649a91]184typedef struct {
185 link_t link;
[79ae36dd]186
[01c3bb4]187 cap_handle_t chandle;
[80649a91]188 ipc_call_t call;
189} msg_t;
190
[5da7199]191/** Message data */
192typedef struct {
193 awaiter_t wdata;
194
195 /** If reply was received. */
196 bool done;
[57dea62]197
[47c9a8c]198 /** If the message / reply should be discarded on arrival. */
199 bool forget;
[57dea62]200
[47c9a8c]201 /** If already destroyed. */
202 bool destroyed;
[5da7199]203
204 /** Pointer to where the answer data is stored. */
205 ipc_call_t *dataptr;
206
207 sysarg_t retval;
208} amsg_t;
209
[79ae36dd]210/* Client connection data */
[c80fdd0]211typedef struct {
[062d900]212 ht_link_t link;
[79ae36dd]213
[649f087]214 task_id_t in_task_id;
[79ae36dd]215 atomic_t refcnt;
[c80fdd0]216 void *data;
217} client_t;
218
[79ae36dd]219/* Server connection data */
[80649a91]220typedef struct {
[49d072e]221 awaiter_t wdata;
[c07544d3]222
[e70bfa5]223 /** Hash table link. */
[062d900]224 ht_link_t link;
[c07544d3]225
[e2ab36f1]226 /** Incoming client task ID. */
227 task_id_t in_task_id;
[79ae36dd]228
[e70bfa5]229 /** Incoming phone hash. */
[96b02eb9]230 sysarg_t in_phone_hash;
[c07544d3]231
[23882034]232 /** Link to the client tracking structure. */
233 client_t *client;
[47b7006]234
[e70bfa5]235 /** Messages that should be delivered to this fibril. */
[b72efe8]236 list_t msg_queue;
[c07544d3]237
[e70bfa5]238 /** Identification of the opening call. */
[01c3bb4]239 cap_handle_t chandle;
[b688fd8]240
[e70bfa5]241 /** Call data of the opening call. */
[80649a91]242 ipc_call_t call;
[c07544d3]243
[e70bfa5]244 /** Identification of the closing call. */
[01c3bb4]245 cap_handle_t close_chandle;
[c07544d3]246
[e70bfa5]247 /** Fibril function that will be used to handle the connection. */
[b688fd8]248 async_port_handler_t handler;
249
250 /** Client data */
251 void *data;
[80649a91]252} connection_t;
253
[566992e1]254/** Interface data */
255typedef struct {
256 ht_link_t link;
257
258 /** Interface ID */
259 iface_t iface;
260
261 /** Futex protecting the hash table */
262 futex_t futex;
263
264 /** Interface ports */
265 hash_table_t port_hash_table;
266
267 /** Next available port ID */
268 port_id_t port_id_avail;
269} interface_t;
270
271/* Port data */
272typedef struct {
273 ht_link_t link;
274
275 /** Port ID */
276 port_id_t id;
277
278 /** Port connection handler */
279 async_port_handler_t handler;
280
281 /** Client data */
282 void *data;
283} port_t;
284
[8820544]285/* Notification data */
286typedef struct {
287 ht_link_t link;
288
289 /** Notification method */
290 sysarg_t imethod;
291
292 /** Notification handler */
293 async_notification_handler_t handler;
294
295 /** Notification data */
296 void *data;
297} notification_t;
298
[bc1f1c2]299/** Identifier of the incoming connection handled by the current fibril. */
[79ae36dd]300static fibril_local connection_t *fibril_connection;
[e70bfa5]301
[47c9a8c]302static void to_event_initialize(to_event_t *to)
303{
[aeeddeb]304 struct timeval tv = { 0, 0 };
[57dea62]305
[47c9a8c]306 to->inlist = false;
307 to->occurred = false;
308 link_initialize(&to->link);
309 to->expires = tv;
310}
311
312static void wu_event_initialize(wu_event_t *wu)
313{
314 wu->inlist = false;
315 link_initialize(&wu->link);
316}
317
318void awaiter_initialize(awaiter_t *aw)
319{
320 aw->fid = 0;
321 aw->active = false;
322 to_event_initialize(&aw->to_event);
323 wu_event_initialize(&aw->wu_event);
324}
325
326static amsg_t *amsg_create(void)
327{
[57dea62]328 amsg_t *msg = malloc(sizeof(amsg_t));
[47c9a8c]329 if (msg) {
330 msg->done = false;
331 msg->forget = false;
332 msg->destroyed = false;
333 msg->dataptr = NULL;
334 msg->retval = (sysarg_t) EINVAL;
335 awaiter_initialize(&msg->wdata);
336 }
[57dea62]337
[47c9a8c]338 return msg;
339}
340
341static void amsg_destroy(amsg_t *msg)
342{
343 assert(!msg->destroyed);
344 msg->destroyed = true;
345 free(msg);
346}
347
[46eec3b]348static void *default_client_data_constructor(void)
349{
350 return NULL;
351}
352
353static void default_client_data_destructor(void *data)
354{
355}
356
357static async_client_data_ctor_t async_client_data_create =
358 default_client_data_constructor;
359static async_client_data_dtor_t async_client_data_destroy =
360 default_client_data_destructor;
361
362void async_set_client_data_constructor(async_client_data_ctor_t ctor)
363{
[f302586]364 assert(async_client_data_create == default_client_data_constructor);
[46eec3b]365 async_client_data_create = ctor;
366}
367
368void async_set_client_data_destructor(async_client_data_dtor_t dtor)
369{
[f302586]370 assert(async_client_data_destroy == default_client_data_destructor);
[46eec3b]371 async_client_data_destroy = dtor;
372}
373
[b688fd8]374/** Default fallback fibril function.
[47b7006]375 *
[01c3bb4]376 * This fallback fibril function gets called on incomming connections that do
377 * not have a specific handler defined.
[47b7006]378 *
[01c3bb4]379 * @param chandle Handle of the incoming call.
380 * @param call Data of the incoming call.
381 * @param arg Local argument
[47b7006]382 *
383 */
[01c3bb4]384static void default_fallback_port_handler(cap_handle_t chandle,
385 ipc_call_t *call, void *arg)
[47b7006]386{
[01c3bb4]387 ipc_answer_0(chandle, ENOENT);
[47b7006]388}
[36c9234]389
[b688fd8]390static async_port_handler_t fallback_port_handler =
391 default_fallback_port_handler;
392static void *fallback_port_data = NULL;
[da0c91e7]393
[566992e1]394static hash_table_t interface_hash_table;
395
396static size_t interface_key_hash(void *key)
397{
398 iface_t iface = *(iface_t *) key;
399 return iface;
400}
401
402static size_t interface_hash(const ht_link_t *item)
403{
404 interface_t *interface = hash_table_get_inst(item, interface_t, link);
405 return interface_key_hash(&interface->iface);
406}
407
408static bool interface_key_equal(void *key, const ht_link_t *item)
409{
410 iface_t iface = *(iface_t *) key;
411 interface_t *interface = hash_table_get_inst(item, interface_t, link);
412 return iface == interface->iface;
413}
414
415/** Operations for the port hash table. */
416static hash_table_ops_t interface_hash_table_ops = {
417 .hash = interface_hash,
418 .key_hash = interface_key_hash,
419 .key_equal = interface_key_equal,
420 .equal = NULL,
421 .remove_callback = NULL
422};
423
424static size_t port_key_hash(void *key)
425{
426 port_id_t port_id = *(port_id_t *) key;
427 return port_id;
428}
429
430static size_t port_hash(const ht_link_t *item)
431{
432 port_t *port = hash_table_get_inst(item, port_t, link);
433 return port_key_hash(&port->id);
434}
435
436static bool port_key_equal(void *key, const ht_link_t *item)
437{
438 port_id_t port_id = *(port_id_t *) key;
439 port_t *port = hash_table_get_inst(item, port_t, link);
440 return port_id == port->id;
441}
442
443/** Operations for the port hash table. */
444static hash_table_ops_t port_hash_table_ops = {
445 .hash = port_hash,
446 .key_hash = port_key_hash,
447 .key_equal = port_key_equal,
448 .equal = NULL,
449 .remove_callback = NULL
450};
451
452static interface_t *async_new_interface(iface_t iface)
453{
454 interface_t *interface =
455 (interface_t *) malloc(sizeof(interface_t));
456 if (!interface)
457 return NULL;
458
459 bool ret = hash_table_create(&interface->port_hash_table, 0, 0,
460 &port_hash_table_ops);
461 if (!ret) {
462 free(interface);
463 return NULL;
464 }
465
466 interface->iface = iface;
467 futex_initialize(&interface->futex, 1);
468 interface->port_id_avail = 0;
469
470 hash_table_insert(&interface_hash_table, &interface->link);
471
472 return interface;
473}
474
475static port_t *async_new_port(interface_t *interface,
476 async_port_handler_t handler, void *data)
477{
478 port_t *port = (port_t *) malloc(sizeof(port_t));
479 if (!port)
480 return NULL;
481
482 futex_down(&interface->futex);
483
484 port_id_t id = interface->port_id_avail;
485 interface->port_id_avail++;
486
487 port->id = id;
488 port->handler = handler;
489 port->data = data;
490
491 hash_table_insert(&interface->port_hash_table, &port->link);
492
493 futex_up(&interface->futex);
494
495 return port;
496}
497
[79ae36dd]498/** Mutex protecting inactive_exch_list and avail_phone_cv.
499 *
500 */
501static FIBRIL_MUTEX_INITIALIZE(async_sess_mutex);
502
503/** List of all currently inactive exchanges.
504 *
505 */
506static LIST_INITIALIZE(inactive_exch_list);
507
508/** Condition variable to wait for a phone to become available.
509 *
510 */
511static FIBRIL_CONDVAR_INITIALIZE(avail_phone_cv);
512
[566992e1]513int async_create_port(iface_t iface, async_port_handler_t handler,
514 void *data, port_id_t *port_id)
515{
516 if ((iface & IFACE_MOD_MASK) == IFACE_MOD_CALLBACK)
517 return EINVAL;
518
519 interface_t *interface;
520
521 futex_down(&async_futex);
522
523 ht_link_t *link = hash_table_find(&interface_hash_table, &iface);
524 if (link)
525 interface = hash_table_get_inst(link, interface_t, link);
526 else
527 interface = async_new_interface(iface);
528
529 if (!interface) {
530 futex_up(&async_futex);
531 return ENOMEM;
532 }
533
534 port_t *port = async_new_port(interface, handler, data);
535 if (!port) {
536 futex_up(&async_futex);
537 return ENOMEM;
538 }
539
540 *port_id = port->id;
541
542 futex_up(&async_futex);
543
544 return EOK;
545}
546
[b688fd8]547void async_set_fallback_port_handler(async_port_handler_t handler, void *data)
548{
549 assert(handler != NULL);
550
551 fallback_port_handler = handler;
552 fallback_port_data = data;
553}
554
[c80fdd0]555static hash_table_t client_hash_table;
[c07544d3]556static hash_table_t conn_hash_table;
[8820544]557static hash_table_t notification_hash_table;
[c07544d3]558static LIST_INITIALIZE(timeout_list);
559
[8820544]560static sysarg_t notification_avail = 0;
561
562static size_t client_key_hash(void *key)
[c80fdd0]563{
[8820544]564 task_id_t in_task_id = *(task_id_t *) key;
565 return in_task_id;
[c80fdd0]566}
567
[062d900]568static size_t client_hash(const ht_link_t *item)
[c80fdd0]569{
[062d900]570 client_t *client = hash_table_get_inst(item, client_t, link);
571 return client_key_hash(&client->in_task_id);
[c80fdd0]572}
573
[8820544]574static bool client_key_equal(void *key, const ht_link_t *item)
[c80fdd0]575{
[8820544]576 task_id_t in_task_id = *(task_id_t *) key;
[062d900]577 client_t *client = hash_table_get_inst(item, client_t, link);
[8820544]578 return in_task_id == client->in_task_id;
[c80fdd0]579}
580
581/** Operations for the client hash table. */
[062d900]582static hash_table_ops_t client_hash_table_ops = {
[c80fdd0]583 .hash = client_hash,
[062d900]584 .key_hash = client_key_hash,
585 .key_equal = client_key_equal,
[4e00f87]586 .equal = NULL,
587 .remove_callback = NULL
[c80fdd0]588};
[80649a91]589
[853802e]590typedef struct {
591 task_id_t task_id;
592 sysarg_t phone_hash;
593} conn_key_t;
594
595/** Compute hash into the connection hash table
[e70bfa5]596 *
[853802e]597 * The hash is based on the source task ID and the source phone hash. The task
598 * ID is included in the hash because a phone hash alone might not be unique
599 * while we still track connections for killed tasks due to kernel's recycling
600 * of phone structures.
601 *
602 * @param key Pointer to the connection key structure.
[c07544d3]603 *
604 * @return Index into the connection hash table.
[e70bfa5]605 *
606 */
[062d900]607static size_t conn_key_hash(void *key)
[450cd3a]608{
[853802e]609 conn_key_t *ck = (conn_key_t *) key;
610
611 size_t hash = 0;
612 hash = hash_combine(hash, LOWER32(ck->task_id));
613 hash = hash_combine(hash, UPPER32(ck->task_id));
614 hash = hash_combine(hash, ck->phone_hash);
615 return hash;
[450cd3a]616}
[06502f7d]617
[062d900]618static size_t conn_hash(const ht_link_t *item)
[450cd3a]619{
[062d900]620 connection_t *conn = hash_table_get_inst(item, connection_t, link);
[853802e]621 return conn_key_hash(&(conn_key_t){
622 .task_id = conn->in_task_id,
623 .phone_hash = conn->in_phone_hash
624 });
[450cd3a]625}
[06502f7d]626
[062d900]627static bool conn_key_equal(void *key, const ht_link_t *item)
[450cd3a]628{
[853802e]629 conn_key_t *ck = (conn_key_t *) key;
[062d900]630 connection_t *conn = hash_table_get_inst(item, connection_t, link);
[853802e]631 return ((ck->task_id == conn->in_task_id) &&
632 (ck->phone_hash == conn->in_phone_hash));
[450cd3a]633}
634
[e70bfa5]635/** Operations for the connection hash table. */
[062d900]636static hash_table_ops_t conn_hash_table_ops = {
[80649a91]637 .hash = conn_hash,
[062d900]638 .key_hash = conn_key_hash,
639 .key_equal = conn_key_equal,
[4e00f87]640 .equal = NULL,
641 .remove_callback = NULL
[80649a91]642};
643
[9ef495f]644static client_t *async_client_get(task_id_t client_id, bool create)
645{
646 client_t *client = NULL;
647
648 futex_down(&async_futex);
649 ht_link_t *link = hash_table_find(&client_hash_table, &client_id);
650 if (link) {
651 client = hash_table_get_inst(link, client_t, link);
652 atomic_inc(&client->refcnt);
653 } else if (create) {
654 client = malloc(sizeof(client_t));
655 if (client) {
656 client->in_task_id = client_id;
657 client->data = async_client_data_create();
658
659 atomic_set(&client->refcnt, 1);
660 hash_table_insert(&client_hash_table, &client->link);
661 }
662 }
663
664 futex_up(&async_futex);
665 return client;
666}
667
668static void async_client_put(client_t *client)
669{
670 bool destroy;
671
672 futex_down(&async_futex);
673
674 if (atomic_predec(&client->refcnt) == 0) {
675 hash_table_remove(&client_hash_table, &client->in_task_id);
676 destroy = true;
677 } else
678 destroy = false;
679
680 futex_up(&async_futex);
681
682 if (destroy) {
683 if (client->data)
684 async_client_data_destroy(client->data);
685
686 free(client);
687 }
688}
689
690/** Wrapper for client connection fibril.
691 *
692 * When a new connection arrives, a fibril with this implementing
693 * function is created.
694 *
695 * @param arg Connection structure pointer.
696 *
697 * @return Always zero.
698 *
699 */
700static int connection_fibril(void *arg)
701{
702 assert(arg);
703
704 /*
705 * Setup fibril-local connection pointer.
706 */
707 fibril_connection = (connection_t *) arg;
708
709 /*
710 * Add our reference for the current connection in the client task
711 * tracking structure. If this is the first reference, create and
712 * hash in a new tracking structure.
713 */
714
715 client_t *client = async_client_get(fibril_connection->in_task_id, true);
716 if (!client) {
[01c3bb4]717 ipc_answer_0(fibril_connection->chandle, ENOMEM);
[9ef495f]718 return 0;
719 }
720
721 fibril_connection->client = client;
722
723 /*
724 * Call the connection handler function.
725 */
[01c3bb4]726 fibril_connection->handler(fibril_connection->chandle,
[9ef495f]727 &fibril_connection->call, fibril_connection->data);
728
729 /*
730 * Remove the reference for this client task connection.
731 */
732 async_client_put(client);
733
734 /*
735 * Remove myself from the connection hash table.
736 */
737 futex_down(&async_futex);
[853802e]738 hash_table_remove(&conn_hash_table, &(conn_key_t){
739 .task_id = fibril_connection->in_task_id,
740 .phone_hash = fibril_connection->in_phone_hash
741 });
[9ef495f]742 futex_up(&async_futex);
743
744 /*
745 * Answer all remaining messages with EHANGUP.
746 */
747 while (!list_empty(&fibril_connection->msg_queue)) {
748 msg_t *msg =
749 list_get_instance(list_first(&fibril_connection->msg_queue),
750 msg_t, link);
751
752 list_remove(&msg->link);
[01c3bb4]753 ipc_answer_0(msg->chandle, EHANGUP);
[9ef495f]754 free(msg);
755 }
756
757 /*
758 * If the connection was hung-up, answer the last call,
759 * i.e. IPC_M_PHONE_HUNGUP.
760 */
[01c3bb4]761 if (fibril_connection->close_chandle)
762 ipc_answer_0(fibril_connection->close_chandle, EOK);
[9ef495f]763
764 free(fibril_connection);
765 return 0;
766}
767
768/** Create a new fibril for a new connection.
769 *
[01c3bb4]770 * Create new fibril for connection, fill in connection structures and insert it
771 * into the hash table, so that later we can easily do routing of messages to
772 * particular fibrils.
[9ef495f]773 *
[01c3bb4]774 * @param in_task_id Identification of the incoming connection.
775 * @param in_phone_hash Identification of the incoming connection.
776 * @param chandle Handle of the opening IPC_M_CONNECT_ME_TO call.
777 * If chandle is CAP_NIL, the connection was opened by
778 * accepting the IPC_M_CONNECT_TO_ME call and this
779 * function is called directly by the server.
780 * @param call Call data of the opening call.
781 * @param handler Connection handler.
782 * @param data Client argument to pass to the connection handler.
[9ef495f]783 *
[01c3bb4]784 * @return New fibril id or NULL on failure.
[9ef495f]785 *
786 */
787static fid_t async_new_connection(task_id_t in_task_id, sysarg_t in_phone_hash,
[01c3bb4]788 cap_handle_t chandle, ipc_call_t *call, async_port_handler_t handler,
[9ef495f]789 void *data)
790{
791 connection_t *conn = malloc(sizeof(*conn));
792 if (!conn) {
[01c3bb4]793 if (chandle != CAP_NIL)
794 ipc_answer_0(chandle, ENOMEM);
[9ef495f]795
796 return (uintptr_t) NULL;
797 }
798
799 conn->in_task_id = in_task_id;
800 conn->in_phone_hash = in_phone_hash;
801 list_initialize(&conn->msg_queue);
[01c3bb4]802 conn->chandle = chandle;
803 conn->close_chandle = CAP_NIL;
[9ef495f]804 conn->handler = handler;
805 conn->data = data;
806
807 if (call)
808 conn->call = *call;
809
810 /* We will activate the fibril ASAP */
811 conn->wdata.active = true;
812 conn->wdata.fid = fibril_create(connection_fibril, conn);
813
814 if (conn->wdata.fid == 0) {
815 free(conn);
816
[01c3bb4]817 if (chandle != CAP_NIL)
818 ipc_answer_0(chandle, ENOMEM);
[9ef495f]819
820 return (uintptr_t) NULL;
821 }
822
823 /* Add connection to the connection hash table */
824
825 futex_down(&async_futex);
826 hash_table_insert(&conn_hash_table, &conn->link);
827 futex_up(&async_futex);
828
829 fibril_add_ready(conn->wdata.fid);
830
831 return conn->wdata.fid;
832}
833
[78bb04b]834/** Wrapper for making IPC_M_CONNECT_TO_ME calls using the async framework.
835 *
836 * Ask through phone for a new connection to some service.
837 *
838 * @param exch Exchange for sending the message.
839 * @param iface Callback interface.
840 * @param arg1 User defined argument.
841 * @param arg2 User defined argument.
842 * @param handler Callback handler.
843 * @param data Handler data.
844 * @param port_id ID of the newly created port.
845 *
846 * @return Zero on success or a negative error code.
847 *
848 */
849int async_create_callback_port(async_exch_t *exch, iface_t iface, sysarg_t arg1,
850 sysarg_t arg2, async_port_handler_t handler, void *data, port_id_t *port_id)
851{
852 if ((iface & IFACE_MOD_CALLBACK) != IFACE_MOD_CALLBACK)
853 return EINVAL;
854
855 if (exch == NULL)
856 return ENOENT;
857
858 ipc_call_t answer;
859 aid_t req = async_send_3(exch, IPC_M_CONNECT_TO_ME, iface, arg1, arg2,
860 &answer);
861
862 sysarg_t ret;
863 async_wait_for(req, &ret);
864 if (ret != EOK)
865 return (int) ret;
866
867 sysarg_t phone_hash = IPC_GET_ARG5(answer);
868 interface_t *interface;
869
870 futex_down(&async_futex);
871
872 ht_link_t *link = hash_table_find(&interface_hash_table, &iface);
873 if (link)
874 interface = hash_table_get_inst(link, interface_t, link);
875 else
876 interface = async_new_interface(iface);
877
878 if (!interface) {
879 futex_up(&async_futex);
880 return ENOMEM;
881 }
882
883 port_t *port = async_new_port(interface, handler, data);
884 if (!port) {
885 futex_up(&async_futex);
886 return ENOMEM;
887 }
888
889 *port_id = port->id;
890
891 futex_up(&async_futex);
892
893 fid_t fid = async_new_connection(answer.in_task_id, phone_hash,
[01c3bb4]894 CAP_NIL, NULL, handler, data);
[78bb04b]895 if (fid == (uintptr_t) NULL)
896 return ENOMEM;
897
898 return EOK;
899}
900
[8820544]901static size_t notification_key_hash(void *key)
902{
903 sysarg_t id = *(sysarg_t *) key;
904 return id;
905}
906
907static size_t notification_hash(const ht_link_t *item)
908{
909 notification_t *notification =
910 hash_table_get_inst(item, notification_t, link);
911 return notification_key_hash(&notification->imethod);
912}
913
914static bool notification_key_equal(void *key, const ht_link_t *item)
915{
916 sysarg_t id = *(sysarg_t *) key;
917 notification_t *notification =
918 hash_table_get_inst(item, notification_t, link);
919 return id == notification->imethod;
920}
921
922/** Operations for the notification hash table. */
923static hash_table_ops_t notification_hash_table_ops = {
924 .hash = notification_hash,
925 .key_hash = notification_key_hash,
926 .key_equal = notification_key_equal,
927 .equal = NULL,
928 .remove_callback = NULL
929};
930
[e70bfa5]931/** Sort in current fibril's timeout request.
[49d072e]932 *
[c07544d3]933 * @param wd Wait data of the current fibril.
934 *
[49d072e]935 */
[b6ee5b1]936void async_insert_timeout(awaiter_t *wd)
[49d072e]937{
[79ae36dd]938 assert(wd);
939
[f53cc81]940 wd->to_event.occurred = false;
941 wd->to_event.inlist = true;
[c07544d3]942
[b72efe8]943 link_t *tmp = timeout_list.head.next;
944 while (tmp != &timeout_list.head) {
[47b7006]945 awaiter_t *cur
946 = list_get_instance(tmp, awaiter_t, to_event.link);
[c07544d3]947
[f53cc81]948 if (tv_gteq(&cur->to_event.expires, &wd->to_event.expires))
[49d072e]949 break;
[47b7006]950
[49d072e]951 tmp = tmp->next;
952 }
[c07544d3]953
[b72efe8]954 list_insert_before(&wd->to_event.link, tmp);
[49d072e]955}
956
[e70bfa5]957/** Try to route a call to an appropriate connection fibril.
[80649a91]958 *
[36c9234]959 * If the proper connection fibril is found, a message with the call is added to
960 * its message queue. If the fibril was not active, it is activated and all
961 * timeouts are unregistered.
962 *
[01c3bb4]963 * @param chandle Handle of the incoming call.
964 * @param call Data of the incoming call.
[c07544d3]965 *
966 * @return False if the call doesn't match any connection.
[47b7006]967 * @return True if the call was passed to the respective connection fibril.
[36c9234]968 *
[80649a91]969 */
[01c3bb4]970static bool route_call(cap_handle_t chandle, ipc_call_t *call)
[450cd3a]971{
[79ae36dd]972 assert(call);
973
[01ff41c]974 futex_down(&async_futex);
[c07544d3]975
[853802e]976 ht_link_t *link = hash_table_find(&conn_hash_table, &(conn_key_t){
977 .task_id = call->in_task_id,
978 .phone_hash = call->in_phone_hash
979 });
[8820544]980 if (!link) {
[01ff41c]981 futex_up(&async_futex);
[c07544d3]982 return false;
[450cd3a]983 }
[c07544d3]984
[8820544]985 connection_t *conn = hash_table_get_inst(link, connection_t, link);
[c07544d3]986
987 msg_t *msg = malloc(sizeof(*msg));
988 if (!msg) {
989 futex_up(&async_futex);
990 return false;
991 }
992
[01c3bb4]993 msg->chandle = chandle;
[80649a91]994 msg->call = *call;
995 list_append(&msg->link, &conn->msg_queue);
[c07544d3]996
[228e490]997 if (IPC_GET_IMETHOD(*call) == IPC_M_PHONE_HUNGUP)
[01c3bb4]998 conn->close_chandle = chandle;
[80649a91]999
[36c9234]1000 /* If the connection fibril is waiting for an event, activate it */
[49d072e]1001 if (!conn->wdata.active) {
[c07544d3]1002
[49d072e]1003 /* If in timeout list, remove it */
[f53cc81]1004 if (conn->wdata.to_event.inlist) {
1005 conn->wdata.to_event.inlist = false;
1006 list_remove(&conn->wdata.to_event.link);
[49d072e]1007 }
[c07544d3]1008
1009 conn->wdata.active = true;
[bc1f1c2]1010 fibril_add_ready(conn->wdata.fid);
[80649a91]1011 }
[c07544d3]1012
[01ff41c]1013 futex_up(&async_futex);
[c07544d3]1014 return true;
1015}
[80649a91]1016
[c170438]1017/** Process notification.
[c07544d3]1018 *
[c170438]1019 * @param call Data of the incoming call.
[58563585]1020 *
[c07544d3]1021 */
[01c3bb4]1022static void process_notification(ipc_call_t *call)
[c07544d3]1023{
[8820544]1024 async_notification_handler_t handler = NULL;
1025 void *data = NULL;
[c170438]1026
1027 assert(call);
[8820544]1028
1029 futex_down(&async_futex);
1030
1031 ht_link_t *link = hash_table_find(&notification_hash_table,
[c170438]1032 &IPC_GET_IMETHOD(*call));
[8820544]1033 if (link) {
1034 notification_t *notification =
1035 hash_table_get_inst(link, notification_t, link);
1036 handler = notification->handler;
1037 data = notification->data;
1038 }
1039
1040 futex_up(&async_futex);
1041
1042 if (handler)
[01c3bb4]1043 handler(call, data);
[80649a91]1044}
1045
[8820544]1046/** Subscribe to IRQ notification.
1047 *
1048 * @param inr IRQ number.
1049 * @param handler Notification handler.
1050 * @param data Notification handler client data.
1051 * @param ucode Top-half pseudocode handler.
1052 *
[3f74275]1053 * @return IRQ capability handle on success.
[e9d15d9]1054 * @return Negative error code.
[8820544]1055 *
1056 */
[24abb85d]1057int async_irq_subscribe(int inr, async_notification_handler_t handler,
1058 void *data, const irq_code_t *ucode)
[8820544]1059{
1060 notification_t *notification =
1061 (notification_t *) malloc(sizeof(notification_t));
1062 if (!notification)
1063 return ENOMEM;
1064
1065 futex_down(&async_futex);
1066
1067 sysarg_t imethod = notification_avail;
1068 notification_avail++;
1069
1070 notification->imethod = imethod;
1071 notification->handler = handler;
1072 notification->data = data;
1073
1074 hash_table_insert(&notification_hash_table, &notification->link);
1075
1076 futex_up(&async_futex);
1077
[9233e9d]1078 cap_handle_t cap;
1079 int rc = ipc_irq_subscribe(inr, imethod, ucode, &cap);
1080 if (rc != EOK) {
1081 return rc;
1082 }
1083 return cap;
[8820544]1084}
1085
1086/** Unsubscribe from IRQ notification.
1087 *
[3f74275]1088 * @param cap IRQ capability handle.
[8820544]1089 *
1090 * @return Zero on success or a negative error code.
1091 *
1092 */
[e9d15d9]1093int async_irq_unsubscribe(int cap)
[8820544]1094{
1095 // TODO: Remove entry from hash table
1096 // to avoid memory leak
1097
[e9d15d9]1098 return ipc_irq_unsubscribe(cap);
[8820544]1099}
1100
1101/** Subscribe to event notifications.
1102 *
1103 * @param evno Event type to subscribe.
1104 * @param handler Notification handler.
1105 * @param data Notification handler client data.
1106 *
1107 * @return Zero on success or a negative error code.
1108 *
1109 */
1110int async_event_subscribe(event_type_t evno,
1111 async_notification_handler_t handler, void *data)
1112{
1113 notification_t *notification =
1114 (notification_t *) malloc(sizeof(notification_t));
1115 if (!notification)
1116 return ENOMEM;
1117
1118 futex_down(&async_futex);
1119
1120 sysarg_t imethod = notification_avail;
1121 notification_avail++;
1122
1123 notification->imethod = imethod;
1124 notification->handler = handler;
1125 notification->data = data;
1126
1127 hash_table_insert(&notification_hash_table, &notification->link);
1128
1129 futex_up(&async_futex);
1130
1131 return ipc_event_subscribe(evno, imethod);
1132}
1133
1134/** Subscribe to task event notifications.
1135 *
1136 * @param evno Event type to subscribe.
1137 * @param handler Notification handler.
1138 * @param data Notification handler client data.
1139 *
1140 * @return Zero on success or a negative error code.
1141 *
1142 */
1143int async_event_task_subscribe(event_task_type_t evno,
1144 async_notification_handler_t handler, void *data)
1145{
1146 notification_t *notification =
1147 (notification_t *) malloc(sizeof(notification_t));
1148 if (!notification)
1149 return ENOMEM;
1150
1151 futex_down(&async_futex);
1152
1153 sysarg_t imethod = notification_avail;
1154 notification_avail++;
1155
1156 notification->imethod = imethod;
1157 notification->handler = handler;
1158 notification->data = data;
1159
1160 hash_table_insert(&notification_hash_table, &notification->link);
1161
1162 futex_up(&async_futex);
1163
1164 return ipc_event_task_subscribe(evno, imethod);
1165}
1166
1167/** Unmask event notifications.
1168 *
1169 * @param evno Event type to unmask.
1170 *
1171 * @return Value returned by the kernel.
1172 *
1173 */
1174int async_event_unmask(event_type_t evno)
1175{
1176 return ipc_event_unmask(evno);
1177}
1178
1179/** Unmask task event notifications.
1180 *
1181 * @param evno Event type to unmask.
1182 *
1183 * @return Value returned by the kernel.
1184 *
1185 */
1186int async_event_task_unmask(event_task_type_t evno)
1187{
1188 return ipc_event_task_unmask(evno);
1189}
1190
[e70bfa5]1191/** Return new incoming message for the current (fibril-local) connection.
1192 *
[01c3bb4]1193 * @param call Storage where the incoming call data will be stored.
1194 * @param usecs Timeout in microseconds. Zero denotes no timeout.
[e70bfa5]1195 *
[01c3bb4]1196 * @return If no timeout was specified, then a handle of the incoming call is
1197 * returned. If a timeout is specified, then a handle of the incoming
1198 * call is returned unless the timeout expires prior to receiving a
1199 * message. In that case zero CAP_NIL is returned.
[e70bfa5]1200 */
[01c3bb4]1201cap_handle_t async_get_call_timeout(ipc_call_t *call, suseconds_t usecs)
[80649a91]1202{
[79ae36dd]1203 assert(call);
1204 assert(fibril_connection);
[c07544d3]1205
1206 /* Why doing this?
[79ae36dd]1207 * GCC 4.1.0 coughs on fibril_connection-> dereference.
[6c46350]1208 * GCC 4.1.1 happilly puts the rdhwr instruction in delay slot.
[c07544d3]1209 * I would never expect to find so many errors in
1210 * a compiler.
[6c46350]1211 */
[79ae36dd]1212 connection_t *conn = fibril_connection;
[c07544d3]1213
[01ff41c]1214 futex_down(&async_futex);
[c07544d3]1215
[49d072e]1216 if (usecs) {
[45cbcaf4]1217 getuptime(&conn->wdata.to_event.expires);
[7f9d97f3]1218 tv_add_diff(&conn->wdata.to_event.expires, usecs);
[c07544d3]1219 } else
[f53cc81]1220 conn->wdata.to_event.inlist = false;
[c07544d3]1221
[e70bfa5]1222 /* If nothing in queue, wait until something arrives */
[6c46350]1223 while (list_empty(&conn->msg_queue)) {
[01c3bb4]1224 if (conn->close_chandle) {
[8c8f8d6]1225 /*
1226 * Handle the case when the connection was already
1227 * closed by the client but the server did not notice
1228 * the first IPC_M_PHONE_HUNGUP call and continues to
1229 * call async_get_call_timeout(). Repeat
[47b7006]1230 * IPC_M_PHONE_HUNGUP until the caller notices.
[8c8f8d6]1231 */
1232 memset(call, 0, sizeof(ipc_call_t));
[228e490]1233 IPC_SET_IMETHOD(*call, IPC_M_PHONE_HUNGUP);
[8c8f8d6]1234 futex_up(&async_futex);
[01c3bb4]1235 return conn->close_chandle;
[8c8f8d6]1236 }
[47b7006]1237
[085bd54]1238 if (usecs)
[b6ee5b1]1239 async_insert_timeout(&conn->wdata);
[c07544d3]1240
1241 conn->wdata.active = false;
1242
[c7509e5]1243 /*
1244 * Note: the current fibril will be rescheduled either due to a
1245 * timeout or due to an arriving message destined to it. In the
1246 * former case, handle_expired_timeouts() and, in the latter
1247 * case, route_call() will perform the wakeup.
1248 */
[116d3f6f]1249 fibril_switch(FIBRIL_TO_MANAGER);
[c07544d3]1250
[e70bfa5]1251 /*
[c07544d3]1252 * Futex is up after getting back from async_manager.
1253 * Get it again.
[c7509e5]1254 */
[49d072e]1255 futex_down(&async_futex);
[f53cc81]1256 if ((usecs) && (conn->wdata.to_event.occurred)
[c07544d3]1257 && (list_empty(&conn->msg_queue))) {
[e70bfa5]1258 /* If we timed out -> exit */
[49d072e]1259 futex_up(&async_futex);
[01c3bb4]1260 return CAP_NIL;
[49d072e]1261 }
[450cd3a]1262 }
1263
[57dea62]1264 msg_t *msg = list_get_instance(list_first(&conn->msg_queue),
1265 msg_t, link);
[80649a91]1266 list_remove(&msg->link);
[c07544d3]1267
[01c3bb4]1268 cap_handle_t chandle = msg->chandle;
[80649a91]1269 *call = msg->call;
1270 free(msg);
1271
[01ff41c]1272 futex_up(&async_futex);
[01c3bb4]1273 return chandle;
[80649a91]1274}
1275
[455f190]1276void *async_get_client_data(void)
1277{
1278 assert(fibril_connection);
1279 return fibril_connection->client->data;
1280}
1281
[e2ab36f1]1282void *async_get_client_data_by_id(task_id_t client_id)
[455f190]1283{
[e2ab36f1]1284 client_t *client = async_client_get(client_id, false);
[455f190]1285 if (!client)
1286 return NULL;
[57dea62]1287
[455f190]1288 if (!client->data) {
1289 async_client_put(client);
1290 return NULL;
1291 }
[57dea62]1292
[455f190]1293 return client->data;
1294}
1295
[e2ab36f1]1296void async_put_client_data_by_id(task_id_t client_id)
[455f190]1297{
[e2ab36f1]1298 client_t *client = async_client_get(client_id, false);
[57dea62]1299
[455f190]1300 assert(client);
1301 assert(client->data);
[57dea62]1302
[cdc8ee2d]1303 /* Drop the reference we got in async_get_client_data_by_hash(). */
1304 async_client_put(client);
[57dea62]1305
[cdc8ee2d]1306 /* Drop our own reference we got at the beginning of this function. */
[455f190]1307 async_client_put(client);
1308}
1309
[566992e1]1310static port_t *async_find_port(iface_t iface, port_id_t port_id)
1311{
1312 port_t *port = NULL;
1313
1314 futex_down(&async_futex);
1315
1316 ht_link_t *link = hash_table_find(&interface_hash_table, &iface);
1317 if (link) {
1318 interface_t *interface =
1319 hash_table_get_inst(link, interface_t, link);
1320
1321 link = hash_table_find(&interface->port_hash_table, &port_id);
1322 if (link)
1323 port = hash_table_get_inst(link, port_t, link);
1324 }
1325
1326 futex_up(&async_futex);
1327
1328 return port;
1329}
1330
[36c9234]1331/** Handle a call that was received.
1332 *
1333 * If the call has the IPC_M_CONNECT_ME_TO method, a new connection is created.
1334 * Otherwise the call is routed to its connection fibril.
1335 *
[01c3bb4]1336 * @param chandle Handle of the incoming call.
1337 * @param call Data of the incoming call.
[6b21292]1338 *
[36c9234]1339 */
[01c3bb4]1340static void handle_call(cap_handle_t chandle, ipc_call_t *call)
[80649a91]1341{
[79ae36dd]1342 assert(call);
1343
[b688fd8]1344 /* Kernel notification */
[addbce4]1345 if ((chandle == CAP_NIL) && (call->flags & IPC_CALL_NOTIF)) {
[c170438]1346 fibril_t *fibril = (fibril_t *) __tcb_get()->fibril_data;
1347 unsigned oldsw = fibril->switches;
[58563585]1348
[01c3bb4]1349 process_notification(call);
[58563585]1350
[c170438]1351 if (oldsw != fibril->switches) {
1352 /*
1353 * The notification handler did not execute atomically
1354 * and so the current manager fibril assumed the role of
1355 * a notification fibril. While waiting for its
1356 * resources, it switched to another manager fibril that
1357 * had already existed or it created a new one. We
1358 * therefore know there is at least yet another
1359 * manager fibril that can take over. We now kill the
1360 * current 'notification' fibril to prevent fibril
1361 * population explosion.
1362 */
1363 futex_down(&async_futex);
1364 fibril_switch(FIBRIL_FROM_DEAD);
1365 }
[58563585]1366
[47b7006]1367 return;
[6b21292]1368 }
1369
[566992e1]1370 /* New connection */
1371 if (IPC_GET_IMETHOD(*call) == IPC_M_CONNECT_ME_TO) {
1372 iface_t iface = (iface_t) IPC_GET_ARG1(*call);
1373 sysarg_t in_phone_hash = IPC_GET_ARG5(*call);
1374
[01c3bb4]1375 async_port_handler_t handler = fallback_port_handler;
[566992e1]1376 void *data = fallback_port_data;
1377
1378 // TODO: Currently ignores all ports but the first one
1379 port_t *port = async_find_port(iface, 0);
1380 if (port) {
1381 handler = port->handler;
1382 data = port->data;
1383 }
1384
[01c3bb4]1385 async_new_connection(call->in_task_id, in_phone_hash, chandle,
[566992e1]1386 call, handler, data);
1387 return;
1388 }
1389
[36c9234]1390 /* Try to route the call through the connection hash table */
[01c3bb4]1391 if (route_call(chandle, call))
[47b7006]1392 return;
[6b21292]1393
[44c6d88d]1394 /* Unknown call from unknown phone - hang it up */
[01c3bb4]1395 ipc_answer_0(chandle, EHANGUP);
[450cd3a]1396}
1397
[f2f0392]1398/** Fire all timeouts that expired. */
[c042bdd]1399static void handle_expired_timeouts(void)
1400{
1401 struct timeval tv;
[45cbcaf4]1402 getuptime(&tv);
[c07544d3]1403
[c042bdd]1404 futex_down(&async_futex);
[c07544d3]1405
[b72efe8]1406 link_t *cur = list_first(&timeout_list);
1407 while (cur != NULL) {
[47b7006]1408 awaiter_t *waiter =
1409 list_get_instance(cur, awaiter_t, to_event.link);
[c07544d3]1410
[f53cc81]1411 if (tv_gt(&waiter->to_event.expires, &tv))
[c042bdd]1412 break;
[47b7006]1413
[f53cc81]1414 list_remove(&waiter->to_event.link);
1415 waiter->to_event.inlist = false;
1416 waiter->to_event.occurred = true;
[c07544d3]1417
[36c9234]1418 /*
[c07544d3]1419 * Redundant condition?
1420 * The fibril should not be active when it gets here.
[c042bdd]1421 */
[49d072e]1422 if (!waiter->active) {
[c07544d3]1423 waiter->active = true;
[bc1f1c2]1424 fibril_add_ready(waiter->fid);
[c042bdd]1425 }
[b72efe8]1426
1427 cur = list_first(&timeout_list);
[c042bdd]1428 }
[c07544d3]1429
[c042bdd]1430 futex_up(&async_futex);
1431}
1432
[36c9234]1433/** Endless loop dispatching incoming calls and answers.
1434 *
[c07544d3]1435 * @return Never returns.
1436 *
[36c9234]1437 */
[085bd54]1438static int async_manager_worker(void)
[80649a91]1439{
[c07544d3]1440 while (true) {
[116d3f6f]1441 if (fibril_switch(FIBRIL_FROM_MANAGER)) {
[47b7006]1442 futex_up(&async_futex);
[36c9234]1443 /*
1444 * async_futex is always held when entering a manager
1445 * fibril.
[a46da63]1446 */
[80649a91]1447 continue;
1448 }
[c07544d3]1449
[c042bdd]1450 futex_down(&async_futex);
[c07544d3]1451
1452 suseconds_t timeout;
[1db6dfd]1453 unsigned int flags = SYNCH_FLAGS_NONE;
[c042bdd]1454 if (!list_empty(&timeout_list)) {
[b72efe8]1455 awaiter_t *waiter = list_get_instance(
1456 list_first(&timeout_list), awaiter_t, to_event.link);
[c07544d3]1457
1458 struct timeval tv;
[45cbcaf4]1459 getuptime(&tv);
[c07544d3]1460
[f53cc81]1461 if (tv_gteq(&tv, &waiter->to_event.expires)) {
[6c46350]1462 futex_up(&async_futex);
[c042bdd]1463 handle_expired_timeouts();
[1db6dfd]1464 /*
1465 * Notice that even if the event(s) already
1466 * expired (and thus the other fibril was
1467 * supposed to be running already),
1468 * we check for incoming IPC.
1469 *
1470 * Otherwise, a fibril that continuously
1471 * creates (almost) expired events could
1472 * prevent IPC retrieval from the kernel.
1473 */
1474 timeout = 0;
1475 flags = SYNCH_FLAGS_NON_BLOCKING;
1476
1477 } else {
[7f9d97f3]1478 timeout = tv_sub_diff(&waiter->to_event.expires,
1479 &tv);
[1db6dfd]1480 futex_up(&async_futex);
1481 }
1482 } else {
1483 futex_up(&async_futex);
[0b99e40]1484 timeout = SYNCH_NO_TIMEOUT;
[1db6dfd]1485 }
[47b7006]1486
[8619f25]1487 atomic_inc(&threads_in_ipc_wait);
[c07544d3]1488
1489 ipc_call_t call;
[6deb2cd]1490 int rc = ipc_wait_cycle(&call, timeout, flags);
[c07544d3]1491
[8619f25]1492 atomic_dec(&threads_in_ipc_wait);
[47b7006]1493
[6deb2cd]1494 assert(rc == EOK);
[01c3bb4]1495
[6deb2cd]1496 if (call.cap_handle == CAP_NIL) {
[01c3bb4]1497 if (call.flags == 0) {
1498 /* This neither a notification nor an answer. */
1499 handle_expired_timeouts();
1500 continue;
1501 }
[0b99e40]1502 }
[01c3bb4]1503
[addbce4]1504 if (call.flags & IPC_CALL_ANSWERED)
[80649a91]1505 continue;
[01c3bb4]1506
[6deb2cd]1507 handle_call(call.cap_handle, &call);
[80649a91]1508 }
[01c3bb4]1509
[a46da63]1510 return 0;
[80649a91]1511}
1512
[36c9234]1513/** Function to start async_manager as a standalone fibril.
[c07544d3]1514 *
[36c9234]1515 * When more kernel threads are used, one async manager should exist per thread.
1516 *
[c07544d3]1517 * @param arg Unused.
1518 * @return Never returns.
[36c9234]1519 *
[a2cd194]1520 */
[9591265]1521static int async_manager_fibril(void *arg)
[80649a91]1522{
[a46da63]1523 futex_up(&async_futex);
[c07544d3]1524
[36c9234]1525 /*
1526 * async_futex is always locked when entering manager
1527 */
[085bd54]1528 async_manager_worker();
[a46da63]1529
1530 return 0;
[80649a91]1531}
[450cd3a]1532
[36c9234]1533/** Add one manager to manager list. */
[80649a91]1534void async_create_manager(void)
[450cd3a]1535{
[c170438]1536 fid_t fid = fibril_create_generic(async_manager_fibril, NULL, PAGE_SIZE);
[86d7bfa]1537 if (fid != 0)
1538 fibril_add_manager(fid);
[80649a91]1539}
1540
1541/** Remove one manager from manager list */
1542void async_destroy_manager(void)
1543{
[bc1f1c2]1544 fibril_remove_manager();
[80649a91]1545}
1546
[36c9234]1547/** Initialize the async framework.
1548 *
1549 */
[47b7006]1550void __async_init(void)
[80649a91]1551{
[566992e1]1552 if (!hash_table_create(&interface_hash_table, 0, 0,
1553 &interface_hash_table_ops))
1554 abort();
1555
[062d900]1556 if (!hash_table_create(&client_hash_table, 0, 0, &client_hash_table_ops))
[47b7006]1557 abort();
[80649a91]1558
[062d900]1559 if (!hash_table_create(&conn_hash_table, 0, 0, &conn_hash_table_ops))
[47b7006]1560 abort();
[79ae36dd]1561
[8820544]1562 if (!hash_table_create(&notification_hash_table, 0, 0,
1563 &notification_hash_table_ops))
1564 abort();
1565
[79ae36dd]1566 session_ns = (async_sess_t *) malloc(sizeof(async_sess_t));
1567 if (session_ns == NULL)
1568 abort();
1569
[566992e1]1570 session_ns->iface = 0;
[79ae36dd]1571 session_ns->mgmt = EXCHANGE_ATOMIC;
1572 session_ns->phone = PHONE_NS;
1573 session_ns->arg1 = 0;
1574 session_ns->arg2 = 0;
1575 session_ns->arg3 = 0;
1576
[58cbf8d5]1577 fibril_mutex_initialize(&session_ns->remote_state_mtx);
1578 session_ns->remote_state_data = NULL;
1579
[79ae36dd]1580 list_initialize(&session_ns->exch_list);
1581 fibril_mutex_initialize(&session_ns->mutex);
1582 atomic_set(&session_ns->refcnt, 0);
[450cd3a]1583}
[01ff41c]1584
[36c9234]1585/** Reply received callback.
[01ff41c]1586 *
[36c9234]1587 * This function is called whenever a reply for an asynchronous message sent out
1588 * by the asynchronous framework is received.
1589 *
1590 * Notify the fibril which is waiting for this message that it has arrived.
1591 *
[c07544d3]1592 * @param arg Pointer to the asynchronous message record.
1593 * @param retval Value returned in the answer.
1594 * @param data Call data of the answer.
[47b7006]1595 *
[01ff41c]1596 */
[79ae36dd]1597void reply_received(void *arg, int retval, ipc_call_t *data)
[01ff41c]1598{
[79ae36dd]1599 assert(arg);
1600
[9db9b10]1601 futex_down(&async_futex);
1602
[c07544d3]1603 amsg_t *msg = (amsg_t *) arg;
[01ff41c]1604 msg->retval = retval;
[c07544d3]1605
[36c9234]1606 /* Copy data after futex_down, just in case the call was detached */
[9db9b10]1607 if ((msg->dataptr) && (data))
[c07544d3]1608 *msg->dataptr = *data;
1609
[c042bdd]1610 write_barrier();
[c07544d3]1611
[c042bdd]1612 /* Remove message from timeout list */
[f53cc81]1613 if (msg->wdata.to_event.inlist)
1614 list_remove(&msg->wdata.to_event.link);
[c07544d3]1615
1616 msg->done = true;
[57dea62]1617
[47c9a8c]1618 if (msg->forget) {
1619 assert(msg->wdata.active);
1620 amsg_destroy(msg);
1621 } else if (!msg->wdata.active) {
[c07544d3]1622 msg->wdata.active = true;
[bc1f1c2]1623 fibril_add_ready(msg->wdata.fid);
[01ff41c]1624 }
[57dea62]1625
[01ff41c]1626 futex_up(&async_futex);
1627}
1628
[36c9234]1629/** Send message and return id of the sent message.
1630 *
1631 * The return value can be used as input for async_wait() to wait for
1632 * completion.
[01ff41c]1633 *
[79ae36dd]1634 * @param exch Exchange for sending the message.
1635 * @param imethod Service-defined interface and method.
[c07544d3]1636 * @param arg1 Service-defined payload argument.
1637 * @param arg2 Service-defined payload argument.
1638 * @param arg3 Service-defined payload argument.
1639 * @param arg4 Service-defined payload argument.
[01c3bb4]1640 * @param dataptr If non-NULL, storage where the reply data will be stored.
[c07544d3]1641 *
1642 * @return Hash of the sent message or 0 on error.
[36c9234]1643 *
[01ff41c]1644 */
[79ae36dd]1645aid_t async_send_fast(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
[96b02eb9]1646 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4, ipc_call_t *dataptr)
[01ff41c]1647{
[79ae36dd]1648 if (exch == NULL)
1649 return 0;
[c07544d3]1650
[47c9a8c]1651 amsg_t *msg = amsg_create();
[79ae36dd]1652 if (msg == NULL)
[c07544d3]1653 return 0;
[6b21292]1654
[01ff41c]1655 msg->dataptr = dataptr;
[c07544d3]1656 msg->wdata.active = true;
1657
[79ae36dd]1658 ipc_call_async_4(exch->phone, imethod, arg1, arg2, arg3, arg4, msg,
[dcc150cb]1659 reply_received);
[6b21292]1660
[01ff41c]1661 return (aid_t) msg;
1662}
1663
[90f5d64]1664/** Send message and return id of the sent message
1665 *
[36c9234]1666 * The return value can be used as input for async_wait() to wait for
1667 * completion.
1668 *
[79ae36dd]1669 * @param exch Exchange for sending the message.
1670 * @param imethod Service-defined interface and method.
[c07544d3]1671 * @param arg1 Service-defined payload argument.
1672 * @param arg2 Service-defined payload argument.
1673 * @param arg3 Service-defined payload argument.
1674 * @param arg4 Service-defined payload argument.
1675 * @param arg5 Service-defined payload argument.
1676 * @param dataptr If non-NULL, storage where the reply data will be
1677 * stored.
1678 *
1679 * @return Hash of the sent message or 0 on error.
[36c9234]1680 *
[90f5d64]1681 */
[79ae36dd]1682aid_t async_send_slow(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
[96b02eb9]1683 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4, sysarg_t arg5,
[0cc4313]1684 ipc_call_t *dataptr)
[90f5d64]1685{
[79ae36dd]1686 if (exch == NULL)
1687 return 0;
1688
[47c9a8c]1689 amsg_t *msg = amsg_create();
[79ae36dd]1690 if (msg == NULL)
[c07544d3]1691 return 0;
1692
[90f5d64]1693 msg->dataptr = dataptr;
[c07544d3]1694 msg->wdata.active = true;
[6b21292]1695
[79ae36dd]1696 ipc_call_async_5(exch->phone, imethod, arg1, arg2, arg3, arg4, arg5,
[dcc150cb]1697 msg, reply_received);
[6b21292]1698
[90f5d64]1699 return (aid_t) msg;
1700}
1701
[36c9234]1702/** Wait for a message sent by the async framework.
[01ff41c]1703 *
[c07544d3]1704 * @param amsgid Hash of the message to wait for.
1705 * @param retval Pointer to storage where the retval of the answer will
1706 * be stored.
1707 *
[01ff41c]1708 */
[96b02eb9]1709void async_wait_for(aid_t amsgid, sysarg_t *retval)
[01ff41c]1710{
[79ae36dd]1711 assert(amsgid);
1712
[01ff41c]1713 amsg_t *msg = (amsg_t *) amsgid;
[c07544d3]1714
[01ff41c]1715 futex_down(&async_futex);
[57dea62]1716
[47c9a8c]1717 assert(!msg->forget);
1718 assert(!msg->destroyed);
[57dea62]1719
[01ff41c]1720 if (msg->done) {
1721 futex_up(&async_futex);
1722 goto done;
1723 }
[c07544d3]1724
[bc1f1c2]1725 msg->wdata.fid = fibril_get_id();
[c07544d3]1726 msg->wdata.active = false;
[f53cc81]1727 msg->wdata.to_event.inlist = false;
[c07544d3]1728
[36c9234]1729 /* Leave the async_futex locked when entering this function */
[116d3f6f]1730 fibril_switch(FIBRIL_TO_MANAGER);
[c07544d3]1731
1732 /* Futex is up automatically after fibril_switch */
1733
[01ff41c]1734done:
1735 if (retval)
1736 *retval = msg->retval;
[c07544d3]1737
[47c9a8c]1738 amsg_destroy(msg);
[01ff41c]1739}
[0b99e40]1740
[36c9234]1741/** Wait for a message sent by the async framework, timeout variant.
[47c9a8c]1742 *
1743 * If the wait times out, the caller may choose to either wait again by calling
1744 * async_wait_for() or async_wait_timeout(), or forget the message via
1745 * async_forget().
[c042bdd]1746 *
[c07544d3]1747 * @param amsgid Hash of the message to wait for.
1748 * @param retval Pointer to storage where the retval of the answer will
1749 * be stored.
1750 * @param timeout Timeout in microseconds.
1751 *
1752 * @return Zero on success, ETIMEOUT if the timeout has expired.
[c042bdd]1753 *
1754 */
[96b02eb9]1755int async_wait_timeout(aid_t amsgid, sysarg_t *retval, suseconds_t timeout)
[c042bdd]1756{
[79ae36dd]1757 assert(amsgid);
1758
[c042bdd]1759 amsg_t *msg = (amsg_t *) amsgid;
[57dea62]1760
[c042bdd]1761 futex_down(&async_futex);
[57dea62]1762
[47c9a8c]1763 assert(!msg->forget);
1764 assert(!msg->destroyed);
[57dea62]1765
[c042bdd]1766 if (msg->done) {
1767 futex_up(&async_futex);
1768 goto done;
1769 }
[c07544d3]1770
[1db6dfd]1771 /*
1772 * Negative timeout is converted to zero timeout to avoid
1773 * using tv_add with negative augmenter.
1774 */
1775 if (timeout < 0)
1776 timeout = 0;
[57dea62]1777
[45cbcaf4]1778 getuptime(&msg->wdata.to_event.expires);
[7f9d97f3]1779 tv_add_diff(&msg->wdata.to_event.expires, timeout);
[c07544d3]1780
[1db6dfd]1781 /*
1782 * Current fibril is inserted as waiting regardless of the
1783 * "size" of the timeout.
1784 *
1785 * Checking for msg->done and immediately bailing out when
1786 * timeout == 0 would mean that the manager fibril would never
1787 * run (consider single threaded program).
1788 * Thus the IPC answer would be never retrieved from the kernel.
1789 *
1790 * Notice that the actual delay would be very small because we
1791 * - switch to manager fibril
1792 * - the manager sees expired timeout
1793 * - and thus adds us back to ready queue
1794 * - manager switches back to some ready fibril
1795 * (prior it, it checks for incoming IPC).
1796 *
1797 */
[bc1f1c2]1798 msg->wdata.fid = fibril_get_id();
[c07544d3]1799 msg->wdata.active = false;
[b6ee5b1]1800 async_insert_timeout(&msg->wdata);
[c07544d3]1801
[36c9234]1802 /* Leave the async_futex locked when entering this function */
[116d3f6f]1803 fibril_switch(FIBRIL_TO_MANAGER);
[c07544d3]1804
1805 /* Futex is up automatically after fibril_switch */
1806
[c042bdd]1807 if (!msg->done)
1808 return ETIMEOUT;
[c07544d3]1809
[c042bdd]1810done:
1811 if (retval)
1812 *retval = msg->retval;
[c07544d3]1813
[47c9a8c]1814 amsg_destroy(msg);
[c07544d3]1815
[c042bdd]1816 return 0;
1817}
[47c9a8c]1818
1819/** Discard the message / reply on arrival.
1820 *
1821 * The message will be marked to be discarded once the reply arrives in
1822 * reply_received(). It is not allowed to call async_wait_for() or
1823 * async_wait_timeout() on this message after a call to this function.
1824 *
1825 * @param amsgid Hash of the message to forget.
1826 */
1827void async_forget(aid_t amsgid)
1828{
1829 amsg_t *msg = (amsg_t *) amsgid;
[57dea62]1830
[47c9a8c]1831 assert(msg);
1832 assert(!msg->forget);
1833 assert(!msg->destroyed);
[57dea62]1834
[47c9a8c]1835 futex_down(&async_futex);
[57dea62]1836
[375e501]1837 if (msg->done) {
[47c9a8c]1838 amsg_destroy(msg);
[375e501]1839 } else {
1840 msg->dataptr = NULL;
[47c9a8c]1841 msg->forget = true;
[375e501]1842 }
[57dea62]1843
[47c9a8c]1844 futex_up(&async_futex);
1845}
[0b99e40]1846
[36c9234]1847/** Wait for specified time.
[44c6d88d]1848 *
[36c9234]1849 * The current fibril is suspended but the thread continues to execute.
1850 *
[c07544d3]1851 * @param timeout Duration of the wait in microseconds.
1852 *
[44c6d88d]1853 */
1854void async_usleep(suseconds_t timeout)
1855{
[47c9a8c]1856 amsg_t *msg = amsg_create();
[44c6d88d]1857 if (!msg)
1858 return;
[6b21292]1859
[bc1f1c2]1860 msg->wdata.fid = fibril_get_id();
[6b21292]1861
[45cbcaf4]1862 getuptime(&msg->wdata.to_event.expires);
[7f9d97f3]1863 tv_add_diff(&msg->wdata.to_event.expires, timeout);
[6b21292]1864
[44c6d88d]1865 futex_down(&async_futex);
[c07544d3]1866
[b6ee5b1]1867 async_insert_timeout(&msg->wdata);
[c07544d3]1868
[36c9234]1869 /* Leave the async_futex locked when entering this function */
[116d3f6f]1870 fibril_switch(FIBRIL_TO_MANAGER);
[c07544d3]1871
1872 /* Futex is up automatically after fibril_switch() */
1873
[47c9a8c]1874 amsg_destroy(msg);
[44c6d88d]1875}
[da0c91e7]1876
[39026d7c]1877/** Delay execution for the specified number of seconds
1878 *
1879 * @param sec Number of seconds to sleep
1880 */
1881void async_sleep(unsigned int sec)
1882{
1883 /*
1884 * Sleep in 1000 second steps to support
1885 * full argument range
1886 */
1887
1888 while (sec > 0) {
1889 unsigned int period = (sec > 1000) ? 1000 : sec;
1890
1891 async_usleep(period * 1000000);
1892 sec -= period;
1893 }
1894}
1895
[0cc4313]1896/** Pseudo-synchronous message sending - fast version.
1897 *
1898 * Send message asynchronously and return only after the reply arrives.
1899 *
1900 * This function can only transfer 4 register payload arguments. For
1901 * transferring more arguments, see the slower async_req_slow().
1902 *
[79ae36dd]1903 * @param exch Exchange for sending the message.
1904 * @param imethod Interface and method of the call.
[c07544d3]1905 * @param arg1 Service-defined payload argument.
1906 * @param arg2 Service-defined payload argument.
1907 * @param arg3 Service-defined payload argument.
1908 * @param arg4 Service-defined payload argument.
1909 * @param r1 If non-NULL, storage for the 1st reply argument.
1910 * @param r2 If non-NULL, storage for the 2nd reply argument.
1911 * @param r3 If non-NULL, storage for the 3rd reply argument.
1912 * @param r4 If non-NULL, storage for the 4th reply argument.
1913 * @param r5 If non-NULL, storage for the 5th reply argument.
1914 *
1915 * @return Return code of the reply or a negative error code.
1916 *
[0cc4313]1917 */
[79ae36dd]1918sysarg_t async_req_fast(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
[96b02eb9]1919 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4, sysarg_t *r1, sysarg_t *r2,
1920 sysarg_t *r3, sysarg_t *r4, sysarg_t *r5)
[085bd54]1921{
[79ae36dd]1922 if (exch == NULL)
1923 return ENOENT;
1924
[0cc4313]1925 ipc_call_t result;
[79ae36dd]1926 aid_t aid = async_send_4(exch, imethod, arg1, arg2, arg3, arg4,
[0cc4313]1927 &result);
[c07544d3]1928
[96b02eb9]1929 sysarg_t rc;
[79ae36dd]1930 async_wait_for(aid, &rc);
[c07544d3]1931
1932 if (r1)
[0cc4313]1933 *r1 = IPC_GET_ARG1(result);
[c07544d3]1934
[0cc4313]1935 if (r2)
1936 *r2 = IPC_GET_ARG2(result);
[c07544d3]1937
[0cc4313]1938 if (r3)
1939 *r3 = IPC_GET_ARG3(result);
[c07544d3]1940
[0cc4313]1941 if (r4)
1942 *r4 = IPC_GET_ARG4(result);
[c07544d3]1943
[0cc4313]1944 if (r5)
1945 *r5 = IPC_GET_ARG5(result);
[c07544d3]1946
[0cc4313]1947 return rc;
[085bd54]1948}
1949
[0cc4313]1950/** Pseudo-synchronous message sending - slow version.
1951 *
1952 * Send message asynchronously and return only after the reply arrives.
1953 *
[79ae36dd]1954 * @param exch Exchange for sending the message.
1955 * @param imethod Interface and method of the call.
[c07544d3]1956 * @param arg1 Service-defined payload argument.
1957 * @param arg2 Service-defined payload argument.
1958 * @param arg3 Service-defined payload argument.
1959 * @param arg4 Service-defined payload argument.
1960 * @param arg5 Service-defined payload argument.
1961 * @param r1 If non-NULL, storage for the 1st reply argument.
1962 * @param r2 If non-NULL, storage for the 2nd reply argument.
1963 * @param r3 If non-NULL, storage for the 3rd reply argument.
1964 * @param r4 If non-NULL, storage for the 4th reply argument.
1965 * @param r5 If non-NULL, storage for the 5th reply argument.
1966 *
1967 * @return Return code of the reply or a negative error code.
1968 *
[0cc4313]1969 */
[79ae36dd]1970sysarg_t async_req_slow(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
[96b02eb9]1971 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4, sysarg_t arg5, sysarg_t *r1,
1972 sysarg_t *r2, sysarg_t *r3, sysarg_t *r4, sysarg_t *r5)
[085bd54]1973{
[79ae36dd]1974 if (exch == NULL)
1975 return ENOENT;
1976
[0cc4313]1977 ipc_call_t result;
[79ae36dd]1978 aid_t aid = async_send_5(exch, imethod, arg1, arg2, arg3, arg4, arg5,
[0cc4313]1979 &result);
[c07544d3]1980
[96b02eb9]1981 sysarg_t rc;
[79ae36dd]1982 async_wait_for(aid, &rc);
[c07544d3]1983
1984 if (r1)
[0cc4313]1985 *r1 = IPC_GET_ARG1(result);
[c07544d3]1986
[0cc4313]1987 if (r2)
1988 *r2 = IPC_GET_ARG2(result);
[c07544d3]1989
[0cc4313]1990 if (r3)
1991 *r3 = IPC_GET_ARG3(result);
[c07544d3]1992
[0cc4313]1993 if (r4)
1994 *r4 = IPC_GET_ARG4(result);
[c07544d3]1995
[0cc4313]1996 if (r5)
1997 *r5 = IPC_GET_ARG5(result);
[c07544d3]1998
[0cc4313]1999 return rc;
[085bd54]2000}
[b2951e2]2001
[79ae36dd]2002void async_msg_0(async_exch_t *exch, sysarg_t imethod)
[64d2b10]2003{
[79ae36dd]2004 if (exch != NULL)
[dcc150cb]2005 ipc_call_async_0(exch->phone, imethod, NULL, NULL);
[64d2b10]2006}
2007
[79ae36dd]2008void async_msg_1(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1)
[64d2b10]2009{
[79ae36dd]2010 if (exch != NULL)
[dcc150cb]2011 ipc_call_async_1(exch->phone, imethod, arg1, NULL, NULL);
[64d2b10]2012}
2013
[79ae36dd]2014void async_msg_2(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
2015 sysarg_t arg2)
[64d2b10]2016{
[79ae36dd]2017 if (exch != NULL)
[dcc150cb]2018 ipc_call_async_2(exch->phone, imethod, arg1, arg2, NULL, NULL);
[64d2b10]2019}
2020
[79ae36dd]2021void async_msg_3(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
2022 sysarg_t arg2, sysarg_t arg3)
[64d2b10]2023{
[79ae36dd]2024 if (exch != NULL)
2025 ipc_call_async_3(exch->phone, imethod, arg1, arg2, arg3, NULL,
[dcc150cb]2026 NULL);
[64d2b10]2027}
2028
[79ae36dd]2029void async_msg_4(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
2030 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4)
[64d2b10]2031{
[79ae36dd]2032 if (exch != NULL)
2033 ipc_call_async_4(exch->phone, imethod, arg1, arg2, arg3, arg4,
[dcc150cb]2034 NULL, NULL);
[64d2b10]2035}
2036
[79ae36dd]2037void async_msg_5(async_exch_t *exch, sysarg_t imethod, sysarg_t arg1,
2038 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4, sysarg_t arg5)
[64d2b10]2039{
[79ae36dd]2040 if (exch != NULL)
2041 ipc_call_async_5(exch->phone, imethod, arg1, arg2, arg3, arg4,
[dcc150cb]2042 arg5, NULL, NULL);
[64d2b10]2043}
2044
[01c3bb4]2045sysarg_t async_answer_0(cap_handle_t chandle, sysarg_t retval)
[64d2b10]2046{
[01c3bb4]2047 return ipc_answer_0(chandle, retval);
[64d2b10]2048}
2049
[01c3bb4]2050sysarg_t async_answer_1(cap_handle_t chandle, sysarg_t retval, sysarg_t arg1)
[64d2b10]2051{
[01c3bb4]2052 return ipc_answer_1(chandle, retval, arg1);
[64d2b10]2053}
2054
[01c3bb4]2055sysarg_t async_answer_2(cap_handle_t chandle, sysarg_t retval, sysarg_t arg1,
[64d2b10]2056 sysarg_t arg2)
2057{
[01c3bb4]2058 return ipc_answer_2(chandle, retval, arg1, arg2);
[64d2b10]2059}
2060
[01c3bb4]2061sysarg_t async_answer_3(cap_handle_t chandle, sysarg_t retval, sysarg_t arg1,
[64d2b10]2062 sysarg_t arg2, sysarg_t arg3)
2063{
[01c3bb4]2064 return ipc_answer_3(chandle, retval, arg1, arg2, arg3);
[64d2b10]2065}
2066
[01c3bb4]2067sysarg_t async_answer_4(cap_handle_t chandle, sysarg_t retval, sysarg_t arg1,
[64d2b10]2068 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4)
2069{
[01c3bb4]2070 return ipc_answer_4(chandle, retval, arg1, arg2, arg3, arg4);
[64d2b10]2071}
2072
[01c3bb4]2073sysarg_t async_answer_5(cap_handle_t chandle, sysarg_t retval, sysarg_t arg1,
[64d2b10]2074 sysarg_t arg2, sysarg_t arg3, sysarg_t arg4, sysarg_t arg5)
2075{
[01c3bb4]2076 return ipc_answer_5(chandle, retval, arg1, arg2, arg3, arg4, arg5);
[64d2b10]2077}
2078
[01c3bb4]2079int async_forward_fast(cap_handle_t chandle, async_exch_t *exch,
[79ae36dd]2080 sysarg_t imethod, sysarg_t arg1, sysarg_t arg2, unsigned int mode)
[64d2b10]2081{
[79ae36dd]2082 if (exch == NULL)
2083 return ENOENT;
2084
[01c3bb4]2085 return ipc_forward_fast(chandle, exch->phone, imethod, arg1, arg2, mode);
[64d2b10]2086}
2087
[01c3bb4]2088int async_forward_slow(cap_handle_t chandle, async_exch_t *exch,
[79ae36dd]2089 sysarg_t imethod, sysarg_t arg1, sysarg_t arg2, sysarg_t arg3,
2090 sysarg_t arg4, sysarg_t arg5, unsigned int mode)
[64d2b10]2091{
[79ae36dd]2092 if (exch == NULL)
2093 return ENOENT;
2094
[01c3bb4]2095 return ipc_forward_slow(chandle, exch->phone, imethod, arg1, arg2, arg3,
[79ae36dd]2096 arg4, arg5, mode);
[64d2b10]2097}
2098
[007e6efa]2099/** Wrapper for making IPC_M_CONNECT_TO_ME calls using the async framework.
2100 *
2101 * Ask through phone for a new connection to some service.
2102 *
[79ae36dd]2103 * @param exch Exchange for sending the message.
[007e6efa]2104 * @param arg1 User defined argument.
2105 * @param arg2 User defined argument.
2106 * @param arg3 User defined argument.
2107 *
[79ae36dd]2108 * @return Zero on success or a negative error code.
[007e6efa]2109 *
2110 */
[79ae36dd]2111int async_connect_to_me(async_exch_t *exch, sysarg_t arg1, sysarg_t arg2,
[f9b2cb4c]2112 sysarg_t arg3)
[007e6efa]2113{
[79ae36dd]2114 if (exch == NULL)
2115 return ENOENT;
2116
[ab34cc9]2117 ipc_call_t answer;
[f9b2cb4c]2118 aid_t req = async_send_3(exch, IPC_M_CONNECT_TO_ME, arg1, arg2, arg3,
[ab34cc9]2119 &answer);
[f9b2cb4c]2120
2121 sysarg_t rc;
[ab34cc9]2122 async_wait_for(req, &rc);
[007e6efa]2123 if (rc != EOK)
[ab34cc9]2124 return (int) rc;
[007e6efa]2125
2126 return EOK;
2127}
2128
[79ae36dd]2129static int async_connect_me_to_internal(int phone, sysarg_t arg1, sysarg_t arg2,
[a99cbc1e]2130 sysarg_t arg3, sysarg_t arg4, int *out_phone)
[f74392f]2131{
[79ae36dd]2132 ipc_call_t result;
2133
[a99cbc1e]2134 // XXX: Workaround for GCC's inability to infer association between
2135 // rc == EOK and *out_phone being assigned.
2136 *out_phone = -1;
2137
[47c9a8c]2138 amsg_t *msg = amsg_create();
2139 if (!msg)
[79ae36dd]2140 return ENOENT;
2141
2142 msg->dataptr = &result;
2143 msg->wdata.active = true;
2144
2145 ipc_call_async_4(phone, IPC_M_CONNECT_ME_TO, arg1, arg2, arg3, arg4,
[dcc150cb]2146 msg, reply_received);
[79ae36dd]2147
2148 sysarg_t rc;
2149 async_wait_for((aid_t) msg, &rc);
[f74392f]2150
[007e6efa]2151 if (rc != EOK)
[f74392f]2152 return rc;
[007e6efa]2153
[a99cbc1e]2154 *out_phone = (int) IPC_GET_ARG5(result);
2155 return EOK;
[79ae36dd]2156}
2157
2158/** Wrapper for making IPC_M_CONNECT_ME_TO calls using the async framework.
2159 *
2160 * Ask through for a new connection to some service.
2161 *
2162 * @param mgmt Exchange management style.
2163 * @param exch Exchange for sending the message.
2164 * @param arg1 User defined argument.
2165 * @param arg2 User defined argument.
2166 * @param arg3 User defined argument.
2167 *
2168 * @return New session on success or NULL on error.
2169 *
2170 */
2171async_sess_t *async_connect_me_to(exch_mgmt_t mgmt, async_exch_t *exch,
2172 sysarg_t arg1, sysarg_t arg2, sysarg_t arg3)
2173{
2174 if (exch == NULL) {
2175 errno = ENOENT;
2176 return NULL;
2177 }
2178
2179 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
2180 if (sess == NULL) {
2181 errno = ENOMEM;
2182 return NULL;
2183 }
2184
[a99cbc1e]2185 int phone;
2186 int rc = async_connect_me_to_internal(exch->phone, arg1, arg2, arg3,
2187 0, &phone);
2188 if (rc != EOK) {
2189 errno = rc;
[79ae36dd]2190 free(sess);
2191 return NULL;
2192 }
2193
[566992e1]2194 sess->iface = 0;
[79ae36dd]2195 sess->mgmt = mgmt;
2196 sess->phone = phone;
2197 sess->arg1 = arg1;
2198 sess->arg2 = arg2;
2199 sess->arg3 = arg3;
2200
[58cbf8d5]2201 fibril_mutex_initialize(&sess->remote_state_mtx);
2202 sess->remote_state_data = NULL;
2203
[79ae36dd]2204 list_initialize(&sess->exch_list);
2205 fibril_mutex_initialize(&sess->mutex);
2206 atomic_set(&sess->refcnt, 0);
2207
2208 return sess;
[f74392f]2209}
2210
[0dd16778]2211/** Wrapper for making IPC_M_CONNECT_ME_TO calls using the async framework.
2212 *
2213 * Ask through phone for a new connection to some service and block until
2214 * success.
2215 *
2216 * @param exch Exchange for sending the message.
2217 * @param iface Connection interface.
2218 * @param arg2 User defined argument.
2219 * @param arg3 User defined argument.
2220 *
2221 * @return New session on success or NULL on error.
2222 *
2223 */
2224async_sess_t *async_connect_me_to_iface(async_exch_t *exch, iface_t iface,
2225 sysarg_t arg2, sysarg_t arg3)
2226{
2227 if (exch == NULL) {
2228 errno = ENOENT;
2229 return NULL;
2230 }
2231
2232 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
2233 if (sess == NULL) {
2234 errno = ENOMEM;
2235 return NULL;
2236 }
2237
[a99cbc1e]2238 int phone;
2239 int rc = async_connect_me_to_internal(exch->phone, iface, arg2,
2240 arg3, 0, &phone);
2241 if (rc != EOK) {
2242 errno = rc;
[0dd16778]2243 free(sess);
2244 return NULL;
2245 }
2246
2247 sess->iface = iface;
2248 sess->phone = phone;
2249 sess->arg1 = iface;
2250 sess->arg2 = arg2;
2251 sess->arg3 = arg3;
2252
2253 fibril_mutex_initialize(&sess->remote_state_mtx);
2254 sess->remote_state_data = NULL;
2255
2256 list_initialize(&sess->exch_list);
2257 fibril_mutex_initialize(&sess->mutex);
2258 atomic_set(&sess->refcnt, 0);
2259
2260 return sess;
2261}
2262
[93ad49a8]2263/** Set arguments for new connections.
[0f4532e]2264 *
2265 * FIXME This is an ugly hack to work around the problem that parallel
2266 * exchanges are implemented using parallel connections. When we create
[93ad49a8]2267 * a callback session, the framework does not know arguments for the new
2268 * connections.
[0f4532e]2269 *
2270 * The proper solution seems to be to implement parallel exchanges using
2271 * tagging.
2272 */
[93ad49a8]2273void async_sess_args_set(async_sess_t *sess, sysarg_t arg1, sysarg_t arg2,
2274 sysarg_t arg3)
[0f4532e]2275{
[93ad49a8]2276 sess->arg1 = arg1;
2277 sess->arg2 = arg2;
2278 sess->arg3 = arg3;
[0f4532e]2279}
2280
[f74392f]2281/** Wrapper for making IPC_M_CONNECT_ME_TO calls using the async framework.
[007e6efa]2282 *
[f74392f]2283 * Ask through phone for a new connection to some service and block until
2284 * success.
2285 *
[79ae36dd]2286 * @param mgmt Exchange management style.
2287 * @param exch Exchange for sending the message.
2288 * @param arg1 User defined argument.
2289 * @param arg2 User defined argument.
2290 * @param arg3 User defined argument.
[007e6efa]2291 *
[79ae36dd]2292 * @return New session on success or NULL on error.
[f74392f]2293 *
2294 */
[79ae36dd]2295async_sess_t *async_connect_me_to_blocking(exch_mgmt_t mgmt, async_exch_t *exch,
2296 sysarg_t arg1, sysarg_t arg2, sysarg_t arg3)
[f74392f]2297{
[79ae36dd]2298 if (exch == NULL) {
2299 errno = ENOENT;
2300 return NULL;
2301 }
[f74392f]2302
[79ae36dd]2303 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
2304 if (sess == NULL) {
2305 errno = ENOMEM;
2306 return NULL;
2307 }
[007e6efa]2308
[a99cbc1e]2309 int phone;
2310 int rc = async_connect_me_to_internal(exch->phone, arg1, arg2, arg3,
2311 IPC_FLAG_BLOCKING, &phone);
[79ae36dd]2312
[a99cbc1e]2313 if (rc != EOK) {
2314 errno = rc;
[79ae36dd]2315 free(sess);
2316 return NULL;
2317 }
2318
[566992e1]2319 sess->iface = 0;
[79ae36dd]2320 sess->mgmt = mgmt;
2321 sess->phone = phone;
2322 sess->arg1 = arg1;
2323 sess->arg2 = arg2;
2324 sess->arg3 = arg3;
2325
[58cbf8d5]2326 fibril_mutex_initialize(&sess->remote_state_mtx);
2327 sess->remote_state_data = NULL;
2328
[79ae36dd]2329 list_initialize(&sess->exch_list);
2330 fibril_mutex_initialize(&sess->mutex);
2331 atomic_set(&sess->refcnt, 0);
2332
2333 return sess;
[f74392f]2334}
2335
[566992e1]2336/** Wrapper for making IPC_M_CONNECT_ME_TO calls using the async framework.
2337 *
2338 * Ask through phone for a new connection to some service and block until
2339 * success.
2340 *
2341 * @param exch Exchange for sending the message.
2342 * @param iface Connection interface.
2343 * @param arg2 User defined argument.
2344 * @param arg3 User defined argument.
2345 *
2346 * @return New session on success or NULL on error.
2347 *
2348 */
2349async_sess_t *async_connect_me_to_blocking_iface(async_exch_t *exch, iface_t iface,
2350 sysarg_t arg2, sysarg_t arg3)
2351{
2352 if (exch == NULL) {
2353 errno = ENOENT;
2354 return NULL;
2355 }
2356
2357 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
2358 if (sess == NULL) {
2359 errno = ENOMEM;
2360 return NULL;
2361 }
2362
[a99cbc1e]2363 int phone;
2364 int rc = async_connect_me_to_internal(exch->phone, iface, arg2,
2365 arg3, IPC_FLAG_BLOCKING, &phone);
2366 if (rc != EOK) {
2367 errno = rc;
[566992e1]2368 free(sess);
2369 return NULL;
2370 }
2371
2372 sess->iface = iface;
2373 sess->phone = phone;
2374 sess->arg1 = iface;
2375 sess->arg2 = arg2;
2376 sess->arg3 = arg3;
2377
2378 fibril_mutex_initialize(&sess->remote_state_mtx);
2379 sess->remote_state_data = NULL;
2380
2381 list_initialize(&sess->exch_list);
2382 fibril_mutex_initialize(&sess->mutex);
2383 atomic_set(&sess->refcnt, 0);
2384
2385 return sess;
2386}
2387
[64d2b10]2388/** Connect to a task specified by id.
2389 *
2390 */
[79ae36dd]2391async_sess_t *async_connect_kbox(task_id_t id)
[64d2b10]2392{
[79ae36dd]2393 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
2394 if (sess == NULL) {
2395 errno = ENOMEM;
2396 return NULL;
2397 }
2398
2399 int phone = ipc_connect_kbox(id);
2400 if (phone < 0) {
2401 errno = phone;
2402 free(sess);
2403 return NULL;
2404 }
2405
[566992e1]2406 sess->iface = 0;
[79ae36dd]2407 sess->mgmt = EXCHANGE_ATOMIC;
2408 sess->phone = phone;
2409 sess->arg1 = 0;
2410 sess->arg2 = 0;
2411 sess->arg3 = 0;
2412
[58cbf8d5]2413 fibril_mutex_initialize(&sess->remote_state_mtx);
2414 sess->remote_state_data = NULL;
2415
[79ae36dd]2416 list_initialize(&sess->exch_list);
2417 fibril_mutex_initialize(&sess->mutex);
2418 atomic_set(&sess->refcnt, 0);
2419
2420 return sess;
2421}
2422
2423static int async_hangup_internal(int phone)
2424{
2425 return ipc_hangup(phone);
[64d2b10]2426}
2427
2428/** Wrapper for ipc_hangup.
2429 *
[79ae36dd]2430 * @param sess Session to hung up.
[64d2b10]2431 *
2432 * @return Zero on success or a negative error code.
2433 *
2434 */
[79ae36dd]2435int async_hangup(async_sess_t *sess)
[64d2b10]2436{
[36e2b55]2437 async_exch_t *exch;
2438
[79ae36dd]2439 assert(sess);
2440
2441 if (atomic_get(&sess->refcnt) > 0)
2442 return EBUSY;
2443
[36e2b55]2444 fibril_mutex_lock(&async_sess_mutex);
[972c60ce]2445
[cff3fb6]2446 int rc = async_hangup_internal(sess->phone);
[36e2b55]2447
2448 while (!list_empty(&sess->exch_list)) {
2449 exch = (async_exch_t *)
2450 list_get_instance(list_first(&sess->exch_list),
2451 async_exch_t, sess_link);
2452
2453 list_remove(&exch->sess_link);
2454 list_remove(&exch->global_link);
2455 async_hangup_internal(exch->phone);
2456 free(exch);
2457 }
[4c50c8d]2458
2459 free(sess);
[36e2b55]2460
2461 fibril_mutex_unlock(&async_sess_mutex);
2462
[79ae36dd]2463 return rc;
[64d2b10]2464}
2465
2466/** Interrupt one thread of this task from waiting for IPC. */
2467void async_poke(void)
2468{
2469 ipc_poke();
2470}
2471
[79ae36dd]2472/** Start new exchange in a session.
2473 *
2474 * @param session Session.
2475 *
2476 * @return New exchange or NULL on error.
2477 *
2478 */
2479async_exch_t *async_exchange_begin(async_sess_t *sess)
2480{
2481 if (sess == NULL)
2482 return NULL;
2483
[566992e1]2484 exch_mgmt_t mgmt = sess->mgmt;
2485 if (sess->iface != 0)
2486 mgmt = sess->iface & IFACE_EXCHANGE_MASK;
2487
2488 async_exch_t *exch = NULL;
[79ae36dd]2489
2490 fibril_mutex_lock(&async_sess_mutex);
2491
2492 if (!list_empty(&sess->exch_list)) {
2493 /*
2494 * There are inactive exchanges in the session.
2495 */
2496 exch = (async_exch_t *)
[b72efe8]2497 list_get_instance(list_first(&sess->exch_list),
2498 async_exch_t, sess_link);
2499
[79ae36dd]2500 list_remove(&exch->sess_link);
2501 list_remove(&exch->global_link);
2502 } else {
2503 /*
2504 * There are no available exchanges in the session.
2505 */
2506
[566992e1]2507 if ((mgmt == EXCHANGE_ATOMIC) ||
2508 (mgmt == EXCHANGE_SERIALIZE)) {
[79ae36dd]2509 exch = (async_exch_t *) malloc(sizeof(async_exch_t));
2510 if (exch != NULL) {
[b72efe8]2511 link_initialize(&exch->sess_link);
2512 link_initialize(&exch->global_link);
[79ae36dd]2513 exch->sess = sess;
2514 exch->phone = sess->phone;
2515 }
[566992e1]2516 } else if (mgmt == EXCHANGE_PARALLEL) {
2517 int phone;
[a99cbc1e]2518 int rc;
[566992e1]2519
2520 retry:
[79ae36dd]2521 /*
2522 * Make a one-time attempt to connect a new data phone.
2523 */
[a99cbc1e]2524 rc = async_connect_me_to_internal(sess->phone, sess->arg1,
2525 sess->arg2, sess->arg3, 0, &phone);
2526 if (rc == EOK) {
[79ae36dd]2527 exch = (async_exch_t *) malloc(sizeof(async_exch_t));
2528 if (exch != NULL) {
[b72efe8]2529 link_initialize(&exch->sess_link);
2530 link_initialize(&exch->global_link);
[79ae36dd]2531 exch->sess = sess;
2532 exch->phone = phone;
2533 } else
2534 async_hangup_internal(phone);
2535 } else if (!list_empty(&inactive_exch_list)) {
2536 /*
2537 * We did not manage to connect a new phone. But we
2538 * can try to close some of the currently inactive
2539 * connections in other sessions and try again.
2540 */
2541 exch = (async_exch_t *)
[b72efe8]2542 list_get_instance(list_first(&inactive_exch_list),
2543 async_exch_t, global_link);
2544
[79ae36dd]2545 list_remove(&exch->sess_link);
2546 list_remove(&exch->global_link);
2547 async_hangup_internal(exch->phone);
2548 free(exch);
2549 goto retry;
2550 } else {
2551 /*
2552 * Wait for a phone to become available.
2553 */
2554 fibril_condvar_wait(&avail_phone_cv, &async_sess_mutex);
2555 goto retry;
2556 }
2557 }
2558 }
2559
2560 fibril_mutex_unlock(&async_sess_mutex);
2561
2562 if (exch != NULL) {
2563 atomic_inc(&sess->refcnt);
2564
[566992e1]2565 if (mgmt == EXCHANGE_SERIALIZE)
[79ae36dd]2566 fibril_mutex_lock(&sess->mutex);
2567 }
2568
2569 return exch;
2570}
2571
2572/** Finish an exchange.
2573 *
2574 * @param exch Exchange to finish.
2575 *
2576 */
2577void async_exchange_end(async_exch_t *exch)
2578{
2579 if (exch == NULL)
2580 return;
2581
2582 async_sess_t *sess = exch->sess;
[3ca2e36]2583 assert(sess != NULL);
[79ae36dd]2584
[566992e1]2585 exch_mgmt_t mgmt = sess->mgmt;
2586 if (sess->iface != 0)
2587 mgmt = sess->iface & IFACE_EXCHANGE_MASK;
2588
[1c6436a]2589 atomic_dec(&sess->refcnt);
2590
[566992e1]2591 if (mgmt == EXCHANGE_SERIALIZE)
[79ae36dd]2592 fibril_mutex_unlock(&sess->mutex);
2593
2594 fibril_mutex_lock(&async_sess_mutex);
2595
2596 list_append(&exch->sess_link, &sess->exch_list);
2597 list_append(&exch->global_link, &inactive_exch_list);
2598 fibril_condvar_signal(&avail_phone_cv);
2599
2600 fibril_mutex_unlock(&async_sess_mutex);
2601}
2602
[47b7006]2603/** Wrapper for IPC_M_SHARE_IN calls using the async framework.
2604 *
[79ae36dd]2605 * @param exch Exchange for sending the message.
2606 * @param size Size of the destination address space area.
2607 * @param arg User defined argument.
2608 * @param flags Storage for the received flags. Can be NULL.
[df956b9b]2609 * @param dst Address of the storage for the destination address space area
2610 * base address. Cannot be NULL.
[0da4e41]2611 *
[47b7006]2612 * @return Zero on success or a negative error code from errno.h.
[0da4e41]2613 *
2614 */
[fbcdeb8]2615int async_share_in_start(async_exch_t *exch, size_t size, sysarg_t arg,
2616 unsigned int *flags, void **dst)
[0da4e41]2617{
[79ae36dd]2618 if (exch == NULL)
2619 return ENOENT;
2620
[fbcdeb8]2621 sysarg_t _flags = 0;
2622 sysarg_t _dst = (sysarg_t) -1;
2623 int res = async_req_2_4(exch, IPC_M_SHARE_IN, (sysarg_t) size,
2624 arg, NULL, &_flags, NULL, &_dst);
[47b7006]2625
[0da4e41]2626 if (flags)
[fbcdeb8]2627 *flags = (unsigned int) _flags;
[47b7006]2628
[fbcdeb8]2629 *dst = (void *) _dst;
[0da4e41]2630 return res;
2631}
2632
2633/** Wrapper for receiving the IPC_M_SHARE_IN calls using the async framework.
2634 *
[47b7006]2635 * This wrapper only makes it more comfortable to receive IPC_M_SHARE_IN
2636 * calls so that the user doesn't have to remember the meaning of each IPC
2637 * argument.
[0da4e41]2638 *
2639 * So far, this wrapper is to be used from within a connection fibril.
2640 *
[01c3bb4]2641 * @param chandle Storage for the handle of the IPC_M_SHARE_IN call.
2642 * @param size Destination address space area size.
[47b7006]2643 *
2644 * @return True on success, false on failure.
[0da4e41]2645 *
2646 */
[01c3bb4]2647bool async_share_in_receive(cap_handle_t *chandle, size_t *size)
[0da4e41]2648{
[01c3bb4]2649 assert(chandle);
[0da4e41]2650 assert(size);
[47b7006]2651
2652 ipc_call_t data;
[01c3bb4]2653 *chandle = async_get_call(&data);
[47b7006]2654
[228e490]2655 if (IPC_GET_IMETHOD(data) != IPC_M_SHARE_IN)
[47b7006]2656 return false;
2657
[fbcdeb8]2658 *size = (size_t) IPC_GET_ARG1(data);
[47b7006]2659 return true;
[0da4e41]2660}
2661
2662/** Wrapper for answering the IPC_M_SHARE_IN calls using the async framework.
2663 *
[fbcdeb8]2664 * This wrapper only makes it more comfortable to answer IPC_M_SHARE_IN
[47b7006]2665 * calls so that the user doesn't have to remember the meaning of each IPC
2666 * argument.
[0da4e41]2667 *
[01c3bb4]2668 * @param chandle Handle of the IPC_M_DATA_READ call to answer.
2669 * @param src Source address space base.
2670 * @param flags Flags to be used for sharing. Bits can be only cleared.
[47b7006]2671 *
2672 * @return Zero on success or a value from @ref errno.h on failure.
[0da4e41]2673 *
2674 */
[01c3bb4]2675int async_share_in_finalize(cap_handle_t chandle, void *src, unsigned int flags)
[0da4e41]2676{
[01c3bb4]2677 return ipc_answer_3(chandle, EOK, (sysarg_t) src, (sysarg_t) flags,
[d7978525]2678 (sysarg_t) __entry);
[0da4e41]2679}
2680
[47b7006]2681/** Wrapper for IPC_M_SHARE_OUT calls using the async framework.
[0da4e41]2682 *
[79ae36dd]2683 * @param exch Exchange for sending the message.
2684 * @param src Source address space area base address.
2685 * @param flags Flags to be used for sharing. Bits can be only cleared.
[47b7006]2686 *
2687 * @return Zero on success or a negative error code from errno.h.
[0da4e41]2688 *
2689 */
[79ae36dd]2690int async_share_out_start(async_exch_t *exch, void *src, unsigned int flags)
[0da4e41]2691{
[79ae36dd]2692 if (exch == NULL)
2693 return ENOENT;
2694
2695 return async_req_3_0(exch, IPC_M_SHARE_OUT, (sysarg_t) src, 0,
[96b02eb9]2696 (sysarg_t) flags);
[0da4e41]2697}
2698
2699/** Wrapper for receiving the IPC_M_SHARE_OUT calls using the async framework.
2700 *
[47b7006]2701 * This wrapper only makes it more comfortable to receive IPC_M_SHARE_OUT
2702 * calls so that the user doesn't have to remember the meaning of each IPC
2703 * argument.
[0da4e41]2704 *
2705 * So far, this wrapper is to be used from within a connection fibril.
2706 *
[01c3bb4]2707 * @param chandle Storage for the hash of the IPC_M_SHARE_OUT call.
2708 * @param size Storage for the source address space area size.
2709 * @param flags Storage for the sharing flags.
[47b7006]2710 *
2711 * @return True on success, false on failure.
[0da4e41]2712 *
2713 */
[01c3bb4]2714bool async_share_out_receive(cap_handle_t *chandle, size_t *size,
2715 unsigned int *flags)
[0da4e41]2716{
[01c3bb4]2717 assert(chandle);
[0da4e41]2718 assert(size);
2719 assert(flags);
[47b7006]2720
2721 ipc_call_t data;
[01c3bb4]2722 *chandle = async_get_call(&data);
[47b7006]2723
[228e490]2724 if (IPC_GET_IMETHOD(data) != IPC_M_SHARE_OUT)
[47b7006]2725 return false;
2726
[0da4e41]2727 *size = (size_t) IPC_GET_ARG2(data);
[47b7006]2728 *flags = (unsigned int) IPC_GET_ARG3(data);
2729 return true;
[0da4e41]2730}
2731
2732/** Wrapper for answering the IPC_M_SHARE_OUT calls using the async framework.
2733 *
[47b7006]2734 * This wrapper only makes it more comfortable to answer IPC_M_SHARE_OUT
2735 * calls so that the user doesn't have to remember the meaning of each IPC
2736 * argument.
[0da4e41]2737 *
[01c3bb4]2738 * @param chandle Handle of the IPC_M_DATA_WRITE call to answer.
2739 * @param dst Address of the storage for the destination address space area
2740 * base address.
[47b7006]2741 *
[01c3bb4]2742 * @return Zero on success or a value from @ref errno.h on failure.
[0da4e41]2743 *
2744 */
[01c3bb4]2745int async_share_out_finalize(cap_handle_t chandle, void **dst)
[0da4e41]2746{
[01c3bb4]2747 return ipc_answer_2(chandle, EOK, (sysarg_t) __entry, (sysarg_t) dst);
[0da4e41]2748}
2749
[8bf1eeb]2750/** Start IPC_M_DATA_READ using the async framework.
2751 *
[79ae36dd]2752 * @param exch Exchange for sending the message.
2753 * @param dst Address of the beginning of the destination buffer.
2754 * @param size Size of the destination buffer (in bytes).
[8bf1eeb]2755 * @param dataptr Storage of call data (arg 2 holds actual data size).
[79ae36dd]2756 *
[8bf1eeb]2757 * @return Hash of the sent message or 0 on error.
[79ae36dd]2758 *
[8bf1eeb]2759 */
[79ae36dd]2760aid_t async_data_read(async_exch_t *exch, void *dst, size_t size,
2761 ipc_call_t *dataptr)
[8bf1eeb]2762{
[79ae36dd]2763 return async_send_2(exch, IPC_M_DATA_READ, (sysarg_t) dst,
[8bf1eeb]2764 (sysarg_t) size, dataptr);
2765}
2766
[47b7006]2767/** Wrapper for IPC_M_DATA_READ calls using the async framework.
[0da4e41]2768 *
[79ae36dd]2769 * @param exch Exchange for sending the message.
2770 * @param dst Address of the beginning of the destination buffer.
2771 * @param size Size of the destination buffer.
[47b7006]2772 *
2773 * @return Zero on success or a negative error code from errno.h.
[0da4e41]2774 *
2775 */
[79ae36dd]2776int async_data_read_start(async_exch_t *exch, void *dst, size_t size)
[0da4e41]2777{
[79ae36dd]2778 if (exch == NULL)
2779 return ENOENT;
2780
2781 return async_req_2_0(exch, IPC_M_DATA_READ, (sysarg_t) dst,
2782 (sysarg_t) size);
[0da4e41]2783}
2784
2785/** Wrapper for receiving the IPC_M_DATA_READ calls using the async framework.
2786 *
[47b7006]2787 * This wrapper only makes it more comfortable to receive IPC_M_DATA_READ
2788 * calls so that the user doesn't have to remember the meaning of each IPC
2789 * argument.
[0da4e41]2790 *
2791 * So far, this wrapper is to be used from within a connection fibril.
2792 *
[01c3bb4]2793 * @param chandle Storage for the handle of the IPC_M_DATA_READ.
2794 * @param size Storage for the maximum size. Can be NULL.
[47b7006]2795 *
2796 * @return True on success, false on failure.
[0da4e41]2797 *
2798 */
[01c3bb4]2799bool async_data_read_receive(cap_handle_t *chandle, size_t *size)
[d768d4c8]2800{
2801 ipc_call_t data;
[01c3bb4]2802 return async_data_read_receive_call(chandle, &data, size);
[d768d4c8]2803}
2804
2805/** Wrapper for receiving the IPC_M_DATA_READ calls using the async framework.
2806 *
2807 * This wrapper only makes it more comfortable to receive IPC_M_DATA_READ
2808 * calls so that the user doesn't have to remember the meaning of each IPC
2809 * argument.
2810 *
2811 * So far, this wrapper is to be used from within a connection fibril.
2812 *
[01c3bb4]2813 * @param chandle Storage for the handle of the IPC_M_DATA_READ.
2814 * @param size Storage for the maximum size. Can be NULL.
[d768d4c8]2815 *
2816 * @return True on success, false on failure.
2817 *
2818 */
[01c3bb4]2819bool async_data_read_receive_call(cap_handle_t *chandle, ipc_call_t *data,
[d768d4c8]2820 size_t *size)
[0da4e41]2821{
[01c3bb4]2822 assert(chandle);
[d768d4c8]2823 assert(data);
[47b7006]2824
[01c3bb4]2825 *chandle = async_get_call(data);
[47b7006]2826
[d768d4c8]2827 if (IPC_GET_IMETHOD(*data) != IPC_M_DATA_READ)
[47b7006]2828 return false;
2829
[0da4e41]2830 if (size)
[d768d4c8]2831 *size = (size_t) IPC_GET_ARG2(*data);
[47b7006]2832
2833 return true;
[0da4e41]2834}
2835
2836/** Wrapper for answering the IPC_M_DATA_READ calls using the async framework.
2837 *
[47b7006]2838 * This wrapper only makes it more comfortable to answer IPC_M_DATA_READ
2839 * calls so that the user doesn't have to remember the meaning of each IPC
2840 * argument.
[0da4e41]2841 *
[01c3bb4]2842 * @param chandle Handle of the IPC_M_DATA_READ call to answer.
2843 * @param src Source address for the IPC_M_DATA_READ call.
2844 * @param size Size for the IPC_M_DATA_READ call. Can be smaller than
2845 * the maximum size announced by the sender.
[47b7006]2846 *
[01c3bb4]2847 * @return Zero on success or a value from @ref errno.h on failure.
[0da4e41]2848 *
2849 */
[01c3bb4]2850int async_data_read_finalize(cap_handle_t chandle, const void *src, size_t size)
[0da4e41]2851{
[01c3bb4]2852 return ipc_answer_2(chandle, EOK, (sysarg_t) src, (sysarg_t) size);
[0da4e41]2853}
2854
[b4cbef1]2855/** Wrapper for forwarding any read request
2856 *
2857 */
[79ae36dd]2858int async_data_read_forward_fast(async_exch_t *exch, sysarg_t imethod,
2859 sysarg_t arg1, sysarg_t arg2, sysarg_t arg3, sysarg_t arg4,
2860 ipc_call_t *dataptr)
[b4cbef1]2861{
[79ae36dd]2862 if (exch == NULL)
2863 return ENOENT;
2864
[01c3bb4]2865 cap_handle_t chandle;
2866 if (!async_data_read_receive(&chandle, NULL)) {
2867 ipc_answer_0(chandle, EINVAL);
[b4cbef1]2868 return EINVAL;
2869 }
2870
[79ae36dd]2871 aid_t msg = async_send_fast(exch, imethod, arg1, arg2, arg3, arg4,
[b4cbef1]2872 dataptr);
2873 if (msg == 0) {
[01c3bb4]2874 ipc_answer_0(chandle, EINVAL);
[b4cbef1]2875 return EINVAL;
2876 }
2877
[01c3bb4]2878 int retval = ipc_forward_fast(chandle, exch->phone, 0, 0, 0,
[b4cbef1]2879 IPC_FF_ROUTE_FROM_ME);
2880 if (retval != EOK) {
[ab9f443]2881 async_forget(msg);
[01c3bb4]2882 ipc_answer_0(chandle, retval);
[b4cbef1]2883 return retval;
2884 }
2885
[96b02eb9]2886 sysarg_t rc;
[b4cbef1]2887 async_wait_for(msg, &rc);
2888
2889 return (int) rc;
2890}
2891
[47b7006]2892/** Wrapper for IPC_M_DATA_WRITE calls using the async framework.
[0da4e41]2893 *
[79ae36dd]2894 * @param exch Exchange for sending the message.
2895 * @param src Address of the beginning of the source buffer.
2896 * @param size Size of the source buffer.
[b4cbef1]2897 *
2898 * @return Zero on success or a negative error code from errno.h.
[0da4e41]2899 *
2900 */
[79ae36dd]2901int async_data_write_start(async_exch_t *exch, const void *src, size_t size)
[0da4e41]2902{
[79ae36dd]2903 if (exch == NULL)
2904 return ENOENT;
2905
2906 return async_req_2_0(exch, IPC_M_DATA_WRITE, (sysarg_t) src,
2907 (sysarg_t) size);
[0da4e41]2908}
2909
2910/** Wrapper for receiving the IPC_M_DATA_WRITE calls using the async framework.
2911 *
[47b7006]2912 * This wrapper only makes it more comfortable to receive IPC_M_DATA_WRITE
2913 * calls so that the user doesn't have to remember the meaning of each IPC
2914 * argument.
[0da4e41]2915 *
2916 * So far, this wrapper is to be used from within a connection fibril.
2917 *
[01c3bb4]2918 * @param chandle Storage for the handle of the IPC_M_DATA_WRITE.
2919 * @param size Storage for the suggested size. May be NULL.
[b4cbef1]2920 *
[01c3bb4]2921 * @return True on success, false on failure.
[0da4e41]2922 *
2923 */
[01c3bb4]2924bool async_data_write_receive(cap_handle_t *chandle, size_t *size)
[5ae1c51]2925{
2926 ipc_call_t data;
[01c3bb4]2927 return async_data_write_receive_call(chandle, &data, size);
[5ae1c51]2928}
2929
2930/** Wrapper for receiving the IPC_M_DATA_WRITE calls using the async framework.
2931 *
2932 * This wrapper only makes it more comfortable to receive IPC_M_DATA_WRITE
2933 * calls so that the user doesn't have to remember the meaning of each IPC
2934 * argument.
2935 *
2936 * So far, this wrapper is to be used from within a connection fibril.
2937 *
[01c3bb4]2938 * @param chandle Storage for the handle of the IPC_M_DATA_WRITE.
2939 * @param data Storage for the ipc call data.
2940 * @param size Storage for the suggested size. May be NULL.
[5ae1c51]2941 *
2942 * @return True on success, false on failure.
2943 *
2944 */
[01c3bb4]2945bool async_data_write_receive_call(cap_handle_t *chandle, ipc_call_t *data,
[5ae1c51]2946 size_t *size)
[0da4e41]2947{
[01c3bb4]2948 assert(chandle);
[5ae1c51]2949 assert(data);
[b4cbef1]2950
[01c3bb4]2951 *chandle = async_get_call(data);
[47b7006]2952
[5ae1c51]2953 if (IPC_GET_IMETHOD(*data) != IPC_M_DATA_WRITE)
[47b7006]2954 return false;
[b4cbef1]2955
[0da4e41]2956 if (size)
[5ae1c51]2957 *size = (size_t) IPC_GET_ARG2(*data);
[b4cbef1]2958
[47b7006]2959 return true;
[0da4e41]2960}
2961
2962/** Wrapper for answering the IPC_M_DATA_WRITE calls using the async framework.
2963 *
[47b7006]2964 * This wrapper only makes it more comfortable to answer IPC_M_DATA_WRITE
2965 * calls so that the user doesn't have to remember the meaning of each IPC
2966 * argument.
[0da4e41]2967 *
[01c3bb4]2968 * @param chandle Handle of the IPC_M_DATA_WRITE call to answer.
2969 * @param dst Final destination address for the IPC_M_DATA_WRITE call.
2970 * @param size Final size for the IPC_M_DATA_WRITE call.
[b4cbef1]2971 *
[01c3bb4]2972 * @return Zero on success or a value from @ref errno.h on failure.
[0da4e41]2973 *
2974 */
[01c3bb4]2975int async_data_write_finalize(cap_handle_t chandle, void *dst, size_t size)
[0da4e41]2976{
[01c3bb4]2977 return ipc_answer_2(chandle, EOK, (sysarg_t) dst, (sysarg_t) size);
[0da4e41]2978}
2979
[eda925a]2980/** Wrapper for receiving binary data or strings
[8aa42e3]2981 *
2982 * This wrapper only makes it more comfortable to use async_data_write_*
[eda925a]2983 * functions to receive binary data or strings.
[8aa42e3]2984 *
[472c09d]2985 * @param data Pointer to data pointer (which should be later disposed
2986 * by free()). If the operation fails, the pointer is not
2987 * touched.
[eda925a]2988 * @param nullterm If true then the received data is always zero terminated.
2989 * This also causes to allocate one extra byte beyond the
2990 * raw transmitted data.
[b4cbef1]2991 * @param min_size Minimum size (in bytes) of the data to receive.
[472c09d]2992 * @param max_size Maximum size (in bytes) of the data to receive. 0 means
2993 * no limit.
[eda925a]2994 * @param granulariy If non-zero then the size of the received data has to
[472c09d]2995 * be divisible by this value.
2996 * @param received If not NULL, the size of the received data is stored here.
[8aa42e3]2997 *
2998 * @return Zero on success or a value from @ref errno.h on failure.
2999 *
3000 */
[eda925a]3001int async_data_write_accept(void **data, const bool nullterm,
3002 const size_t min_size, const size_t max_size, const size_t granularity,
3003 size_t *received)
[8aa42e3]3004{
[79ae36dd]3005 assert(data);
3006
[01c3bb4]3007 cap_handle_t chandle;
[8aa42e3]3008 size_t size;
[01c3bb4]3009 if (!async_data_write_receive(&chandle, &size)) {
3010 ipc_answer_0(chandle, EINVAL);
[8aa42e3]3011 return EINVAL;
3012 }
3013
[b4cbef1]3014 if (size < min_size) {
[01c3bb4]3015 ipc_answer_0(chandle, EINVAL);
[b4cbef1]3016 return EINVAL;
3017 }
3018
[8aa42e3]3019 if ((max_size > 0) && (size > max_size)) {
[01c3bb4]3020 ipc_answer_0(chandle, EINVAL);
[8aa42e3]3021 return EINVAL;
3022 }
3023
[472c09d]3024 if ((granularity > 0) && ((size % granularity) != 0)) {
[01c3bb4]3025 ipc_answer_0(chandle, EINVAL);
[472c09d]3026 return EINVAL;
3027 }
3028
[57dea62]3029 void *arg_data;
[eda925a]3030
3031 if (nullterm)
[57dea62]3032 arg_data = malloc(size + 1);
[eda925a]3033 else
[57dea62]3034 arg_data = malloc(size);
[eda925a]3035
[57dea62]3036 if (arg_data == NULL) {
[01c3bb4]3037 ipc_answer_0(chandle, ENOMEM);
[8aa42e3]3038 return ENOMEM;
3039 }
3040
[01c3bb4]3041 int rc = async_data_write_finalize(chandle, arg_data, size);
[8aa42e3]3042 if (rc != EOK) {
[57dea62]3043 free(arg_data);
[8aa42e3]3044 return rc;
3045 }
3046
[eda925a]3047 if (nullterm)
[57dea62]3048 ((char *) arg_data)[size] = 0;
[8aa42e3]3049
[57dea62]3050 *data = arg_data;
[472c09d]3051 if (received != NULL)
3052 *received = size;
3053
[8aa42e3]3054 return EOK;
3055}
3056
[b4cbef1]3057/** Wrapper for voiding any data that is about to be received
3058 *
3059 * This wrapper can be used to void any pending data
3060 *
3061 * @param retval Error value from @ref errno.h to be returned to the caller.
3062 *
3063 */
[47b7006]3064void async_data_write_void(sysarg_t retval)
[b4cbef1]3065{
[01c3bb4]3066 cap_handle_t chandle;
3067 async_data_write_receive(&chandle, NULL);
3068 ipc_answer_0(chandle, retval);
[b4cbef1]3069}
3070
3071/** Wrapper for forwarding any data that is about to be received
3072 *
3073 */
[79ae36dd]3074int async_data_write_forward_fast(async_exch_t *exch, sysarg_t imethod,
3075 sysarg_t arg1, sysarg_t arg2, sysarg_t arg3, sysarg_t arg4,
3076 ipc_call_t *dataptr)
[b4cbef1]3077{
[79ae36dd]3078 if (exch == NULL)
3079 return ENOENT;
3080
[01c3bb4]3081 cap_handle_t chandle;
3082 if (!async_data_write_receive(&chandle, NULL)) {
3083 ipc_answer_0(chandle, EINVAL);
[b4cbef1]3084 return EINVAL;
3085 }
3086
[79ae36dd]3087 aid_t msg = async_send_fast(exch, imethod, arg1, arg2, arg3, arg4,
[b4cbef1]3088 dataptr);
3089 if (msg == 0) {
[01c3bb4]3090 ipc_answer_0(chandle, EINVAL);
[b4cbef1]3091 return EINVAL;
3092 }
3093
[01c3bb4]3094 int retval = ipc_forward_fast(chandle, exch->phone, 0, 0, 0,
[b4cbef1]3095 IPC_FF_ROUTE_FROM_ME);
3096 if (retval != EOK) {
[ab9f443]3097 async_forget(msg);
[01c3bb4]3098 ipc_answer_0(chandle, retval);
[b4cbef1]3099 return retval;
3100 }
3101
[96b02eb9]3102 sysarg_t rc;
[b4cbef1]3103 async_wait_for(msg, &rc);
3104
3105 return (int) rc;
3106}
3107
[79ae36dd]3108/** Wrapper for receiving the IPC_M_CONNECT_TO_ME calls.
3109 *
3110 * If the current call is IPC_M_CONNECT_TO_ME then a new
3111 * async session is created for the accepted phone.
3112 *
3113 * @param mgmt Exchange management style.
3114 *
[8869f7b]3115 * @return New async session.
3116 * @return NULL on failure.
[79ae36dd]3117 *
3118 */
3119async_sess_t *async_callback_receive(exch_mgmt_t mgmt)
3120{
3121 /* Accept the phone */
3122 ipc_call_t call;
[01c3bb4]3123 cap_handle_t chandle = async_get_call(&call);
3124 cap_handle_t phandle = (cap_handle_t) IPC_GET_ARG5(call);
[79ae36dd]3125
[01c3bb4]3126 if ((IPC_GET_IMETHOD(call) != IPC_M_CONNECT_TO_ME) || (phandle < 0)) {
3127 async_answer_0(chandle, EINVAL);
[79ae36dd]3128 return NULL;
3129 }
3130
3131 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
3132 if (sess == NULL) {
[01c3bb4]3133 async_answer_0(chandle, ENOMEM);
[79ae36dd]3134 return NULL;
3135 }
3136
[566992e1]3137 sess->iface = 0;
[79ae36dd]3138 sess->mgmt = mgmt;
[01c3bb4]3139 sess->phone = phandle;
[79ae36dd]3140 sess->arg1 = 0;
3141 sess->arg2 = 0;
3142 sess->arg3 = 0;
3143
[58cbf8d5]3144 fibril_mutex_initialize(&sess->remote_state_mtx);
3145 sess->remote_state_data = NULL;
3146
[79ae36dd]3147 list_initialize(&sess->exch_list);
3148 fibril_mutex_initialize(&sess->mutex);
3149 atomic_set(&sess->refcnt, 0);
3150
3151 /* Acknowledge the connected phone */
[01c3bb4]3152 async_answer_0(chandle, EOK);
[79ae36dd]3153
3154 return sess;
3155}
3156
[8869f7b]3157/** Wrapper for receiving the IPC_M_CONNECT_TO_ME calls.
3158 *
3159 * If the call is IPC_M_CONNECT_TO_ME then a new
3160 * async session is created. However, the phone is
3161 * not accepted automatically.
3162 *
3163 * @param mgmt Exchange management style.
3164 * @param call Call data.
3165 *
3166 * @return New async session.
3167 * @return NULL on failure.
3168 * @return NULL if the call is not IPC_M_CONNECT_TO_ME.
3169 *
3170 */
3171async_sess_t *async_callback_receive_start(exch_mgmt_t mgmt, ipc_call_t *call)
3172{
[01c3bb4]3173 cap_handle_t phandle = (cap_handle_t) IPC_GET_ARG5(*call);
[8869f7b]3174
[01c3bb4]3175 if ((IPC_GET_IMETHOD(*call) != IPC_M_CONNECT_TO_ME) || (phandle < 0))
[8869f7b]3176 return NULL;
3177
3178 async_sess_t *sess = (async_sess_t *) malloc(sizeof(async_sess_t));
3179 if (sess == NULL)
3180 return NULL;
3181
[566992e1]3182 sess->iface = 0;
[8869f7b]3183 sess->mgmt = mgmt;
[01c3bb4]3184 sess->phone = phandle;
[8869f7b]3185 sess->arg1 = 0;
3186 sess->arg2 = 0;
3187 sess->arg3 = 0;
3188
[58cbf8d5]3189 fibril_mutex_initialize(&sess->remote_state_mtx);
3190 sess->remote_state_data = NULL;
3191
[8869f7b]3192 list_initialize(&sess->exch_list);
3193 fibril_mutex_initialize(&sess->mutex);
3194 atomic_set(&sess->refcnt, 0);
3195
3196 return sess;
3197}
3198
[2c4aa39]3199int async_state_change_start(async_exch_t *exch, sysarg_t arg1, sysarg_t arg2,
3200 sysarg_t arg3, async_exch_t *other_exch)
3201{
3202 return async_req_5_0(exch, IPC_M_STATE_CHANGE_AUTHORIZE,
3203 arg1, arg2, arg3, 0, other_exch->phone);
3204}
3205
[01c3bb4]3206bool async_state_change_receive(cap_handle_t *chandle, sysarg_t *arg1,
[2c4aa39]3207 sysarg_t *arg2, sysarg_t *arg3)
3208{
[01c3bb4]3209 assert(chandle);
[57dea62]3210
[2c4aa39]3211 ipc_call_t call;
[01c3bb4]3212 *chandle = async_get_call(&call);
[57dea62]3213
[2c4aa39]3214 if (IPC_GET_IMETHOD(call) != IPC_M_STATE_CHANGE_AUTHORIZE)
3215 return false;
3216
3217 if (arg1)
3218 *arg1 = IPC_GET_ARG1(call);
3219 if (arg2)
3220 *arg2 = IPC_GET_ARG2(call);
3221 if (arg3)
3222 *arg3 = IPC_GET_ARG3(call);
[57dea62]3223
[2c4aa39]3224 return true;
3225}
3226
[01c3bb4]3227int async_state_change_finalize(cap_handle_t chandle, async_exch_t *other_exch)
[2c4aa39]3228{
[01c3bb4]3229 return ipc_answer_1(chandle, EOK, other_exch->phone);
[2c4aa39]3230}
3231
[58cbf8d5]3232/** Lock and get session remote state
3233 *
3234 * Lock and get the local replica of the remote state
3235 * in stateful sessions. The call should be paired
3236 * with async_remote_state_release*().
3237 *
3238 * @param[in] sess Stateful session.
3239 *
3240 * @return Local replica of the remote state.
3241 *
3242 */
3243void *async_remote_state_acquire(async_sess_t *sess)
3244{
3245 fibril_mutex_lock(&sess->remote_state_mtx);
3246 return sess->remote_state_data;
3247}
3248
3249/** Update the session remote state
3250 *
3251 * Update the local replica of the remote state
3252 * in stateful sessions. The remote state must
3253 * be already locked.
3254 *
3255 * @param[in] sess Stateful session.
3256 * @param[in] state New local replica of the remote state.
3257 *
3258 */
3259void async_remote_state_update(async_sess_t *sess, void *state)
3260{
3261 assert(fibril_mutex_is_locked(&sess->remote_state_mtx));
3262 sess->remote_state_data = state;
3263}
3264
3265/** Release the session remote state
3266 *
3267 * Unlock the local replica of the remote state
3268 * in stateful sessions.
3269 *
3270 * @param[in] sess Stateful session.
3271 *
3272 */
3273void async_remote_state_release(async_sess_t *sess)
3274{
3275 assert(fibril_mutex_is_locked(&sess->remote_state_mtx));
3276
3277 fibril_mutex_unlock(&sess->remote_state_mtx);
3278}
3279
3280/** Release the session remote state and end an exchange
3281 *
3282 * Unlock the local replica of the remote state
3283 * in stateful sessions. This is convenience function
3284 * which gets the session pointer from the exchange
3285 * and also ends the exchange.
3286 *
3287 * @param[in] exch Stateful session's exchange.
3288 *
3289 */
3290void async_remote_state_release_exchange(async_exch_t *exch)
3291{
3292 if (exch == NULL)
3293 return;
3294
3295 async_sess_t *sess = exch->sess;
3296 assert(fibril_mutex_is_locked(&sess->remote_state_mtx));
3297
3298 async_exchange_end(exch);
3299 fibril_mutex_unlock(&sess->remote_state_mtx);
3300}
3301
[101516d]3302void *async_as_area_create(void *base, size_t size, unsigned int flags,
[ae6021d]3303 async_sess_t *pager, sysarg_t id1, sysarg_t id2, sysarg_t id3)
3304{
3305 as_area_pager_info_t pager_info = {
3306 .pager = pager->phone,
3307 .id1 = id1,
3308 .id2 = id2,
3309 .id3 = id3
3310 };
3311 return as_area_create(base, size, flags, &pager_info);
[101516d]3312}
3313
[a46da63]3314/** @}
[b2951e2]3315 */
Note: See TracBrowser for help on using the repository browser.