5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 /* track why this service was selected */
64 enum connman_session_reason reason;
65 enum connman_service_state state;
67 struct connman_service *service;
70 GSList *pending_timeouts;
74 struct connman_session_config config;
75 enum connman_session_state state;
76 struct service_entry *entry;
77 enum connman_session_reason reason;
80 struct connman_session {
86 struct connman_session_policy *policy;
88 connman_bool_t append_all;
89 struct session_info *info;
90 struct session_info *info_last;
91 struct connman_session_config *policy_config;
92 GSList *user_allowed_bearers;
96 GSequence *service_list;
97 GHashTable *service_hash;
100 static const char *trigger2string(enum connman_session_trigger trigger)
103 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
105 case CONNMAN_SESSION_TRIGGER_SETTING:
107 case CONNMAN_SESSION_TRIGGER_CONNECT:
109 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
111 case CONNMAN_SESSION_TRIGGER_SERVICE:
113 case CONNMAN_SESSION_TRIGGER_ECALL:
120 static const char *reason2string(enum connman_session_reason reason)
123 case CONNMAN_SESSION_REASON_UNKNOWN:
125 case CONNMAN_SESSION_REASON_CONNECT:
127 case CONNMAN_SESSION_REASON_FREE_RIDE:
134 static const char *state2string(enum connman_session_state state)
137 case CONNMAN_SESSION_STATE_DISCONNECTED:
138 return "disconnected";
139 case CONNMAN_SESSION_STATE_CONNECTED:
141 case CONNMAN_SESSION_STATE_ONLINE:
148 static const char *type2string(enum connman_session_type type)
151 case CONNMAN_SESSION_TYPE_UNKNOWN:
153 case CONNMAN_SESSION_TYPE_ANY:
155 case CONNMAN_SESSION_TYPE_LOCAL:
157 case CONNMAN_SESSION_TYPE_INTERNET:
164 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
166 if (g_strcmp0(policy, "default") == 0)
167 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
168 else if (g_strcmp0(policy, "always") == 0)
169 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
170 else if (g_strcmp0(policy, "forbidden") == 0)
171 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
172 else if (g_strcmp0(policy, "national") == 0)
173 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
174 else if (g_strcmp0(policy, "international") == 0)
175 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
177 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
180 enum connman_session_type connman_session_parse_connection_type(const char *type)
182 if (g_strcmp0(type, "any") == 0)
183 return CONNMAN_SESSION_TYPE_ANY;
184 if (g_strcmp0(type, "local") == 0)
185 return CONNMAN_SESSION_TYPE_LOCAL;
186 else if (g_strcmp0(type, "internet") == 0)
187 return CONNMAN_SESSION_TYPE_INTERNET;
189 return CONNMAN_SESSION_TYPE_UNKNOWN;
192 static int bearer2service(const char *bearer, enum connman_service_type *type)
194 if (g_strcmp0(bearer, "ethernet") == 0)
195 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
196 else if (g_strcmp0(bearer, "wifi") == 0)
197 *type = CONNMAN_SERVICE_TYPE_WIFI;
198 else if (g_strcmp0(bearer, "wimax") == 0)
199 *type = CONNMAN_SERVICE_TYPE_WIMAX;
200 else if (g_strcmp0(bearer, "bluetooth") == 0)
201 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
202 else if (g_strcmp0(bearer, "cellular") == 0)
203 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
204 else if (g_strcmp0(bearer, "vpn") == 0)
205 *type = CONNMAN_SERVICE_TYPE_VPN;
206 else if (g_strcmp0(bearer, "*") == 0)
207 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
214 static char *service2bearer(enum connman_service_type type)
217 case CONNMAN_SERVICE_TYPE_ETHERNET:
219 case CONNMAN_SERVICE_TYPE_WIFI:
221 case CONNMAN_SERVICE_TYPE_WIMAX:
223 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
225 case CONNMAN_SERVICE_TYPE_CELLULAR:
227 case CONNMAN_SERVICE_TYPE_VPN:
229 case CONNMAN_SERVICE_TYPE_UNKNOWN:
230 case CONNMAN_SERVICE_TYPE_SYSTEM:
231 case CONNMAN_SERVICE_TYPE_GPS:
232 case CONNMAN_SERVICE_TYPE_GADGET:
239 static void destroy_policy_config(struct connman_session *session)
241 if (session->policy == NULL) {
242 g_free(session->policy_config);
246 (*session->policy->destroy)(session);
249 static void free_session(struct connman_session *session)
254 if (session->notify_watch > 0)
255 g_dbus_remove_watch(connection, session->notify_watch);
257 destroy_policy_config(session);
258 g_slist_free(session->info->config.allowed_bearers);
259 g_free(session->owner);
260 g_free(session->session_path);
261 g_free(session->notify_path);
262 g_free(session->info);
263 g_free(session->info_last);
268 static void cleanup_session(gpointer user_data)
270 struct connman_session *session = user_data;
271 struct session_info *info = session->info;
273 DBG("remove %s", session->session_path);
275 g_slist_free(session->user_allowed_bearers);
276 g_hash_table_destroy(session->service_hash);
277 g_sequence_free(session->service_list);
279 if (info->entry != NULL &&
280 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
281 __connman_service_disconnect(info->entry->service);
284 free_session(session);
287 static int assign_policy_plugin(struct connman_session *session)
289 if (session->policy != NULL)
292 if (policy_list == NULL)
295 session->policy = policy_list->data;
301 DBusMessage *pending;
303 enum connman_session_type type;
304 GSList *allowed_bearers;
307 static void cleanup_user_config(struct user_config *user_config)
309 if (user_config == NULL)
312 if (user_config->pending != NULL)
313 dbus_message_unref(user_config->pending);
315 g_slist_free(user_config->allowed_bearers);
319 static int create_policy_config(struct connman_session *session,
320 connman_session_config_cb callback,
321 struct user_config *user_config)
323 struct connman_session_config *config;
325 if (session->policy == NULL) {
326 config = connman_session_create_default_config();
327 if (config == NULL) {
328 free_session(session);
329 cleanup_user_config(user_config);
333 return callback(session, config, user_config, 0);
336 return (*session->policy->create)(session, callback, user_config);
339 static void probe_policy(struct connman_session_policy *policy)
344 struct connman_session *session;
346 DBG("policy %p name %s", policy, policy->name);
348 g_hash_table_iter_init(&iter, session_hash);
350 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
353 if (session->policy != NULL)
356 assign_policy_plugin(session);
360 static void remove_policy(struct connman_session_policy *policy)
364 struct connman_session *session;
366 DBG("policy %p name %s", policy, policy->name);
368 g_hash_table_iter_init(&iter, session_hash);
370 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
373 if (session->policy != policy)
376 session->policy = NULL;
377 assign_policy_plugin(session);
381 static gint compare_priority(gconstpointer a, gconstpointer b)
383 const struct connman_session_policy *policy1 = a;
384 const struct connman_session_policy *policy2 = b;
386 return policy2->priority - policy1->priority;
390 int connman_session_policy_register(struct connman_session_policy *policy)
392 DBG("name %s", policy->name);
394 if (policy->create == NULL || policy->destroy == NULL)
397 policy_list = g_slist_insert_sorted(policy_list, policy,
400 probe_policy(policy);
405 void connman_session_policy_unregister(struct connman_session_policy *policy)
407 DBG("name %s", policy->name);
409 policy_list = g_slist_remove(policy_list, policy);
411 remove_policy(policy);
414 int connman_session_set_default_config(struct connman_session_config *config)
416 config->priority = FALSE;
417 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
418 config->type = CONNMAN_SESSION_TYPE_ANY;
419 config->ecall = FALSE;
421 g_slist_free(config->allowed_bearers);
422 config->allowed_bearers = g_slist_prepend(NULL,
423 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
424 if (config->allowed_bearers == NULL)
430 struct connman_session_config *connman_session_create_default_config(void)
432 struct connman_session_config *config;
434 config = g_try_new0(struct connman_session_config, 1);
438 if (connman_session_set_default_config(config) < 0) {
446 static enum connman_session_type apply_policy_on_type(
447 enum connman_session_type policy,
448 enum connman_session_type type)
450 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
451 return CONNMAN_SESSION_TYPE_UNKNOWN;
453 if (policy == CONNMAN_SESSION_TYPE_ANY)
456 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
457 return CONNMAN_SESSION_TYPE_LOCAL;
459 return CONNMAN_SESSION_TYPE_INTERNET;
462 int connman_session_parse_bearers(const char *token, GSList **list)
464 enum connman_service_type bearer;
467 if (g_strcmp0(token, "") == 0)
470 err = bearer2service(token, &bearer);
474 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
479 static int parse_bearers(DBusMessageIter *iter, GSList **list)
481 DBusMessageIter array;
484 dbus_message_iter_recurse(iter, &array);
488 while ((type = dbus_message_iter_get_arg_type(&array)) !=
490 char *bearer_name = NULL;
492 if (type != DBUS_TYPE_STRING) {
498 dbus_message_iter_get_basic(&array, &bearer_name);
500 err = connman_session_parse_bearers(bearer_name, list);
507 dbus_message_iter_next(&array);
513 static int filter_bearer(GSList *policy_bearers,
514 enum connman_service_type bearer,
517 enum connman_service_type policy;
520 if (policy_bearers == NULL)
523 for (it = policy_bearers; it != NULL; it = it->next) {
524 policy = GPOINTER_TO_INT(it->data);
526 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
531 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
542 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
547 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
550 enum connman_service_type bearer;
556 for (it = bearers; it != NULL; it = it->next) {
557 bearer = GPOINTER_TO_INT(it->data);
559 err = filter_bearer(policy_bearers, bearer, list);
567 const char *connman_session_get_owner(struct connman_session *session)
569 return session->owner;
572 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
574 struct session_info *info = user_data;
577 for (list = info->config.allowed_bearers;
578 list != NULL; list = list->next) {
579 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
580 const char *name = __connman_service_type2string(bearer);
585 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
590 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
592 struct connman_service *service = user_data;
593 struct connman_ipconfig *ipconfig_ipv4;
598 if (__connman_service_is_connected_state(service,
599 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
603 ipconfig_ipv4 = __connman_service_get_ip4config(service);
604 if (ipconfig_ipv4 == NULL)
607 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
610 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
612 struct connman_service *service = user_data;
613 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
618 if (__connman_service_is_connected_state(service,
619 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
623 ipconfig_ipv4 = __connman_service_get_ip4config(service);
624 ipconfig_ipv6 = __connman_service_get_ip6config(service);
625 if (ipconfig_ipv6 == NULL)
628 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
631 static void append_notify(DBusMessageIter *dict,
632 struct connman_session *session)
634 struct session_info *info = session->info;
635 struct session_info *info_last = session->info_last;
636 struct connman_service *service;
637 const char *name, *ifname, *bearer;
639 if (session->append_all == TRUE ||
640 info->state != info_last->state) {
641 const char *state = state2string(info->state);
643 connman_dbus_dict_append_basic(dict, "State",
646 info_last->state = info->state;
649 if (session->append_all == TRUE ||
650 info->entry != info_last->entry) {
651 if (info->entry == NULL) {
657 name = info->entry->name;
658 ifname = info->entry->ifname;
659 service = info->entry->service;
660 bearer = info->entry->bearer;
663 connman_dbus_dict_append_basic(dict, "Name",
667 connman_dbus_dict_append_dict(dict, "IPv4",
668 append_ipconfig_ipv4,
671 connman_dbus_dict_append_dict(dict, "IPv6",
672 append_ipconfig_ipv6,
675 connman_dbus_dict_append_basic(dict, "Interface",
679 connman_dbus_dict_append_basic(dict, "Bearer",
683 info_last->entry = info->entry;
686 if (session->append_all == TRUE ||
687 info->config.type != info_last->config.type) {
688 const char *type = type2string(info->config.type);
690 connman_dbus_dict_append_basic(dict, "ConnectionType",
693 info_last->config.type = info->config.type;
696 if (session->append_all == TRUE ||
697 info->config.allowed_bearers != info_last->config.allowed_bearers) {
698 connman_dbus_dict_append_array(dict, "AllowedBearers",
700 append_allowed_bearers,
702 info_last->config.allowed_bearers = info->config.allowed_bearers;
705 session->append_all = FALSE;
708 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
709 enum connman_session_type type)
712 case CONNMAN_SESSION_TYPE_UNKNOWN:
714 case CONNMAN_SESSION_TYPE_ANY:
716 case CONNMAN_SESSION_TYPE_LOCAL:
717 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
718 *state = CONNMAN_SESSION_STATE_CONNECTED;
723 case CONNMAN_SESSION_TYPE_INTERNET:
724 if (*state == CONNMAN_SESSION_STATE_ONLINE)
732 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
734 struct session_info *info_last = session->info_last;
735 struct session_info *info = session->info;
737 if (session->append_all == TRUE)
740 if (info->state != info_last->state)
743 if (info->entry != info_last->entry &&
744 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
747 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
748 info->config.type != info_last->config.type)
754 static gboolean session_notify(gpointer user_data)
756 struct connman_session *session = user_data;
758 DBusMessageIter array, dict;
760 if (compute_notifiable_changes(session) == FALSE)
763 DBG("session %p owner %s notify_path %s", session,
764 session->owner, session->notify_path);
766 msg = dbus_message_new_method_call(session->owner, session->notify_path,
767 CONNMAN_NOTIFICATION_INTERFACE,
772 dbus_message_iter_init_append(msg, &array);
773 connman_dbus_dict_open(&array, &dict);
775 append_notify(&dict, session);
777 connman_dbus_dict_close(&array, &dict);
779 g_dbus_send_message(connection, msg);
784 static void ipconfig_ipv4_changed(struct connman_session *session)
786 struct session_info *info = session->info;
788 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
789 "IPv4", append_ipconfig_ipv4,
790 info->entry->service);
793 static void ipconfig_ipv6_changed(struct connman_session *session)
795 struct session_info *info = session->info;
797 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
798 "IPv6", append_ipconfig_ipv6,
799 info->entry->service);
802 static connman_bool_t service_type_match(struct connman_session *session,
803 struct connman_service *service)
805 struct session_info *info = session->info;
808 for (list = info->config.allowed_bearers;
809 list != NULL; list = list->next) {
810 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
811 enum connman_service_type service_type;
813 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
816 service_type = connman_service_get_type(service);
817 if (bearer == service_type)
824 static connman_bool_t service_match(struct connman_session *session,
825 struct connman_service *service)
827 if (service_type_match(session, service) == FALSE)
833 static int service_type_weight(enum connman_service_type type)
836 * The session doesn't care which service
837 * to use. Nevertheless we have to sort them
838 * according their type. The ordering is
847 case CONNMAN_SERVICE_TYPE_ETHERNET:
849 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
851 case CONNMAN_SERVICE_TYPE_WIFI:
852 case CONNMAN_SERVICE_TYPE_WIMAX:
854 case CONNMAN_SERVICE_TYPE_CELLULAR:
856 case CONNMAN_SERVICE_TYPE_UNKNOWN:
857 case CONNMAN_SERVICE_TYPE_SYSTEM:
858 case CONNMAN_SERVICE_TYPE_GPS:
859 case CONNMAN_SERVICE_TYPE_VPN:
860 case CONNMAN_SERVICE_TYPE_GADGET:
867 static gint sort_allowed_bearers(struct connman_service *service_a,
868 struct connman_service *service_b,
869 struct connman_session *session)
871 struct session_info *info = session->info;
873 enum connman_service_type type_a, type_b;
874 int weight_a, weight_b;
876 type_a = connman_service_get_type(service_a);
877 type_b = connman_service_get_type(service_b);
879 for (list = info->config.allowed_bearers;
880 list != NULL; list = list->next) {
881 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
883 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
884 if (type_a != type_b) {
885 weight_a = service_type_weight(type_a);
886 weight_b = service_type_weight(type_b);
888 if (weight_a > weight_b)
891 if (weight_a < weight_b)
898 if (type_a == bearer && type_b == bearer)
901 if (type_a == bearer && type_b != bearer)
904 if (type_a != bearer && type_b == bearer)
911 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
913 struct service_entry *entry_a = (void *)a;
914 struct service_entry *entry_b = (void *)b;
915 struct connman_session *session = user_data;
917 return sort_allowed_bearers(entry_a->service, entry_b->service,
921 static enum connman_session_state service_to_session_state(enum connman_service_state state)
924 case CONNMAN_SERVICE_STATE_UNKNOWN:
925 case CONNMAN_SERVICE_STATE_IDLE:
926 case CONNMAN_SERVICE_STATE_ASSOCIATION:
927 case CONNMAN_SERVICE_STATE_CONFIGURATION:
928 case CONNMAN_SERVICE_STATE_DISCONNECT:
929 case CONNMAN_SERVICE_STATE_FAILURE:
931 case CONNMAN_SERVICE_STATE_READY:
932 return CONNMAN_SESSION_STATE_CONNECTED;
933 case CONNMAN_SERVICE_STATE_ONLINE:
934 return CONNMAN_SESSION_STATE_ONLINE;
937 return CONNMAN_SESSION_STATE_DISCONNECTED;
940 static connman_bool_t is_connected(enum connman_service_state state)
943 case CONNMAN_SERVICE_STATE_UNKNOWN:
944 case CONNMAN_SERVICE_STATE_IDLE:
945 case CONNMAN_SERVICE_STATE_ASSOCIATION:
946 case CONNMAN_SERVICE_STATE_CONFIGURATION:
947 case CONNMAN_SERVICE_STATE_DISCONNECT:
948 case CONNMAN_SERVICE_STATE_FAILURE:
950 case CONNMAN_SERVICE_STATE_READY:
951 case CONNMAN_SERVICE_STATE_ONLINE:
958 static connman_bool_t is_connecting(enum connman_service_state state)
961 case CONNMAN_SERVICE_STATE_UNKNOWN:
962 case CONNMAN_SERVICE_STATE_IDLE:
964 case CONNMAN_SERVICE_STATE_ASSOCIATION:
965 case CONNMAN_SERVICE_STATE_CONFIGURATION:
967 case CONNMAN_SERVICE_STATE_DISCONNECT:
968 case CONNMAN_SERVICE_STATE_FAILURE:
969 case CONNMAN_SERVICE_STATE_READY:
970 case CONNMAN_SERVICE_STATE_ONLINE:
977 static connman_bool_t explicit_connect(enum connman_session_reason reason)
980 case CONNMAN_SESSION_REASON_UNKNOWN:
981 case CONNMAN_SESSION_REASON_FREE_RIDE:
983 case CONNMAN_SESSION_REASON_CONNECT:
990 static connman_bool_t explicit_disconnect(struct session_info *info)
992 if (info->entry == NULL)
995 DBG("reason %s service %p state %d",
996 reason2string(info->entry->reason),
997 info->entry->service, info->entry->state);
999 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
1002 if (explicit_connect(info->entry->reason) == FALSE)
1005 if (__connman_service_session_dec(info->entry->service) == FALSE)
1011 struct pending_data {
1012 unsigned int timeout;
1013 struct service_entry *entry;
1014 gboolean (*cb)(gpointer);
1017 static void pending_timeout_free(gpointer data, gpointer user_data)
1019 struct pending_data *pending = data;
1021 DBG("pending %p timeout %d", pending, pending->timeout);
1022 g_source_remove(pending->timeout);
1026 static void pending_timeout_remove_all(struct service_entry *entry)
1030 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1031 g_slist_free(entry->pending_timeouts);
1032 entry->pending_timeouts = NULL;
1035 static gboolean pending_timeout_cb(gpointer data)
1037 struct pending_data *pending = data;
1038 struct service_entry *entry = pending->entry;
1041 DBG("pending %p timeout %d", pending, pending->timeout);
1043 ret = pending->cb(pending->entry);
1045 entry->pending_timeouts =
1046 g_slist_remove(entry->pending_timeouts,
1053 static connman_bool_t pending_timeout_add(unsigned int seconds,
1054 gboolean (*cb)(gpointer),
1055 struct service_entry *entry)
1057 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1059 if (pending == NULL || cb == NULL || entry == NULL) {
1065 pending->entry = entry;
1066 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1068 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1071 DBG("pending %p entry %p timeout id %d", pending, entry,
1077 static gboolean call_disconnect(gpointer user_data)
1079 struct service_entry *entry = user_data;
1080 struct connman_service *service = entry->service;
1083 * TODO: We should mark this entry as pending work. In case
1084 * disconnect fails we just unassign this session from the
1085 * service and can't do anything later on it
1087 DBG("disconnect service %p", service);
1088 __connman_service_disconnect(service);
1093 static gboolean call_connect(gpointer user_data)
1095 struct service_entry *entry = user_data;
1096 struct connman_service *service = entry->service;
1098 DBG("connect service %p", service);
1099 __connman_service_connect(service);
1104 static void deselect_service(struct session_info *info)
1106 struct service_entry *entry;
1107 connman_bool_t disconnect, connected;
1111 if (info->entry == NULL)
1114 disconnect = explicit_disconnect(info);
1116 connected = is_connecting(info->entry->state) == TRUE ||
1117 is_connected(info->entry->state) == TRUE;
1119 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1120 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1122 entry = info->entry;
1125 DBG("disconnect %d connected %d", disconnect, connected);
1127 if (disconnect == TRUE && connected == TRUE)
1128 pending_timeout_add(0, call_disconnect, entry);
1131 static void deselect_and_disconnect(struct connman_session *session)
1133 struct session_info *info = session->info;
1135 deselect_service(info);
1137 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1140 static void select_connected_service(struct session_info *info,
1141 struct service_entry *entry)
1143 enum connman_session_state state;
1145 state = service_to_session_state(entry->state);
1146 if (is_type_matching_state(&state, info->config.type) == FALSE)
1149 info->state = state;
1151 info->entry = entry;
1152 info->entry->reason = info->reason;
1154 if (explicit_connect(info->reason) == FALSE)
1157 __connman_service_session_inc(info->entry->service);
1160 static void select_offline_service(struct session_info *info,
1161 struct service_entry *entry)
1163 if (explicit_connect(info->reason) == FALSE)
1166 info->state = service_to_session_state(entry->state);
1168 info->entry = entry;
1169 info->entry->reason = info->reason;
1171 __connman_service_session_inc(info->entry->service);
1172 pending_timeout_add(0, call_connect, entry);
1175 static void select_service(struct session_info *info,
1176 struct service_entry *entry)
1178 DBG("service %p", entry->service);
1180 if (is_connected(entry->state) == TRUE)
1181 select_connected_service(info, entry);
1183 select_offline_service(info, entry);
1186 static void select_and_connect(struct connman_session *session,
1187 enum connman_session_reason reason)
1189 struct session_info *info = session->info;
1190 struct service_entry *entry = NULL;
1191 GSequenceIter *iter;
1193 DBG("session %p reason %s", session, reason2string(reason));
1195 info->reason = reason;
1197 iter = g_sequence_get_begin_iter(session->service_list);
1199 while (g_sequence_iter_is_end(iter) == FALSE) {
1200 entry = g_sequence_get(iter);
1202 switch (entry->state) {
1203 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1204 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1205 case CONNMAN_SERVICE_STATE_READY:
1206 case CONNMAN_SERVICE_STATE_ONLINE:
1207 case CONNMAN_SERVICE_STATE_IDLE:
1208 case CONNMAN_SERVICE_STATE_DISCONNECT:
1209 select_service(info, entry);
1211 case CONNMAN_SERVICE_STATE_UNKNOWN:
1212 case CONNMAN_SERVICE_STATE_FAILURE:
1216 iter = g_sequence_iter_next(iter);
1220 static struct service_entry *create_service_entry(struct connman_service *service,
1222 enum connman_service_state state)
1224 struct service_entry *entry;
1225 enum connman_service_type type;
1228 entry = g_try_new0(struct service_entry, 1);
1232 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1233 entry->state = state;
1238 entry->service = service;
1240 idx = __connman_service_get_index(entry->service);
1241 entry->ifname = connman_inet_ifname(idx);
1242 if (entry->ifname == NULL)
1243 entry->ifname = g_strdup("");
1245 type = connman_service_get_type(entry->service);
1246 entry->bearer = service2bearer(type);
1251 static void destroy_service_entry(gpointer data)
1253 struct service_entry *entry = data;
1255 pending_timeout_remove_all(entry);
1256 g_free(entry->ifname);
1261 static void populate_service_list(struct connman_session *session)
1263 struct service_entry *entry;
1264 GSequenceIter *iter;
1266 session->service_hash =
1267 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1269 session->service_list = __connman_service_get_list(session,
1271 create_service_entry,
1272 destroy_service_entry);
1274 g_sequence_sort(session->service_list, sort_services, session);
1276 iter = g_sequence_get_begin_iter(session->service_list);
1278 while (g_sequence_iter_is_end(iter) == FALSE) {
1279 entry = g_sequence_get(iter);
1281 DBG("service %p type %s name %s", entry->service,
1282 service2bearer(connman_service_get_type(entry->service)),
1285 g_hash_table_replace(session->service_hash,
1286 entry->service, iter);
1288 iter = g_sequence_iter_next(iter);
1292 static void session_changed(struct connman_session *session,
1293 enum connman_session_trigger trigger)
1295 struct session_info *info = session->info;
1296 struct session_info *info_last = session->info_last;
1297 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1298 GSequence *service_list_last;
1299 GHashTable *service_hash_last;
1302 * TODO: This only a placeholder for the 'real' algorithm to
1303 * play a bit around. So we are going to improve it step by step.
1306 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1307 reason2string(info->reason));
1309 if (info->entry != NULL) {
1310 enum connman_session_state state;
1312 state = service_to_session_state(info->entry->state);
1314 if (is_type_matching_state(&state, info->config.type) == TRUE)
1315 info->state = state;
1319 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1320 DBG("ignore session changed event");
1322 case CONNMAN_SESSION_TRIGGER_SETTING:
1323 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1325 service_hash_last = session->service_hash;
1326 service_list_last = session->service_list;
1328 populate_service_list(session);
1330 if (info->entry != NULL) {
1331 service_iter_last = g_hash_table_lookup(
1333 info->entry->service);
1334 service_iter = g_hash_table_lookup(
1335 session->service_hash,
1336 info->entry->service);
1339 if (service_iter == NULL && service_iter_last != NULL) {
1341 * The currently selected service is
1342 * not part of this session anymore.
1344 deselect_and_disconnect(session);
1347 g_hash_table_remove_all(service_hash_last);
1348 g_sequence_free(service_list_last);
1351 if (info->config.type != info_last->config.type) {
1352 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1353 is_type_matching_state(&info->state,
1354 info->config.type) == FALSE)
1355 deselect_and_disconnect(session);
1358 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1359 select_and_connect(session,
1360 CONNMAN_SESSION_REASON_FREE_RIDE);
1364 case CONNMAN_SESSION_TRIGGER_ECALL:
1366 * For the time beeing we fallback to normal connect
1369 case CONNMAN_SESSION_TRIGGER_CONNECT:
1370 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1371 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1373 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1374 __connman_service_session_inc(info->entry->service);
1378 if (info->entry != NULL &&
1379 is_connecting(info->entry->state) == TRUE) {
1383 select_and_connect(session,
1384 CONNMAN_SESSION_REASON_CONNECT);
1387 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1388 deselect_and_disconnect(session);
1391 case CONNMAN_SESSION_TRIGGER_SERVICE:
1392 if (info->entry != NULL &&
1393 (is_connecting(info->entry->state) == TRUE ||
1394 is_connected(info->entry->state) == TRUE)) {
1398 deselect_and_disconnect(session);
1400 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1401 select_and_connect(session, info->reason);
1407 session_notify(session);
1410 int connman_session_config_update(struct connman_session *session)
1412 struct session_info *info = session->info;
1413 GSList *allowed_bearers;
1416 DBG("session %p", session);
1419 * We update all configuration even though only one entry
1420 * might have changed. We can still optimize this later.
1423 err = apply_policy_on_bearers(
1424 session->policy_config->allowed_bearers,
1425 session->user_allowed_bearers,
1430 g_slist_free(info->config.allowed_bearers);
1431 info->config.allowed_bearers = allowed_bearers;
1433 info->config.type = apply_policy_on_type(
1434 session->policy_config->type,
1437 info->config.roaming_policy = session->policy_config->roaming_policy;
1439 info->config.ecall = session->policy_config->ecall;
1440 if (info->config.ecall == TRUE)
1441 ecall_session = session;
1443 info->config.priority = session->policy_config->priority;
1445 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1450 static DBusMessage *connect_session(DBusConnection *conn,
1451 DBusMessage *msg, void *user_data)
1453 struct connman_session *session = user_data;
1455 DBG("session %p", session);
1457 if (ecall_session != NULL) {
1458 if (ecall_session->ecall == TRUE && ecall_session != session)
1459 return __connman_error_failed(msg, EBUSY);
1461 session->ecall = TRUE;
1462 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1464 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1466 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1469 static DBusMessage *disconnect_session(DBusConnection *conn,
1470 DBusMessage *msg, void *user_data)
1472 struct connman_session *session = user_data;
1474 DBG("session %p", session);
1476 if (ecall_session != NULL) {
1477 if (ecall_session->ecall == TRUE && ecall_session != session)
1478 return __connman_error_failed(msg, EBUSY);
1480 session->ecall = FALSE;
1483 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1485 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1488 static DBusMessage *change_session(DBusConnection *conn,
1489 DBusMessage *msg, void *user_data)
1491 struct connman_session *session = user_data;
1492 struct session_info *info = session->info;
1493 DBusMessageIter iter, value;
1496 GSList *allowed_bearers;
1499 DBG("session %p", session);
1500 if (dbus_message_iter_init(msg, &iter) == FALSE)
1501 return __connman_error_invalid_arguments(msg);
1503 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1504 return __connman_error_invalid_arguments(msg);
1506 dbus_message_iter_get_basic(&iter, &name);
1507 dbus_message_iter_next(&iter);
1509 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1510 return __connman_error_invalid_arguments(msg);
1512 dbus_message_iter_recurse(&iter, &value);
1514 switch (dbus_message_iter_get_arg_type(&value)) {
1515 case DBUS_TYPE_ARRAY:
1516 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1517 err = parse_bearers(&value, &allowed_bearers);
1519 return __connman_error_failed(msg, err);
1521 g_slist_free(info->config.allowed_bearers);
1522 session->user_allowed_bearers = allowed_bearers;
1524 err = apply_policy_on_bearers(
1525 session->policy_config->allowed_bearers,
1526 session->user_allowed_bearers,
1527 &info->config.allowed_bearers);
1530 return __connman_error_failed(msg, err);
1535 case DBUS_TYPE_STRING:
1536 if (g_str_equal(name, "ConnectionType") == TRUE) {
1537 dbus_message_iter_get_basic(&value, &val);
1538 info->config.type = apply_policy_on_type(
1539 session->policy_config->type,
1540 connman_session_parse_connection_type(val));
1549 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1551 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1554 return __connman_error_invalid_arguments(msg);
1557 static void release_session(gpointer key, gpointer value, gpointer user_data)
1559 struct connman_session *session = value;
1560 DBusMessage *message;
1562 DBG("owner %s path %s", session->owner, session->notify_path);
1564 if (session->notify_watch > 0)
1565 g_dbus_remove_watch(connection, session->notify_watch);
1567 g_dbus_unregister_interface(connection, session->session_path,
1568 CONNMAN_SESSION_INTERFACE);
1570 message = dbus_message_new_method_call(session->owner,
1571 session->notify_path,
1572 CONNMAN_NOTIFICATION_INTERFACE,
1574 if (message == NULL)
1577 dbus_message_set_no_reply(message, TRUE);
1579 g_dbus_send_message(connection, message);
1582 static int session_disconnect(struct connman_session *session)
1584 DBG("session %p, %s", session, session->owner);
1586 if (session->notify_watch > 0)
1587 g_dbus_remove_watch(connection, session->notify_watch);
1589 g_dbus_unregister_interface(connection, session->session_path,
1590 CONNMAN_SESSION_INTERFACE);
1592 deselect_and_disconnect(session);
1594 g_hash_table_remove(session_hash, session->session_path);
1599 static void owner_disconnect(DBusConnection *conn, void *user_data)
1601 struct connman_session *session = user_data;
1603 DBG("session %p, %s died", session, session->owner);
1605 session_disconnect(session);
1608 static DBusMessage *destroy_session(DBusConnection *conn,
1609 DBusMessage *msg, void *user_data)
1611 struct connman_session *session = user_data;
1613 DBG("session %p", session);
1615 if (ecall_session != NULL && ecall_session != session)
1616 return __connman_error_failed(msg, EBUSY);
1618 session_disconnect(session);
1620 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1623 static const GDBusMethodTable session_methods[] = {
1624 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1625 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1626 { GDBUS_METHOD("Disconnect", NULL, NULL,
1627 disconnect_session ) },
1628 { GDBUS_METHOD("Change",
1629 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1630 NULL, change_session) },
1634 static int session_create_cb(struct connman_session *session,
1635 struct connman_session_config *config,
1636 void *user_data, int err)
1639 struct user_config *user_config = user_data;
1640 struct session_info *info, *info_last;
1642 DBG("session %p config %p", session, config);
1647 session->policy_config = config;
1649 info = session->info;
1650 info_last = session->info_last;
1652 if (session->policy_config->ecall == TRUE)
1653 ecall_session = session;
1655 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1656 info->config.type = apply_policy_on_type(
1657 session->policy_config->type,
1659 info->config.priority = session->policy_config->priority;
1660 info->config.roaming_policy = session->policy_config->roaming_policy;
1663 session->user_allowed_bearers = user_config->allowed_bearers;
1664 user_config->allowed_bearers = NULL;
1666 err = apply_policy_on_bearers(
1667 session->policy_config->allowed_bearers,
1668 session->user_allowed_bearers,
1669 &info->config.allowed_bearers);
1673 g_hash_table_replace(session_hash, session->session_path, session);
1675 DBG("add %s", session->session_path);
1677 if (g_dbus_register_interface(connection, session->session_path,
1678 CONNMAN_SESSION_INTERFACE,
1679 session_methods, NULL,
1680 NULL, session, NULL) == FALSE) {
1681 connman_error("Failed to register %s", session->session_path);
1682 g_hash_table_remove(session_hash, session->session_path);
1687 reply = g_dbus_create_reply(user_config->pending,
1688 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1690 g_dbus_send_message(connection, reply);
1691 user_config->pending = NULL;
1693 populate_service_list(session);
1695 info_last->state = info->state;
1696 info_last->config.priority = info->config.priority;
1697 info_last->config.roaming_policy = info->config.roaming_policy;
1698 info_last->entry = info->entry;
1699 info_last->config.allowed_bearers = info->config.allowed_bearers;
1701 session->append_all = TRUE;
1703 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1707 reply = __connman_error_failed(user_config->pending, -err);
1708 g_dbus_send_message(connection, reply);
1710 free_session(session);
1713 cleanup_user_config(user_config);
1718 int __connman_session_create(DBusMessage *msg)
1720 const char *owner, *notify_path;
1721 char *session_path = NULL;
1722 DBusMessageIter iter, array;
1723 struct connman_session *session = NULL;
1724 struct user_config *user_config = NULL;
1725 connman_bool_t user_allowed_bearers = FALSE;
1726 connman_bool_t user_connection_type = FALSE;
1729 owner = dbus_message_get_sender(msg);
1731 DBG("owner %s", owner);
1733 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1735 * If there is an emergency call already going on,
1736 * ignore session creation attempt
1742 user_config = g_try_new0(struct user_config, 1);
1743 if (user_config == NULL) {
1748 user_config->pending = dbus_message_ref(msg);
1750 dbus_message_iter_init(msg, &iter);
1751 dbus_message_iter_recurse(&iter, &array);
1753 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1754 DBusMessageIter entry, value;
1755 const char *key, *val;
1757 dbus_message_iter_recurse(&array, &entry);
1758 dbus_message_iter_get_basic(&entry, &key);
1760 dbus_message_iter_next(&entry);
1761 dbus_message_iter_recurse(&entry, &value);
1763 switch (dbus_message_iter_get_arg_type(&value)) {
1764 case DBUS_TYPE_ARRAY:
1765 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1766 err = parse_bearers(&value,
1767 &user_config->allowed_bearers);
1771 user_allowed_bearers = TRUE;
1777 case DBUS_TYPE_STRING:
1778 if (g_str_equal(key, "ConnectionType") == TRUE) {
1779 dbus_message_iter_get_basic(&value, &val);
1781 connman_session_parse_connection_type(val);
1783 user_connection_type = TRUE;
1789 dbus_message_iter_next(&array);
1793 * If the user hasn't provided a configuration, we set
1794 * the default configuration.
1796 * For AllowedBearers this is '*', ...
1798 if (user_allowed_bearers == FALSE) {
1799 user_config->allowed_bearers =
1800 g_slist_append(NULL,
1801 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1802 if (user_config->allowed_bearers == NULL) {
1808 /* ... and for ConnectionType it is 'any'. */
1809 if (user_connection_type == FALSE)
1810 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1812 dbus_message_iter_next(&iter);
1813 dbus_message_iter_get_basic(&iter, ¬ify_path);
1815 if (notify_path == NULL) {
1820 session_path = g_strdup_printf("/sessions%s", notify_path);
1821 if (session_path == NULL) {
1826 session = g_hash_table_lookup(session_hash, session_path);
1827 if (session != NULL) {
1828 g_free(session_path);
1834 session = g_try_new0(struct connman_session, 1);
1835 if (session == NULL) {
1836 g_free(session_path);
1841 session->session_path = session_path;
1843 session->info = g_try_new0(struct session_info, 1);
1844 if (session->info == NULL) {
1849 session->info_last = g_try_new0(struct session_info, 1);
1850 if (session->info_last == NULL) {
1855 session->owner = g_strdup(owner);
1856 session->notify_path = g_strdup(notify_path);
1857 session->notify_watch =
1858 g_dbus_add_disconnect_watch(connection, session->owner,
1859 owner_disconnect, session, NULL);
1861 err = assign_policy_plugin(session);
1865 err = create_policy_config(session, session_create_cb, user_config);
1866 if (err < 0 && err != -EINPROGRESS)
1869 return -EINPROGRESS;
1872 connman_error("Failed to create session");
1874 free_session(session);
1876 cleanup_user_config(user_config);
1880 void connman_session_destroy(struct connman_session *session)
1882 DBG("session %p", session);
1884 session_disconnect(session);
1887 int __connman_session_destroy(DBusMessage *msg)
1889 const char *owner, *session_path;
1890 struct connman_session *session;
1892 owner = dbus_message_get_sender(msg);
1894 DBG("owner %s", owner);
1896 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1898 if (session_path == NULL)
1901 session = g_hash_table_lookup(session_hash, session_path);
1902 if (session == NULL)
1905 if (g_strcmp0(owner, session->owner) != 0)
1908 connman_session_destroy(session);
1913 connman_bool_t __connman_session_mode()
1918 void __connman_session_set_mode(connman_bool_t enable)
1920 DBG("enable %d", enable);
1922 if (sessionmode != enable) {
1923 sessionmode = enable;
1925 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1926 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1927 DBUS_TYPE_BOOLEAN, &sessionmode);
1930 if (sessionmode == TRUE)
1931 __connman_service_disconnect_all();
1934 static void service_add(struct connman_service *service,
1937 GHashTableIter iter;
1938 GSequenceIter *iter_service_list;
1939 gpointer key, value;
1940 struct connman_session *session;
1941 struct service_entry *entry;
1943 DBG("service %p", service);
1945 g_hash_table_iter_init(&iter, session_hash);
1947 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1950 if (service_match(session, service) == FALSE)
1953 entry = create_service_entry(service, name,
1954 CONNMAN_SERVICE_STATE_IDLE);
1959 g_sequence_insert_sorted(session->service_list,
1960 entry, sort_services,
1963 g_hash_table_replace(session->service_hash, service,
1966 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1970 static void service_remove(struct connman_service *service)
1973 GHashTableIter iter;
1974 gpointer key, value;
1975 struct connman_session *session;
1976 struct session_info *info;
1978 DBG("service %p", service);
1980 g_hash_table_iter_init(&iter, session_hash);
1982 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1983 GSequenceIter *seq_iter;
1985 info = session->info;
1987 seq_iter = g_hash_table_lookup(session->service_hash, service);
1988 if (seq_iter == NULL)
1991 g_sequence_remove(seq_iter);
1993 if (info->entry != NULL && info->entry->service == service)
1995 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1999 static void service_state_changed(struct connman_service *service,
2000 enum connman_service_state state)
2002 GHashTableIter iter;
2003 gpointer key, value;
2005 DBG("service %p state %d", service, state);
2007 g_hash_table_iter_init(&iter, session_hash);
2009 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2010 struct connman_session *session = value;
2011 GSequenceIter *service_iter;
2013 service_iter = g_hash_table_lookup(session->service_hash, service);
2014 if (service_iter != NULL) {
2015 struct service_entry *entry;
2017 entry = g_sequence_get(service_iter);
2018 entry->state = state;
2021 session_changed(session,
2022 CONNMAN_SESSION_TRIGGER_SERVICE);
2026 static void ipconfig_changed(struct connman_service *service,
2027 struct connman_ipconfig *ipconfig)
2029 GHashTableIter iter;
2030 gpointer key, value;
2031 struct connman_session *session;
2032 struct session_info *info;
2033 enum connman_ipconfig_type type;
2035 DBG("service %p ipconfig %p", service, ipconfig);
2037 type = __connman_ipconfig_get_config_type(ipconfig);
2039 g_hash_table_iter_init(&iter, session_hash);
2041 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2043 info = session->info;
2045 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2048 if (info->entry != NULL && info->entry->service == service) {
2049 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2050 ipconfig_ipv4_changed(session);
2051 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2052 ipconfig_ipv6_changed(session);
2057 static struct connman_notifier session_notifier = {
2059 .service_add = service_add,
2060 .service_remove = service_remove,
2061 .service_state_changed = service_state_changed,
2062 .ipconfig_changed = ipconfig_changed,
2065 int __connman_session_init(void)
2071 connection = connman_dbus_get_connection();
2072 if (connection == NULL)
2075 err = connman_notifier_register(&session_notifier);
2077 dbus_connection_unref(connection);
2081 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2082 NULL, cleanup_session);
2084 sessionmode = FALSE;
2088 void __connman_session_cleanup(void)
2092 if (connection == NULL)
2095 connman_notifier_unregister(&session_notifier);
2097 g_hash_table_foreach(session_hash, release_session, NULL);
2098 g_hash_table_destroy(session_hash);
2099 session_hash = NULL;
2101 dbus_connection_unref(connection);