5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 struct connman_session *session;
64 /* track why this service was selected */
65 enum connman_session_reason reason;
66 enum connman_service_state state;
68 struct connman_service *service;
71 GSList *pending_timeouts;
75 struct connman_session_config config;
76 enum connman_session_state state;
77 struct service_entry *entry;
78 enum connman_session_reason reason;
81 struct connman_session {
87 struct connman_session_policy *policy;
89 connman_bool_t append_all;
90 struct session_info *info;
91 struct session_info *info_last;
92 struct connman_session_config *policy_config;
93 GSList *user_allowed_bearers;
97 GSequence *service_list;
98 GHashTable *service_hash;
101 static const char *trigger2string(enum connman_session_trigger trigger)
104 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
106 case CONNMAN_SESSION_TRIGGER_SETTING:
108 case CONNMAN_SESSION_TRIGGER_CONNECT:
110 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
112 case CONNMAN_SESSION_TRIGGER_SERVICE:
114 case CONNMAN_SESSION_TRIGGER_ECALL:
121 static const char *reason2string(enum connman_session_reason reason)
124 case CONNMAN_SESSION_REASON_UNKNOWN:
126 case CONNMAN_SESSION_REASON_CONNECT:
128 case CONNMAN_SESSION_REASON_FREE_RIDE:
135 static const char *state2string(enum connman_session_state state)
138 case CONNMAN_SESSION_STATE_DISCONNECTED:
139 return "disconnected";
140 case CONNMAN_SESSION_STATE_CONNECTED:
142 case CONNMAN_SESSION_STATE_ONLINE:
149 static const char *type2string(enum connman_session_type type)
152 case CONNMAN_SESSION_TYPE_UNKNOWN:
154 case CONNMAN_SESSION_TYPE_ANY:
156 case CONNMAN_SESSION_TYPE_LOCAL:
158 case CONNMAN_SESSION_TYPE_INTERNET:
165 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
167 if (g_strcmp0(policy, "default") == 0)
168 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
169 else if (g_strcmp0(policy, "always") == 0)
170 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
171 else if (g_strcmp0(policy, "forbidden") == 0)
172 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
173 else if (g_strcmp0(policy, "national") == 0)
174 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
175 else if (g_strcmp0(policy, "international") == 0)
176 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
178 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
181 enum connman_session_type connman_session_parse_connection_type(const char *type)
183 if (g_strcmp0(type, "any") == 0)
184 return CONNMAN_SESSION_TYPE_ANY;
185 if (g_strcmp0(type, "local") == 0)
186 return CONNMAN_SESSION_TYPE_LOCAL;
187 else if (g_strcmp0(type, "internet") == 0)
188 return CONNMAN_SESSION_TYPE_INTERNET;
190 return CONNMAN_SESSION_TYPE_UNKNOWN;
193 static int bearer2service(const char *bearer, enum connman_service_type *type)
195 if (g_strcmp0(bearer, "ethernet") == 0)
196 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
197 else if (g_strcmp0(bearer, "wifi") == 0)
198 *type = CONNMAN_SERVICE_TYPE_WIFI;
199 else if (g_strcmp0(bearer, "bluetooth") == 0)
200 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
201 else if (g_strcmp0(bearer, "cellular") == 0)
202 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
203 else if (g_strcmp0(bearer, "vpn") == 0)
204 *type = CONNMAN_SERVICE_TYPE_VPN;
205 else if (g_strcmp0(bearer, "*") == 0)
206 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
213 static char *service2bearer(enum connman_service_type type)
216 case CONNMAN_SERVICE_TYPE_ETHERNET:
218 case CONNMAN_SERVICE_TYPE_WIFI:
220 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
222 case CONNMAN_SERVICE_TYPE_CELLULAR:
224 case CONNMAN_SERVICE_TYPE_VPN:
226 case CONNMAN_SERVICE_TYPE_UNKNOWN:
228 case CONNMAN_SERVICE_TYPE_SYSTEM:
229 case CONNMAN_SERVICE_TYPE_GPS:
230 case CONNMAN_SERVICE_TYPE_GADGET:
237 static void destroy_policy_config(struct connman_session *session)
239 if (session->policy == NULL) {
240 g_free(session->policy_config);
244 (*session->policy->destroy)(session);
247 static void free_session(struct connman_session *session)
252 if (session->notify_watch > 0)
253 g_dbus_remove_watch(connection, session->notify_watch);
255 destroy_policy_config(session);
256 g_slist_free(session->info->config.allowed_bearers);
257 g_free(session->owner);
258 g_free(session->session_path);
259 g_free(session->notify_path);
260 g_free(session->info);
261 g_free(session->info_last);
266 static void cleanup_session(gpointer user_data)
268 struct connman_session *session = user_data;
269 struct session_info *info = session->info;
271 DBG("remove %s", session->session_path);
273 g_slist_free(session->user_allowed_bearers);
274 g_hash_table_destroy(session->service_hash);
275 g_sequence_free(session->service_list);
277 if (info->entry != NULL &&
278 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
279 __connman_service_disconnect(info->entry->service);
282 free_session(session);
285 static int assign_policy_plugin(struct connman_session *session)
287 if (session->policy != NULL)
290 if (policy_list == NULL)
293 session->policy = policy_list->data;
299 DBusMessage *pending;
301 enum connman_session_type type;
302 GSList *allowed_bearers;
305 static void cleanup_user_config(struct user_config *user_config)
307 if (user_config == NULL)
310 if (user_config->pending != NULL)
311 dbus_message_unref(user_config->pending);
313 g_slist_free(user_config->allowed_bearers);
317 static int create_policy_config(struct connman_session *session,
318 connman_session_config_func_t cb,
319 struct user_config *user_config)
321 struct connman_session_config *config;
323 if (session->policy == NULL) {
324 config = connman_session_create_default_config();
325 if (config == NULL) {
326 free_session(session);
327 cleanup_user_config(user_config);
331 return cb(session, config, user_config, 0);
334 return (*session->policy->create)(session, cb, user_config);
337 static void probe_policy(struct connman_session_policy *policy)
342 struct connman_session *session;
344 DBG("policy %p name %s", policy, policy->name);
346 g_hash_table_iter_init(&iter, session_hash);
348 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
351 if (session->policy != NULL)
354 assign_policy_plugin(session);
358 static void remove_policy(struct connman_session_policy *policy)
362 struct connman_session *session;
364 if (session_hash == NULL)
367 DBG("policy %p name %s", policy, policy->name);
369 g_hash_table_iter_init(&iter, session_hash);
371 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
374 if (session->policy != policy)
377 session->policy = NULL;
378 assign_policy_plugin(session);
382 static gint compare_priority(gconstpointer a, gconstpointer b)
384 const struct connman_session_policy *policy1 = a;
385 const struct connman_session_policy *policy2 = b;
387 return policy2->priority - policy1->priority;
391 int connman_session_policy_register(struct connman_session_policy *policy)
393 DBG("name %s", policy->name);
395 if (policy->create == NULL || policy->destroy == NULL)
398 policy_list = g_slist_insert_sorted(policy_list, policy,
401 probe_policy(policy);
406 void connman_session_policy_unregister(struct connman_session_policy *policy)
408 DBG("name %s", policy->name);
410 policy_list = g_slist_remove(policy_list, policy);
412 remove_policy(policy);
415 void connman_session_set_default_config(struct connman_session_config *config)
417 config->id_type = CONNMAN_SESSION_ID_TYPE_UNKNOWN;
421 config->priority = FALSE;
422 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
423 config->type = CONNMAN_SESSION_TYPE_ANY;
424 config->ecall = FALSE;
426 g_slist_free(config->allowed_bearers);
427 config->allowed_bearers = g_slist_prepend(NULL,
428 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
431 struct connman_session_config *connman_session_create_default_config(void)
433 struct connman_session_config *config;
435 config = g_new0(struct connman_session_config, 1);
436 connman_session_set_default_config(config);
441 static enum connman_session_type apply_policy_on_type(
442 enum connman_session_type policy,
443 enum connman_session_type type)
445 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
446 return CONNMAN_SESSION_TYPE_UNKNOWN;
448 if (policy == CONNMAN_SESSION_TYPE_ANY)
451 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
452 return CONNMAN_SESSION_TYPE_LOCAL;
454 return CONNMAN_SESSION_TYPE_INTERNET;
457 int connman_session_parse_bearers(const char *token, GSList **list)
459 enum connman_service_type bearer;
462 if (g_strcmp0(token, "") == 0)
465 err = bearer2service(token, &bearer);
469 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
474 static int parse_bearers(DBusMessageIter *iter, GSList **list)
476 DBusMessageIter array;
479 dbus_message_iter_recurse(iter, &array);
483 while ((type = dbus_message_iter_get_arg_type(&array)) !=
485 char *bearer_name = NULL;
487 if (type != DBUS_TYPE_STRING) {
493 dbus_message_iter_get_basic(&array, &bearer_name);
495 err = connman_session_parse_bearers(bearer_name, list);
502 dbus_message_iter_next(&array);
508 static int filter_bearer(GSList *policy_bearers,
509 enum connman_service_type bearer,
512 enum connman_service_type policy;
515 if (policy_bearers == NULL)
518 for (it = policy_bearers; it != NULL; it = it->next) {
519 policy = GPOINTER_TO_INT(it->data);
521 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
526 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
537 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
542 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
545 enum connman_service_type bearer;
551 for (it = bearers; it != NULL; it = it->next) {
552 bearer = GPOINTER_TO_INT(it->data);
554 err = filter_bearer(policy_bearers, bearer, list);
562 const char *connman_session_get_owner(struct connman_session *session)
564 return session->owner;
567 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
569 struct session_info *info = user_data;
572 for (list = info->config.allowed_bearers;
573 list != NULL; list = list->next) {
574 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
575 const char *name = __connman_service_type2string(bearer);
580 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
585 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
587 struct connman_service *service = user_data;
588 struct connman_ipconfig *ipconfig_ipv4;
593 if (__connman_service_is_connected_state(service,
594 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
598 ipconfig_ipv4 = __connman_service_get_ip4config(service);
599 if (ipconfig_ipv4 == NULL)
602 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
605 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
607 struct connman_service *service = user_data;
608 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
613 if (__connman_service_is_connected_state(service,
614 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
618 ipconfig_ipv4 = __connman_service_get_ip4config(service);
619 ipconfig_ipv6 = __connman_service_get_ip6config(service);
620 if (ipconfig_ipv6 == NULL)
623 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
626 static void append_notify(DBusMessageIter *dict,
627 struct connman_session *session)
629 struct session_info *info = session->info;
630 struct session_info *info_last = session->info_last;
631 struct connman_service *service;
632 const char *name, *ifname, *bearer;
634 if (session->append_all == TRUE ||
635 info->state != info_last->state) {
636 const char *state = state2string(info->state);
638 connman_dbus_dict_append_basic(dict, "State",
641 info_last->state = info->state;
644 if (session->append_all == TRUE ||
645 info->entry != info_last->entry) {
646 if (info->entry == NULL) {
652 name = info->entry->name;
653 ifname = info->entry->ifname;
654 service = info->entry->service;
655 bearer = info->entry->bearer;
658 connman_dbus_dict_append_basic(dict, "Name",
662 connman_dbus_dict_append_dict(dict, "IPv4",
663 append_ipconfig_ipv4,
666 connman_dbus_dict_append_dict(dict, "IPv6",
667 append_ipconfig_ipv6,
670 connman_dbus_dict_append_basic(dict, "Interface",
674 connman_dbus_dict_append_basic(dict, "Bearer",
678 info_last->entry = info->entry;
681 if (session->append_all == TRUE ||
682 info->config.type != info_last->config.type) {
683 const char *type = type2string(info->config.type);
685 connman_dbus_dict_append_basic(dict, "ConnectionType",
688 info_last->config.type = info->config.type;
691 if (session->append_all == TRUE ||
692 info->config.allowed_bearers != info_last->config.allowed_bearers) {
693 connman_dbus_dict_append_array(dict, "AllowedBearers",
695 append_allowed_bearers,
697 info_last->config.allowed_bearers = info->config.allowed_bearers;
700 session->append_all = FALSE;
703 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
704 enum connman_session_type type)
707 case CONNMAN_SESSION_TYPE_UNKNOWN:
709 case CONNMAN_SESSION_TYPE_ANY:
711 case CONNMAN_SESSION_TYPE_LOCAL:
712 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
713 *state = CONNMAN_SESSION_STATE_CONNECTED;
718 case CONNMAN_SESSION_TYPE_INTERNET:
719 if (*state == CONNMAN_SESSION_STATE_ONLINE)
727 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
729 struct session_info *info_last = session->info_last;
730 struct session_info *info = session->info;
732 if (session->append_all == TRUE)
735 if (info->state != info_last->state)
738 if (info->entry != info_last->entry &&
739 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
742 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
743 info->config.type != info_last->config.type)
749 static gboolean session_notify(gpointer user_data)
751 struct connman_session *session = user_data;
753 DBusMessageIter array, dict;
755 if (compute_notifiable_changes(session) == FALSE)
758 DBG("session %p owner %s notify_path %s", session,
759 session->owner, session->notify_path);
761 msg = dbus_message_new_method_call(session->owner, session->notify_path,
762 CONNMAN_NOTIFICATION_INTERFACE,
767 dbus_message_iter_init_append(msg, &array);
768 connman_dbus_dict_open(&array, &dict);
770 append_notify(&dict, session);
772 connman_dbus_dict_close(&array, &dict);
774 g_dbus_send_message(connection, msg);
779 static void ipconfig_ipv4_changed(struct connman_session *session)
781 struct session_info *info = session->info;
783 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
784 "IPv4", append_ipconfig_ipv4,
785 info->entry->service);
788 static void ipconfig_ipv6_changed(struct connman_session *session)
790 struct session_info *info = session->info;
792 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
793 "IPv6", append_ipconfig_ipv6,
794 info->entry->service);
797 static connman_bool_t service_type_match(struct connman_session *session,
798 struct connman_service *service)
800 struct session_info *info = session->info;
803 for (list = info->config.allowed_bearers;
804 list != NULL; list = list->next) {
805 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
806 enum connman_service_type service_type;
808 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
811 service_type = connman_service_get_type(service);
812 if (bearer == service_type)
819 static connman_bool_t service_match(struct connman_session *session,
820 struct connman_service *service)
822 if (service_type_match(session, service) == FALSE)
828 static int service_type_weight(enum connman_service_type type)
831 * The session doesn't care which service
832 * to use. Nevertheless we have to sort them
833 * according their type. The ordering is
842 case CONNMAN_SERVICE_TYPE_ETHERNET:
844 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
846 case CONNMAN_SERVICE_TYPE_WIFI:
848 case CONNMAN_SERVICE_TYPE_CELLULAR:
850 case CONNMAN_SERVICE_TYPE_UNKNOWN:
851 case CONNMAN_SERVICE_TYPE_SYSTEM:
852 case CONNMAN_SERVICE_TYPE_GPS:
853 case CONNMAN_SERVICE_TYPE_VPN:
854 case CONNMAN_SERVICE_TYPE_GADGET:
861 static gint sort_allowed_bearers(struct connman_service *service_a,
862 struct connman_service *service_b,
863 struct connman_session *session)
865 struct session_info *info = session->info;
867 enum connman_service_type type_a, type_b;
868 int weight_a, weight_b;
870 type_a = connman_service_get_type(service_a);
871 type_b = connman_service_get_type(service_b);
873 for (list = info->config.allowed_bearers;
874 list != NULL; list = list->next) {
875 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
877 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
878 if (type_a != type_b) {
879 weight_a = service_type_weight(type_a);
880 weight_b = service_type_weight(type_b);
882 if (weight_a > weight_b)
885 if (weight_a < weight_b)
892 if (type_a == bearer && type_b == bearer)
895 if (type_a == bearer && type_b != bearer)
898 if (type_a != bearer && type_b == bearer)
905 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
907 struct service_entry *entry_a = (void *)a;
908 struct service_entry *entry_b = (void *)b;
909 struct connman_session *session = user_data;
911 return sort_allowed_bearers(entry_a->service, entry_b->service,
915 static enum connman_session_state service_to_session_state(enum connman_service_state state)
918 case CONNMAN_SERVICE_STATE_UNKNOWN:
919 case CONNMAN_SERVICE_STATE_IDLE:
920 case CONNMAN_SERVICE_STATE_ASSOCIATION:
921 case CONNMAN_SERVICE_STATE_CONFIGURATION:
922 case CONNMAN_SERVICE_STATE_DISCONNECT:
923 case CONNMAN_SERVICE_STATE_FAILURE:
925 case CONNMAN_SERVICE_STATE_READY:
926 return CONNMAN_SESSION_STATE_CONNECTED;
927 case CONNMAN_SERVICE_STATE_ONLINE:
928 return CONNMAN_SESSION_STATE_ONLINE;
931 return CONNMAN_SESSION_STATE_DISCONNECTED;
934 static connman_bool_t is_connected(enum connman_service_state state)
937 case CONNMAN_SERVICE_STATE_UNKNOWN:
938 case CONNMAN_SERVICE_STATE_IDLE:
939 case CONNMAN_SERVICE_STATE_ASSOCIATION:
940 case CONNMAN_SERVICE_STATE_CONFIGURATION:
941 case CONNMAN_SERVICE_STATE_DISCONNECT:
942 case CONNMAN_SERVICE_STATE_FAILURE:
944 case CONNMAN_SERVICE_STATE_READY:
945 case CONNMAN_SERVICE_STATE_ONLINE:
952 static connman_bool_t is_connecting(enum connman_service_state state)
955 case CONNMAN_SERVICE_STATE_UNKNOWN:
956 case CONNMAN_SERVICE_STATE_IDLE:
958 case CONNMAN_SERVICE_STATE_ASSOCIATION:
959 case CONNMAN_SERVICE_STATE_CONFIGURATION:
961 case CONNMAN_SERVICE_STATE_DISCONNECT:
962 case CONNMAN_SERVICE_STATE_FAILURE:
963 case CONNMAN_SERVICE_STATE_READY:
964 case CONNMAN_SERVICE_STATE_ONLINE:
971 static connman_bool_t explicit_connect(enum connman_session_reason reason)
974 case CONNMAN_SESSION_REASON_UNKNOWN:
975 case CONNMAN_SESSION_REASON_FREE_RIDE:
977 case CONNMAN_SESSION_REASON_CONNECT:
984 static connman_bool_t explicit_disconnect(struct session_info *info)
986 if (info->entry == NULL)
989 DBG("reason %s service %p state %d",
990 reason2string(info->entry->reason),
991 info->entry->service, info->entry->state);
993 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
996 if (explicit_connect(info->entry->reason) == FALSE)
999 if (__connman_service_session_dec(info->entry->service) == FALSE)
1005 struct pending_data {
1006 unsigned int timeout;
1007 struct service_entry *entry;
1008 gboolean (*cb)(gpointer);
1011 static void pending_timeout_free(gpointer data, gpointer user_data)
1013 struct pending_data *pending = data;
1015 DBG("pending %p timeout %d", pending, pending->timeout);
1016 g_source_remove(pending->timeout);
1020 static void pending_timeout_remove_all(struct service_entry *entry)
1024 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1025 g_slist_free(entry->pending_timeouts);
1026 entry->pending_timeouts = NULL;
1029 static gboolean pending_timeout_cb(gpointer data)
1031 struct pending_data *pending = data;
1032 struct service_entry *entry = pending->entry;
1035 DBG("pending %p timeout %d", pending, pending->timeout);
1037 ret = pending->cb(pending->entry);
1039 entry->pending_timeouts =
1040 g_slist_remove(entry->pending_timeouts,
1047 static connman_bool_t pending_timeout_add(unsigned int seconds,
1048 gboolean (*cb)(gpointer),
1049 struct service_entry *entry)
1051 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1053 if (pending == NULL || cb == NULL || entry == NULL) {
1059 pending->entry = entry;
1060 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1062 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1065 DBG("pending %p entry %p timeout id %d", pending, entry,
1071 static gboolean call_disconnect(gpointer user_data)
1073 struct service_entry *entry = user_data;
1074 struct connman_service *service = entry->service;
1077 * TODO: We should mark this entry as pending work. In case
1078 * disconnect fails we just unassign this session from the
1079 * service and can't do anything later on it
1081 DBG("disconnect service %p", service);
1082 __connman_service_disconnect(service);
1087 static gboolean call_connect(gpointer user_data)
1089 struct service_entry *entry = user_data;
1090 struct connman_service *service = entry->service;
1092 DBG("connect service %p", service);
1093 __connman_service_connect(service);
1098 static void deselect_service(struct session_info *info)
1100 struct service_entry *entry;
1101 connman_bool_t disconnect, connected;
1105 if (info->entry == NULL)
1108 disconnect = explicit_disconnect(info);
1110 connected = is_connecting(info->entry->state) == TRUE ||
1111 is_connected(info->entry->state) == TRUE;
1113 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1114 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1116 entry = info->entry;
1119 DBG("disconnect %d connected %d", disconnect, connected);
1121 if (disconnect == TRUE && connected == TRUE)
1122 pending_timeout_add(0, call_disconnect, entry);
1125 static void deselect_and_disconnect(struct connman_session *session)
1127 struct session_info *info = session->info;
1129 deselect_service(info);
1131 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1134 static void select_connected_service(struct session_info *info,
1135 struct service_entry *entry)
1137 enum connman_session_state state;
1139 state = service_to_session_state(entry->state);
1140 if (is_type_matching_state(&state, info->config.type) == FALSE)
1143 info->state = state;
1145 info->entry = entry;
1146 info->entry->reason = info->reason;
1148 if (explicit_connect(info->reason) == FALSE)
1151 __connman_service_session_inc(info->entry->service);
1154 static void select_offline_service(struct session_info *info,
1155 struct service_entry *entry)
1157 if (explicit_connect(info->reason) == FALSE)
1160 info->state = service_to_session_state(entry->state);
1162 info->entry = entry;
1163 info->entry->reason = info->reason;
1165 __connman_service_session_inc(info->entry->service);
1166 pending_timeout_add(0, call_connect, entry);
1169 static void select_service(struct session_info *info,
1170 struct service_entry *entry)
1172 DBG("service %p", entry->service);
1174 if (is_connected(entry->state) == TRUE)
1175 select_connected_service(info, entry);
1177 select_offline_service(info, entry);
1180 static void select_and_connect(struct connman_session *session,
1181 enum connman_session_reason reason)
1183 struct session_info *info = session->info;
1184 struct service_entry *entry = NULL;
1185 GSequenceIter *iter;
1187 DBG("session %p reason %s", session, reason2string(reason));
1189 info->reason = reason;
1191 iter = g_sequence_get_begin_iter(session->service_list);
1193 while (g_sequence_iter_is_end(iter) == FALSE) {
1194 entry = g_sequence_get(iter);
1196 switch (entry->state) {
1197 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1198 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1199 case CONNMAN_SERVICE_STATE_READY:
1200 case CONNMAN_SERVICE_STATE_ONLINE:
1201 case CONNMAN_SERVICE_STATE_IDLE:
1202 case CONNMAN_SERVICE_STATE_DISCONNECT:
1203 select_service(info, entry);
1205 case CONNMAN_SERVICE_STATE_UNKNOWN:
1206 case CONNMAN_SERVICE_STATE_FAILURE:
1210 iter = g_sequence_iter_next(iter);
1214 static struct service_entry *create_service_entry(struct connman_session * session,
1215 struct connman_service *service,
1217 enum connman_service_state state)
1219 struct service_entry *entry;
1220 enum connman_service_type type;
1223 entry = g_try_new0(struct service_entry, 1);
1227 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1228 entry->state = state;
1233 entry->service = service;
1235 idx = __connman_service_get_index(entry->service);
1236 entry->ifname = connman_inet_ifname(idx);
1237 if (entry->ifname == NULL)
1238 entry->ifname = g_strdup("");
1240 type = connman_service_get_type(entry->service);
1241 entry->bearer = service2bearer(type);
1243 entry->session = session;
1248 static void iterate_service_cb(struct connman_service *service,
1250 enum connman_service_state state,
1253 struct connman_session *session = user_data;
1254 struct service_entry *entry;
1256 if (service_match(session, service) == FALSE)
1259 entry = create_service_entry(session, service, name, state);
1263 g_sequence_append(session->service_list, entry);
1266 static void destroy_service_entry(gpointer data)
1268 struct service_entry *entry = data;
1269 struct session_info *info = entry->session->info;
1270 struct connman_session *session;
1272 if (info != NULL && info->entry == entry) {
1273 session = entry->session;
1274 deselect_and_disconnect(session);
1277 pending_timeout_remove_all(entry);
1278 g_free(entry->ifname);
1283 static void populate_service_list(struct connman_session *session)
1285 struct service_entry *entry;
1286 GSequenceIter *iter;
1288 session->service_hash =
1289 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1291 session->service_list = g_sequence_new(destroy_service_entry);
1292 __connman_service_iterate_services(iterate_service_cb, session);
1294 g_sequence_sort(session->service_list, sort_services, session);
1296 iter = g_sequence_get_begin_iter(session->service_list);
1298 while (g_sequence_iter_is_end(iter) == FALSE) {
1299 entry = g_sequence_get(iter);
1301 DBG("service %p type %s name %s", entry->service,
1302 service2bearer(connman_service_get_type(entry->service)),
1305 g_hash_table_replace(session->service_hash,
1306 entry->service, iter);
1308 iter = g_sequence_iter_next(iter);
1312 static void session_changed(struct connman_session *session,
1313 enum connman_session_trigger trigger)
1315 struct session_info *info = session->info;
1316 struct session_info *info_last = session->info_last;
1317 struct connman_service *service;
1318 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1319 GSequence *service_list_last;
1320 GHashTable *service_hash_last;
1323 * TODO: This only a placeholder for the 'real' algorithm to
1324 * play a bit around. So we are going to improve it step by step.
1327 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1328 reason2string(info->reason));
1330 if (info->entry != NULL) {
1331 enum connman_session_state state;
1333 state = service_to_session_state(info->entry->state);
1335 if (is_type_matching_state(&state, info->config.type) == TRUE)
1336 info->state = state;
1340 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1341 DBG("ignore session changed event");
1343 case CONNMAN_SESSION_TRIGGER_SETTING:
1344 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1346 service_hash_last = session->service_hash;
1347 service_list_last = session->service_list;
1349 if (info->entry != NULL)
1350 service = info->entry->service;
1354 populate_service_list(session);
1356 if (service != NULL) {
1357 service_iter_last = g_hash_table_lookup(
1360 service_iter = g_hash_table_lookup(
1361 session->service_hash,
1365 if (service_iter == NULL && service_iter_last != NULL) {
1367 * The currently selected service is
1368 * not part of this session anymore.
1370 deselect_and_disconnect(session);
1373 g_hash_table_remove_all(service_hash_last);
1374 g_sequence_free(service_list_last);
1377 if (info->config.type != info_last->config.type) {
1378 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1379 is_type_matching_state(&info->state,
1380 info->config.type) == FALSE)
1381 deselect_and_disconnect(session);
1384 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1385 select_and_connect(session,
1386 CONNMAN_SESSION_REASON_FREE_RIDE);
1390 case CONNMAN_SESSION_TRIGGER_ECALL:
1392 * For the time beeing we fallback to normal connect
1395 case CONNMAN_SESSION_TRIGGER_CONNECT:
1396 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1397 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1399 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1400 __connman_service_session_inc(info->entry->service);
1404 if (info->entry != NULL &&
1405 is_connecting(info->entry->state) == TRUE) {
1409 select_and_connect(session,
1410 CONNMAN_SESSION_REASON_CONNECT);
1413 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1414 deselect_and_disconnect(session);
1417 case CONNMAN_SESSION_TRIGGER_SERVICE:
1418 if (info->entry != NULL &&
1419 (is_connecting(info->entry->state) == TRUE ||
1420 is_connected(info->entry->state) == TRUE)) {
1424 deselect_and_disconnect(session);
1426 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1427 select_and_connect(session, info->reason);
1433 session_notify(session);
1436 int connman_session_config_update(struct connman_session *session)
1438 struct session_info *info = session->info;
1439 GSList *allowed_bearers;
1442 DBG("session %p", session);
1445 * We update all configuration even though only one entry
1446 * might have changed. We can still optimize this later.
1449 err = apply_policy_on_bearers(
1450 session->policy_config->allowed_bearers,
1451 session->user_allowed_bearers,
1456 g_slist_free(info->config.allowed_bearers);
1457 info->config.allowed_bearers = allowed_bearers;
1459 info->config.type = apply_policy_on_type(
1460 session->policy_config->type,
1463 info->config.roaming_policy = session->policy_config->roaming_policy;
1465 info->config.ecall = session->policy_config->ecall;
1466 if (info->config.ecall == TRUE)
1467 ecall_session = session;
1469 info->config.priority = session->policy_config->priority;
1471 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1476 static DBusMessage *connect_session(DBusConnection *conn,
1477 DBusMessage *msg, void *user_data)
1479 struct connman_session *session = user_data;
1481 DBG("session %p", session);
1483 if (ecall_session != NULL) {
1484 if (ecall_session->ecall == TRUE && ecall_session != session)
1485 return __connman_error_failed(msg, EBUSY);
1487 session->ecall = TRUE;
1488 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1490 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1492 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1495 static DBusMessage *disconnect_session(DBusConnection *conn,
1496 DBusMessage *msg, void *user_data)
1498 struct connman_session *session = user_data;
1500 DBG("session %p", session);
1502 if (ecall_session != NULL) {
1503 if (ecall_session->ecall == TRUE && ecall_session != session)
1504 return __connman_error_failed(msg, EBUSY);
1506 session->ecall = FALSE;
1509 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1511 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1514 static DBusMessage *change_session(DBusConnection *conn,
1515 DBusMessage *msg, void *user_data)
1517 struct connman_session *session = user_data;
1518 struct session_info *info = session->info;
1519 DBusMessageIter iter, value;
1522 GSList *allowed_bearers;
1525 DBG("session %p", session);
1526 if (dbus_message_iter_init(msg, &iter) == FALSE)
1527 return __connman_error_invalid_arguments(msg);
1529 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1530 return __connman_error_invalid_arguments(msg);
1532 dbus_message_iter_get_basic(&iter, &name);
1533 dbus_message_iter_next(&iter);
1535 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1536 return __connman_error_invalid_arguments(msg);
1538 dbus_message_iter_recurse(&iter, &value);
1540 switch (dbus_message_iter_get_arg_type(&value)) {
1541 case DBUS_TYPE_ARRAY:
1542 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1543 err = parse_bearers(&value, &allowed_bearers);
1545 return __connman_error_failed(msg, err);
1547 g_slist_free(info->config.allowed_bearers);
1548 session->user_allowed_bearers = allowed_bearers;
1550 err = apply_policy_on_bearers(
1551 session->policy_config->allowed_bearers,
1552 session->user_allowed_bearers,
1553 &info->config.allowed_bearers);
1556 return __connman_error_failed(msg, err);
1561 case DBUS_TYPE_STRING:
1562 if (g_str_equal(name, "ConnectionType") == TRUE) {
1563 dbus_message_iter_get_basic(&value, &val);
1564 info->config.type = apply_policy_on_type(
1565 session->policy_config->type,
1566 connman_session_parse_connection_type(val));
1575 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1577 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1580 return __connman_error_invalid_arguments(msg);
1583 static void release_session(gpointer key, gpointer value, gpointer user_data)
1585 struct connman_session *session = value;
1586 DBusMessage *message;
1588 DBG("owner %s path %s", session->owner, session->notify_path);
1590 if (session->notify_watch > 0)
1591 g_dbus_remove_watch(connection, session->notify_watch);
1593 g_dbus_unregister_interface(connection, session->session_path,
1594 CONNMAN_SESSION_INTERFACE);
1596 message = dbus_message_new_method_call(session->owner,
1597 session->notify_path,
1598 CONNMAN_NOTIFICATION_INTERFACE,
1600 if (message == NULL)
1603 dbus_message_set_no_reply(message, TRUE);
1605 g_dbus_send_message(connection, message);
1608 static int session_disconnect(struct connman_session *session)
1610 DBG("session %p, %s", session, session->owner);
1612 if (session->notify_watch > 0)
1613 g_dbus_remove_watch(connection, session->notify_watch);
1615 g_dbus_unregister_interface(connection, session->session_path,
1616 CONNMAN_SESSION_INTERFACE);
1618 deselect_and_disconnect(session);
1620 g_hash_table_remove(session_hash, session->session_path);
1625 static void owner_disconnect(DBusConnection *conn, void *user_data)
1627 struct connman_session *session = user_data;
1629 DBG("session %p, %s died", session, session->owner);
1631 session_disconnect(session);
1634 static DBusMessage *destroy_session(DBusConnection *conn,
1635 DBusMessage *msg, void *user_data)
1637 struct connman_session *session = user_data;
1639 DBG("session %p", session);
1641 if (ecall_session != NULL && ecall_session != session)
1642 return __connman_error_failed(msg, EBUSY);
1644 session_disconnect(session);
1646 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1649 static const GDBusMethodTable session_methods[] = {
1650 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1651 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1652 { GDBUS_METHOD("Disconnect", NULL, NULL,
1653 disconnect_session ) },
1654 { GDBUS_METHOD("Change",
1655 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1656 NULL, change_session) },
1660 static int session_create_cb(struct connman_session *session,
1661 struct connman_session_config *config,
1662 void *user_data, int err)
1665 struct user_config *user_config = user_data;
1666 struct session_info *info, *info_last;
1668 DBG("session %p config %p", session, config);
1673 session->policy_config = config;
1675 info = session->info;
1676 info_last = session->info_last;
1678 if (session->policy_config->ecall == TRUE)
1679 ecall_session = session;
1681 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1682 info->config.type = apply_policy_on_type(
1683 session->policy_config->type,
1685 info->config.priority = session->policy_config->priority;
1686 info->config.roaming_policy = session->policy_config->roaming_policy;
1689 session->user_allowed_bearers = user_config->allowed_bearers;
1690 user_config->allowed_bearers = NULL;
1692 err = apply_policy_on_bearers(
1693 session->policy_config->allowed_bearers,
1694 session->user_allowed_bearers,
1695 &info->config.allowed_bearers);
1699 g_hash_table_replace(session_hash, session->session_path, session);
1701 DBG("add %s", session->session_path);
1703 if (g_dbus_register_interface(connection, session->session_path,
1704 CONNMAN_SESSION_INTERFACE,
1705 session_methods, NULL,
1706 NULL, session, NULL) == FALSE) {
1707 connman_error("Failed to register %s", session->session_path);
1708 g_hash_table_remove(session_hash, session->session_path);
1713 reply = g_dbus_create_reply(user_config->pending,
1714 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1716 g_dbus_send_message(connection, reply);
1717 user_config->pending = NULL;
1719 populate_service_list(session);
1721 info_last->state = info->state;
1722 info_last->config.priority = info->config.priority;
1723 info_last->config.roaming_policy = info->config.roaming_policy;
1724 info_last->entry = info->entry;
1725 info_last->config.allowed_bearers = info->config.allowed_bearers;
1727 session->append_all = TRUE;
1729 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1733 reply = __connman_error_failed(user_config->pending, -err);
1734 g_dbus_send_message(connection, reply);
1736 free_session(session);
1739 cleanup_user_config(user_config);
1744 int __connman_session_create(DBusMessage *msg)
1746 const char *owner, *notify_path;
1747 char *session_path = NULL;
1748 DBusMessageIter iter, array;
1749 struct connman_session *session = NULL;
1750 struct user_config *user_config = NULL;
1751 connman_bool_t user_allowed_bearers = FALSE;
1752 connman_bool_t user_connection_type = FALSE;
1755 owner = dbus_message_get_sender(msg);
1757 DBG("owner %s", owner);
1759 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1761 * If there is an emergency call already going on,
1762 * ignore session creation attempt
1768 user_config = g_try_new0(struct user_config, 1);
1769 if (user_config == NULL) {
1774 user_config->pending = dbus_message_ref(msg);
1776 dbus_message_iter_init(msg, &iter);
1777 dbus_message_iter_recurse(&iter, &array);
1779 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1780 DBusMessageIter entry, value;
1781 const char *key, *val;
1783 dbus_message_iter_recurse(&array, &entry);
1784 dbus_message_iter_get_basic(&entry, &key);
1786 dbus_message_iter_next(&entry);
1787 dbus_message_iter_recurse(&entry, &value);
1789 switch (dbus_message_iter_get_arg_type(&value)) {
1790 case DBUS_TYPE_ARRAY:
1791 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1792 err = parse_bearers(&value,
1793 &user_config->allowed_bearers);
1797 user_allowed_bearers = TRUE;
1803 case DBUS_TYPE_STRING:
1804 if (g_str_equal(key, "ConnectionType") == TRUE) {
1805 dbus_message_iter_get_basic(&value, &val);
1807 connman_session_parse_connection_type(val);
1809 user_connection_type = TRUE;
1815 dbus_message_iter_next(&array);
1819 * If the user hasn't provided a configuration, we set
1820 * the default configuration.
1822 * For AllowedBearers this is '*', ...
1824 if (user_allowed_bearers == FALSE) {
1825 user_config->allowed_bearers =
1826 g_slist_append(NULL,
1827 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1828 if (user_config->allowed_bearers == NULL) {
1834 /* ... and for ConnectionType it is 'any'. */
1835 if (user_connection_type == FALSE)
1836 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1838 dbus_message_iter_next(&iter);
1839 dbus_message_iter_get_basic(&iter, ¬ify_path);
1841 if (notify_path == NULL) {
1846 session_path = g_strdup_printf("/sessions%s", notify_path);
1847 if (session_path == NULL) {
1852 session = g_hash_table_lookup(session_hash, session_path);
1853 if (session != NULL) {
1854 g_free(session_path);
1860 session = g_try_new0(struct connman_session, 1);
1861 if (session == NULL) {
1862 g_free(session_path);
1867 session->session_path = session_path;
1869 session->info = g_try_new0(struct session_info, 1);
1870 if (session->info == NULL) {
1875 session->info_last = g_try_new0(struct session_info, 1);
1876 if (session->info_last == NULL) {
1881 session->owner = g_strdup(owner);
1882 session->notify_path = g_strdup(notify_path);
1883 session->notify_watch =
1884 g_dbus_add_disconnect_watch(connection, session->owner,
1885 owner_disconnect, session, NULL);
1887 err = assign_policy_plugin(session);
1891 err = create_policy_config(session, session_create_cb, user_config);
1892 if (err < 0 && err != -EINPROGRESS)
1895 return -EINPROGRESS;
1898 connman_error("Failed to create session");
1900 free_session(session);
1902 cleanup_user_config(user_config);
1906 void connman_session_destroy(struct connman_session *session)
1908 DBG("session %p", session);
1910 session_disconnect(session);
1913 int __connman_session_destroy(DBusMessage *msg)
1915 const char *owner, *session_path;
1916 struct connman_session *session;
1918 owner = dbus_message_get_sender(msg);
1920 DBG("owner %s", owner);
1922 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1924 if (session_path == NULL)
1927 session = g_hash_table_lookup(session_hash, session_path);
1928 if (session == NULL)
1931 if (g_strcmp0(owner, session->owner) != 0)
1934 connman_session_destroy(session);
1939 connman_bool_t __connman_session_mode()
1944 void __connman_session_set_mode(connman_bool_t enable)
1946 DBG("enable %d", enable);
1948 if (sessionmode != enable) {
1949 sessionmode = enable;
1951 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1952 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1953 DBUS_TYPE_BOOLEAN, &sessionmode);
1956 if (sessionmode == TRUE)
1957 __connman_service_disconnect_all();
1960 static void service_add(struct connman_service *service,
1963 GHashTableIter iter;
1964 GSequenceIter *iter_service_list;
1965 gpointer key, value;
1966 struct connman_session *session;
1967 struct service_entry *entry;
1969 DBG("service %p", service);
1971 g_hash_table_iter_init(&iter, session_hash);
1973 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1976 if (service_match(session, service) == FALSE)
1979 entry = create_service_entry(session, service, name,
1980 CONNMAN_SERVICE_STATE_IDLE);
1985 g_sequence_insert_sorted(session->service_list,
1986 entry, sort_services,
1989 g_hash_table_replace(session->service_hash, service,
1992 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1996 static void service_remove(struct connman_service *service)
1999 GHashTableIter iter;
2000 gpointer key, value;
2001 struct connman_session *session;
2002 struct session_info *info;
2004 DBG("service %p", service);
2006 g_hash_table_iter_init(&iter, session_hash);
2008 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2009 GSequenceIter *seq_iter;
2011 info = session->info;
2013 seq_iter = g_hash_table_lookup(session->service_hash, service);
2014 if (seq_iter == NULL)
2017 g_sequence_remove(seq_iter);
2019 if (info->entry != NULL && info->entry->service == service)
2021 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
2025 static void service_state_changed(struct connman_service *service,
2026 enum connman_service_state state)
2028 GHashTableIter iter;
2029 gpointer key, value;
2031 DBG("service %p state %d", service, state);
2033 g_hash_table_iter_init(&iter, session_hash);
2035 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2036 struct connman_session *session = value;
2037 GSequenceIter *service_iter;
2039 service_iter = g_hash_table_lookup(session->service_hash, service);
2040 if (service_iter != NULL) {
2041 struct service_entry *entry;
2043 entry = g_sequence_get(service_iter);
2044 entry->state = state;
2047 session_changed(session,
2048 CONNMAN_SESSION_TRIGGER_SERVICE);
2052 static void ipconfig_changed(struct connman_service *service,
2053 struct connman_ipconfig *ipconfig)
2055 GHashTableIter iter;
2056 gpointer key, value;
2057 struct connman_session *session;
2058 struct session_info *info;
2059 enum connman_ipconfig_type type;
2061 DBG("service %p ipconfig %p", service, ipconfig);
2063 type = __connman_ipconfig_get_config_type(ipconfig);
2065 g_hash_table_iter_init(&iter, session_hash);
2067 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2069 info = session->info;
2071 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2074 if (info->entry != NULL && info->entry->service == service) {
2075 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2076 ipconfig_ipv4_changed(session);
2077 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2078 ipconfig_ipv6_changed(session);
2083 static struct connman_notifier session_notifier = {
2085 .service_add = service_add,
2086 .service_remove = service_remove,
2087 .service_state_changed = service_state_changed,
2088 .ipconfig_changed = ipconfig_changed,
2091 int __connman_session_init(void)
2097 connection = connman_dbus_get_connection();
2098 if (connection == NULL)
2101 err = connman_notifier_register(&session_notifier);
2103 dbus_connection_unref(connection);
2107 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2108 NULL, cleanup_session);
2110 sessionmode = FALSE;
2114 void __connman_session_cleanup(void)
2118 if (connection == NULL)
2121 connman_notifier_unregister(&session_notifier);
2123 g_hash_table_foreach(session_hash, release_session, NULL);
2124 g_hash_table_destroy(session_hash);
2125 session_hash = NULL;
2127 dbus_connection_unref(connection);