5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 /* track why this service was selected */
64 enum connman_session_reason reason;
65 enum connman_service_state state;
67 struct connman_service *service;
70 GSList *pending_timeouts;
74 struct connman_session_config config;
75 enum connman_session_state state;
76 struct service_entry *entry;
77 enum connman_session_reason reason;
80 struct connman_session {
86 struct connman_session_policy *policy;
88 connman_bool_t append_all;
89 struct session_info *info;
90 struct session_info *info_last;
91 struct connman_session_config *policy_config;
92 GSList *user_allowed_bearers;
96 GSequence *service_list;
97 GHashTable *service_hash;
100 static const char *trigger2string(enum connman_session_trigger trigger)
103 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
105 case CONNMAN_SESSION_TRIGGER_SETTING:
107 case CONNMAN_SESSION_TRIGGER_CONNECT:
109 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
111 case CONNMAN_SESSION_TRIGGER_SERVICE:
113 case CONNMAN_SESSION_TRIGGER_ECALL:
120 static const char *reason2string(enum connman_session_reason reason)
123 case CONNMAN_SESSION_REASON_UNKNOWN:
125 case CONNMAN_SESSION_REASON_CONNECT:
127 case CONNMAN_SESSION_REASON_FREE_RIDE:
134 static const char *state2string(enum connman_session_state state)
137 case CONNMAN_SESSION_STATE_DISCONNECTED:
138 return "disconnected";
139 case CONNMAN_SESSION_STATE_CONNECTED:
141 case CONNMAN_SESSION_STATE_ONLINE:
148 static const char *type2string(enum connman_session_type type)
151 case CONNMAN_SESSION_TYPE_UNKNOWN:
153 case CONNMAN_SESSION_TYPE_ANY:
155 case CONNMAN_SESSION_TYPE_LOCAL:
157 case CONNMAN_SESSION_TYPE_INTERNET:
164 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
166 if (g_strcmp0(policy, "default") == 0)
167 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
168 else if (g_strcmp0(policy, "always") == 0)
169 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
170 else if (g_strcmp0(policy, "forbidden") == 0)
171 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
172 else if (g_strcmp0(policy, "national") == 0)
173 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
174 else if (g_strcmp0(policy, "international") == 0)
175 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
177 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
180 enum connman_session_type connman_session_parse_connection_type(const char *type)
182 if (g_strcmp0(type, "any") == 0)
183 return CONNMAN_SESSION_TYPE_ANY;
184 if (g_strcmp0(type, "local") == 0)
185 return CONNMAN_SESSION_TYPE_LOCAL;
186 else if (g_strcmp0(type, "internet") == 0)
187 return CONNMAN_SESSION_TYPE_INTERNET;
189 return CONNMAN_SESSION_TYPE_UNKNOWN;
192 static int bearer2service(const char *bearer, enum connman_service_type *type)
194 if (g_strcmp0(bearer, "ethernet") == 0)
195 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
196 else if (g_strcmp0(bearer, "wifi") == 0)
197 *type = CONNMAN_SERVICE_TYPE_WIFI;
198 else if (g_strcmp0(bearer, "wimax") == 0)
199 *type = CONNMAN_SERVICE_TYPE_WIMAX;
200 else if (g_strcmp0(bearer, "bluetooth") == 0)
201 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
202 else if (g_strcmp0(bearer, "cellular") == 0)
203 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
204 else if (g_strcmp0(bearer, "vpn") == 0)
205 *type = CONNMAN_SERVICE_TYPE_VPN;
206 else if (g_strcmp0(bearer, "*") == 0)
207 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
214 static char *service2bearer(enum connman_service_type type)
217 case CONNMAN_SERVICE_TYPE_ETHERNET:
219 case CONNMAN_SERVICE_TYPE_WIFI:
221 case CONNMAN_SERVICE_TYPE_WIMAX:
223 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
225 case CONNMAN_SERVICE_TYPE_CELLULAR:
227 case CONNMAN_SERVICE_TYPE_VPN:
229 case CONNMAN_SERVICE_TYPE_UNKNOWN:
230 case CONNMAN_SERVICE_TYPE_SYSTEM:
231 case CONNMAN_SERVICE_TYPE_GPS:
232 case CONNMAN_SERVICE_TYPE_GADGET:
239 static int assign_policy_plugin(struct connman_session *session)
241 if (session->policy != NULL)
244 if (policy_list == NULL)
247 session->policy = policy_list->data;
252 static int create_policy_config(struct connman_session *session,
253 connman_session_config_cb callback,
256 struct connman_session_config *config;
258 if (session->policy == NULL) {
259 config = connman_session_create_default_config();
263 session->policy_config = config;
268 return (*session->policy->create)(session, callback, user_data);
271 static void destroy_policy_config(struct connman_session *session)
273 if (session->policy == NULL) {
274 g_free(session->policy_config);
278 (*session->policy->destroy)(session);
281 static void probe_policy(struct connman_session_policy *policy)
286 struct connman_session *session;
288 DBG("policy %p name %s", policy, policy->name);
290 g_hash_table_iter_init(&iter, session_hash);
292 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
295 if (session->policy != NULL)
298 assign_policy_plugin(session);
302 static void remove_policy(struct connman_session_policy *policy)
306 struct connman_session *session;
308 DBG("policy %p name %s", policy, policy->name);
310 g_hash_table_iter_init(&iter, session_hash);
312 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
315 if (session->policy != policy)
318 session->policy = NULL;
319 assign_policy_plugin(session);
323 static gint compare_priority(gconstpointer a, gconstpointer b)
325 const struct connman_session_policy *policy1 = a;
326 const struct connman_session_policy *policy2 = b;
328 return policy2->priority - policy1->priority;
332 int connman_session_policy_register(struct connman_session_policy *policy)
334 DBG("name %s", policy->name);
336 if (policy->create == NULL || policy->destroy == NULL)
339 policy_list = g_slist_insert_sorted(policy_list, policy,
342 probe_policy(policy);
347 void connman_session_policy_unregister(struct connman_session_policy *policy)
349 DBG("name %s", policy->name);
351 policy_list = g_slist_remove(policy_list, policy);
353 remove_policy(policy);
356 int connman_session_set_default_config(struct connman_session_config *config)
358 config->priority = FALSE;
359 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
360 config->type = CONNMAN_SESSION_TYPE_ANY;
361 config->ecall = FALSE;
363 g_slist_free(config->allowed_bearers);
364 config->allowed_bearers = g_slist_prepend(NULL,
365 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
366 if (config->allowed_bearers == NULL)
372 struct connman_session_config *connman_session_create_default_config(void)
374 struct connman_session_config *config;
376 config = g_try_new0(struct connman_session_config, 1);
380 if (connman_session_set_default_config(config) < 0) {
388 static enum connman_session_type apply_policy_on_type(
389 enum connman_session_type policy,
390 enum connman_session_type type)
392 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
393 return CONNMAN_SESSION_TYPE_UNKNOWN;
395 if (policy == CONNMAN_SESSION_TYPE_ANY)
398 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
399 return CONNMAN_SESSION_TYPE_LOCAL;
401 return CONNMAN_SESSION_TYPE_INTERNET;
404 int connman_session_parse_bearers(const char *token, GSList **list)
406 enum connman_service_type bearer;
409 if (g_strcmp0(token, "") == 0)
412 err = bearer2service(token, &bearer);
416 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
421 static int parse_bearers(DBusMessageIter *iter, GSList **list)
423 DBusMessageIter array;
426 dbus_message_iter_recurse(iter, &array);
430 while ((type = dbus_message_iter_get_arg_type(&array)) !=
432 char *bearer_name = NULL;
434 if (type != DBUS_TYPE_STRING) {
440 dbus_message_iter_get_basic(&array, &bearer_name);
442 err = connman_session_parse_bearers(bearer_name, list);
449 dbus_message_iter_next(&array);
455 static int filter_bearer(GSList *policy_bearers,
456 enum connman_service_type bearer,
459 enum connman_service_type policy;
462 if (policy_bearers == NULL)
465 for (it = policy_bearers; it != NULL; it = it->next) {
466 policy = GPOINTER_TO_INT(it->data);
468 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
473 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
484 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
489 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
492 enum connman_service_type bearer;
498 for (it = bearers; it != NULL; it = it->next) {
499 bearer = GPOINTER_TO_INT(it->data);
501 err = filter_bearer(policy_bearers, bearer, list);
509 const char *connman_session_get_owner(struct connman_session *session)
511 return session->owner;
514 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
516 struct session_info *info = user_data;
519 for (list = info->config.allowed_bearers;
520 list != NULL; list = list->next) {
521 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
522 const char *name = __connman_service_type2string(bearer);
527 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
532 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
534 struct connman_service *service = user_data;
535 struct connman_ipconfig *ipconfig_ipv4;
540 if (__connman_service_is_connected_state(service,
541 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
545 ipconfig_ipv4 = __connman_service_get_ip4config(service);
546 if (ipconfig_ipv4 == NULL)
549 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
552 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
554 struct connman_service *service = user_data;
555 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
560 if (__connman_service_is_connected_state(service,
561 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
565 ipconfig_ipv4 = __connman_service_get_ip4config(service);
566 ipconfig_ipv6 = __connman_service_get_ip6config(service);
567 if (ipconfig_ipv6 == NULL)
570 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
573 static void append_notify(DBusMessageIter *dict,
574 struct connman_session *session)
576 struct session_info *info = session->info;
577 struct session_info *info_last = session->info_last;
578 struct connman_service *service;
579 const char *name, *ifname, *bearer;
581 if (session->append_all == TRUE ||
582 info->state != info_last->state) {
583 const char *state = state2string(info->state);
585 connman_dbus_dict_append_basic(dict, "State",
588 info_last->state = info->state;
591 if (session->append_all == TRUE ||
592 info->entry != info_last->entry) {
593 if (info->entry == NULL) {
599 name = info->entry->name;
600 ifname = info->entry->ifname;
601 service = info->entry->service;
602 bearer = info->entry->bearer;
605 connman_dbus_dict_append_basic(dict, "Name",
609 connman_dbus_dict_append_dict(dict, "IPv4",
610 append_ipconfig_ipv4,
613 connman_dbus_dict_append_dict(dict, "IPv6",
614 append_ipconfig_ipv6,
617 connman_dbus_dict_append_basic(dict, "Interface",
621 connman_dbus_dict_append_basic(dict, "Bearer",
625 info_last->entry = info->entry;
628 if (session->append_all == TRUE ||
629 info->config.type != info_last->config.type) {
630 const char *type = type2string(info->config.type);
632 connman_dbus_dict_append_basic(dict, "ConnectionType",
635 info_last->config.type = info->config.type;
638 if (session->append_all == TRUE ||
639 info->config.allowed_bearers != info_last->config.allowed_bearers) {
640 connman_dbus_dict_append_array(dict, "AllowedBearers",
642 append_allowed_bearers,
644 info_last->config.allowed_bearers = info->config.allowed_bearers;
647 session->append_all = FALSE;
650 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
651 enum connman_session_type type)
654 case CONNMAN_SESSION_TYPE_UNKNOWN:
656 case CONNMAN_SESSION_TYPE_ANY:
658 case CONNMAN_SESSION_TYPE_LOCAL:
659 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
660 *state = CONNMAN_SESSION_STATE_CONNECTED;
665 case CONNMAN_SESSION_TYPE_INTERNET:
666 if (*state == CONNMAN_SESSION_STATE_ONLINE)
674 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
676 struct session_info *info_last = session->info_last;
677 struct session_info *info = session->info;
679 if (session->append_all == TRUE)
682 if (info->state != info_last->state)
685 if (info->entry != info_last->entry &&
686 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
689 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
690 info->config.type != info_last->config.type)
696 static gboolean session_notify(gpointer user_data)
698 struct connman_session *session = user_data;
700 DBusMessageIter array, dict;
702 if (compute_notifiable_changes(session) == FALSE)
705 DBG("session %p owner %s notify_path %s", session,
706 session->owner, session->notify_path);
708 msg = dbus_message_new_method_call(session->owner, session->notify_path,
709 CONNMAN_NOTIFICATION_INTERFACE,
714 dbus_message_iter_init_append(msg, &array);
715 connman_dbus_dict_open(&array, &dict);
717 append_notify(&dict, session);
719 connman_dbus_dict_close(&array, &dict);
721 g_dbus_send_message(connection, msg);
726 static void ipconfig_ipv4_changed(struct connman_session *session)
728 struct session_info *info = session->info;
730 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
731 "IPv4", append_ipconfig_ipv4,
732 info->entry->service);
735 static void ipconfig_ipv6_changed(struct connman_session *session)
737 struct session_info *info = session->info;
739 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
740 "IPv6", append_ipconfig_ipv6,
741 info->entry->service);
744 static connman_bool_t service_type_match(struct connman_session *session,
745 struct connman_service *service)
747 struct session_info *info = session->info;
750 for (list = info->config.allowed_bearers;
751 list != NULL; list = list->next) {
752 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
753 enum connman_service_type service_type;
755 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
758 service_type = connman_service_get_type(service);
759 if (bearer == service_type)
766 static connman_bool_t service_match(struct connman_session *session,
767 struct connman_service *service)
769 if (service_type_match(session, service) == FALSE)
775 static int service_type_weight(enum connman_service_type type)
778 * The session doesn't care which service
779 * to use. Nevertheless we have to sort them
780 * according their type. The ordering is
789 case CONNMAN_SERVICE_TYPE_ETHERNET:
791 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
793 case CONNMAN_SERVICE_TYPE_WIFI:
794 case CONNMAN_SERVICE_TYPE_WIMAX:
796 case CONNMAN_SERVICE_TYPE_CELLULAR:
798 case CONNMAN_SERVICE_TYPE_UNKNOWN:
799 case CONNMAN_SERVICE_TYPE_SYSTEM:
800 case CONNMAN_SERVICE_TYPE_GPS:
801 case CONNMAN_SERVICE_TYPE_VPN:
802 case CONNMAN_SERVICE_TYPE_GADGET:
809 static gint sort_allowed_bearers(struct connman_service *service_a,
810 struct connman_service *service_b,
811 struct connman_session *session)
813 struct session_info *info = session->info;
815 enum connman_service_type type_a, type_b;
816 int weight_a, weight_b;
818 type_a = connman_service_get_type(service_a);
819 type_b = connman_service_get_type(service_b);
821 for (list = info->config.allowed_bearers;
822 list != NULL; list = list->next) {
823 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
825 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
826 if (type_a != type_b) {
827 weight_a = service_type_weight(type_a);
828 weight_b = service_type_weight(type_b);
830 if (weight_a > weight_b)
833 if (weight_a < weight_b)
840 if (type_a == bearer && type_b == bearer)
843 if (type_a == bearer && type_b != bearer)
846 if (type_a != bearer && type_b == bearer)
853 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
855 struct service_entry *entry_a = (void *)a;
856 struct service_entry *entry_b = (void *)b;
857 struct connman_session *session = user_data;
859 return sort_allowed_bearers(entry_a->service, entry_b->service,
863 static void free_session(struct connman_session *session)
868 destroy_policy_config(session);
869 g_slist_free(session->info->config.allowed_bearers);
870 g_free(session->owner);
871 g_free(session->session_path);
872 g_free(session->notify_path);
873 g_free(session->info);
874 g_free(session->info_last);
879 static void cleanup_session(gpointer user_data)
881 struct connman_session *session = user_data;
882 struct session_info *info = session->info;
884 DBG("remove %s", session->session_path);
886 g_slist_free(session->user_allowed_bearers);
887 g_hash_table_destroy(session->service_hash);
888 g_sequence_free(session->service_list);
890 if (info->entry != NULL &&
891 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
892 __connman_service_disconnect(info->entry->service);
895 free_session(session);
898 static enum connman_session_state service_to_session_state(enum connman_service_state state)
901 case CONNMAN_SERVICE_STATE_UNKNOWN:
902 case CONNMAN_SERVICE_STATE_IDLE:
903 case CONNMAN_SERVICE_STATE_ASSOCIATION:
904 case CONNMAN_SERVICE_STATE_CONFIGURATION:
905 case CONNMAN_SERVICE_STATE_DISCONNECT:
906 case CONNMAN_SERVICE_STATE_FAILURE:
908 case CONNMAN_SERVICE_STATE_READY:
909 return CONNMAN_SESSION_STATE_CONNECTED;
910 case CONNMAN_SERVICE_STATE_ONLINE:
911 return CONNMAN_SESSION_STATE_ONLINE;
914 return CONNMAN_SESSION_STATE_DISCONNECTED;
917 static connman_bool_t is_connected(enum connman_service_state state)
920 case CONNMAN_SERVICE_STATE_UNKNOWN:
921 case CONNMAN_SERVICE_STATE_IDLE:
922 case CONNMAN_SERVICE_STATE_ASSOCIATION:
923 case CONNMAN_SERVICE_STATE_CONFIGURATION:
924 case CONNMAN_SERVICE_STATE_DISCONNECT:
925 case CONNMAN_SERVICE_STATE_FAILURE:
927 case CONNMAN_SERVICE_STATE_READY:
928 case CONNMAN_SERVICE_STATE_ONLINE:
935 static connman_bool_t is_connecting(enum connman_service_state state)
938 case CONNMAN_SERVICE_STATE_UNKNOWN:
939 case CONNMAN_SERVICE_STATE_IDLE:
941 case CONNMAN_SERVICE_STATE_ASSOCIATION:
942 case CONNMAN_SERVICE_STATE_CONFIGURATION:
944 case CONNMAN_SERVICE_STATE_DISCONNECT:
945 case CONNMAN_SERVICE_STATE_FAILURE:
946 case CONNMAN_SERVICE_STATE_READY:
947 case CONNMAN_SERVICE_STATE_ONLINE:
954 static connman_bool_t explicit_connect(enum connman_session_reason reason)
957 case CONNMAN_SESSION_REASON_UNKNOWN:
958 case CONNMAN_SESSION_REASON_FREE_RIDE:
960 case CONNMAN_SESSION_REASON_CONNECT:
967 static connman_bool_t explicit_disconnect(struct session_info *info)
969 if (info->entry == NULL)
972 DBG("reason %s service %p state %d",
973 reason2string(info->entry->reason),
974 info->entry->service, info->entry->state);
976 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
979 if (explicit_connect(info->entry->reason) == FALSE)
982 if (__connman_service_session_dec(info->entry->service) == FALSE)
988 struct pending_data {
989 unsigned int timeout;
990 struct service_entry *entry;
991 gboolean (*cb)(gpointer);
994 static void pending_timeout_free(gpointer data, gpointer user_data)
996 struct pending_data *pending = data;
998 DBG("pending %p timeout %d", pending, pending->timeout);
999 g_source_remove(pending->timeout);
1003 static void pending_timeout_remove_all(struct service_entry *entry)
1007 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1008 g_slist_free(entry->pending_timeouts);
1009 entry->pending_timeouts = NULL;
1012 static gboolean pending_timeout_cb(gpointer data)
1014 struct pending_data *pending = data;
1015 struct service_entry *entry = pending->entry;
1018 DBG("pending %p timeout %d", pending, pending->timeout);
1020 ret = pending->cb(pending->entry);
1022 entry->pending_timeouts =
1023 g_slist_remove(entry->pending_timeouts,
1030 static connman_bool_t pending_timeout_add(unsigned int seconds,
1031 gboolean (*cb)(gpointer),
1032 struct service_entry *entry)
1034 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1036 if (pending == NULL || cb == NULL || entry == NULL) {
1042 pending->entry = entry;
1043 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1045 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1048 DBG("pending %p entry %p timeout id %d", pending, entry,
1054 static gboolean call_disconnect(gpointer user_data)
1056 struct service_entry *entry = user_data;
1057 struct connman_service *service = entry->service;
1060 * TODO: We should mark this entry as pending work. In case
1061 * disconnect fails we just unassign this session from the
1062 * service and can't do anything later on it
1064 DBG("disconnect service %p", service);
1065 __connman_service_disconnect(service);
1070 static gboolean call_connect(gpointer user_data)
1072 struct service_entry *entry = user_data;
1073 struct connman_service *service = entry->service;
1075 DBG("connect service %p", service);
1076 __connman_service_connect(service);
1081 static void deselect_service(struct session_info *info)
1083 struct service_entry *entry;
1084 connman_bool_t disconnect, connected;
1088 if (info->entry == NULL)
1091 disconnect = explicit_disconnect(info);
1093 connected = is_connecting(info->entry->state) == TRUE ||
1094 is_connected(info->entry->state) == TRUE;
1096 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1097 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1099 entry = info->entry;
1102 DBG("disconnect %d connected %d", disconnect, connected);
1104 if (disconnect == TRUE && connected == TRUE)
1105 pending_timeout_add(0, call_disconnect, entry);
1108 static void deselect_and_disconnect(struct connman_session *session)
1110 struct session_info *info = session->info;
1112 deselect_service(info);
1114 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1117 static void select_connected_service(struct session_info *info,
1118 struct service_entry *entry)
1120 enum connman_session_state state;
1122 state = service_to_session_state(entry->state);
1123 if (is_type_matching_state(&state, info->config.type) == FALSE)
1126 info->state = state;
1128 info->entry = entry;
1129 info->entry->reason = info->reason;
1131 if (explicit_connect(info->reason) == FALSE)
1134 __connman_service_session_inc(info->entry->service);
1137 static void select_offline_service(struct session_info *info,
1138 struct service_entry *entry)
1140 if (explicit_connect(info->reason) == FALSE)
1143 info->state = service_to_session_state(entry->state);
1145 info->entry = entry;
1146 info->entry->reason = info->reason;
1148 __connman_service_session_inc(info->entry->service);
1149 pending_timeout_add(0, call_connect, entry);
1152 static void select_service(struct session_info *info,
1153 struct service_entry *entry)
1155 DBG("service %p", entry->service);
1157 if (is_connected(entry->state) == TRUE)
1158 select_connected_service(info, entry);
1160 select_offline_service(info, entry);
1163 static void select_and_connect(struct connman_session *session,
1164 enum connman_session_reason reason)
1166 struct session_info *info = session->info;
1167 struct service_entry *entry = NULL;
1168 GSequenceIter *iter;
1170 DBG("session %p reason %s", session, reason2string(reason));
1172 info->reason = reason;
1174 iter = g_sequence_get_begin_iter(session->service_list);
1176 while (g_sequence_iter_is_end(iter) == FALSE) {
1177 entry = g_sequence_get(iter);
1179 switch (entry->state) {
1180 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1181 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1182 case CONNMAN_SERVICE_STATE_READY:
1183 case CONNMAN_SERVICE_STATE_ONLINE:
1184 case CONNMAN_SERVICE_STATE_IDLE:
1185 case CONNMAN_SERVICE_STATE_DISCONNECT:
1186 select_service(info, entry);
1188 case CONNMAN_SERVICE_STATE_UNKNOWN:
1189 case CONNMAN_SERVICE_STATE_FAILURE:
1193 iter = g_sequence_iter_next(iter);
1197 static struct service_entry *create_service_entry(struct connman_service *service,
1199 enum connman_service_state state)
1201 struct service_entry *entry;
1202 enum connman_service_type type;
1205 entry = g_try_new0(struct service_entry, 1);
1209 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1210 entry->state = state;
1215 entry->service = service;
1217 idx = __connman_service_get_index(entry->service);
1218 entry->ifname = connman_inet_ifname(idx);
1219 if (entry->ifname == NULL)
1220 entry->ifname = g_strdup("");
1222 type = connman_service_get_type(entry->service);
1223 entry->bearer = service2bearer(type);
1228 static void destroy_service_entry(gpointer data)
1230 struct service_entry *entry = data;
1232 pending_timeout_remove_all(entry);
1233 g_free(entry->ifname);
1238 static void populate_service_list(struct connman_session *session)
1240 struct service_entry *entry;
1241 GSequenceIter *iter;
1243 session->service_hash =
1244 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1246 session->service_list = __connman_service_get_list(session,
1248 create_service_entry,
1249 destroy_service_entry);
1251 g_sequence_sort(session->service_list, sort_services, session);
1253 iter = g_sequence_get_begin_iter(session->service_list);
1255 while (g_sequence_iter_is_end(iter) == FALSE) {
1256 entry = g_sequence_get(iter);
1258 DBG("service %p type %s name %s", entry->service,
1259 service2bearer(connman_service_get_type(entry->service)),
1262 g_hash_table_replace(session->service_hash,
1263 entry->service, iter);
1265 iter = g_sequence_iter_next(iter);
1269 static void session_changed(struct connman_session *session,
1270 enum connman_session_trigger trigger)
1272 struct session_info *info = session->info;
1273 struct session_info *info_last = session->info_last;
1274 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1275 GSequence *service_list_last;
1276 GHashTable *service_hash_last;
1279 * TODO: This only a placeholder for the 'real' algorithm to
1280 * play a bit around. So we are going to improve it step by step.
1283 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1284 reason2string(info->reason));
1286 if (info->entry != NULL) {
1287 enum connman_session_state state;
1289 state = service_to_session_state(info->entry->state);
1291 if (is_type_matching_state(&state, info->config.type) == TRUE)
1292 info->state = state;
1296 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1297 DBG("ignore session changed event");
1299 case CONNMAN_SESSION_TRIGGER_SETTING:
1300 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1302 service_hash_last = session->service_hash;
1303 service_list_last = session->service_list;
1305 populate_service_list(session);
1307 if (info->entry != NULL) {
1308 service_iter_last = g_hash_table_lookup(
1310 info->entry->service);
1311 service_iter = g_hash_table_lookup(
1312 session->service_hash,
1313 info->entry->service);
1316 if (service_iter == NULL && service_iter_last != NULL) {
1318 * The currently selected service is
1319 * not part of this session anymore.
1321 deselect_and_disconnect(session);
1324 g_hash_table_remove_all(service_hash_last);
1325 g_sequence_free(service_list_last);
1328 if (info->config.type != info_last->config.type) {
1329 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1330 is_type_matching_state(&info->state,
1331 info->config.type) == FALSE)
1332 deselect_and_disconnect(session);
1335 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1336 select_and_connect(session,
1337 CONNMAN_SESSION_REASON_FREE_RIDE);
1341 case CONNMAN_SESSION_TRIGGER_ECALL:
1343 * For the time beeing we fallback to normal connect
1346 case CONNMAN_SESSION_TRIGGER_CONNECT:
1347 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1348 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1350 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1351 __connman_service_session_inc(info->entry->service);
1355 if (info->entry != NULL &&
1356 is_connecting(info->entry->state) == TRUE) {
1360 select_and_connect(session,
1361 CONNMAN_SESSION_REASON_CONNECT);
1364 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1365 deselect_and_disconnect(session);
1368 case CONNMAN_SESSION_TRIGGER_SERVICE:
1369 if (info->entry != NULL &&
1370 (is_connecting(info->entry->state) == TRUE ||
1371 is_connected(info->entry->state) == TRUE)) {
1375 deselect_and_disconnect(session);
1377 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1378 select_and_connect(session, info->reason);
1384 session_notify(session);
1387 int connman_session_config_update(struct connman_session *session)
1389 struct session_info *info = session->info;
1390 GSList *allowed_bearers;
1393 DBG("session %p", session);
1396 * We update all configuration even though only one entry
1397 * might have changed. We can still optimize this later.
1400 err = apply_policy_on_bearers(
1401 session->policy_config->allowed_bearers,
1402 session->user_allowed_bearers,
1407 g_slist_free(info->config.allowed_bearers);
1408 info->config.allowed_bearers = allowed_bearers;
1410 info->config.type = apply_policy_on_type(
1411 session->policy_config->type,
1414 info->config.roaming_policy = session->policy_config->roaming_policy;
1416 info->config.ecall = session->policy_config->ecall;
1417 if (info->config.ecall == TRUE)
1418 ecall_session = session;
1420 info->config.priority = session->policy_config->priority;
1422 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1427 static DBusMessage *connect_session(DBusConnection *conn,
1428 DBusMessage *msg, void *user_data)
1430 struct connman_session *session = user_data;
1432 DBG("session %p", session);
1434 if (ecall_session != NULL) {
1435 if (ecall_session->ecall == TRUE && ecall_session != session)
1436 return __connman_error_failed(msg, EBUSY);
1438 session->ecall = TRUE;
1439 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1441 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1443 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1446 static DBusMessage *disconnect_session(DBusConnection *conn,
1447 DBusMessage *msg, void *user_data)
1449 struct connman_session *session = user_data;
1451 DBG("session %p", session);
1453 if (ecall_session != NULL) {
1454 if (ecall_session->ecall == TRUE && ecall_session != session)
1455 return __connman_error_failed(msg, EBUSY);
1457 session->ecall = FALSE;
1460 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1462 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1465 static DBusMessage *change_session(DBusConnection *conn,
1466 DBusMessage *msg, void *user_data)
1468 struct connman_session *session = user_data;
1469 struct session_info *info = session->info;
1470 DBusMessageIter iter, value;
1473 GSList *allowed_bearers;
1476 DBG("session %p", session);
1477 if (dbus_message_iter_init(msg, &iter) == FALSE)
1478 return __connman_error_invalid_arguments(msg);
1480 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1481 return __connman_error_invalid_arguments(msg);
1483 dbus_message_iter_get_basic(&iter, &name);
1484 dbus_message_iter_next(&iter);
1486 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1487 return __connman_error_invalid_arguments(msg);
1489 dbus_message_iter_recurse(&iter, &value);
1491 switch (dbus_message_iter_get_arg_type(&value)) {
1492 case DBUS_TYPE_ARRAY:
1493 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1494 err = parse_bearers(&value, &allowed_bearers);
1496 return __connman_error_failed(msg, err);
1498 g_slist_free(info->config.allowed_bearers);
1499 session->user_allowed_bearers = allowed_bearers;
1501 err = apply_policy_on_bearers(
1502 session->policy_config->allowed_bearers,
1503 session->user_allowed_bearers,
1504 &info->config.allowed_bearers);
1507 return __connman_error_failed(msg, err);
1512 case DBUS_TYPE_STRING:
1513 if (g_str_equal(name, "ConnectionType") == TRUE) {
1514 dbus_message_iter_get_basic(&value, &val);
1515 info->config.type = apply_policy_on_type(
1516 session->policy_config->type,
1517 connman_session_parse_connection_type(val));
1526 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1528 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1531 return __connman_error_invalid_arguments(msg);
1534 static void release_session(gpointer key, gpointer value, gpointer user_data)
1536 struct connman_session *session = value;
1537 DBusMessage *message;
1539 DBG("owner %s path %s", session->owner, session->notify_path);
1541 if (session->notify_watch > 0)
1542 g_dbus_remove_watch(connection, session->notify_watch);
1544 g_dbus_unregister_interface(connection, session->session_path,
1545 CONNMAN_SESSION_INTERFACE);
1547 message = dbus_message_new_method_call(session->owner,
1548 session->notify_path,
1549 CONNMAN_NOTIFICATION_INTERFACE,
1551 if (message == NULL)
1554 dbus_message_set_no_reply(message, TRUE);
1556 g_dbus_send_message(connection, message);
1559 static int session_disconnect(struct connman_session *session)
1561 DBG("session %p, %s", session, session->owner);
1563 if (session->notify_watch > 0)
1564 g_dbus_remove_watch(connection, session->notify_watch);
1566 g_dbus_unregister_interface(connection, session->session_path,
1567 CONNMAN_SESSION_INTERFACE);
1569 deselect_and_disconnect(session);
1571 g_hash_table_remove(session_hash, session->session_path);
1576 static void owner_disconnect(DBusConnection *conn, void *user_data)
1578 struct connman_session *session = user_data;
1580 DBG("session %p, %s died", session, session->owner);
1582 session_disconnect(session);
1585 static DBusMessage *destroy_session(DBusConnection *conn,
1586 DBusMessage *msg, void *user_data)
1588 struct connman_session *session = user_data;
1590 DBG("session %p", session);
1592 if (ecall_session != NULL && ecall_session != session)
1593 return __connman_error_failed(msg, EBUSY);
1595 session_disconnect(session);
1597 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1600 static const GDBusMethodTable session_methods[] = {
1601 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1602 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1603 { GDBUS_METHOD("Disconnect", NULL, NULL,
1604 disconnect_session ) },
1605 { GDBUS_METHOD("Change",
1606 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1607 NULL, change_session) },
1611 struct user_config {
1612 DBusMessage *pending;
1614 enum connman_session_type type;
1615 GSList *allowed_bearers;
1618 static void session_create_cb(struct connman_session *session,
1619 struct connman_session_config *config,
1620 void *user_data, int err)
1623 struct user_config *user_config = user_data;
1624 struct session_info *info, *info_last;
1626 DBG("session %p config %p", session, config);
1631 session->policy_config = config;
1633 info = session->info;
1634 info_last = session->info_last;
1636 if (session->policy_config->ecall == TRUE)
1637 ecall_session = session;
1639 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1640 info->config.type = apply_policy_on_type(
1641 session->policy_config->type,
1643 info->config.priority = session->policy_config->priority;
1644 info->config.roaming_policy = session->policy_config->roaming_policy;
1647 session->user_allowed_bearers = user_config->allowed_bearers;
1649 err = apply_policy_on_bearers(
1650 session->policy_config->allowed_bearers,
1651 session->user_allowed_bearers,
1652 &info->config.allowed_bearers);
1656 g_hash_table_replace(session_hash, session->session_path, session);
1658 DBG("add %s", session->session_path);
1660 if (g_dbus_register_interface(connection, session->session_path,
1661 CONNMAN_SESSION_INTERFACE,
1662 session_methods, NULL,
1663 NULL, session, NULL) == FALSE) {
1664 connman_error("Failed to register %s", session->session_path);
1665 g_hash_table_remove(session_hash, session->session_path);
1670 reply = g_dbus_create_reply(user_config->pending,
1671 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1673 g_dbus_send_message(connection, reply);
1675 populate_service_list(session);
1677 info_last->state = info->state;
1678 info_last->config.priority = info->config.priority;
1679 info_last->config.roaming_policy = info->config.roaming_policy;
1680 info_last->entry = info->entry;
1681 info_last->config.allowed_bearers = info->config.allowed_bearers;
1683 session->append_all = TRUE;
1685 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1689 __connman_error_failed(user_config->pending, err);
1690 free_session(session);
1693 dbus_message_unref(user_config->pending);
1694 g_free(user_config);
1697 int __connman_session_create(DBusMessage *msg)
1699 const char *owner, *notify_path;
1700 char *session_path = NULL;
1701 DBusMessageIter iter, array;
1702 struct connman_session *session = NULL;
1703 struct user_config *user_config = NULL;
1704 connman_bool_t user_allowed_bearers = FALSE;
1705 connman_bool_t user_connection_type = FALSE;
1708 owner = dbus_message_get_sender(msg);
1710 DBG("owner %s", owner);
1712 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1714 * If there is an emergency call already going on,
1715 * ignore session creation attempt
1721 user_config = g_try_new0(struct user_config, 1);
1722 if (user_config == NULL) {
1727 user_config->pending = dbus_message_ref(msg);
1729 dbus_message_iter_init(msg, &iter);
1730 dbus_message_iter_recurse(&iter, &array);
1732 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1733 DBusMessageIter entry, value;
1734 const char *key, *val;
1736 dbus_message_iter_recurse(&array, &entry);
1737 dbus_message_iter_get_basic(&entry, &key);
1739 dbus_message_iter_next(&entry);
1740 dbus_message_iter_recurse(&entry, &value);
1742 switch (dbus_message_iter_get_arg_type(&value)) {
1743 case DBUS_TYPE_ARRAY:
1744 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1745 err = parse_bearers(&value,
1746 &user_config->allowed_bearers);
1750 user_allowed_bearers = TRUE;
1756 case DBUS_TYPE_STRING:
1757 if (g_str_equal(key, "ConnectionType") == TRUE) {
1758 dbus_message_iter_get_basic(&value, &val);
1760 connman_session_parse_connection_type(val);
1762 user_connection_type = TRUE;
1768 dbus_message_iter_next(&array);
1772 * If the user hasn't provided a configuration, we set
1773 * the default configuration.
1775 * For AllowedBearers this is '*', ...
1777 if (user_allowed_bearers == FALSE) {
1778 user_config->allowed_bearers =
1779 g_slist_append(NULL,
1780 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1781 if (user_config->allowed_bearers == NULL) {
1787 /* ... and for ConnectionType it is 'any'. */
1788 if (user_connection_type == FALSE)
1789 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1791 dbus_message_iter_next(&iter);
1792 dbus_message_iter_get_basic(&iter, ¬ify_path);
1794 if (notify_path == NULL) {
1799 session_path = g_strdup_printf("/sessions%s", notify_path);
1800 if (session_path == NULL) {
1805 session = g_hash_table_lookup(session_hash, session_path);
1806 if (session != NULL) {
1807 g_free(session_path);
1813 session = g_try_new0(struct connman_session, 1);
1814 if (session == NULL) {
1815 g_free(session_path);
1820 session->session_path = session_path;
1822 session->info = g_try_new0(struct session_info, 1);
1823 if (session->info == NULL) {
1828 session->info_last = g_try_new0(struct session_info, 1);
1829 if (session->info_last == NULL) {
1834 session->owner = g_strdup(owner);
1835 session->notify_path = g_strdup(notify_path);
1836 session->notify_watch =
1837 g_dbus_add_disconnect_watch(connection, session->owner,
1838 owner_disconnect, session, NULL);
1840 err = assign_policy_plugin(session);
1844 err = create_policy_config(session, session_create_cb, user_config);
1848 return -EINPROGRESS;
1851 connman_error("Failed to create session");
1853 free_session(session);
1855 if (user_config != NULL) {
1856 dbus_message_unref(user_config->pending);
1857 g_slist_free(user_config->allowed_bearers);
1858 g_free(user_config);
1863 void connman_session_destroy(struct connman_session *session)
1865 DBG("session %p", session);
1867 session_disconnect(session);
1870 int __connman_session_destroy(DBusMessage *msg)
1872 const char *owner, *session_path;
1873 struct connman_session *session;
1875 owner = dbus_message_get_sender(msg);
1877 DBG("owner %s", owner);
1879 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1881 if (session_path == NULL)
1884 session = g_hash_table_lookup(session_hash, session_path);
1885 if (session == NULL)
1888 if (g_strcmp0(owner, session->owner) != 0)
1891 connman_session_destroy(session);
1896 connman_bool_t __connman_session_mode()
1901 void __connman_session_set_mode(connman_bool_t enable)
1903 DBG("enable %d", enable);
1905 if (sessionmode != enable) {
1906 sessionmode = enable;
1908 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1909 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1910 DBUS_TYPE_BOOLEAN, &sessionmode);
1913 if (sessionmode == TRUE)
1914 __connman_service_disconnect_all();
1917 static void service_add(struct connman_service *service,
1920 GHashTableIter iter;
1921 GSequenceIter *iter_service_list;
1922 gpointer key, value;
1923 struct connman_session *session;
1924 struct service_entry *entry;
1926 DBG("service %p", service);
1928 g_hash_table_iter_init(&iter, session_hash);
1930 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1933 if (service_match(session, service) == FALSE)
1936 entry = create_service_entry(service, name,
1937 CONNMAN_SERVICE_STATE_IDLE);
1942 g_sequence_insert_sorted(session->service_list,
1943 entry, sort_services,
1946 g_hash_table_replace(session->service_hash, service,
1949 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1953 static void service_remove(struct connman_service *service)
1956 GHashTableIter iter;
1957 gpointer key, value;
1958 struct connman_session *session;
1959 struct session_info *info;
1961 DBG("service %p", service);
1963 g_hash_table_iter_init(&iter, session_hash);
1965 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1966 GSequenceIter *seq_iter;
1968 info = session->info;
1970 seq_iter = g_hash_table_lookup(session->service_hash, service);
1971 if (seq_iter == NULL)
1974 g_sequence_remove(seq_iter);
1976 if (info->entry != NULL && info->entry->service == service)
1978 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1982 static void service_state_changed(struct connman_service *service,
1983 enum connman_service_state state)
1985 GHashTableIter iter;
1986 gpointer key, value;
1988 DBG("service %p state %d", service, state);
1990 g_hash_table_iter_init(&iter, session_hash);
1992 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1993 struct connman_session *session = value;
1994 GSequenceIter *service_iter;
1996 service_iter = g_hash_table_lookup(session->service_hash, service);
1997 if (service_iter != NULL) {
1998 struct service_entry *entry;
2000 entry = g_sequence_get(service_iter);
2001 entry->state = state;
2004 session_changed(session,
2005 CONNMAN_SESSION_TRIGGER_SERVICE);
2009 static void ipconfig_changed(struct connman_service *service,
2010 struct connman_ipconfig *ipconfig)
2012 GHashTableIter iter;
2013 gpointer key, value;
2014 struct connman_session *session;
2015 struct session_info *info;
2016 enum connman_ipconfig_type type;
2018 DBG("service %p ipconfig %p", service, ipconfig);
2020 type = __connman_ipconfig_get_config_type(ipconfig);
2022 g_hash_table_iter_init(&iter, session_hash);
2024 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2026 info = session->info;
2028 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2031 if (info->entry != NULL && info->entry->service == service) {
2032 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2033 ipconfig_ipv4_changed(session);
2034 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2035 ipconfig_ipv6_changed(session);
2040 static struct connman_notifier session_notifier = {
2042 .service_add = service_add,
2043 .service_remove = service_remove,
2044 .service_state_changed = service_state_changed,
2045 .ipconfig_changed = ipconfig_changed,
2048 int __connman_session_init(void)
2054 connection = connman_dbus_get_connection();
2055 if (connection == NULL)
2058 err = connman_notifier_register(&session_notifier);
2060 dbus_connection_unref(connection);
2064 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2065 NULL, cleanup_session);
2067 sessionmode = FALSE;
2071 void __connman_session_cleanup(void)
2075 if (connection == NULL)
2078 connman_notifier_unregister(&session_notifier);
2080 g_hash_table_foreach(session_hash, release_session, NULL);
2081 g_hash_table_destroy(session_hash);
2082 session_hash = NULL;
2084 dbus_connection_unref(connection);