5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 /* track why this service was selected */
64 enum connman_session_reason reason;
65 enum connman_service_state state;
67 struct connman_service *service;
70 GSList *pending_timeouts;
74 struct connman_session_config config;
75 enum connman_session_state state;
76 struct service_entry *entry;
77 enum connman_session_reason reason;
80 struct connman_session {
86 struct connman_session_policy *policy;
88 connman_bool_t append_all;
89 struct session_info *info;
90 struct session_info *info_last;
91 struct connman_session_config *policy_config;
92 GSList *user_allowed_bearers;
96 GSequence *service_list;
97 GHashTable *service_hash;
100 static const char *trigger2string(enum connman_session_trigger trigger)
103 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
105 case CONNMAN_SESSION_TRIGGER_SETTING:
107 case CONNMAN_SESSION_TRIGGER_CONNECT:
109 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
111 case CONNMAN_SESSION_TRIGGER_SERVICE:
113 case CONNMAN_SESSION_TRIGGER_ECALL:
120 static const char *reason2string(enum connman_session_reason reason)
123 case CONNMAN_SESSION_REASON_UNKNOWN:
125 case CONNMAN_SESSION_REASON_CONNECT:
127 case CONNMAN_SESSION_REASON_FREE_RIDE:
134 static const char *state2string(enum connman_session_state state)
137 case CONNMAN_SESSION_STATE_DISCONNECTED:
138 return "disconnected";
139 case CONNMAN_SESSION_STATE_CONNECTED:
141 case CONNMAN_SESSION_STATE_ONLINE:
148 static const char *type2string(enum connman_session_type type)
151 case CONNMAN_SESSION_TYPE_UNKNOWN:
153 case CONNMAN_SESSION_TYPE_ANY:
155 case CONNMAN_SESSION_TYPE_LOCAL:
157 case CONNMAN_SESSION_TYPE_INTERNET:
164 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
166 if (g_strcmp0(policy, "default") == 0)
167 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
168 else if (g_strcmp0(policy, "always") == 0)
169 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
170 else if (g_strcmp0(policy, "forbidden") == 0)
171 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
172 else if (g_strcmp0(policy, "national") == 0)
173 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
174 else if (g_strcmp0(policy, "international") == 0)
175 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
177 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
180 enum connman_session_type connman_session_parse_connection_type(const char *type)
182 if (g_strcmp0(type, "any") == 0)
183 return CONNMAN_SESSION_TYPE_ANY;
184 if (g_strcmp0(type, "local") == 0)
185 return CONNMAN_SESSION_TYPE_LOCAL;
186 else if (g_strcmp0(type, "internet") == 0)
187 return CONNMAN_SESSION_TYPE_INTERNET;
189 return CONNMAN_SESSION_TYPE_UNKNOWN;
192 static int bearer2service(const char *bearer, enum connman_service_type *type)
194 if (g_strcmp0(bearer, "ethernet") == 0)
195 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
196 else if (g_strcmp0(bearer, "wifi") == 0)
197 *type = CONNMAN_SERVICE_TYPE_WIFI;
198 else if (g_strcmp0(bearer, "wimax") == 0)
199 *type = CONNMAN_SERVICE_TYPE_WIMAX;
200 else if (g_strcmp0(bearer, "bluetooth") == 0)
201 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
202 else if (g_strcmp0(bearer, "cellular") == 0)
203 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
204 else if (g_strcmp0(bearer, "vpn") == 0)
205 *type = CONNMAN_SERVICE_TYPE_VPN;
206 else if (g_strcmp0(bearer, "*") == 0)
207 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
214 static char *service2bearer(enum connman_service_type type)
217 case CONNMAN_SERVICE_TYPE_ETHERNET:
219 case CONNMAN_SERVICE_TYPE_WIFI:
221 case CONNMAN_SERVICE_TYPE_WIMAX:
223 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
225 case CONNMAN_SERVICE_TYPE_CELLULAR:
227 case CONNMAN_SERVICE_TYPE_VPN:
229 case CONNMAN_SERVICE_TYPE_UNKNOWN:
230 case CONNMAN_SERVICE_TYPE_SYSTEM:
231 case CONNMAN_SERVICE_TYPE_GPS:
232 case CONNMAN_SERVICE_TYPE_GADGET:
239 static void destroy_policy_config(struct connman_session *session)
241 if (session->policy == NULL) {
242 g_free(session->policy_config);
246 (*session->policy->destroy)(session);
249 static void free_session(struct connman_session *session)
254 if (session->notify_watch > 0)
255 g_dbus_remove_watch(connection, session->notify_watch);
257 destroy_policy_config(session);
258 g_slist_free(session->info->config.allowed_bearers);
259 g_free(session->owner);
260 g_free(session->session_path);
261 g_free(session->notify_path);
262 g_free(session->info);
263 g_free(session->info_last);
268 static void cleanup_session(gpointer user_data)
270 struct connman_session *session = user_data;
271 struct session_info *info = session->info;
273 DBG("remove %s", session->session_path);
275 g_slist_free(session->user_allowed_bearers);
276 g_hash_table_destroy(session->service_hash);
277 g_sequence_free(session->service_list);
279 if (info->entry != NULL &&
280 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
281 __connman_service_disconnect(info->entry->service);
284 free_session(session);
287 static int assign_policy_plugin(struct connman_session *session)
289 if (session->policy != NULL)
292 if (policy_list == NULL)
295 session->policy = policy_list->data;
300 static int create_policy_config(struct connman_session *session,
301 connman_session_config_cb callback,
304 struct connman_session_config *config;
306 if (session->policy == NULL) {
307 config = connman_session_create_default_config();
311 session->policy_config = config;
316 return (*session->policy->create)(session, callback, user_data);
319 static void probe_policy(struct connman_session_policy *policy)
324 struct connman_session *session;
326 DBG("policy %p name %s", policy, policy->name);
328 g_hash_table_iter_init(&iter, session_hash);
330 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
333 if (session->policy != NULL)
336 assign_policy_plugin(session);
340 static void remove_policy(struct connman_session_policy *policy)
344 struct connman_session *session;
346 DBG("policy %p name %s", policy, policy->name);
348 g_hash_table_iter_init(&iter, session_hash);
350 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
353 if (session->policy != policy)
356 session->policy = NULL;
357 assign_policy_plugin(session);
361 static gint compare_priority(gconstpointer a, gconstpointer b)
363 const struct connman_session_policy *policy1 = a;
364 const struct connman_session_policy *policy2 = b;
366 return policy2->priority - policy1->priority;
370 int connman_session_policy_register(struct connman_session_policy *policy)
372 DBG("name %s", policy->name);
374 if (policy->create == NULL || policy->destroy == NULL)
377 policy_list = g_slist_insert_sorted(policy_list, policy,
380 probe_policy(policy);
385 void connman_session_policy_unregister(struct connman_session_policy *policy)
387 DBG("name %s", policy->name);
389 policy_list = g_slist_remove(policy_list, policy);
391 remove_policy(policy);
394 int connman_session_set_default_config(struct connman_session_config *config)
396 config->priority = FALSE;
397 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
398 config->type = CONNMAN_SESSION_TYPE_ANY;
399 config->ecall = FALSE;
401 g_slist_free(config->allowed_bearers);
402 config->allowed_bearers = g_slist_prepend(NULL,
403 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
404 if (config->allowed_bearers == NULL)
410 struct connman_session_config *connman_session_create_default_config(void)
412 struct connman_session_config *config;
414 config = g_try_new0(struct connman_session_config, 1);
418 if (connman_session_set_default_config(config) < 0) {
426 static enum connman_session_type apply_policy_on_type(
427 enum connman_session_type policy,
428 enum connman_session_type type)
430 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
431 return CONNMAN_SESSION_TYPE_UNKNOWN;
433 if (policy == CONNMAN_SESSION_TYPE_ANY)
436 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
437 return CONNMAN_SESSION_TYPE_LOCAL;
439 return CONNMAN_SESSION_TYPE_INTERNET;
442 int connman_session_parse_bearers(const char *token, GSList **list)
444 enum connman_service_type bearer;
447 if (g_strcmp0(token, "") == 0)
450 err = bearer2service(token, &bearer);
454 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
459 static int parse_bearers(DBusMessageIter *iter, GSList **list)
461 DBusMessageIter array;
464 dbus_message_iter_recurse(iter, &array);
468 while ((type = dbus_message_iter_get_arg_type(&array)) !=
470 char *bearer_name = NULL;
472 if (type != DBUS_TYPE_STRING) {
478 dbus_message_iter_get_basic(&array, &bearer_name);
480 err = connman_session_parse_bearers(bearer_name, list);
487 dbus_message_iter_next(&array);
493 static int filter_bearer(GSList *policy_bearers,
494 enum connman_service_type bearer,
497 enum connman_service_type policy;
500 if (policy_bearers == NULL)
503 for (it = policy_bearers; it != NULL; it = it->next) {
504 policy = GPOINTER_TO_INT(it->data);
506 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
511 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
522 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
527 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
530 enum connman_service_type bearer;
536 for (it = bearers; it != NULL; it = it->next) {
537 bearer = GPOINTER_TO_INT(it->data);
539 err = filter_bearer(policy_bearers, bearer, list);
547 const char *connman_session_get_owner(struct connman_session *session)
549 return session->owner;
552 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
554 struct session_info *info = user_data;
557 for (list = info->config.allowed_bearers;
558 list != NULL; list = list->next) {
559 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
560 const char *name = __connman_service_type2string(bearer);
565 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
570 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
572 struct connman_service *service = user_data;
573 struct connman_ipconfig *ipconfig_ipv4;
578 if (__connman_service_is_connected_state(service,
579 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
583 ipconfig_ipv4 = __connman_service_get_ip4config(service);
584 if (ipconfig_ipv4 == NULL)
587 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
590 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
592 struct connman_service *service = user_data;
593 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
598 if (__connman_service_is_connected_state(service,
599 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
603 ipconfig_ipv4 = __connman_service_get_ip4config(service);
604 ipconfig_ipv6 = __connman_service_get_ip6config(service);
605 if (ipconfig_ipv6 == NULL)
608 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
611 static void append_notify(DBusMessageIter *dict,
612 struct connman_session *session)
614 struct session_info *info = session->info;
615 struct session_info *info_last = session->info_last;
616 struct connman_service *service;
617 const char *name, *ifname, *bearer;
619 if (session->append_all == TRUE ||
620 info->state != info_last->state) {
621 const char *state = state2string(info->state);
623 connman_dbus_dict_append_basic(dict, "State",
626 info_last->state = info->state;
629 if (session->append_all == TRUE ||
630 info->entry != info_last->entry) {
631 if (info->entry == NULL) {
637 name = info->entry->name;
638 ifname = info->entry->ifname;
639 service = info->entry->service;
640 bearer = info->entry->bearer;
643 connman_dbus_dict_append_basic(dict, "Name",
647 connman_dbus_dict_append_dict(dict, "IPv4",
648 append_ipconfig_ipv4,
651 connman_dbus_dict_append_dict(dict, "IPv6",
652 append_ipconfig_ipv6,
655 connman_dbus_dict_append_basic(dict, "Interface",
659 connman_dbus_dict_append_basic(dict, "Bearer",
663 info_last->entry = info->entry;
666 if (session->append_all == TRUE ||
667 info->config.type != info_last->config.type) {
668 const char *type = type2string(info->config.type);
670 connman_dbus_dict_append_basic(dict, "ConnectionType",
673 info_last->config.type = info->config.type;
676 if (session->append_all == TRUE ||
677 info->config.allowed_bearers != info_last->config.allowed_bearers) {
678 connman_dbus_dict_append_array(dict, "AllowedBearers",
680 append_allowed_bearers,
682 info_last->config.allowed_bearers = info->config.allowed_bearers;
685 session->append_all = FALSE;
688 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
689 enum connman_session_type type)
692 case CONNMAN_SESSION_TYPE_UNKNOWN:
694 case CONNMAN_SESSION_TYPE_ANY:
696 case CONNMAN_SESSION_TYPE_LOCAL:
697 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
698 *state = CONNMAN_SESSION_STATE_CONNECTED;
703 case CONNMAN_SESSION_TYPE_INTERNET:
704 if (*state == CONNMAN_SESSION_STATE_ONLINE)
712 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
714 struct session_info *info_last = session->info_last;
715 struct session_info *info = session->info;
717 if (session->append_all == TRUE)
720 if (info->state != info_last->state)
723 if (info->entry != info_last->entry &&
724 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
727 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
728 info->config.type != info_last->config.type)
734 static gboolean session_notify(gpointer user_data)
736 struct connman_session *session = user_data;
738 DBusMessageIter array, dict;
740 if (compute_notifiable_changes(session) == FALSE)
743 DBG("session %p owner %s notify_path %s", session,
744 session->owner, session->notify_path);
746 msg = dbus_message_new_method_call(session->owner, session->notify_path,
747 CONNMAN_NOTIFICATION_INTERFACE,
752 dbus_message_iter_init_append(msg, &array);
753 connman_dbus_dict_open(&array, &dict);
755 append_notify(&dict, session);
757 connman_dbus_dict_close(&array, &dict);
759 g_dbus_send_message(connection, msg);
764 static void ipconfig_ipv4_changed(struct connman_session *session)
766 struct session_info *info = session->info;
768 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
769 "IPv4", append_ipconfig_ipv4,
770 info->entry->service);
773 static void ipconfig_ipv6_changed(struct connman_session *session)
775 struct session_info *info = session->info;
777 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
778 "IPv6", append_ipconfig_ipv6,
779 info->entry->service);
782 static connman_bool_t service_type_match(struct connman_session *session,
783 struct connman_service *service)
785 struct session_info *info = session->info;
788 for (list = info->config.allowed_bearers;
789 list != NULL; list = list->next) {
790 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
791 enum connman_service_type service_type;
793 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
796 service_type = connman_service_get_type(service);
797 if (bearer == service_type)
804 static connman_bool_t service_match(struct connman_session *session,
805 struct connman_service *service)
807 if (service_type_match(session, service) == FALSE)
813 static int service_type_weight(enum connman_service_type type)
816 * The session doesn't care which service
817 * to use. Nevertheless we have to sort them
818 * according their type. The ordering is
827 case CONNMAN_SERVICE_TYPE_ETHERNET:
829 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
831 case CONNMAN_SERVICE_TYPE_WIFI:
832 case CONNMAN_SERVICE_TYPE_WIMAX:
834 case CONNMAN_SERVICE_TYPE_CELLULAR:
836 case CONNMAN_SERVICE_TYPE_UNKNOWN:
837 case CONNMAN_SERVICE_TYPE_SYSTEM:
838 case CONNMAN_SERVICE_TYPE_GPS:
839 case CONNMAN_SERVICE_TYPE_VPN:
840 case CONNMAN_SERVICE_TYPE_GADGET:
847 static gint sort_allowed_bearers(struct connman_service *service_a,
848 struct connman_service *service_b,
849 struct connman_session *session)
851 struct session_info *info = session->info;
853 enum connman_service_type type_a, type_b;
854 int weight_a, weight_b;
856 type_a = connman_service_get_type(service_a);
857 type_b = connman_service_get_type(service_b);
859 for (list = info->config.allowed_bearers;
860 list != NULL; list = list->next) {
861 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
863 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
864 if (type_a != type_b) {
865 weight_a = service_type_weight(type_a);
866 weight_b = service_type_weight(type_b);
868 if (weight_a > weight_b)
871 if (weight_a < weight_b)
878 if (type_a == bearer && type_b == bearer)
881 if (type_a == bearer && type_b != bearer)
884 if (type_a != bearer && type_b == bearer)
891 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
893 struct service_entry *entry_a = (void *)a;
894 struct service_entry *entry_b = (void *)b;
895 struct connman_session *session = user_data;
897 return sort_allowed_bearers(entry_a->service, entry_b->service,
901 static enum connman_session_state service_to_session_state(enum connman_service_state state)
904 case CONNMAN_SERVICE_STATE_UNKNOWN:
905 case CONNMAN_SERVICE_STATE_IDLE:
906 case CONNMAN_SERVICE_STATE_ASSOCIATION:
907 case CONNMAN_SERVICE_STATE_CONFIGURATION:
908 case CONNMAN_SERVICE_STATE_DISCONNECT:
909 case CONNMAN_SERVICE_STATE_FAILURE:
911 case CONNMAN_SERVICE_STATE_READY:
912 return CONNMAN_SESSION_STATE_CONNECTED;
913 case CONNMAN_SERVICE_STATE_ONLINE:
914 return CONNMAN_SESSION_STATE_ONLINE;
917 return CONNMAN_SESSION_STATE_DISCONNECTED;
920 static connman_bool_t is_connected(enum connman_service_state state)
923 case CONNMAN_SERVICE_STATE_UNKNOWN:
924 case CONNMAN_SERVICE_STATE_IDLE:
925 case CONNMAN_SERVICE_STATE_ASSOCIATION:
926 case CONNMAN_SERVICE_STATE_CONFIGURATION:
927 case CONNMAN_SERVICE_STATE_DISCONNECT:
928 case CONNMAN_SERVICE_STATE_FAILURE:
930 case CONNMAN_SERVICE_STATE_READY:
931 case CONNMAN_SERVICE_STATE_ONLINE:
938 static connman_bool_t is_connecting(enum connman_service_state state)
941 case CONNMAN_SERVICE_STATE_UNKNOWN:
942 case CONNMAN_SERVICE_STATE_IDLE:
944 case CONNMAN_SERVICE_STATE_ASSOCIATION:
945 case CONNMAN_SERVICE_STATE_CONFIGURATION:
947 case CONNMAN_SERVICE_STATE_DISCONNECT:
948 case CONNMAN_SERVICE_STATE_FAILURE:
949 case CONNMAN_SERVICE_STATE_READY:
950 case CONNMAN_SERVICE_STATE_ONLINE:
957 static connman_bool_t explicit_connect(enum connman_session_reason reason)
960 case CONNMAN_SESSION_REASON_UNKNOWN:
961 case CONNMAN_SESSION_REASON_FREE_RIDE:
963 case CONNMAN_SESSION_REASON_CONNECT:
970 static connman_bool_t explicit_disconnect(struct session_info *info)
972 if (info->entry == NULL)
975 DBG("reason %s service %p state %d",
976 reason2string(info->entry->reason),
977 info->entry->service, info->entry->state);
979 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
982 if (explicit_connect(info->entry->reason) == FALSE)
985 if (__connman_service_session_dec(info->entry->service) == FALSE)
991 struct pending_data {
992 unsigned int timeout;
993 struct service_entry *entry;
994 gboolean (*cb)(gpointer);
997 static void pending_timeout_free(gpointer data, gpointer user_data)
999 struct pending_data *pending = data;
1001 DBG("pending %p timeout %d", pending, pending->timeout);
1002 g_source_remove(pending->timeout);
1006 static void pending_timeout_remove_all(struct service_entry *entry)
1010 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1011 g_slist_free(entry->pending_timeouts);
1012 entry->pending_timeouts = NULL;
1015 static gboolean pending_timeout_cb(gpointer data)
1017 struct pending_data *pending = data;
1018 struct service_entry *entry = pending->entry;
1021 DBG("pending %p timeout %d", pending, pending->timeout);
1023 ret = pending->cb(pending->entry);
1025 entry->pending_timeouts =
1026 g_slist_remove(entry->pending_timeouts,
1033 static connman_bool_t pending_timeout_add(unsigned int seconds,
1034 gboolean (*cb)(gpointer),
1035 struct service_entry *entry)
1037 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1039 if (pending == NULL || cb == NULL || entry == NULL) {
1045 pending->entry = entry;
1046 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1048 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1051 DBG("pending %p entry %p timeout id %d", pending, entry,
1057 static gboolean call_disconnect(gpointer user_data)
1059 struct service_entry *entry = user_data;
1060 struct connman_service *service = entry->service;
1063 * TODO: We should mark this entry as pending work. In case
1064 * disconnect fails we just unassign this session from the
1065 * service and can't do anything later on it
1067 DBG("disconnect service %p", service);
1068 __connman_service_disconnect(service);
1073 static gboolean call_connect(gpointer user_data)
1075 struct service_entry *entry = user_data;
1076 struct connman_service *service = entry->service;
1078 DBG("connect service %p", service);
1079 __connman_service_connect(service);
1084 static void deselect_service(struct session_info *info)
1086 struct service_entry *entry;
1087 connman_bool_t disconnect, connected;
1091 if (info->entry == NULL)
1094 disconnect = explicit_disconnect(info);
1096 connected = is_connecting(info->entry->state) == TRUE ||
1097 is_connected(info->entry->state) == TRUE;
1099 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1100 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1102 entry = info->entry;
1105 DBG("disconnect %d connected %d", disconnect, connected);
1107 if (disconnect == TRUE && connected == TRUE)
1108 pending_timeout_add(0, call_disconnect, entry);
1111 static void deselect_and_disconnect(struct connman_session *session)
1113 struct session_info *info = session->info;
1115 deselect_service(info);
1117 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1120 static void select_connected_service(struct session_info *info,
1121 struct service_entry *entry)
1123 enum connman_session_state state;
1125 state = service_to_session_state(entry->state);
1126 if (is_type_matching_state(&state, info->config.type) == FALSE)
1129 info->state = state;
1131 info->entry = entry;
1132 info->entry->reason = info->reason;
1134 if (explicit_connect(info->reason) == FALSE)
1137 __connman_service_session_inc(info->entry->service);
1140 static void select_offline_service(struct session_info *info,
1141 struct service_entry *entry)
1143 if (explicit_connect(info->reason) == FALSE)
1146 info->state = service_to_session_state(entry->state);
1148 info->entry = entry;
1149 info->entry->reason = info->reason;
1151 __connman_service_session_inc(info->entry->service);
1152 pending_timeout_add(0, call_connect, entry);
1155 static void select_service(struct session_info *info,
1156 struct service_entry *entry)
1158 DBG("service %p", entry->service);
1160 if (is_connected(entry->state) == TRUE)
1161 select_connected_service(info, entry);
1163 select_offline_service(info, entry);
1166 static void select_and_connect(struct connman_session *session,
1167 enum connman_session_reason reason)
1169 struct session_info *info = session->info;
1170 struct service_entry *entry = NULL;
1171 GSequenceIter *iter;
1173 DBG("session %p reason %s", session, reason2string(reason));
1175 info->reason = reason;
1177 iter = g_sequence_get_begin_iter(session->service_list);
1179 while (g_sequence_iter_is_end(iter) == FALSE) {
1180 entry = g_sequence_get(iter);
1182 switch (entry->state) {
1183 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1184 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1185 case CONNMAN_SERVICE_STATE_READY:
1186 case CONNMAN_SERVICE_STATE_ONLINE:
1187 case CONNMAN_SERVICE_STATE_IDLE:
1188 case CONNMAN_SERVICE_STATE_DISCONNECT:
1189 select_service(info, entry);
1191 case CONNMAN_SERVICE_STATE_UNKNOWN:
1192 case CONNMAN_SERVICE_STATE_FAILURE:
1196 iter = g_sequence_iter_next(iter);
1200 static struct service_entry *create_service_entry(struct connman_service *service,
1202 enum connman_service_state state)
1204 struct service_entry *entry;
1205 enum connman_service_type type;
1208 entry = g_try_new0(struct service_entry, 1);
1212 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1213 entry->state = state;
1218 entry->service = service;
1220 idx = __connman_service_get_index(entry->service);
1221 entry->ifname = connman_inet_ifname(idx);
1222 if (entry->ifname == NULL)
1223 entry->ifname = g_strdup("");
1225 type = connman_service_get_type(entry->service);
1226 entry->bearer = service2bearer(type);
1231 static void destroy_service_entry(gpointer data)
1233 struct service_entry *entry = data;
1235 pending_timeout_remove_all(entry);
1236 g_free(entry->ifname);
1241 static void populate_service_list(struct connman_session *session)
1243 struct service_entry *entry;
1244 GSequenceIter *iter;
1246 session->service_hash =
1247 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1249 session->service_list = __connman_service_get_list(session,
1251 create_service_entry,
1252 destroy_service_entry);
1254 g_sequence_sort(session->service_list, sort_services, session);
1256 iter = g_sequence_get_begin_iter(session->service_list);
1258 while (g_sequence_iter_is_end(iter) == FALSE) {
1259 entry = g_sequence_get(iter);
1261 DBG("service %p type %s name %s", entry->service,
1262 service2bearer(connman_service_get_type(entry->service)),
1265 g_hash_table_replace(session->service_hash,
1266 entry->service, iter);
1268 iter = g_sequence_iter_next(iter);
1272 static void session_changed(struct connman_session *session,
1273 enum connman_session_trigger trigger)
1275 struct session_info *info = session->info;
1276 struct session_info *info_last = session->info_last;
1277 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1278 GSequence *service_list_last;
1279 GHashTable *service_hash_last;
1282 * TODO: This only a placeholder for the 'real' algorithm to
1283 * play a bit around. So we are going to improve it step by step.
1286 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1287 reason2string(info->reason));
1289 if (info->entry != NULL) {
1290 enum connman_session_state state;
1292 state = service_to_session_state(info->entry->state);
1294 if (is_type_matching_state(&state, info->config.type) == TRUE)
1295 info->state = state;
1299 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1300 DBG("ignore session changed event");
1302 case CONNMAN_SESSION_TRIGGER_SETTING:
1303 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1305 service_hash_last = session->service_hash;
1306 service_list_last = session->service_list;
1308 populate_service_list(session);
1310 if (info->entry != NULL) {
1311 service_iter_last = g_hash_table_lookup(
1313 info->entry->service);
1314 service_iter = g_hash_table_lookup(
1315 session->service_hash,
1316 info->entry->service);
1319 if (service_iter == NULL && service_iter_last != NULL) {
1321 * The currently selected service is
1322 * not part of this session anymore.
1324 deselect_and_disconnect(session);
1327 g_hash_table_remove_all(service_hash_last);
1328 g_sequence_free(service_list_last);
1331 if (info->config.type != info_last->config.type) {
1332 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1333 is_type_matching_state(&info->state,
1334 info->config.type) == FALSE)
1335 deselect_and_disconnect(session);
1338 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1339 select_and_connect(session,
1340 CONNMAN_SESSION_REASON_FREE_RIDE);
1344 case CONNMAN_SESSION_TRIGGER_ECALL:
1346 * For the time beeing we fallback to normal connect
1349 case CONNMAN_SESSION_TRIGGER_CONNECT:
1350 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1351 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1353 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1354 __connman_service_session_inc(info->entry->service);
1358 if (info->entry != NULL &&
1359 is_connecting(info->entry->state) == TRUE) {
1363 select_and_connect(session,
1364 CONNMAN_SESSION_REASON_CONNECT);
1367 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1368 deselect_and_disconnect(session);
1371 case CONNMAN_SESSION_TRIGGER_SERVICE:
1372 if (info->entry != NULL &&
1373 (is_connecting(info->entry->state) == TRUE ||
1374 is_connected(info->entry->state) == TRUE)) {
1378 deselect_and_disconnect(session);
1380 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1381 select_and_connect(session, info->reason);
1387 session_notify(session);
1390 int connman_session_config_update(struct connman_session *session)
1392 struct session_info *info = session->info;
1393 GSList *allowed_bearers;
1396 DBG("session %p", session);
1399 * We update all configuration even though only one entry
1400 * might have changed. We can still optimize this later.
1403 err = apply_policy_on_bearers(
1404 session->policy_config->allowed_bearers,
1405 session->user_allowed_bearers,
1410 g_slist_free(info->config.allowed_bearers);
1411 info->config.allowed_bearers = allowed_bearers;
1413 info->config.type = apply_policy_on_type(
1414 session->policy_config->type,
1417 info->config.roaming_policy = session->policy_config->roaming_policy;
1419 info->config.ecall = session->policy_config->ecall;
1420 if (info->config.ecall == TRUE)
1421 ecall_session = session;
1423 info->config.priority = session->policy_config->priority;
1425 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1430 static DBusMessage *connect_session(DBusConnection *conn,
1431 DBusMessage *msg, void *user_data)
1433 struct connman_session *session = user_data;
1435 DBG("session %p", session);
1437 if (ecall_session != NULL) {
1438 if (ecall_session->ecall == TRUE && ecall_session != session)
1439 return __connman_error_failed(msg, EBUSY);
1441 session->ecall = TRUE;
1442 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1444 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1446 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1449 static DBusMessage *disconnect_session(DBusConnection *conn,
1450 DBusMessage *msg, void *user_data)
1452 struct connman_session *session = user_data;
1454 DBG("session %p", session);
1456 if (ecall_session != NULL) {
1457 if (ecall_session->ecall == TRUE && ecall_session != session)
1458 return __connman_error_failed(msg, EBUSY);
1460 session->ecall = FALSE;
1463 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1465 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1468 static DBusMessage *change_session(DBusConnection *conn,
1469 DBusMessage *msg, void *user_data)
1471 struct connman_session *session = user_data;
1472 struct session_info *info = session->info;
1473 DBusMessageIter iter, value;
1476 GSList *allowed_bearers;
1479 DBG("session %p", session);
1480 if (dbus_message_iter_init(msg, &iter) == FALSE)
1481 return __connman_error_invalid_arguments(msg);
1483 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1484 return __connman_error_invalid_arguments(msg);
1486 dbus_message_iter_get_basic(&iter, &name);
1487 dbus_message_iter_next(&iter);
1489 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1490 return __connman_error_invalid_arguments(msg);
1492 dbus_message_iter_recurse(&iter, &value);
1494 switch (dbus_message_iter_get_arg_type(&value)) {
1495 case DBUS_TYPE_ARRAY:
1496 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1497 err = parse_bearers(&value, &allowed_bearers);
1499 return __connman_error_failed(msg, err);
1501 g_slist_free(info->config.allowed_bearers);
1502 session->user_allowed_bearers = allowed_bearers;
1504 err = apply_policy_on_bearers(
1505 session->policy_config->allowed_bearers,
1506 session->user_allowed_bearers,
1507 &info->config.allowed_bearers);
1510 return __connman_error_failed(msg, err);
1515 case DBUS_TYPE_STRING:
1516 if (g_str_equal(name, "ConnectionType") == TRUE) {
1517 dbus_message_iter_get_basic(&value, &val);
1518 info->config.type = apply_policy_on_type(
1519 session->policy_config->type,
1520 connman_session_parse_connection_type(val));
1529 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1531 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1534 return __connman_error_invalid_arguments(msg);
1537 static void release_session(gpointer key, gpointer value, gpointer user_data)
1539 struct connman_session *session = value;
1540 DBusMessage *message;
1542 DBG("owner %s path %s", session->owner, session->notify_path);
1544 if (session->notify_watch > 0)
1545 g_dbus_remove_watch(connection, session->notify_watch);
1547 g_dbus_unregister_interface(connection, session->session_path,
1548 CONNMAN_SESSION_INTERFACE);
1550 message = dbus_message_new_method_call(session->owner,
1551 session->notify_path,
1552 CONNMAN_NOTIFICATION_INTERFACE,
1554 if (message == NULL)
1557 dbus_message_set_no_reply(message, TRUE);
1559 g_dbus_send_message(connection, message);
1562 static int session_disconnect(struct connman_session *session)
1564 DBG("session %p, %s", session, session->owner);
1566 if (session->notify_watch > 0)
1567 g_dbus_remove_watch(connection, session->notify_watch);
1569 g_dbus_unregister_interface(connection, session->session_path,
1570 CONNMAN_SESSION_INTERFACE);
1572 deselect_and_disconnect(session);
1574 g_hash_table_remove(session_hash, session->session_path);
1579 static void owner_disconnect(DBusConnection *conn, void *user_data)
1581 struct connman_session *session = user_data;
1583 DBG("session %p, %s died", session, session->owner);
1585 session_disconnect(session);
1588 static DBusMessage *destroy_session(DBusConnection *conn,
1589 DBusMessage *msg, void *user_data)
1591 struct connman_session *session = user_data;
1593 DBG("session %p", session);
1595 if (ecall_session != NULL && ecall_session != session)
1596 return __connman_error_failed(msg, EBUSY);
1598 session_disconnect(session);
1600 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1603 static const GDBusMethodTable session_methods[] = {
1604 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1605 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1606 { GDBUS_METHOD("Disconnect", NULL, NULL,
1607 disconnect_session ) },
1608 { GDBUS_METHOD("Change",
1609 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1610 NULL, change_session) },
1614 struct user_config {
1615 DBusMessage *pending;
1617 enum connman_session_type type;
1618 GSList *allowed_bearers;
1621 static int session_create_cb(struct connman_session *session,
1622 struct connman_session_config *config,
1623 void *user_data, int err)
1626 struct user_config *user_config = user_data;
1627 struct session_info *info, *info_last;
1629 DBG("session %p config %p", session, config);
1634 session->policy_config = config;
1636 info = session->info;
1637 info_last = session->info_last;
1639 if (session->policy_config->ecall == TRUE)
1640 ecall_session = session;
1642 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1643 info->config.type = apply_policy_on_type(
1644 session->policy_config->type,
1646 info->config.priority = session->policy_config->priority;
1647 info->config.roaming_policy = session->policy_config->roaming_policy;
1650 session->user_allowed_bearers = user_config->allowed_bearers;
1652 err = apply_policy_on_bearers(
1653 session->policy_config->allowed_bearers,
1654 session->user_allowed_bearers,
1655 &info->config.allowed_bearers);
1659 g_hash_table_replace(session_hash, session->session_path, session);
1661 DBG("add %s", session->session_path);
1663 if (g_dbus_register_interface(connection, session->session_path,
1664 CONNMAN_SESSION_INTERFACE,
1665 session_methods, NULL,
1666 NULL, session, NULL) == FALSE) {
1667 connman_error("Failed to register %s", session->session_path);
1668 g_hash_table_remove(session_hash, session->session_path);
1673 reply = g_dbus_create_reply(user_config->pending,
1674 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1676 g_dbus_send_message(connection, reply);
1678 populate_service_list(session);
1680 info_last->state = info->state;
1681 info_last->config.priority = info->config.priority;
1682 info_last->config.roaming_policy = info->config.roaming_policy;
1683 info_last->entry = info->entry;
1684 info_last->config.allowed_bearers = info->config.allowed_bearers;
1686 session->append_all = TRUE;
1688 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1692 reply = __connman_error_failed(user_config->pending, -err);
1693 g_dbus_send_message(connection, reply);
1695 free_session(session);
1698 g_free(user_config);
1703 int __connman_session_create(DBusMessage *msg)
1705 const char *owner, *notify_path;
1706 char *session_path = NULL;
1707 DBusMessageIter iter, array;
1708 struct connman_session *session = NULL;
1709 struct user_config *user_config = NULL;
1710 connman_bool_t user_allowed_bearers = FALSE;
1711 connman_bool_t user_connection_type = FALSE;
1714 owner = dbus_message_get_sender(msg);
1716 DBG("owner %s", owner);
1718 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1720 * If there is an emergency call already going on,
1721 * ignore session creation attempt
1727 user_config = g_try_new0(struct user_config, 1);
1728 if (user_config == NULL) {
1733 user_config->pending = dbus_message_ref(msg);
1735 dbus_message_iter_init(msg, &iter);
1736 dbus_message_iter_recurse(&iter, &array);
1738 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1739 DBusMessageIter entry, value;
1740 const char *key, *val;
1742 dbus_message_iter_recurse(&array, &entry);
1743 dbus_message_iter_get_basic(&entry, &key);
1745 dbus_message_iter_next(&entry);
1746 dbus_message_iter_recurse(&entry, &value);
1748 switch (dbus_message_iter_get_arg_type(&value)) {
1749 case DBUS_TYPE_ARRAY:
1750 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1751 err = parse_bearers(&value,
1752 &user_config->allowed_bearers);
1756 user_allowed_bearers = TRUE;
1762 case DBUS_TYPE_STRING:
1763 if (g_str_equal(key, "ConnectionType") == TRUE) {
1764 dbus_message_iter_get_basic(&value, &val);
1766 connman_session_parse_connection_type(val);
1768 user_connection_type = TRUE;
1774 dbus_message_iter_next(&array);
1778 * If the user hasn't provided a configuration, we set
1779 * the default configuration.
1781 * For AllowedBearers this is '*', ...
1783 if (user_allowed_bearers == FALSE) {
1784 user_config->allowed_bearers =
1785 g_slist_append(NULL,
1786 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1787 if (user_config->allowed_bearers == NULL) {
1793 /* ... and for ConnectionType it is 'any'. */
1794 if (user_connection_type == FALSE)
1795 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1797 dbus_message_iter_next(&iter);
1798 dbus_message_iter_get_basic(&iter, ¬ify_path);
1800 if (notify_path == NULL) {
1805 session_path = g_strdup_printf("/sessions%s", notify_path);
1806 if (session_path == NULL) {
1811 session = g_hash_table_lookup(session_hash, session_path);
1812 if (session != NULL) {
1813 g_free(session_path);
1819 session = g_try_new0(struct connman_session, 1);
1820 if (session == NULL) {
1821 g_free(session_path);
1826 session->session_path = session_path;
1828 session->info = g_try_new0(struct session_info, 1);
1829 if (session->info == NULL) {
1834 session->info_last = g_try_new0(struct session_info, 1);
1835 if (session->info_last == NULL) {
1840 session->owner = g_strdup(owner);
1841 session->notify_path = g_strdup(notify_path);
1842 session->notify_watch =
1843 g_dbus_add_disconnect_watch(connection, session->owner,
1844 owner_disconnect, session, NULL);
1846 err = assign_policy_plugin(session);
1850 err = create_policy_config(session, session_create_cb, user_config);
1854 return -EINPROGRESS;
1857 connman_error("Failed to create session");
1859 free_session(session);
1861 if (user_config != NULL) {
1862 dbus_message_unref(user_config->pending);
1863 g_slist_free(user_config->allowed_bearers);
1864 g_free(user_config);
1869 void connman_session_destroy(struct connman_session *session)
1871 DBG("session %p", session);
1873 session_disconnect(session);
1876 int __connman_session_destroy(DBusMessage *msg)
1878 const char *owner, *session_path;
1879 struct connman_session *session;
1881 owner = dbus_message_get_sender(msg);
1883 DBG("owner %s", owner);
1885 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1887 if (session_path == NULL)
1890 session = g_hash_table_lookup(session_hash, session_path);
1891 if (session == NULL)
1894 if (g_strcmp0(owner, session->owner) != 0)
1897 connman_session_destroy(session);
1902 connman_bool_t __connman_session_mode()
1907 void __connman_session_set_mode(connman_bool_t enable)
1909 DBG("enable %d", enable);
1911 if (sessionmode != enable) {
1912 sessionmode = enable;
1914 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1915 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1916 DBUS_TYPE_BOOLEAN, &sessionmode);
1919 if (sessionmode == TRUE)
1920 __connman_service_disconnect_all();
1923 static void service_add(struct connman_service *service,
1926 GHashTableIter iter;
1927 GSequenceIter *iter_service_list;
1928 gpointer key, value;
1929 struct connman_session *session;
1930 struct service_entry *entry;
1932 DBG("service %p", service);
1934 g_hash_table_iter_init(&iter, session_hash);
1936 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1939 if (service_match(session, service) == FALSE)
1942 entry = create_service_entry(service, name,
1943 CONNMAN_SERVICE_STATE_IDLE);
1948 g_sequence_insert_sorted(session->service_list,
1949 entry, sort_services,
1952 g_hash_table_replace(session->service_hash, service,
1955 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1959 static void service_remove(struct connman_service *service)
1962 GHashTableIter iter;
1963 gpointer key, value;
1964 struct connman_session *session;
1965 struct session_info *info;
1967 DBG("service %p", service);
1969 g_hash_table_iter_init(&iter, session_hash);
1971 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1972 GSequenceIter *seq_iter;
1974 info = session->info;
1976 seq_iter = g_hash_table_lookup(session->service_hash, service);
1977 if (seq_iter == NULL)
1980 g_sequence_remove(seq_iter);
1982 if (info->entry != NULL && info->entry->service == service)
1984 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1988 static void service_state_changed(struct connman_service *service,
1989 enum connman_service_state state)
1991 GHashTableIter iter;
1992 gpointer key, value;
1994 DBG("service %p state %d", service, state);
1996 g_hash_table_iter_init(&iter, session_hash);
1998 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1999 struct connman_session *session = value;
2000 GSequenceIter *service_iter;
2002 service_iter = g_hash_table_lookup(session->service_hash, service);
2003 if (service_iter != NULL) {
2004 struct service_entry *entry;
2006 entry = g_sequence_get(service_iter);
2007 entry->state = state;
2010 session_changed(session,
2011 CONNMAN_SESSION_TRIGGER_SERVICE);
2015 static void ipconfig_changed(struct connman_service *service,
2016 struct connman_ipconfig *ipconfig)
2018 GHashTableIter iter;
2019 gpointer key, value;
2020 struct connman_session *session;
2021 struct session_info *info;
2022 enum connman_ipconfig_type type;
2024 DBG("service %p ipconfig %p", service, ipconfig);
2026 type = __connman_ipconfig_get_config_type(ipconfig);
2028 g_hash_table_iter_init(&iter, session_hash);
2030 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2032 info = session->info;
2034 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2037 if (info->entry != NULL && info->entry->service == service) {
2038 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2039 ipconfig_ipv4_changed(session);
2040 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2041 ipconfig_ipv6_changed(session);
2046 static struct connman_notifier session_notifier = {
2048 .service_add = service_add,
2049 .service_remove = service_remove,
2050 .service_state_changed = service_state_changed,
2051 .ipconfig_changed = ipconfig_changed,
2054 int __connman_session_init(void)
2060 connection = connman_dbus_get_connection();
2061 if (connection == NULL)
2064 err = connman_notifier_register(&session_notifier);
2066 dbus_connection_unref(connection);
2070 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2071 NULL, cleanup_session);
2073 sessionmode = FALSE;
2077 void __connman_session_cleanup(void)
2081 if (connection == NULL)
2084 connman_notifier_unregister(&session_notifier);
2086 g_hash_table_foreach(session_hash, release_session, NULL);
2087 g_hash_table_destroy(session_hash);
2088 session_hash = NULL;
2090 dbus_connection_unref(connection);