5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 /* track why this service was selected */
64 enum connman_session_reason reason;
65 enum connman_service_state state;
67 struct connman_service *service;
70 GSList *pending_timeouts;
74 struct connman_session_config config;
75 enum connman_session_state state;
76 struct service_entry *entry;
77 enum connman_session_reason reason;
80 struct connman_session {
86 struct connman_session_policy *policy;
88 connman_bool_t append_all;
89 struct session_info *info;
90 struct session_info *info_last;
91 struct connman_session_config *policy_config;
92 GSList *user_allowed_bearers;
96 GSequence *service_list;
97 GHashTable *service_hash;
100 static const char *trigger2string(enum connman_session_trigger trigger)
103 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
105 case CONNMAN_SESSION_TRIGGER_SETTING:
107 case CONNMAN_SESSION_TRIGGER_CONNECT:
109 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
111 case CONNMAN_SESSION_TRIGGER_SERVICE:
113 case CONNMAN_SESSION_TRIGGER_ECALL:
120 static const char *reason2string(enum connman_session_reason reason)
123 case CONNMAN_SESSION_REASON_UNKNOWN:
125 case CONNMAN_SESSION_REASON_CONNECT:
127 case CONNMAN_SESSION_REASON_FREE_RIDE:
134 static const char *state2string(enum connman_session_state state)
137 case CONNMAN_SESSION_STATE_DISCONNECTED:
138 return "disconnected";
139 case CONNMAN_SESSION_STATE_CONNECTED:
141 case CONNMAN_SESSION_STATE_ONLINE:
148 static const char *type2string(enum connman_session_type type)
151 case CONNMAN_SESSION_TYPE_UNKNOWN:
153 case CONNMAN_SESSION_TYPE_ANY:
155 case CONNMAN_SESSION_TYPE_LOCAL:
157 case CONNMAN_SESSION_TYPE_INTERNET:
164 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
166 if (g_strcmp0(policy, "default") == 0)
167 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
168 else if (g_strcmp0(policy, "always") == 0)
169 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
170 else if (g_strcmp0(policy, "forbidden") == 0)
171 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
172 else if (g_strcmp0(policy, "national") == 0)
173 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
174 else if (g_strcmp0(policy, "international") == 0)
175 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
177 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
180 enum connman_session_type connman_session_parse_connection_type(const char *type)
182 if (g_strcmp0(type, "any") == 0)
183 return CONNMAN_SESSION_TYPE_ANY;
184 if (g_strcmp0(type, "local") == 0)
185 return CONNMAN_SESSION_TYPE_LOCAL;
186 else if (g_strcmp0(type, "internet") == 0)
187 return CONNMAN_SESSION_TYPE_INTERNET;
189 return CONNMAN_SESSION_TYPE_UNKNOWN;
192 static int bearer2service(const char *bearer, enum connman_service_type *type)
194 if (g_strcmp0(bearer, "ethernet") == 0)
195 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
196 else if (g_strcmp0(bearer, "wifi") == 0)
197 *type = CONNMAN_SERVICE_TYPE_WIFI;
198 else if (g_strcmp0(bearer, "bluetooth") == 0)
199 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
200 else if (g_strcmp0(bearer, "cellular") == 0)
201 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
202 else if (g_strcmp0(bearer, "vpn") == 0)
203 *type = CONNMAN_SERVICE_TYPE_VPN;
204 else if (g_strcmp0(bearer, "*") == 0)
205 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
212 static char *service2bearer(enum connman_service_type type)
215 case CONNMAN_SERVICE_TYPE_ETHERNET:
217 case CONNMAN_SERVICE_TYPE_WIFI:
219 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
221 case CONNMAN_SERVICE_TYPE_CELLULAR:
223 case CONNMAN_SERVICE_TYPE_VPN:
225 case CONNMAN_SERVICE_TYPE_UNKNOWN:
226 case CONNMAN_SERVICE_TYPE_SYSTEM:
227 case CONNMAN_SERVICE_TYPE_GPS:
228 case CONNMAN_SERVICE_TYPE_GADGET:
235 static void destroy_policy_config(struct connman_session *session)
237 if (session->policy == NULL) {
238 g_free(session->policy_config);
242 (*session->policy->destroy)(session);
245 static void free_session(struct connman_session *session)
250 if (session->notify_watch > 0)
251 g_dbus_remove_watch(connection, session->notify_watch);
253 destroy_policy_config(session);
254 g_slist_free(session->info->config.allowed_bearers);
255 g_free(session->owner);
256 g_free(session->session_path);
257 g_free(session->notify_path);
258 g_free(session->info);
259 g_free(session->info_last);
264 static void cleanup_session(gpointer user_data)
266 struct connman_session *session = user_data;
267 struct session_info *info = session->info;
269 DBG("remove %s", session->session_path);
271 g_slist_free(session->user_allowed_bearers);
272 g_hash_table_destroy(session->service_hash);
273 g_sequence_free(session->service_list);
275 if (info->entry != NULL &&
276 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
277 __connman_service_disconnect(info->entry->service);
280 free_session(session);
283 static int assign_policy_plugin(struct connman_session *session)
285 if (session->policy != NULL)
288 if (policy_list == NULL)
291 session->policy = policy_list->data;
297 DBusMessage *pending;
299 enum connman_session_type type;
300 GSList *allowed_bearers;
303 static void cleanup_user_config(struct user_config *user_config)
305 if (user_config == NULL)
308 if (user_config->pending != NULL)
309 dbus_message_unref(user_config->pending);
311 g_slist_free(user_config->allowed_bearers);
315 static int create_policy_config(struct connman_session *session,
316 connman_session_config_cb callback,
317 struct user_config *user_config)
319 struct connman_session_config *config;
321 if (session->policy == NULL) {
322 config = connman_session_create_default_config();
323 if (config == NULL) {
324 free_session(session);
325 cleanup_user_config(user_config);
329 return callback(session, config, user_config, 0);
332 return (*session->policy->create)(session, callback, user_config);
335 static void probe_policy(struct connman_session_policy *policy)
340 struct connman_session *session;
342 DBG("policy %p name %s", policy, policy->name);
344 g_hash_table_iter_init(&iter, session_hash);
346 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
349 if (session->policy != NULL)
352 assign_policy_plugin(session);
356 static void remove_policy(struct connman_session_policy *policy)
360 struct connman_session *session;
362 DBG("policy %p name %s", policy, policy->name);
364 g_hash_table_iter_init(&iter, session_hash);
366 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
369 if (session->policy != policy)
372 session->policy = NULL;
373 assign_policy_plugin(session);
377 static gint compare_priority(gconstpointer a, gconstpointer b)
379 const struct connman_session_policy *policy1 = a;
380 const struct connman_session_policy *policy2 = b;
382 return policy2->priority - policy1->priority;
386 int connman_session_policy_register(struct connman_session_policy *policy)
388 DBG("name %s", policy->name);
390 if (policy->create == NULL || policy->destroy == NULL)
393 policy_list = g_slist_insert_sorted(policy_list, policy,
396 probe_policy(policy);
401 void connman_session_policy_unregister(struct connman_session_policy *policy)
403 DBG("name %s", policy->name);
405 policy_list = g_slist_remove(policy_list, policy);
407 remove_policy(policy);
410 int connman_session_set_default_config(struct connman_session_config *config)
412 config->priority = FALSE;
413 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
414 config->type = CONNMAN_SESSION_TYPE_ANY;
415 config->ecall = FALSE;
417 g_slist_free(config->allowed_bearers);
418 config->allowed_bearers = g_slist_prepend(NULL,
419 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
420 if (config->allowed_bearers == NULL)
426 struct connman_session_config *connman_session_create_default_config(void)
428 struct connman_session_config *config;
430 config = g_try_new0(struct connman_session_config, 1);
434 if (connman_session_set_default_config(config) < 0) {
442 static enum connman_session_type apply_policy_on_type(
443 enum connman_session_type policy,
444 enum connman_session_type type)
446 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
447 return CONNMAN_SESSION_TYPE_UNKNOWN;
449 if (policy == CONNMAN_SESSION_TYPE_ANY)
452 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
453 return CONNMAN_SESSION_TYPE_LOCAL;
455 return CONNMAN_SESSION_TYPE_INTERNET;
458 int connman_session_parse_bearers(const char *token, GSList **list)
460 enum connman_service_type bearer;
463 if (g_strcmp0(token, "") == 0)
466 err = bearer2service(token, &bearer);
470 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
475 static int parse_bearers(DBusMessageIter *iter, GSList **list)
477 DBusMessageIter array;
480 dbus_message_iter_recurse(iter, &array);
484 while ((type = dbus_message_iter_get_arg_type(&array)) !=
486 char *bearer_name = NULL;
488 if (type != DBUS_TYPE_STRING) {
494 dbus_message_iter_get_basic(&array, &bearer_name);
496 err = connman_session_parse_bearers(bearer_name, list);
503 dbus_message_iter_next(&array);
509 static int filter_bearer(GSList *policy_bearers,
510 enum connman_service_type bearer,
513 enum connman_service_type policy;
516 if (policy_bearers == NULL)
519 for (it = policy_bearers; it != NULL; it = it->next) {
520 policy = GPOINTER_TO_INT(it->data);
522 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
527 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
538 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
543 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
546 enum connman_service_type bearer;
552 for (it = bearers; it != NULL; it = it->next) {
553 bearer = GPOINTER_TO_INT(it->data);
555 err = filter_bearer(policy_bearers, bearer, list);
563 const char *connman_session_get_owner(struct connman_session *session)
565 return session->owner;
568 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
570 struct session_info *info = user_data;
573 for (list = info->config.allowed_bearers;
574 list != NULL; list = list->next) {
575 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
576 const char *name = __connman_service_type2string(bearer);
581 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
586 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
588 struct connman_service *service = user_data;
589 struct connman_ipconfig *ipconfig_ipv4;
594 if (__connman_service_is_connected_state(service,
595 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
599 ipconfig_ipv4 = __connman_service_get_ip4config(service);
600 if (ipconfig_ipv4 == NULL)
603 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
606 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
608 struct connman_service *service = user_data;
609 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
614 if (__connman_service_is_connected_state(service,
615 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
619 ipconfig_ipv4 = __connman_service_get_ip4config(service);
620 ipconfig_ipv6 = __connman_service_get_ip6config(service);
621 if (ipconfig_ipv6 == NULL)
624 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
627 static void append_notify(DBusMessageIter *dict,
628 struct connman_session *session)
630 struct session_info *info = session->info;
631 struct session_info *info_last = session->info_last;
632 struct connman_service *service;
633 const char *name, *ifname, *bearer;
635 if (session->append_all == TRUE ||
636 info->state != info_last->state) {
637 const char *state = state2string(info->state);
639 connman_dbus_dict_append_basic(dict, "State",
642 info_last->state = info->state;
645 if (session->append_all == TRUE ||
646 info->entry != info_last->entry) {
647 if (info->entry == NULL) {
653 name = info->entry->name;
654 ifname = info->entry->ifname;
655 service = info->entry->service;
656 bearer = info->entry->bearer;
659 connman_dbus_dict_append_basic(dict, "Name",
663 connman_dbus_dict_append_dict(dict, "IPv4",
664 append_ipconfig_ipv4,
667 connman_dbus_dict_append_dict(dict, "IPv6",
668 append_ipconfig_ipv6,
671 connman_dbus_dict_append_basic(dict, "Interface",
675 connman_dbus_dict_append_basic(dict, "Bearer",
679 info_last->entry = info->entry;
682 if (session->append_all == TRUE ||
683 info->config.type != info_last->config.type) {
684 const char *type = type2string(info->config.type);
686 connman_dbus_dict_append_basic(dict, "ConnectionType",
689 info_last->config.type = info->config.type;
692 if (session->append_all == TRUE ||
693 info->config.allowed_bearers != info_last->config.allowed_bearers) {
694 connman_dbus_dict_append_array(dict, "AllowedBearers",
696 append_allowed_bearers,
698 info_last->config.allowed_bearers = info->config.allowed_bearers;
701 session->append_all = FALSE;
704 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
705 enum connman_session_type type)
708 case CONNMAN_SESSION_TYPE_UNKNOWN:
710 case CONNMAN_SESSION_TYPE_ANY:
712 case CONNMAN_SESSION_TYPE_LOCAL:
713 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
714 *state = CONNMAN_SESSION_STATE_CONNECTED;
719 case CONNMAN_SESSION_TYPE_INTERNET:
720 if (*state == CONNMAN_SESSION_STATE_ONLINE)
728 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
730 struct session_info *info_last = session->info_last;
731 struct session_info *info = session->info;
733 if (session->append_all == TRUE)
736 if (info->state != info_last->state)
739 if (info->entry != info_last->entry &&
740 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
743 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
744 info->config.type != info_last->config.type)
750 static gboolean session_notify(gpointer user_data)
752 struct connman_session *session = user_data;
754 DBusMessageIter array, dict;
756 if (compute_notifiable_changes(session) == FALSE)
759 DBG("session %p owner %s notify_path %s", session,
760 session->owner, session->notify_path);
762 msg = dbus_message_new_method_call(session->owner, session->notify_path,
763 CONNMAN_NOTIFICATION_INTERFACE,
768 dbus_message_iter_init_append(msg, &array);
769 connman_dbus_dict_open(&array, &dict);
771 append_notify(&dict, session);
773 connman_dbus_dict_close(&array, &dict);
775 g_dbus_send_message(connection, msg);
780 static void ipconfig_ipv4_changed(struct connman_session *session)
782 struct session_info *info = session->info;
784 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
785 "IPv4", append_ipconfig_ipv4,
786 info->entry->service);
789 static void ipconfig_ipv6_changed(struct connman_session *session)
791 struct session_info *info = session->info;
793 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
794 "IPv6", append_ipconfig_ipv6,
795 info->entry->service);
798 static connman_bool_t service_type_match(struct connman_session *session,
799 struct connman_service *service)
801 struct session_info *info = session->info;
804 for (list = info->config.allowed_bearers;
805 list != NULL; list = list->next) {
806 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
807 enum connman_service_type service_type;
809 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
812 service_type = connman_service_get_type(service);
813 if (bearer == service_type)
820 static connman_bool_t service_match(struct connman_session *session,
821 struct connman_service *service)
823 if (service_type_match(session, service) == FALSE)
829 static int service_type_weight(enum connman_service_type type)
832 * The session doesn't care which service
833 * to use. Nevertheless we have to sort them
834 * according their type. The ordering is
843 case CONNMAN_SERVICE_TYPE_ETHERNET:
845 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
847 case CONNMAN_SERVICE_TYPE_WIFI:
849 case CONNMAN_SERVICE_TYPE_CELLULAR:
851 case CONNMAN_SERVICE_TYPE_UNKNOWN:
852 case CONNMAN_SERVICE_TYPE_SYSTEM:
853 case CONNMAN_SERVICE_TYPE_GPS:
854 case CONNMAN_SERVICE_TYPE_VPN:
855 case CONNMAN_SERVICE_TYPE_GADGET:
862 static gint sort_allowed_bearers(struct connman_service *service_a,
863 struct connman_service *service_b,
864 struct connman_session *session)
866 struct session_info *info = session->info;
868 enum connman_service_type type_a, type_b;
869 int weight_a, weight_b;
871 type_a = connman_service_get_type(service_a);
872 type_b = connman_service_get_type(service_b);
874 for (list = info->config.allowed_bearers;
875 list != NULL; list = list->next) {
876 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
878 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
879 if (type_a != type_b) {
880 weight_a = service_type_weight(type_a);
881 weight_b = service_type_weight(type_b);
883 if (weight_a > weight_b)
886 if (weight_a < weight_b)
893 if (type_a == bearer && type_b == bearer)
896 if (type_a == bearer && type_b != bearer)
899 if (type_a != bearer && type_b == bearer)
906 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
908 struct service_entry *entry_a = (void *)a;
909 struct service_entry *entry_b = (void *)b;
910 struct connman_session *session = user_data;
912 return sort_allowed_bearers(entry_a->service, entry_b->service,
916 static enum connman_session_state service_to_session_state(enum connman_service_state state)
919 case CONNMAN_SERVICE_STATE_UNKNOWN:
920 case CONNMAN_SERVICE_STATE_IDLE:
921 case CONNMAN_SERVICE_STATE_ASSOCIATION:
922 case CONNMAN_SERVICE_STATE_CONFIGURATION:
923 case CONNMAN_SERVICE_STATE_DISCONNECT:
924 case CONNMAN_SERVICE_STATE_FAILURE:
926 case CONNMAN_SERVICE_STATE_READY:
927 return CONNMAN_SESSION_STATE_CONNECTED;
928 case CONNMAN_SERVICE_STATE_ONLINE:
929 return CONNMAN_SESSION_STATE_ONLINE;
932 return CONNMAN_SESSION_STATE_DISCONNECTED;
935 static connman_bool_t is_connected(enum connman_service_state state)
938 case CONNMAN_SERVICE_STATE_UNKNOWN:
939 case CONNMAN_SERVICE_STATE_IDLE:
940 case CONNMAN_SERVICE_STATE_ASSOCIATION:
941 case CONNMAN_SERVICE_STATE_CONFIGURATION:
942 case CONNMAN_SERVICE_STATE_DISCONNECT:
943 case CONNMAN_SERVICE_STATE_FAILURE:
945 case CONNMAN_SERVICE_STATE_READY:
946 case CONNMAN_SERVICE_STATE_ONLINE:
953 static connman_bool_t is_connecting(enum connman_service_state state)
956 case CONNMAN_SERVICE_STATE_UNKNOWN:
957 case CONNMAN_SERVICE_STATE_IDLE:
959 case CONNMAN_SERVICE_STATE_ASSOCIATION:
960 case CONNMAN_SERVICE_STATE_CONFIGURATION:
962 case CONNMAN_SERVICE_STATE_DISCONNECT:
963 case CONNMAN_SERVICE_STATE_FAILURE:
964 case CONNMAN_SERVICE_STATE_READY:
965 case CONNMAN_SERVICE_STATE_ONLINE:
972 static connman_bool_t explicit_connect(enum connman_session_reason reason)
975 case CONNMAN_SESSION_REASON_UNKNOWN:
976 case CONNMAN_SESSION_REASON_FREE_RIDE:
978 case CONNMAN_SESSION_REASON_CONNECT:
985 static connman_bool_t explicit_disconnect(struct session_info *info)
987 if (info->entry == NULL)
990 DBG("reason %s service %p state %d",
991 reason2string(info->entry->reason),
992 info->entry->service, info->entry->state);
994 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
997 if (explicit_connect(info->entry->reason) == FALSE)
1000 if (__connman_service_session_dec(info->entry->service) == FALSE)
1006 struct pending_data {
1007 unsigned int timeout;
1008 struct service_entry *entry;
1009 gboolean (*cb)(gpointer);
1012 static void pending_timeout_free(gpointer data, gpointer user_data)
1014 struct pending_data *pending = data;
1016 DBG("pending %p timeout %d", pending, pending->timeout);
1017 g_source_remove(pending->timeout);
1021 static void pending_timeout_remove_all(struct service_entry *entry)
1025 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1026 g_slist_free(entry->pending_timeouts);
1027 entry->pending_timeouts = NULL;
1030 static gboolean pending_timeout_cb(gpointer data)
1032 struct pending_data *pending = data;
1033 struct service_entry *entry = pending->entry;
1036 DBG("pending %p timeout %d", pending, pending->timeout);
1038 ret = pending->cb(pending->entry);
1040 entry->pending_timeouts =
1041 g_slist_remove(entry->pending_timeouts,
1048 static connman_bool_t pending_timeout_add(unsigned int seconds,
1049 gboolean (*cb)(gpointer),
1050 struct service_entry *entry)
1052 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1054 if (pending == NULL || cb == NULL || entry == NULL) {
1060 pending->entry = entry;
1061 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1063 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1066 DBG("pending %p entry %p timeout id %d", pending, entry,
1072 static gboolean call_disconnect(gpointer user_data)
1074 struct service_entry *entry = user_data;
1075 struct connman_service *service = entry->service;
1078 * TODO: We should mark this entry as pending work. In case
1079 * disconnect fails we just unassign this session from the
1080 * service and can't do anything later on it
1082 DBG("disconnect service %p", service);
1083 __connman_service_disconnect(service);
1088 static gboolean call_connect(gpointer user_data)
1090 struct service_entry *entry = user_data;
1091 struct connman_service *service = entry->service;
1093 DBG("connect service %p", service);
1094 __connman_service_connect(service);
1099 static void deselect_service(struct session_info *info)
1101 struct service_entry *entry;
1102 connman_bool_t disconnect, connected;
1106 if (info->entry == NULL)
1109 disconnect = explicit_disconnect(info);
1111 connected = is_connecting(info->entry->state) == TRUE ||
1112 is_connected(info->entry->state) == TRUE;
1114 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1115 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1117 entry = info->entry;
1120 DBG("disconnect %d connected %d", disconnect, connected);
1122 if (disconnect == TRUE && connected == TRUE)
1123 pending_timeout_add(0, call_disconnect, entry);
1126 static void deselect_and_disconnect(struct connman_session *session)
1128 struct session_info *info = session->info;
1130 deselect_service(info);
1132 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1135 static void select_connected_service(struct session_info *info,
1136 struct service_entry *entry)
1138 enum connman_session_state state;
1140 state = service_to_session_state(entry->state);
1141 if (is_type_matching_state(&state, info->config.type) == FALSE)
1144 info->state = state;
1146 info->entry = entry;
1147 info->entry->reason = info->reason;
1149 if (explicit_connect(info->reason) == FALSE)
1152 __connman_service_session_inc(info->entry->service);
1155 static void select_offline_service(struct session_info *info,
1156 struct service_entry *entry)
1158 if (explicit_connect(info->reason) == FALSE)
1161 info->state = service_to_session_state(entry->state);
1163 info->entry = entry;
1164 info->entry->reason = info->reason;
1166 __connman_service_session_inc(info->entry->service);
1167 pending_timeout_add(0, call_connect, entry);
1170 static void select_service(struct session_info *info,
1171 struct service_entry *entry)
1173 DBG("service %p", entry->service);
1175 if (is_connected(entry->state) == TRUE)
1176 select_connected_service(info, entry);
1178 select_offline_service(info, entry);
1181 static void select_and_connect(struct connman_session *session,
1182 enum connman_session_reason reason)
1184 struct session_info *info = session->info;
1185 struct service_entry *entry = NULL;
1186 GSequenceIter *iter;
1188 DBG("session %p reason %s", session, reason2string(reason));
1190 info->reason = reason;
1192 iter = g_sequence_get_begin_iter(session->service_list);
1194 while (g_sequence_iter_is_end(iter) == FALSE) {
1195 entry = g_sequence_get(iter);
1197 switch (entry->state) {
1198 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1199 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1200 case CONNMAN_SERVICE_STATE_READY:
1201 case CONNMAN_SERVICE_STATE_ONLINE:
1202 case CONNMAN_SERVICE_STATE_IDLE:
1203 case CONNMAN_SERVICE_STATE_DISCONNECT:
1204 select_service(info, entry);
1206 case CONNMAN_SERVICE_STATE_UNKNOWN:
1207 case CONNMAN_SERVICE_STATE_FAILURE:
1211 iter = g_sequence_iter_next(iter);
1215 static struct service_entry *create_service_entry(struct connman_service *service,
1217 enum connman_service_state state)
1219 struct service_entry *entry;
1220 enum connman_service_type type;
1223 entry = g_try_new0(struct service_entry, 1);
1227 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1228 entry->state = state;
1233 entry->service = service;
1235 idx = __connman_service_get_index(entry->service);
1236 entry->ifname = connman_inet_ifname(idx);
1237 if (entry->ifname == NULL)
1238 entry->ifname = g_strdup("");
1240 type = connman_service_get_type(entry->service);
1241 entry->bearer = service2bearer(type);
1246 static void destroy_service_entry(gpointer data)
1248 struct service_entry *entry = data;
1250 pending_timeout_remove_all(entry);
1251 g_free(entry->ifname);
1256 static void populate_service_list(struct connman_session *session)
1258 struct service_entry *entry;
1259 GSequenceIter *iter;
1261 session->service_hash =
1262 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1264 session->service_list = __connman_service_get_list(session,
1266 create_service_entry,
1267 destroy_service_entry);
1269 g_sequence_sort(session->service_list, sort_services, session);
1271 iter = g_sequence_get_begin_iter(session->service_list);
1273 while (g_sequence_iter_is_end(iter) == FALSE) {
1274 entry = g_sequence_get(iter);
1276 DBG("service %p type %s name %s", entry->service,
1277 service2bearer(connman_service_get_type(entry->service)),
1280 g_hash_table_replace(session->service_hash,
1281 entry->service, iter);
1283 iter = g_sequence_iter_next(iter);
1287 static void session_changed(struct connman_session *session,
1288 enum connman_session_trigger trigger)
1290 struct session_info *info = session->info;
1291 struct session_info *info_last = session->info_last;
1292 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1293 GSequence *service_list_last;
1294 GHashTable *service_hash_last;
1297 * TODO: This only a placeholder for the 'real' algorithm to
1298 * play a bit around. So we are going to improve it step by step.
1301 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1302 reason2string(info->reason));
1304 if (info->entry != NULL) {
1305 enum connman_session_state state;
1307 state = service_to_session_state(info->entry->state);
1309 if (is_type_matching_state(&state, info->config.type) == TRUE)
1310 info->state = state;
1314 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1315 DBG("ignore session changed event");
1317 case CONNMAN_SESSION_TRIGGER_SETTING:
1318 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1320 service_hash_last = session->service_hash;
1321 service_list_last = session->service_list;
1323 populate_service_list(session);
1325 if (info->entry != NULL) {
1326 service_iter_last = g_hash_table_lookup(
1328 info->entry->service);
1329 service_iter = g_hash_table_lookup(
1330 session->service_hash,
1331 info->entry->service);
1334 if (service_iter == NULL && service_iter_last != NULL) {
1336 * The currently selected service is
1337 * not part of this session anymore.
1339 deselect_and_disconnect(session);
1342 g_hash_table_remove_all(service_hash_last);
1343 g_sequence_free(service_list_last);
1346 if (info->config.type != info_last->config.type) {
1347 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1348 is_type_matching_state(&info->state,
1349 info->config.type) == FALSE)
1350 deselect_and_disconnect(session);
1353 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1354 select_and_connect(session,
1355 CONNMAN_SESSION_REASON_FREE_RIDE);
1359 case CONNMAN_SESSION_TRIGGER_ECALL:
1361 * For the time beeing we fallback to normal connect
1364 case CONNMAN_SESSION_TRIGGER_CONNECT:
1365 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1366 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1368 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1369 __connman_service_session_inc(info->entry->service);
1373 if (info->entry != NULL &&
1374 is_connecting(info->entry->state) == TRUE) {
1378 select_and_connect(session,
1379 CONNMAN_SESSION_REASON_CONNECT);
1382 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1383 deselect_and_disconnect(session);
1386 case CONNMAN_SESSION_TRIGGER_SERVICE:
1387 if (info->entry != NULL &&
1388 (is_connecting(info->entry->state) == TRUE ||
1389 is_connected(info->entry->state) == TRUE)) {
1393 deselect_and_disconnect(session);
1395 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1396 select_and_connect(session, info->reason);
1402 session_notify(session);
1405 int connman_session_config_update(struct connman_session *session)
1407 struct session_info *info = session->info;
1408 GSList *allowed_bearers;
1411 DBG("session %p", session);
1414 * We update all configuration even though only one entry
1415 * might have changed. We can still optimize this later.
1418 err = apply_policy_on_bearers(
1419 session->policy_config->allowed_bearers,
1420 session->user_allowed_bearers,
1425 g_slist_free(info->config.allowed_bearers);
1426 info->config.allowed_bearers = allowed_bearers;
1428 info->config.type = apply_policy_on_type(
1429 session->policy_config->type,
1432 info->config.roaming_policy = session->policy_config->roaming_policy;
1434 info->config.ecall = session->policy_config->ecall;
1435 if (info->config.ecall == TRUE)
1436 ecall_session = session;
1438 info->config.priority = session->policy_config->priority;
1440 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1445 static DBusMessage *connect_session(DBusConnection *conn,
1446 DBusMessage *msg, void *user_data)
1448 struct connman_session *session = user_data;
1450 DBG("session %p", session);
1452 if (ecall_session != NULL) {
1453 if (ecall_session->ecall == TRUE && ecall_session != session)
1454 return __connman_error_failed(msg, EBUSY);
1456 session->ecall = TRUE;
1457 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1459 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1461 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1464 static DBusMessage *disconnect_session(DBusConnection *conn,
1465 DBusMessage *msg, void *user_data)
1467 struct connman_session *session = user_data;
1469 DBG("session %p", session);
1471 if (ecall_session != NULL) {
1472 if (ecall_session->ecall == TRUE && ecall_session != session)
1473 return __connman_error_failed(msg, EBUSY);
1475 session->ecall = FALSE;
1478 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1480 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1483 static DBusMessage *change_session(DBusConnection *conn,
1484 DBusMessage *msg, void *user_data)
1486 struct connman_session *session = user_data;
1487 struct session_info *info = session->info;
1488 DBusMessageIter iter, value;
1491 GSList *allowed_bearers;
1494 DBG("session %p", session);
1495 if (dbus_message_iter_init(msg, &iter) == FALSE)
1496 return __connman_error_invalid_arguments(msg);
1498 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1499 return __connman_error_invalid_arguments(msg);
1501 dbus_message_iter_get_basic(&iter, &name);
1502 dbus_message_iter_next(&iter);
1504 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1505 return __connman_error_invalid_arguments(msg);
1507 dbus_message_iter_recurse(&iter, &value);
1509 switch (dbus_message_iter_get_arg_type(&value)) {
1510 case DBUS_TYPE_ARRAY:
1511 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1512 err = parse_bearers(&value, &allowed_bearers);
1514 return __connman_error_failed(msg, err);
1516 g_slist_free(info->config.allowed_bearers);
1517 session->user_allowed_bearers = allowed_bearers;
1519 err = apply_policy_on_bearers(
1520 session->policy_config->allowed_bearers,
1521 session->user_allowed_bearers,
1522 &info->config.allowed_bearers);
1525 return __connman_error_failed(msg, err);
1530 case DBUS_TYPE_STRING:
1531 if (g_str_equal(name, "ConnectionType") == TRUE) {
1532 dbus_message_iter_get_basic(&value, &val);
1533 info->config.type = apply_policy_on_type(
1534 session->policy_config->type,
1535 connman_session_parse_connection_type(val));
1544 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1546 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1549 return __connman_error_invalid_arguments(msg);
1552 static void release_session(gpointer key, gpointer value, gpointer user_data)
1554 struct connman_session *session = value;
1555 DBusMessage *message;
1557 DBG("owner %s path %s", session->owner, session->notify_path);
1559 if (session->notify_watch > 0)
1560 g_dbus_remove_watch(connection, session->notify_watch);
1562 g_dbus_unregister_interface(connection, session->session_path,
1563 CONNMAN_SESSION_INTERFACE);
1565 message = dbus_message_new_method_call(session->owner,
1566 session->notify_path,
1567 CONNMAN_NOTIFICATION_INTERFACE,
1569 if (message == NULL)
1572 dbus_message_set_no_reply(message, TRUE);
1574 g_dbus_send_message(connection, message);
1577 static int session_disconnect(struct connman_session *session)
1579 DBG("session %p, %s", session, session->owner);
1581 if (session->notify_watch > 0)
1582 g_dbus_remove_watch(connection, session->notify_watch);
1584 g_dbus_unregister_interface(connection, session->session_path,
1585 CONNMAN_SESSION_INTERFACE);
1587 deselect_and_disconnect(session);
1589 g_hash_table_remove(session_hash, session->session_path);
1594 static void owner_disconnect(DBusConnection *conn, void *user_data)
1596 struct connman_session *session = user_data;
1598 DBG("session %p, %s died", session, session->owner);
1600 session_disconnect(session);
1603 static DBusMessage *destroy_session(DBusConnection *conn,
1604 DBusMessage *msg, void *user_data)
1606 struct connman_session *session = user_data;
1608 DBG("session %p", session);
1610 if (ecall_session != NULL && ecall_session != session)
1611 return __connman_error_failed(msg, EBUSY);
1613 session_disconnect(session);
1615 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1618 static const GDBusMethodTable session_methods[] = {
1619 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1620 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1621 { GDBUS_METHOD("Disconnect", NULL, NULL,
1622 disconnect_session ) },
1623 { GDBUS_METHOD("Change",
1624 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1625 NULL, change_session) },
1629 static int session_create_cb(struct connman_session *session,
1630 struct connman_session_config *config,
1631 void *user_data, int err)
1634 struct user_config *user_config = user_data;
1635 struct session_info *info, *info_last;
1637 DBG("session %p config %p", session, config);
1642 session->policy_config = config;
1644 info = session->info;
1645 info_last = session->info_last;
1647 if (session->policy_config->ecall == TRUE)
1648 ecall_session = session;
1650 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1651 info->config.type = apply_policy_on_type(
1652 session->policy_config->type,
1654 info->config.priority = session->policy_config->priority;
1655 info->config.roaming_policy = session->policy_config->roaming_policy;
1658 session->user_allowed_bearers = user_config->allowed_bearers;
1659 user_config->allowed_bearers = NULL;
1661 err = apply_policy_on_bearers(
1662 session->policy_config->allowed_bearers,
1663 session->user_allowed_bearers,
1664 &info->config.allowed_bearers);
1668 g_hash_table_replace(session_hash, session->session_path, session);
1670 DBG("add %s", session->session_path);
1672 if (g_dbus_register_interface(connection, session->session_path,
1673 CONNMAN_SESSION_INTERFACE,
1674 session_methods, NULL,
1675 NULL, session, NULL) == FALSE) {
1676 connman_error("Failed to register %s", session->session_path);
1677 g_hash_table_remove(session_hash, session->session_path);
1682 reply = g_dbus_create_reply(user_config->pending,
1683 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1685 g_dbus_send_message(connection, reply);
1686 user_config->pending = NULL;
1688 populate_service_list(session);
1690 info_last->state = info->state;
1691 info_last->config.priority = info->config.priority;
1692 info_last->config.roaming_policy = info->config.roaming_policy;
1693 info_last->entry = info->entry;
1694 info_last->config.allowed_bearers = info->config.allowed_bearers;
1696 session->append_all = TRUE;
1698 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1702 reply = __connman_error_failed(user_config->pending, -err);
1703 g_dbus_send_message(connection, reply);
1705 free_session(session);
1708 cleanup_user_config(user_config);
1713 int __connman_session_create(DBusMessage *msg)
1715 const char *owner, *notify_path;
1716 char *session_path = NULL;
1717 DBusMessageIter iter, array;
1718 struct connman_session *session = NULL;
1719 struct user_config *user_config = NULL;
1720 connman_bool_t user_allowed_bearers = FALSE;
1721 connman_bool_t user_connection_type = FALSE;
1724 owner = dbus_message_get_sender(msg);
1726 DBG("owner %s", owner);
1728 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1730 * If there is an emergency call already going on,
1731 * ignore session creation attempt
1737 user_config = g_try_new0(struct user_config, 1);
1738 if (user_config == NULL) {
1743 user_config->pending = dbus_message_ref(msg);
1745 dbus_message_iter_init(msg, &iter);
1746 dbus_message_iter_recurse(&iter, &array);
1748 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1749 DBusMessageIter entry, value;
1750 const char *key, *val;
1752 dbus_message_iter_recurse(&array, &entry);
1753 dbus_message_iter_get_basic(&entry, &key);
1755 dbus_message_iter_next(&entry);
1756 dbus_message_iter_recurse(&entry, &value);
1758 switch (dbus_message_iter_get_arg_type(&value)) {
1759 case DBUS_TYPE_ARRAY:
1760 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1761 err = parse_bearers(&value,
1762 &user_config->allowed_bearers);
1766 user_allowed_bearers = TRUE;
1772 case DBUS_TYPE_STRING:
1773 if (g_str_equal(key, "ConnectionType") == TRUE) {
1774 dbus_message_iter_get_basic(&value, &val);
1776 connman_session_parse_connection_type(val);
1778 user_connection_type = TRUE;
1784 dbus_message_iter_next(&array);
1788 * If the user hasn't provided a configuration, we set
1789 * the default configuration.
1791 * For AllowedBearers this is '*', ...
1793 if (user_allowed_bearers == FALSE) {
1794 user_config->allowed_bearers =
1795 g_slist_append(NULL,
1796 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1797 if (user_config->allowed_bearers == NULL) {
1803 /* ... and for ConnectionType it is 'any'. */
1804 if (user_connection_type == FALSE)
1805 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1807 dbus_message_iter_next(&iter);
1808 dbus_message_iter_get_basic(&iter, ¬ify_path);
1810 if (notify_path == NULL) {
1815 session_path = g_strdup_printf("/sessions%s", notify_path);
1816 if (session_path == NULL) {
1821 session = g_hash_table_lookup(session_hash, session_path);
1822 if (session != NULL) {
1823 g_free(session_path);
1829 session = g_try_new0(struct connman_session, 1);
1830 if (session == NULL) {
1831 g_free(session_path);
1836 session->session_path = session_path;
1838 session->info = g_try_new0(struct session_info, 1);
1839 if (session->info == NULL) {
1844 session->info_last = g_try_new0(struct session_info, 1);
1845 if (session->info_last == NULL) {
1850 session->owner = g_strdup(owner);
1851 session->notify_path = g_strdup(notify_path);
1852 session->notify_watch =
1853 g_dbus_add_disconnect_watch(connection, session->owner,
1854 owner_disconnect, session, NULL);
1856 err = assign_policy_plugin(session);
1860 err = create_policy_config(session, session_create_cb, user_config);
1861 if (err < 0 && err != -EINPROGRESS)
1864 return -EINPROGRESS;
1867 connman_error("Failed to create session");
1869 free_session(session);
1871 cleanup_user_config(user_config);
1875 void connman_session_destroy(struct connman_session *session)
1877 DBG("session %p", session);
1879 session_disconnect(session);
1882 int __connman_session_destroy(DBusMessage *msg)
1884 const char *owner, *session_path;
1885 struct connman_session *session;
1887 owner = dbus_message_get_sender(msg);
1889 DBG("owner %s", owner);
1891 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1893 if (session_path == NULL)
1896 session = g_hash_table_lookup(session_hash, session_path);
1897 if (session == NULL)
1900 if (g_strcmp0(owner, session->owner) != 0)
1903 connman_session_destroy(session);
1908 connman_bool_t __connman_session_mode()
1913 void __connman_session_set_mode(connman_bool_t enable)
1915 DBG("enable %d", enable);
1917 if (sessionmode != enable) {
1918 sessionmode = enable;
1920 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1921 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1922 DBUS_TYPE_BOOLEAN, &sessionmode);
1925 if (sessionmode == TRUE)
1926 __connman_service_disconnect_all();
1929 static void service_add(struct connman_service *service,
1932 GHashTableIter iter;
1933 GSequenceIter *iter_service_list;
1934 gpointer key, value;
1935 struct connman_session *session;
1936 struct service_entry *entry;
1938 DBG("service %p", service);
1940 g_hash_table_iter_init(&iter, session_hash);
1942 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1945 if (service_match(session, service) == FALSE)
1948 entry = create_service_entry(service, name,
1949 CONNMAN_SERVICE_STATE_IDLE);
1954 g_sequence_insert_sorted(session->service_list,
1955 entry, sort_services,
1958 g_hash_table_replace(session->service_hash, service,
1961 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1965 static void service_remove(struct connman_service *service)
1968 GHashTableIter iter;
1969 gpointer key, value;
1970 struct connman_session *session;
1971 struct session_info *info;
1973 DBG("service %p", service);
1975 g_hash_table_iter_init(&iter, session_hash);
1977 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1978 GSequenceIter *seq_iter;
1980 info = session->info;
1982 seq_iter = g_hash_table_lookup(session->service_hash, service);
1983 if (seq_iter == NULL)
1986 g_sequence_remove(seq_iter);
1988 if (info->entry != NULL && info->entry->service == service)
1990 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1994 static void service_state_changed(struct connman_service *service,
1995 enum connman_service_state state)
1997 GHashTableIter iter;
1998 gpointer key, value;
2000 DBG("service %p state %d", service, state);
2002 g_hash_table_iter_init(&iter, session_hash);
2004 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2005 struct connman_session *session = value;
2006 GSequenceIter *service_iter;
2008 service_iter = g_hash_table_lookup(session->service_hash, service);
2009 if (service_iter != NULL) {
2010 struct service_entry *entry;
2012 entry = g_sequence_get(service_iter);
2013 entry->state = state;
2016 session_changed(session,
2017 CONNMAN_SESSION_TRIGGER_SERVICE);
2021 static void ipconfig_changed(struct connman_service *service,
2022 struct connman_ipconfig *ipconfig)
2024 GHashTableIter iter;
2025 gpointer key, value;
2026 struct connman_session *session;
2027 struct session_info *info;
2028 enum connman_ipconfig_type type;
2030 DBG("service %p ipconfig %p", service, ipconfig);
2032 type = __connman_ipconfig_get_config_type(ipconfig);
2034 g_hash_table_iter_init(&iter, session_hash);
2036 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2038 info = session->info;
2040 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2043 if (info->entry != NULL && info->entry->service == service) {
2044 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2045 ipconfig_ipv4_changed(session);
2046 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2047 ipconfig_ipv6_changed(session);
2052 static struct connman_notifier session_notifier = {
2054 .service_add = service_add,
2055 .service_remove = service_remove,
2056 .service_state_changed = service_state_changed,
2057 .ipconfig_changed = ipconfig_changed,
2060 int __connman_session_init(void)
2066 connection = connman_dbus_get_connection();
2067 if (connection == NULL)
2070 err = connman_notifier_register(&session_notifier);
2072 dbus_connection_unref(connection);
2076 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2077 NULL, cleanup_session);
2079 sessionmode = FALSE;
2083 void __connman_session_cleanup(void)
2087 if (connection == NULL)
2090 connman_notifier_unregister(&session_notifier);
2092 g_hash_table_foreach(session_hash, release_session, NULL);
2093 g_hash_table_destroy(session_hash);
2094 session_hash = NULL;
2096 dbus_connection_unref(connection);