5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 /* track why this service was selected */
64 enum connman_session_reason reason;
65 enum connman_service_state state;
67 struct connman_service *service;
70 GSList *pending_timeouts;
74 struct connman_session_config config;
75 enum connman_session_state state;
76 struct service_entry *entry;
77 enum connman_session_reason reason;
80 struct connman_session {
86 struct connman_session_policy *policy;
88 connman_bool_t append_all;
89 struct session_info *info;
90 struct session_info *info_last;
91 struct connman_session_config *policy_config;
92 GSList *user_allowed_bearers;
96 GSequence *service_list;
97 GHashTable *service_hash;
100 static const char *trigger2string(enum connman_session_trigger trigger)
103 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
105 case CONNMAN_SESSION_TRIGGER_SETTING:
107 case CONNMAN_SESSION_TRIGGER_CONNECT:
109 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
111 case CONNMAN_SESSION_TRIGGER_SERVICE:
113 case CONNMAN_SESSION_TRIGGER_ECALL:
120 static const char *reason2string(enum connman_session_reason reason)
123 case CONNMAN_SESSION_REASON_UNKNOWN:
125 case CONNMAN_SESSION_REASON_CONNECT:
127 case CONNMAN_SESSION_REASON_FREE_RIDE:
134 static const char *state2string(enum connman_session_state state)
137 case CONNMAN_SESSION_STATE_DISCONNECTED:
138 return "disconnected";
139 case CONNMAN_SESSION_STATE_CONNECTED:
141 case CONNMAN_SESSION_STATE_ONLINE:
148 static const char *type2string(enum connman_session_type type)
151 case CONNMAN_SESSION_TYPE_UNKNOWN:
153 case CONNMAN_SESSION_TYPE_ANY:
155 case CONNMAN_SESSION_TYPE_LOCAL:
157 case CONNMAN_SESSION_TYPE_INTERNET:
164 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
166 if (g_strcmp0(policy, "default") == 0)
167 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
168 else if (g_strcmp0(policy, "always") == 0)
169 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
170 else if (g_strcmp0(policy, "forbidden") == 0)
171 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
172 else if (g_strcmp0(policy, "national") == 0)
173 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
174 else if (g_strcmp0(policy, "international") == 0)
175 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
177 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
180 enum connman_session_type connman_session_parse_connection_type(const char *type)
182 if (g_strcmp0(type, "any") == 0)
183 return CONNMAN_SESSION_TYPE_ANY;
184 if (g_strcmp0(type, "local") == 0)
185 return CONNMAN_SESSION_TYPE_LOCAL;
186 else if (g_strcmp0(type, "internet") == 0)
187 return CONNMAN_SESSION_TYPE_INTERNET;
189 return CONNMAN_SESSION_TYPE_UNKNOWN;
192 static int bearer2service(const char *bearer, enum connman_service_type *type)
194 if (g_strcmp0(bearer, "ethernet") == 0)
195 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
196 else if (g_strcmp0(bearer, "wifi") == 0)
197 *type = CONNMAN_SERVICE_TYPE_WIFI;
198 else if (g_strcmp0(bearer, "bluetooth") == 0)
199 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
200 else if (g_strcmp0(bearer, "cellular") == 0)
201 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
202 else if (g_strcmp0(bearer, "vpn") == 0)
203 *type = CONNMAN_SERVICE_TYPE_VPN;
204 else if (g_strcmp0(bearer, "*") == 0)
205 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
212 static char *service2bearer(enum connman_service_type type)
215 case CONNMAN_SERVICE_TYPE_ETHERNET:
217 case CONNMAN_SERVICE_TYPE_WIFI:
219 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
221 case CONNMAN_SERVICE_TYPE_CELLULAR:
223 case CONNMAN_SERVICE_TYPE_VPN:
225 case CONNMAN_SERVICE_TYPE_UNKNOWN:
227 case CONNMAN_SERVICE_TYPE_SYSTEM:
228 case CONNMAN_SERVICE_TYPE_GPS:
229 case CONNMAN_SERVICE_TYPE_GADGET:
236 static void destroy_policy_config(struct connman_session *session)
238 if (session->policy == NULL) {
239 g_free(session->policy_config);
243 (*session->policy->destroy)(session);
246 static void free_session(struct connman_session *session)
251 if (session->notify_watch > 0)
252 g_dbus_remove_watch(connection, session->notify_watch);
254 destroy_policy_config(session);
255 g_slist_free(session->info->config.allowed_bearers);
256 g_free(session->owner);
257 g_free(session->session_path);
258 g_free(session->notify_path);
259 g_free(session->info);
260 g_free(session->info_last);
265 static void cleanup_session(gpointer user_data)
267 struct connman_session *session = user_data;
268 struct session_info *info = session->info;
270 DBG("remove %s", session->session_path);
272 g_slist_free(session->user_allowed_bearers);
273 g_hash_table_destroy(session->service_hash);
274 g_sequence_free(session->service_list);
276 if (info->entry != NULL &&
277 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
278 __connman_service_disconnect(info->entry->service);
281 free_session(session);
284 static int assign_policy_plugin(struct connman_session *session)
286 if (session->policy != NULL)
289 if (policy_list == NULL)
292 session->policy = policy_list->data;
298 DBusMessage *pending;
300 enum connman_session_type type;
301 GSList *allowed_bearers;
304 static void cleanup_user_config(struct user_config *user_config)
306 if (user_config == NULL)
309 if (user_config->pending != NULL)
310 dbus_message_unref(user_config->pending);
312 g_slist_free(user_config->allowed_bearers);
316 static int create_policy_config(struct connman_session *session,
317 connman_session_config_func_t cb,
318 struct user_config *user_config)
320 struct connman_session_config *config;
322 if (session->policy == NULL) {
323 config = connman_session_create_default_config();
324 if (config == NULL) {
325 free_session(session);
326 cleanup_user_config(user_config);
330 return cb(session, config, user_config, 0);
333 return (*session->policy->create)(session, cb, user_config);
336 static void probe_policy(struct connman_session_policy *policy)
341 struct connman_session *session;
343 DBG("policy %p name %s", policy, policy->name);
345 g_hash_table_iter_init(&iter, session_hash);
347 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
350 if (session->policy != NULL)
353 assign_policy_plugin(session);
357 static void remove_policy(struct connman_session_policy *policy)
361 struct connman_session *session;
363 if (session_hash == NULL)
366 DBG("policy %p name %s", policy, policy->name);
368 g_hash_table_iter_init(&iter, session_hash);
370 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
373 if (session->policy != policy)
376 session->policy = NULL;
377 assign_policy_plugin(session);
381 static gint compare_priority(gconstpointer a, gconstpointer b)
383 const struct connman_session_policy *policy1 = a;
384 const struct connman_session_policy *policy2 = b;
386 return policy2->priority - policy1->priority;
390 int connman_session_policy_register(struct connman_session_policy *policy)
392 DBG("name %s", policy->name);
394 if (policy->create == NULL || policy->destroy == NULL)
397 policy_list = g_slist_insert_sorted(policy_list, policy,
400 probe_policy(policy);
405 void connman_session_policy_unregister(struct connman_session_policy *policy)
407 DBG("name %s", policy->name);
409 policy_list = g_slist_remove(policy_list, policy);
411 remove_policy(policy);
414 void connman_session_set_default_config(struct connman_session_config *config)
416 config->priority = FALSE;
417 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
418 config->type = CONNMAN_SESSION_TYPE_ANY;
419 config->ecall = FALSE;
421 g_slist_free(config->allowed_bearers);
422 config->allowed_bearers = g_slist_prepend(NULL,
423 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
426 struct connman_session_config *connman_session_create_default_config(void)
428 struct connman_session_config *config;
430 config = g_new0(struct connman_session_config, 1);
431 connman_session_set_default_config(config);
436 static enum connman_session_type apply_policy_on_type(
437 enum connman_session_type policy,
438 enum connman_session_type type)
440 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
441 return CONNMAN_SESSION_TYPE_UNKNOWN;
443 if (policy == CONNMAN_SESSION_TYPE_ANY)
446 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
447 return CONNMAN_SESSION_TYPE_LOCAL;
449 return CONNMAN_SESSION_TYPE_INTERNET;
452 int connman_session_parse_bearers(const char *token, GSList **list)
454 enum connman_service_type bearer;
457 if (g_strcmp0(token, "") == 0)
460 err = bearer2service(token, &bearer);
464 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
469 static int parse_bearers(DBusMessageIter *iter, GSList **list)
471 DBusMessageIter array;
474 dbus_message_iter_recurse(iter, &array);
478 while ((type = dbus_message_iter_get_arg_type(&array)) !=
480 char *bearer_name = NULL;
482 if (type != DBUS_TYPE_STRING) {
488 dbus_message_iter_get_basic(&array, &bearer_name);
490 err = connman_session_parse_bearers(bearer_name, list);
497 dbus_message_iter_next(&array);
503 static int filter_bearer(GSList *policy_bearers,
504 enum connman_service_type bearer,
507 enum connman_service_type policy;
510 if (policy_bearers == NULL)
513 for (it = policy_bearers; it != NULL; it = it->next) {
514 policy = GPOINTER_TO_INT(it->data);
516 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
521 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
532 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
537 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
540 enum connman_service_type bearer;
546 for (it = bearers; it != NULL; it = it->next) {
547 bearer = GPOINTER_TO_INT(it->data);
549 err = filter_bearer(policy_bearers, bearer, list);
557 const char *connman_session_get_owner(struct connman_session *session)
559 return session->owner;
562 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
564 struct session_info *info = user_data;
567 for (list = info->config.allowed_bearers;
568 list != NULL; list = list->next) {
569 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
570 const char *name = __connman_service_type2string(bearer);
575 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
580 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
582 struct connman_service *service = user_data;
583 struct connman_ipconfig *ipconfig_ipv4;
588 if (__connman_service_is_connected_state(service,
589 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
593 ipconfig_ipv4 = __connman_service_get_ip4config(service);
594 if (ipconfig_ipv4 == NULL)
597 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
600 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
602 struct connman_service *service = user_data;
603 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
608 if (__connman_service_is_connected_state(service,
609 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
613 ipconfig_ipv4 = __connman_service_get_ip4config(service);
614 ipconfig_ipv6 = __connman_service_get_ip6config(service);
615 if (ipconfig_ipv6 == NULL)
618 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
621 static void append_notify(DBusMessageIter *dict,
622 struct connman_session *session)
624 struct session_info *info = session->info;
625 struct session_info *info_last = session->info_last;
626 struct connman_service *service;
627 const char *name, *ifname, *bearer;
629 if (session->append_all == TRUE ||
630 info->state != info_last->state) {
631 const char *state = state2string(info->state);
633 connman_dbus_dict_append_basic(dict, "State",
636 info_last->state = info->state;
639 if (session->append_all == TRUE ||
640 info->entry != info_last->entry) {
641 if (info->entry == NULL) {
647 name = info->entry->name;
648 ifname = info->entry->ifname;
649 service = info->entry->service;
650 bearer = info->entry->bearer;
653 connman_dbus_dict_append_basic(dict, "Name",
657 connman_dbus_dict_append_dict(dict, "IPv4",
658 append_ipconfig_ipv4,
661 connman_dbus_dict_append_dict(dict, "IPv6",
662 append_ipconfig_ipv6,
665 connman_dbus_dict_append_basic(dict, "Interface",
669 connman_dbus_dict_append_basic(dict, "Bearer",
673 info_last->entry = info->entry;
676 if (session->append_all == TRUE ||
677 info->config.type != info_last->config.type) {
678 const char *type = type2string(info->config.type);
680 connman_dbus_dict_append_basic(dict, "ConnectionType",
683 info_last->config.type = info->config.type;
686 if (session->append_all == TRUE ||
687 info->config.allowed_bearers != info_last->config.allowed_bearers) {
688 connman_dbus_dict_append_array(dict, "AllowedBearers",
690 append_allowed_bearers,
692 info_last->config.allowed_bearers = info->config.allowed_bearers;
695 session->append_all = FALSE;
698 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
699 enum connman_session_type type)
702 case CONNMAN_SESSION_TYPE_UNKNOWN:
704 case CONNMAN_SESSION_TYPE_ANY:
706 case CONNMAN_SESSION_TYPE_LOCAL:
707 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
708 *state = CONNMAN_SESSION_STATE_CONNECTED;
713 case CONNMAN_SESSION_TYPE_INTERNET:
714 if (*state == CONNMAN_SESSION_STATE_ONLINE)
722 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
724 struct session_info *info_last = session->info_last;
725 struct session_info *info = session->info;
727 if (session->append_all == TRUE)
730 if (info->state != info_last->state)
733 if (info->entry != info_last->entry &&
734 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
737 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
738 info->config.type != info_last->config.type)
744 static gboolean session_notify(gpointer user_data)
746 struct connman_session *session = user_data;
748 DBusMessageIter array, dict;
750 if (compute_notifiable_changes(session) == FALSE)
753 DBG("session %p owner %s notify_path %s", session,
754 session->owner, session->notify_path);
756 msg = dbus_message_new_method_call(session->owner, session->notify_path,
757 CONNMAN_NOTIFICATION_INTERFACE,
762 dbus_message_iter_init_append(msg, &array);
763 connman_dbus_dict_open(&array, &dict);
765 append_notify(&dict, session);
767 connman_dbus_dict_close(&array, &dict);
769 g_dbus_send_message(connection, msg);
774 static void ipconfig_ipv4_changed(struct connman_session *session)
776 struct session_info *info = session->info;
778 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
779 "IPv4", append_ipconfig_ipv4,
780 info->entry->service);
783 static void ipconfig_ipv6_changed(struct connman_session *session)
785 struct session_info *info = session->info;
787 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
788 "IPv6", append_ipconfig_ipv6,
789 info->entry->service);
792 static connman_bool_t service_type_match(struct connman_session *session,
793 struct connman_service *service)
795 struct session_info *info = session->info;
798 for (list = info->config.allowed_bearers;
799 list != NULL; list = list->next) {
800 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
801 enum connman_service_type service_type;
803 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
806 service_type = connman_service_get_type(service);
807 if (bearer == service_type)
814 static connman_bool_t service_match(struct connman_session *session,
815 struct connman_service *service)
817 if (service_type_match(session, service) == FALSE)
823 static int service_type_weight(enum connman_service_type type)
826 * The session doesn't care which service
827 * to use. Nevertheless we have to sort them
828 * according their type. The ordering is
837 case CONNMAN_SERVICE_TYPE_ETHERNET:
839 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
841 case CONNMAN_SERVICE_TYPE_WIFI:
843 case CONNMAN_SERVICE_TYPE_CELLULAR:
845 case CONNMAN_SERVICE_TYPE_UNKNOWN:
846 case CONNMAN_SERVICE_TYPE_SYSTEM:
847 case CONNMAN_SERVICE_TYPE_GPS:
848 case CONNMAN_SERVICE_TYPE_VPN:
849 case CONNMAN_SERVICE_TYPE_GADGET:
856 static gint sort_allowed_bearers(struct connman_service *service_a,
857 struct connman_service *service_b,
858 struct connman_session *session)
860 struct session_info *info = session->info;
862 enum connman_service_type type_a, type_b;
863 int weight_a, weight_b;
865 type_a = connman_service_get_type(service_a);
866 type_b = connman_service_get_type(service_b);
868 for (list = info->config.allowed_bearers;
869 list != NULL; list = list->next) {
870 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
872 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
873 if (type_a != type_b) {
874 weight_a = service_type_weight(type_a);
875 weight_b = service_type_weight(type_b);
877 if (weight_a > weight_b)
880 if (weight_a < weight_b)
887 if (type_a == bearer && type_b == bearer)
890 if (type_a == bearer && type_b != bearer)
893 if (type_a != bearer && type_b == bearer)
900 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
902 struct service_entry *entry_a = (void *)a;
903 struct service_entry *entry_b = (void *)b;
904 struct connman_session *session = user_data;
906 return sort_allowed_bearers(entry_a->service, entry_b->service,
910 static enum connman_session_state service_to_session_state(enum connman_service_state state)
913 case CONNMAN_SERVICE_STATE_UNKNOWN:
914 case CONNMAN_SERVICE_STATE_IDLE:
915 case CONNMAN_SERVICE_STATE_ASSOCIATION:
916 case CONNMAN_SERVICE_STATE_CONFIGURATION:
917 case CONNMAN_SERVICE_STATE_DISCONNECT:
918 case CONNMAN_SERVICE_STATE_FAILURE:
920 case CONNMAN_SERVICE_STATE_READY:
921 return CONNMAN_SESSION_STATE_CONNECTED;
922 case CONNMAN_SERVICE_STATE_ONLINE:
923 return CONNMAN_SESSION_STATE_ONLINE;
926 return CONNMAN_SESSION_STATE_DISCONNECTED;
929 static connman_bool_t is_connected(enum connman_service_state state)
932 case CONNMAN_SERVICE_STATE_UNKNOWN:
933 case CONNMAN_SERVICE_STATE_IDLE:
934 case CONNMAN_SERVICE_STATE_ASSOCIATION:
935 case CONNMAN_SERVICE_STATE_CONFIGURATION:
936 case CONNMAN_SERVICE_STATE_DISCONNECT:
937 case CONNMAN_SERVICE_STATE_FAILURE:
939 case CONNMAN_SERVICE_STATE_READY:
940 case CONNMAN_SERVICE_STATE_ONLINE:
947 static connman_bool_t is_connecting(enum connman_service_state state)
950 case CONNMAN_SERVICE_STATE_UNKNOWN:
951 case CONNMAN_SERVICE_STATE_IDLE:
953 case CONNMAN_SERVICE_STATE_ASSOCIATION:
954 case CONNMAN_SERVICE_STATE_CONFIGURATION:
956 case CONNMAN_SERVICE_STATE_DISCONNECT:
957 case CONNMAN_SERVICE_STATE_FAILURE:
958 case CONNMAN_SERVICE_STATE_READY:
959 case CONNMAN_SERVICE_STATE_ONLINE:
966 static connman_bool_t explicit_connect(enum connman_session_reason reason)
969 case CONNMAN_SESSION_REASON_UNKNOWN:
970 case CONNMAN_SESSION_REASON_FREE_RIDE:
972 case CONNMAN_SESSION_REASON_CONNECT:
979 static connman_bool_t explicit_disconnect(struct session_info *info)
981 if (info->entry == NULL)
984 DBG("reason %s service %p state %d",
985 reason2string(info->entry->reason),
986 info->entry->service, info->entry->state);
988 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
991 if (explicit_connect(info->entry->reason) == FALSE)
994 if (__connman_service_session_dec(info->entry->service) == FALSE)
1000 struct pending_data {
1001 unsigned int timeout;
1002 struct service_entry *entry;
1003 gboolean (*cb)(gpointer);
1006 static void pending_timeout_free(gpointer data, gpointer user_data)
1008 struct pending_data *pending = data;
1010 DBG("pending %p timeout %d", pending, pending->timeout);
1011 g_source_remove(pending->timeout);
1015 static void pending_timeout_remove_all(struct service_entry *entry)
1019 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1020 g_slist_free(entry->pending_timeouts);
1021 entry->pending_timeouts = NULL;
1024 static gboolean pending_timeout_cb(gpointer data)
1026 struct pending_data *pending = data;
1027 struct service_entry *entry = pending->entry;
1030 DBG("pending %p timeout %d", pending, pending->timeout);
1032 ret = pending->cb(pending->entry);
1034 entry->pending_timeouts =
1035 g_slist_remove(entry->pending_timeouts,
1042 static connman_bool_t pending_timeout_add(unsigned int seconds,
1043 gboolean (*cb)(gpointer),
1044 struct service_entry *entry)
1046 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1048 if (pending == NULL || cb == NULL || entry == NULL) {
1054 pending->entry = entry;
1055 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1057 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1060 DBG("pending %p entry %p timeout id %d", pending, entry,
1066 static gboolean call_disconnect(gpointer user_data)
1068 struct service_entry *entry = user_data;
1069 struct connman_service *service = entry->service;
1072 * TODO: We should mark this entry as pending work. In case
1073 * disconnect fails we just unassign this session from the
1074 * service and can't do anything later on it
1076 DBG("disconnect service %p", service);
1077 __connman_service_disconnect(service);
1082 static gboolean call_connect(gpointer user_data)
1084 struct service_entry *entry = user_data;
1085 struct connman_service *service = entry->service;
1087 DBG("connect service %p", service);
1088 __connman_service_connect(service);
1093 static void deselect_service(struct session_info *info)
1095 struct service_entry *entry;
1096 connman_bool_t disconnect, connected;
1100 if (info->entry == NULL)
1103 disconnect = explicit_disconnect(info);
1105 connected = is_connecting(info->entry->state) == TRUE ||
1106 is_connected(info->entry->state) == TRUE;
1108 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1109 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1111 entry = info->entry;
1114 DBG("disconnect %d connected %d", disconnect, connected);
1116 if (disconnect == TRUE && connected == TRUE)
1117 pending_timeout_add(0, call_disconnect, entry);
1120 static void deselect_and_disconnect(struct connman_session *session)
1122 struct session_info *info = session->info;
1124 deselect_service(info);
1126 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1129 static void select_connected_service(struct session_info *info,
1130 struct service_entry *entry)
1132 enum connman_session_state state;
1134 state = service_to_session_state(entry->state);
1135 if (is_type_matching_state(&state, info->config.type) == FALSE)
1138 info->state = state;
1140 info->entry = entry;
1141 info->entry->reason = info->reason;
1143 if (explicit_connect(info->reason) == FALSE)
1146 __connman_service_session_inc(info->entry->service);
1149 static void select_offline_service(struct session_info *info,
1150 struct service_entry *entry)
1152 if (explicit_connect(info->reason) == FALSE)
1155 info->state = service_to_session_state(entry->state);
1157 info->entry = entry;
1158 info->entry->reason = info->reason;
1160 __connman_service_session_inc(info->entry->service);
1161 pending_timeout_add(0, call_connect, entry);
1164 static void select_service(struct session_info *info,
1165 struct service_entry *entry)
1167 DBG("service %p", entry->service);
1169 if (is_connected(entry->state) == TRUE)
1170 select_connected_service(info, entry);
1172 select_offline_service(info, entry);
1175 static void select_and_connect(struct connman_session *session,
1176 enum connman_session_reason reason)
1178 struct session_info *info = session->info;
1179 struct service_entry *entry = NULL;
1180 GSequenceIter *iter;
1182 DBG("session %p reason %s", session, reason2string(reason));
1184 info->reason = reason;
1186 iter = g_sequence_get_begin_iter(session->service_list);
1188 while (g_sequence_iter_is_end(iter) == FALSE) {
1189 entry = g_sequence_get(iter);
1191 switch (entry->state) {
1192 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1193 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1194 case CONNMAN_SERVICE_STATE_READY:
1195 case CONNMAN_SERVICE_STATE_ONLINE:
1196 case CONNMAN_SERVICE_STATE_IDLE:
1197 case CONNMAN_SERVICE_STATE_DISCONNECT:
1198 select_service(info, entry);
1200 case CONNMAN_SERVICE_STATE_UNKNOWN:
1201 case CONNMAN_SERVICE_STATE_FAILURE:
1205 iter = g_sequence_iter_next(iter);
1209 static struct service_entry *create_service_entry(struct connman_service *service,
1211 enum connman_service_state state)
1213 struct service_entry *entry;
1214 enum connman_service_type type;
1217 entry = g_try_new0(struct service_entry, 1);
1221 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1222 entry->state = state;
1227 entry->service = service;
1229 idx = __connman_service_get_index(entry->service);
1230 entry->ifname = connman_inet_ifname(idx);
1231 if (entry->ifname == NULL)
1232 entry->ifname = g_strdup("");
1234 type = connman_service_get_type(entry->service);
1235 entry->bearer = service2bearer(type);
1240 static void destroy_service_entry(gpointer data)
1242 struct service_entry *entry = data;
1244 pending_timeout_remove_all(entry);
1245 g_free(entry->ifname);
1250 static void populate_service_list(struct connman_session *session)
1252 struct service_entry *entry;
1253 GSequenceIter *iter;
1255 session->service_hash =
1256 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1258 session->service_list = __connman_service_get_list(session,
1260 create_service_entry,
1261 destroy_service_entry);
1263 g_sequence_sort(session->service_list, sort_services, session);
1265 iter = g_sequence_get_begin_iter(session->service_list);
1267 while (g_sequence_iter_is_end(iter) == FALSE) {
1268 entry = g_sequence_get(iter);
1270 DBG("service %p type %s name %s", entry->service,
1271 service2bearer(connman_service_get_type(entry->service)),
1274 g_hash_table_replace(session->service_hash,
1275 entry->service, iter);
1277 iter = g_sequence_iter_next(iter);
1281 static void session_changed(struct connman_session *session,
1282 enum connman_session_trigger trigger)
1284 struct session_info *info = session->info;
1285 struct session_info *info_last = session->info_last;
1286 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1287 GSequence *service_list_last;
1288 GHashTable *service_hash_last;
1291 * TODO: This only a placeholder for the 'real' algorithm to
1292 * play a bit around. So we are going to improve it step by step.
1295 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1296 reason2string(info->reason));
1298 if (info->entry != NULL) {
1299 enum connman_session_state state;
1301 state = service_to_session_state(info->entry->state);
1303 if (is_type_matching_state(&state, info->config.type) == TRUE)
1304 info->state = state;
1308 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1309 DBG("ignore session changed event");
1311 case CONNMAN_SESSION_TRIGGER_SETTING:
1312 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1314 service_hash_last = session->service_hash;
1315 service_list_last = session->service_list;
1317 populate_service_list(session);
1319 if (info->entry != NULL) {
1320 service_iter_last = g_hash_table_lookup(
1322 info->entry->service);
1323 service_iter = g_hash_table_lookup(
1324 session->service_hash,
1325 info->entry->service);
1328 if (service_iter == NULL && service_iter_last != NULL) {
1330 * The currently selected service is
1331 * not part of this session anymore.
1333 deselect_and_disconnect(session);
1336 g_hash_table_remove_all(service_hash_last);
1337 g_sequence_free(service_list_last);
1340 if (info->config.type != info_last->config.type) {
1341 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1342 is_type_matching_state(&info->state,
1343 info->config.type) == FALSE)
1344 deselect_and_disconnect(session);
1347 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1348 select_and_connect(session,
1349 CONNMAN_SESSION_REASON_FREE_RIDE);
1353 case CONNMAN_SESSION_TRIGGER_ECALL:
1355 * For the time beeing we fallback to normal connect
1358 case CONNMAN_SESSION_TRIGGER_CONNECT:
1359 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1360 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1362 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1363 __connman_service_session_inc(info->entry->service);
1367 if (info->entry != NULL &&
1368 is_connecting(info->entry->state) == TRUE) {
1372 select_and_connect(session,
1373 CONNMAN_SESSION_REASON_CONNECT);
1376 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1377 deselect_and_disconnect(session);
1380 case CONNMAN_SESSION_TRIGGER_SERVICE:
1381 if (info->entry != NULL &&
1382 (is_connecting(info->entry->state) == TRUE ||
1383 is_connected(info->entry->state) == TRUE)) {
1387 deselect_and_disconnect(session);
1389 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1390 select_and_connect(session, info->reason);
1396 session_notify(session);
1399 int connman_session_config_update(struct connman_session *session)
1401 struct session_info *info = session->info;
1402 GSList *allowed_bearers;
1405 DBG("session %p", session);
1408 * We update all configuration even though only one entry
1409 * might have changed. We can still optimize this later.
1412 err = apply_policy_on_bearers(
1413 session->policy_config->allowed_bearers,
1414 session->user_allowed_bearers,
1419 g_slist_free(info->config.allowed_bearers);
1420 info->config.allowed_bearers = allowed_bearers;
1422 info->config.type = apply_policy_on_type(
1423 session->policy_config->type,
1426 info->config.roaming_policy = session->policy_config->roaming_policy;
1428 info->config.ecall = session->policy_config->ecall;
1429 if (info->config.ecall == TRUE)
1430 ecall_session = session;
1432 info->config.priority = session->policy_config->priority;
1434 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1439 static DBusMessage *connect_session(DBusConnection *conn,
1440 DBusMessage *msg, void *user_data)
1442 struct connman_session *session = user_data;
1444 DBG("session %p", session);
1446 if (ecall_session != NULL) {
1447 if (ecall_session->ecall == TRUE && ecall_session != session)
1448 return __connman_error_failed(msg, EBUSY);
1450 session->ecall = TRUE;
1451 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1453 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1455 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1458 static DBusMessage *disconnect_session(DBusConnection *conn,
1459 DBusMessage *msg, void *user_data)
1461 struct connman_session *session = user_data;
1463 DBG("session %p", session);
1465 if (ecall_session != NULL) {
1466 if (ecall_session->ecall == TRUE && ecall_session != session)
1467 return __connman_error_failed(msg, EBUSY);
1469 session->ecall = FALSE;
1472 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1474 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1477 static DBusMessage *change_session(DBusConnection *conn,
1478 DBusMessage *msg, void *user_data)
1480 struct connman_session *session = user_data;
1481 struct session_info *info = session->info;
1482 DBusMessageIter iter, value;
1485 GSList *allowed_bearers;
1488 DBG("session %p", session);
1489 if (dbus_message_iter_init(msg, &iter) == FALSE)
1490 return __connman_error_invalid_arguments(msg);
1492 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1493 return __connman_error_invalid_arguments(msg);
1495 dbus_message_iter_get_basic(&iter, &name);
1496 dbus_message_iter_next(&iter);
1498 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1499 return __connman_error_invalid_arguments(msg);
1501 dbus_message_iter_recurse(&iter, &value);
1503 switch (dbus_message_iter_get_arg_type(&value)) {
1504 case DBUS_TYPE_ARRAY:
1505 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1506 err = parse_bearers(&value, &allowed_bearers);
1508 return __connman_error_failed(msg, err);
1510 g_slist_free(info->config.allowed_bearers);
1511 session->user_allowed_bearers = allowed_bearers;
1513 err = apply_policy_on_bearers(
1514 session->policy_config->allowed_bearers,
1515 session->user_allowed_bearers,
1516 &info->config.allowed_bearers);
1519 return __connman_error_failed(msg, err);
1524 case DBUS_TYPE_STRING:
1525 if (g_str_equal(name, "ConnectionType") == TRUE) {
1526 dbus_message_iter_get_basic(&value, &val);
1527 info->config.type = apply_policy_on_type(
1528 session->policy_config->type,
1529 connman_session_parse_connection_type(val));
1538 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1540 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1543 return __connman_error_invalid_arguments(msg);
1546 static void release_session(gpointer key, gpointer value, gpointer user_data)
1548 struct connman_session *session = value;
1549 DBusMessage *message;
1551 DBG("owner %s path %s", session->owner, session->notify_path);
1553 if (session->notify_watch > 0)
1554 g_dbus_remove_watch(connection, session->notify_watch);
1556 g_dbus_unregister_interface(connection, session->session_path,
1557 CONNMAN_SESSION_INTERFACE);
1559 message = dbus_message_new_method_call(session->owner,
1560 session->notify_path,
1561 CONNMAN_NOTIFICATION_INTERFACE,
1563 if (message == NULL)
1566 dbus_message_set_no_reply(message, TRUE);
1568 g_dbus_send_message(connection, message);
1571 static int session_disconnect(struct connman_session *session)
1573 DBG("session %p, %s", session, session->owner);
1575 if (session->notify_watch > 0)
1576 g_dbus_remove_watch(connection, session->notify_watch);
1578 g_dbus_unregister_interface(connection, session->session_path,
1579 CONNMAN_SESSION_INTERFACE);
1581 deselect_and_disconnect(session);
1583 g_hash_table_remove(session_hash, session->session_path);
1588 static void owner_disconnect(DBusConnection *conn, void *user_data)
1590 struct connman_session *session = user_data;
1592 DBG("session %p, %s died", session, session->owner);
1594 session_disconnect(session);
1597 static DBusMessage *destroy_session(DBusConnection *conn,
1598 DBusMessage *msg, void *user_data)
1600 struct connman_session *session = user_data;
1602 DBG("session %p", session);
1604 if (ecall_session != NULL && ecall_session != session)
1605 return __connman_error_failed(msg, EBUSY);
1607 session_disconnect(session);
1609 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1612 static const GDBusMethodTable session_methods[] = {
1613 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1614 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1615 { GDBUS_METHOD("Disconnect", NULL, NULL,
1616 disconnect_session ) },
1617 { GDBUS_METHOD("Change",
1618 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1619 NULL, change_session) },
1623 static int session_create_cb(struct connman_session *session,
1624 struct connman_session_config *config,
1625 void *user_data, int err)
1628 struct user_config *user_config = user_data;
1629 struct session_info *info, *info_last;
1631 DBG("session %p config %p", session, config);
1636 session->policy_config = config;
1638 info = session->info;
1639 info_last = session->info_last;
1641 if (session->policy_config->ecall == TRUE)
1642 ecall_session = session;
1644 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1645 info->config.type = apply_policy_on_type(
1646 session->policy_config->type,
1648 info->config.priority = session->policy_config->priority;
1649 info->config.roaming_policy = session->policy_config->roaming_policy;
1652 session->user_allowed_bearers = user_config->allowed_bearers;
1653 user_config->allowed_bearers = NULL;
1655 err = apply_policy_on_bearers(
1656 session->policy_config->allowed_bearers,
1657 session->user_allowed_bearers,
1658 &info->config.allowed_bearers);
1662 g_hash_table_replace(session_hash, session->session_path, session);
1664 DBG("add %s", session->session_path);
1666 if (g_dbus_register_interface(connection, session->session_path,
1667 CONNMAN_SESSION_INTERFACE,
1668 session_methods, NULL,
1669 NULL, session, NULL) == FALSE) {
1670 connman_error("Failed to register %s", session->session_path);
1671 g_hash_table_remove(session_hash, session->session_path);
1676 reply = g_dbus_create_reply(user_config->pending,
1677 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1679 g_dbus_send_message(connection, reply);
1680 user_config->pending = NULL;
1682 populate_service_list(session);
1684 info_last->state = info->state;
1685 info_last->config.priority = info->config.priority;
1686 info_last->config.roaming_policy = info->config.roaming_policy;
1687 info_last->entry = info->entry;
1688 info_last->config.allowed_bearers = info->config.allowed_bearers;
1690 session->append_all = TRUE;
1692 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1696 reply = __connman_error_failed(user_config->pending, -err);
1697 g_dbus_send_message(connection, reply);
1699 free_session(session);
1702 cleanup_user_config(user_config);
1707 int __connman_session_create(DBusMessage *msg)
1709 const char *owner, *notify_path;
1710 char *session_path = NULL;
1711 DBusMessageIter iter, array;
1712 struct connman_session *session = NULL;
1713 struct user_config *user_config = NULL;
1714 connman_bool_t user_allowed_bearers = FALSE;
1715 connman_bool_t user_connection_type = FALSE;
1718 owner = dbus_message_get_sender(msg);
1720 DBG("owner %s", owner);
1722 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1724 * If there is an emergency call already going on,
1725 * ignore session creation attempt
1731 user_config = g_try_new0(struct user_config, 1);
1732 if (user_config == NULL) {
1737 user_config->pending = dbus_message_ref(msg);
1739 dbus_message_iter_init(msg, &iter);
1740 dbus_message_iter_recurse(&iter, &array);
1742 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1743 DBusMessageIter entry, value;
1744 const char *key, *val;
1746 dbus_message_iter_recurse(&array, &entry);
1747 dbus_message_iter_get_basic(&entry, &key);
1749 dbus_message_iter_next(&entry);
1750 dbus_message_iter_recurse(&entry, &value);
1752 switch (dbus_message_iter_get_arg_type(&value)) {
1753 case DBUS_TYPE_ARRAY:
1754 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1755 err = parse_bearers(&value,
1756 &user_config->allowed_bearers);
1760 user_allowed_bearers = TRUE;
1766 case DBUS_TYPE_STRING:
1767 if (g_str_equal(key, "ConnectionType") == TRUE) {
1768 dbus_message_iter_get_basic(&value, &val);
1770 connman_session_parse_connection_type(val);
1772 user_connection_type = TRUE;
1778 dbus_message_iter_next(&array);
1782 * If the user hasn't provided a configuration, we set
1783 * the default configuration.
1785 * For AllowedBearers this is '*', ...
1787 if (user_allowed_bearers == FALSE) {
1788 user_config->allowed_bearers =
1789 g_slist_append(NULL,
1790 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1791 if (user_config->allowed_bearers == NULL) {
1797 /* ... and for ConnectionType it is 'any'. */
1798 if (user_connection_type == FALSE)
1799 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1801 dbus_message_iter_next(&iter);
1802 dbus_message_iter_get_basic(&iter, ¬ify_path);
1804 if (notify_path == NULL) {
1809 session_path = g_strdup_printf("/sessions%s", notify_path);
1810 if (session_path == NULL) {
1815 session = g_hash_table_lookup(session_hash, session_path);
1816 if (session != NULL) {
1817 g_free(session_path);
1823 session = g_try_new0(struct connman_session, 1);
1824 if (session == NULL) {
1825 g_free(session_path);
1830 session->session_path = session_path;
1832 session->info = g_try_new0(struct session_info, 1);
1833 if (session->info == NULL) {
1838 session->info_last = g_try_new0(struct session_info, 1);
1839 if (session->info_last == NULL) {
1844 session->owner = g_strdup(owner);
1845 session->notify_path = g_strdup(notify_path);
1846 session->notify_watch =
1847 g_dbus_add_disconnect_watch(connection, session->owner,
1848 owner_disconnect, session, NULL);
1850 err = assign_policy_plugin(session);
1854 err = create_policy_config(session, session_create_cb, user_config);
1855 if (err < 0 && err != -EINPROGRESS)
1858 return -EINPROGRESS;
1861 connman_error("Failed to create session");
1863 free_session(session);
1865 cleanup_user_config(user_config);
1869 void connman_session_destroy(struct connman_session *session)
1871 DBG("session %p", session);
1873 session_disconnect(session);
1876 int __connman_session_destroy(DBusMessage *msg)
1878 const char *owner, *session_path;
1879 struct connman_session *session;
1881 owner = dbus_message_get_sender(msg);
1883 DBG("owner %s", owner);
1885 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1887 if (session_path == NULL)
1890 session = g_hash_table_lookup(session_hash, session_path);
1891 if (session == NULL)
1894 if (g_strcmp0(owner, session->owner) != 0)
1897 connman_session_destroy(session);
1902 connman_bool_t __connman_session_mode()
1907 void __connman_session_set_mode(connman_bool_t enable)
1909 DBG("enable %d", enable);
1911 if (sessionmode != enable) {
1912 sessionmode = enable;
1914 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1915 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1916 DBUS_TYPE_BOOLEAN, &sessionmode);
1919 if (sessionmode == TRUE)
1920 __connman_service_disconnect_all();
1923 static void service_add(struct connman_service *service,
1926 GHashTableIter iter;
1927 GSequenceIter *iter_service_list;
1928 gpointer key, value;
1929 struct connman_session *session;
1930 struct service_entry *entry;
1932 DBG("service %p", service);
1934 g_hash_table_iter_init(&iter, session_hash);
1936 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1939 if (service_match(session, service) == FALSE)
1942 entry = create_service_entry(service, name,
1943 CONNMAN_SERVICE_STATE_IDLE);
1948 g_sequence_insert_sorted(session->service_list,
1949 entry, sort_services,
1952 g_hash_table_replace(session->service_hash, service,
1955 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1959 static void service_remove(struct connman_service *service)
1962 GHashTableIter iter;
1963 gpointer key, value;
1964 struct connman_session *session;
1965 struct session_info *info;
1967 DBG("service %p", service);
1969 g_hash_table_iter_init(&iter, session_hash);
1971 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1972 GSequenceIter *seq_iter;
1974 info = session->info;
1976 seq_iter = g_hash_table_lookup(session->service_hash, service);
1977 if (seq_iter == NULL)
1980 g_sequence_remove(seq_iter);
1982 if (info->entry != NULL && info->entry->service == service)
1984 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1988 static void service_state_changed(struct connman_service *service,
1989 enum connman_service_state state)
1991 GHashTableIter iter;
1992 gpointer key, value;
1994 DBG("service %p state %d", service, state);
1996 g_hash_table_iter_init(&iter, session_hash);
1998 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1999 struct connman_session *session = value;
2000 GSequenceIter *service_iter;
2002 service_iter = g_hash_table_lookup(session->service_hash, service);
2003 if (service_iter != NULL) {
2004 struct service_entry *entry;
2006 entry = g_sequence_get(service_iter);
2007 entry->state = state;
2010 session_changed(session,
2011 CONNMAN_SESSION_TRIGGER_SERVICE);
2015 static void ipconfig_changed(struct connman_service *service,
2016 struct connman_ipconfig *ipconfig)
2018 GHashTableIter iter;
2019 gpointer key, value;
2020 struct connman_session *session;
2021 struct session_info *info;
2022 enum connman_ipconfig_type type;
2024 DBG("service %p ipconfig %p", service, ipconfig);
2026 type = __connman_ipconfig_get_config_type(ipconfig);
2028 g_hash_table_iter_init(&iter, session_hash);
2030 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2032 info = session->info;
2034 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2037 if (info->entry != NULL && info->entry->service == service) {
2038 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2039 ipconfig_ipv4_changed(session);
2040 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2041 ipconfig_ipv6_changed(session);
2046 static struct connman_notifier session_notifier = {
2048 .service_add = service_add,
2049 .service_remove = service_remove,
2050 .service_state_changed = service_state_changed,
2051 .ipconfig_changed = ipconfig_changed,
2054 int __connman_session_init(void)
2060 connection = connman_dbus_get_connection();
2061 if (connection == NULL)
2064 err = connman_notifier_register(&session_notifier);
2066 dbus_connection_unref(connection);
2070 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2071 NULL, cleanup_session);
2073 sessionmode = FALSE;
2077 void __connman_session_cleanup(void)
2081 if (connection == NULL)
2084 connman_notifier_unregister(&session_notifier);
2086 g_hash_table_foreach(session_hash, release_session, NULL);
2087 g_hash_table_destroy(session_hash);
2088 session_hash = NULL;
2090 dbus_connection_unref(connection);