5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 /* track why this service was selected */
64 enum connman_session_reason reason;
65 enum connman_service_state state;
67 struct connman_service *service;
70 GSList *pending_timeouts;
74 struct connman_session_config config;
75 enum connman_session_state state;
76 struct service_entry *entry;
77 enum connman_session_reason reason;
80 struct connman_session {
86 struct connman_session_policy *policy;
88 connman_bool_t append_all;
89 struct session_info *info;
90 struct session_info *info_last;
91 struct connman_session_config *policy_config;
92 GSList *user_allowed_bearers;
96 GSequence *service_list;
97 GHashTable *service_hash;
100 static const char *trigger2string(enum connman_session_trigger trigger)
103 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
105 case CONNMAN_SESSION_TRIGGER_SETTING:
107 case CONNMAN_SESSION_TRIGGER_CONNECT:
109 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
111 case CONNMAN_SESSION_TRIGGER_SERVICE:
113 case CONNMAN_SESSION_TRIGGER_ECALL:
120 static const char *reason2string(enum connman_session_reason reason)
123 case CONNMAN_SESSION_REASON_UNKNOWN:
125 case CONNMAN_SESSION_REASON_CONNECT:
127 case CONNMAN_SESSION_REASON_FREE_RIDE:
134 static const char *state2string(enum connman_session_state state)
137 case CONNMAN_SESSION_STATE_DISCONNECTED:
138 return "disconnected";
139 case CONNMAN_SESSION_STATE_CONNECTED:
141 case CONNMAN_SESSION_STATE_ONLINE:
148 static const char *type2string(enum connman_session_type type)
151 case CONNMAN_SESSION_TYPE_UNKNOWN:
153 case CONNMAN_SESSION_TYPE_ANY:
155 case CONNMAN_SESSION_TYPE_LOCAL:
157 case CONNMAN_SESSION_TYPE_INTERNET:
164 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
166 if (g_strcmp0(policy, "default") == 0)
167 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
168 else if (g_strcmp0(policy, "always") == 0)
169 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
170 else if (g_strcmp0(policy, "forbidden") == 0)
171 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
172 else if (g_strcmp0(policy, "national") == 0)
173 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
174 else if (g_strcmp0(policy, "international") == 0)
175 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
177 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
180 enum connman_session_type connman_session_parse_connection_type(const char *type)
182 if (g_strcmp0(type, "any") == 0)
183 return CONNMAN_SESSION_TYPE_ANY;
184 if (g_strcmp0(type, "local") == 0)
185 return CONNMAN_SESSION_TYPE_LOCAL;
186 else if (g_strcmp0(type, "internet") == 0)
187 return CONNMAN_SESSION_TYPE_INTERNET;
189 return CONNMAN_SESSION_TYPE_UNKNOWN;
192 static int bearer2service(const char *bearer, enum connman_service_type *type)
194 if (g_strcmp0(bearer, "ethernet") == 0)
195 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
196 else if (g_strcmp0(bearer, "wifi") == 0)
197 *type = CONNMAN_SERVICE_TYPE_WIFI;
198 else if (g_strcmp0(bearer, "wimax") == 0)
199 *type = CONNMAN_SERVICE_TYPE_WIMAX;
200 else if (g_strcmp0(bearer, "bluetooth") == 0)
201 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
202 else if (g_strcmp0(bearer, "cellular") == 0)
203 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
204 else if (g_strcmp0(bearer, "vpn") == 0)
205 *type = CONNMAN_SERVICE_TYPE_VPN;
206 else if (g_strcmp0(bearer, "*") == 0)
207 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
214 static char *service2bearer(enum connman_service_type type)
217 case CONNMAN_SERVICE_TYPE_ETHERNET:
219 case CONNMAN_SERVICE_TYPE_WIFI:
221 case CONNMAN_SERVICE_TYPE_WIMAX:
223 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
225 case CONNMAN_SERVICE_TYPE_CELLULAR:
227 case CONNMAN_SERVICE_TYPE_VPN:
229 case CONNMAN_SERVICE_TYPE_UNKNOWN:
230 case CONNMAN_SERVICE_TYPE_SYSTEM:
231 case CONNMAN_SERVICE_TYPE_GPS:
232 case CONNMAN_SERVICE_TYPE_GADGET:
239 static int assign_policy_plugin(struct connman_session *session)
241 if (session->policy != NULL)
244 if (policy_list == NULL)
247 session->policy = policy_list->data;
252 static int create_policy_config(struct connman_session *session,
253 connman_session_config_cb callback,
256 struct connman_session_config *config;
258 if (session->policy == NULL) {
259 config = connman_session_create_default_config();
263 session->policy_config = config;
268 return (*session->policy->create)(session, callback, user_data);
271 static void destroy_policy_config(struct connman_session *session)
273 if (session->policy == NULL) {
274 g_free(session->policy_config);
278 (*session->policy->destroy)(session);
281 static void probe_policy(struct connman_session_policy *policy)
286 struct connman_session *session;
288 DBG("policy %p name %s", policy, policy->name);
290 g_hash_table_iter_init(&iter, session_hash);
292 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
295 if (session->policy != NULL)
298 assign_policy_plugin(session);
302 static void remove_policy(struct connman_session_policy *policy)
306 struct connman_session *session;
308 DBG("policy %p name %s", policy, policy->name);
310 g_hash_table_iter_init(&iter, session_hash);
312 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
315 if (session->policy != policy)
318 session->policy = NULL;
319 assign_policy_plugin(session);
323 static gint compare_priority(gconstpointer a, gconstpointer b)
325 const struct connman_session_policy *policy1 = a;
326 const struct connman_session_policy *policy2 = b;
328 return policy2->priority - policy1->priority;
332 int connman_session_policy_register(struct connman_session_policy *policy)
334 DBG("name %s", policy->name);
336 if (policy->create == NULL || policy->destroy == NULL)
339 policy_list = g_slist_insert_sorted(policy_list, policy,
342 probe_policy(policy);
347 void connman_session_policy_unregister(struct connman_session_policy *policy)
349 DBG("name %s", policy->name);
351 policy_list = g_slist_remove(policy_list, policy);
353 remove_policy(policy);
356 int connman_session_set_default_config(struct connman_session_config *config)
358 config->priority = FALSE;
359 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
360 config->type = CONNMAN_SESSION_TYPE_ANY;
361 config->ecall = FALSE;
363 g_slist_free(config->allowed_bearers);
364 config->allowed_bearers = g_slist_prepend(NULL,
365 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
366 if (config->allowed_bearers == NULL)
372 struct connman_session_config *connman_session_create_default_config(void)
374 struct connman_session_config *config;
376 config = g_try_new0(struct connman_session_config, 1);
380 if (connman_session_set_default_config(config) < 0) {
388 static enum connman_session_type apply_policy_on_type(
389 enum connman_session_type policy,
390 enum connman_session_type type)
392 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
393 return CONNMAN_SESSION_TYPE_UNKNOWN;
395 if (policy == CONNMAN_SESSION_TYPE_ANY)
398 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
399 return CONNMAN_SESSION_TYPE_LOCAL;
401 return CONNMAN_SESSION_TYPE_INTERNET;
404 int connman_session_parse_bearers(const char *token, GSList **list)
406 enum connman_service_type bearer;
409 if (g_strcmp0(token, "") == 0)
412 err = bearer2service(token, &bearer);
416 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
421 static int parse_bearers(DBusMessageIter *iter, GSList **list)
423 DBusMessageIter array;
426 dbus_message_iter_recurse(iter, &array);
430 while ((type = dbus_message_iter_get_arg_type(&array)) !=
432 char *bearer_name = NULL;
434 if (type != DBUS_TYPE_STRING) {
440 dbus_message_iter_get_basic(&array, &bearer_name);
442 err = connman_session_parse_bearers(bearer_name, list);
449 dbus_message_iter_next(&array);
455 static int filter_bearer(GSList *policy_bearers,
456 enum connman_service_type bearer,
459 enum connman_service_type policy;
462 if (policy_bearers == NULL)
465 for (it = policy_bearers; it != NULL; it = it->next) {
466 policy = GPOINTER_TO_INT(it->data);
468 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
473 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
484 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
489 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
492 enum connman_service_type bearer;
498 for (it = bearers; it != NULL; it = it->next) {
499 bearer = GPOINTER_TO_INT(it->data);
501 err = filter_bearer(policy_bearers, bearer, list);
509 const char *connman_session_get_owner(struct connman_session *session)
511 return session->owner;
514 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
516 struct session_info *info = user_data;
519 for (list = info->config.allowed_bearers;
520 list != NULL; list = list->next) {
521 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
522 const char *name = __connman_service_type2string(bearer);
527 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
532 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
534 struct connman_service *service = user_data;
535 struct connman_ipconfig *ipconfig_ipv4;
540 if (__connman_service_is_connected_state(service,
541 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
545 ipconfig_ipv4 = __connman_service_get_ip4config(service);
546 if (ipconfig_ipv4 == NULL)
549 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
552 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
554 struct connman_service *service = user_data;
555 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
560 if (__connman_service_is_connected_state(service,
561 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
565 ipconfig_ipv4 = __connman_service_get_ip4config(service);
566 ipconfig_ipv6 = __connman_service_get_ip6config(service);
567 if (ipconfig_ipv6 == NULL)
570 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
573 static void append_notify(DBusMessageIter *dict,
574 struct connman_session *session)
576 struct session_info *info = session->info;
577 struct session_info *info_last = session->info_last;
578 struct connman_service *service;
579 const char *name, *ifname, *bearer;
581 if (session->append_all == TRUE ||
582 info->state != info_last->state) {
583 const char *state = state2string(info->state);
585 connman_dbus_dict_append_basic(dict, "State",
588 info_last->state = info->state;
591 if (session->append_all == TRUE ||
592 info->entry != info_last->entry) {
593 if (info->entry == NULL) {
599 name = info->entry->name;
600 ifname = info->entry->ifname;
601 service = info->entry->service;
602 bearer = info->entry->bearer;
605 connman_dbus_dict_append_basic(dict, "Name",
609 connman_dbus_dict_append_dict(dict, "IPv4",
610 append_ipconfig_ipv4,
613 connman_dbus_dict_append_dict(dict, "IPv6",
614 append_ipconfig_ipv6,
617 connman_dbus_dict_append_basic(dict, "Interface",
621 connman_dbus_dict_append_basic(dict, "Bearer",
625 info_last->entry = info->entry;
628 if (session->append_all == TRUE ||
629 info->config.type != info_last->config.type) {
630 const char *type = type2string(info->config.type);
632 connman_dbus_dict_append_basic(dict, "ConnectionType",
635 info_last->config.type = info->config.type;
638 if (session->append_all == TRUE ||
639 info->config.allowed_bearers != info_last->config.allowed_bearers) {
640 connman_dbus_dict_append_array(dict, "AllowedBearers",
642 append_allowed_bearers,
644 info_last->config.allowed_bearers = info->config.allowed_bearers;
647 session->append_all = FALSE;
650 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
651 enum connman_session_type type)
654 case CONNMAN_SESSION_TYPE_UNKNOWN:
656 case CONNMAN_SESSION_TYPE_ANY:
658 case CONNMAN_SESSION_TYPE_LOCAL:
659 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
660 *state = CONNMAN_SESSION_STATE_CONNECTED;
665 case CONNMAN_SESSION_TYPE_INTERNET:
666 if (*state == CONNMAN_SESSION_STATE_ONLINE)
674 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
676 struct session_info *info_last = session->info_last;
677 struct session_info *info = session->info;
679 if (session->append_all == TRUE)
682 if (info->state != info_last->state)
685 if (info->entry != info_last->entry &&
686 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
689 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
690 info->config.type != info_last->config.type)
696 static gboolean session_notify(gpointer user_data)
698 struct connman_session *session = user_data;
700 DBusMessageIter array, dict;
702 if (compute_notifiable_changes(session) == FALSE)
705 DBG("session %p owner %s notify_path %s", session,
706 session->owner, session->notify_path);
708 msg = dbus_message_new_method_call(session->owner, session->notify_path,
709 CONNMAN_NOTIFICATION_INTERFACE,
714 dbus_message_iter_init_append(msg, &array);
715 connman_dbus_dict_open(&array, &dict);
717 append_notify(&dict, session);
719 connman_dbus_dict_close(&array, &dict);
721 g_dbus_send_message(connection, msg);
726 static void ipconfig_ipv4_changed(struct connman_session *session)
728 struct session_info *info = session->info;
730 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
731 "IPv4", append_ipconfig_ipv4,
732 info->entry->service);
735 static void ipconfig_ipv6_changed(struct connman_session *session)
737 struct session_info *info = session->info;
739 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
740 "IPv6", append_ipconfig_ipv6,
741 info->entry->service);
744 static connman_bool_t service_type_match(struct connman_session *session,
745 struct connman_service *service)
747 struct session_info *info = session->info;
750 for (list = info->config.allowed_bearers;
751 list != NULL; list = list->next) {
752 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
753 enum connman_service_type service_type;
755 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
758 service_type = connman_service_get_type(service);
759 if (bearer == service_type)
766 static connman_bool_t service_match(struct connman_session *session,
767 struct connman_service *service)
769 if (service_type_match(session, service) == FALSE)
775 static int service_type_weight(enum connman_service_type type)
778 * The session doesn't care which service
779 * to use. Nevertheless we have to sort them
780 * according their type. The ordering is
789 case CONNMAN_SERVICE_TYPE_ETHERNET:
791 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
793 case CONNMAN_SERVICE_TYPE_WIFI:
794 case CONNMAN_SERVICE_TYPE_WIMAX:
796 case CONNMAN_SERVICE_TYPE_CELLULAR:
798 case CONNMAN_SERVICE_TYPE_UNKNOWN:
799 case CONNMAN_SERVICE_TYPE_SYSTEM:
800 case CONNMAN_SERVICE_TYPE_GPS:
801 case CONNMAN_SERVICE_TYPE_VPN:
802 case CONNMAN_SERVICE_TYPE_GADGET:
809 static gint sort_allowed_bearers(struct connman_service *service_a,
810 struct connman_service *service_b,
811 struct connman_session *session)
813 struct session_info *info = session->info;
815 enum connman_service_type type_a, type_b;
816 int weight_a, weight_b;
818 type_a = connman_service_get_type(service_a);
819 type_b = connman_service_get_type(service_b);
821 for (list = info->config.allowed_bearers;
822 list != NULL; list = list->next) {
823 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
825 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
826 if (type_a != type_b) {
827 weight_a = service_type_weight(type_a);
828 weight_b = service_type_weight(type_b);
830 if (weight_a > weight_b)
833 if (weight_a < weight_b)
840 if (type_a == bearer && type_b == bearer)
843 if (type_a == bearer && type_b != bearer)
846 if (type_a != bearer && type_b == bearer)
853 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
855 struct service_entry *entry_a = (void *)a;
856 struct service_entry *entry_b = (void *)b;
857 struct connman_session *session = user_data;
859 return sort_allowed_bearers(entry_a->service, entry_b->service,
863 static void free_session(struct connman_session *session)
868 if (session->notify_watch > 0)
869 g_dbus_remove_watch(connection, session->notify_watch);
871 destroy_policy_config(session);
872 g_slist_free(session->info->config.allowed_bearers);
873 g_free(session->owner);
874 g_free(session->session_path);
875 g_free(session->notify_path);
876 g_free(session->info);
877 g_free(session->info_last);
882 static void cleanup_session(gpointer user_data)
884 struct connman_session *session = user_data;
885 struct session_info *info = session->info;
887 DBG("remove %s", session->session_path);
889 g_slist_free(session->user_allowed_bearers);
890 g_hash_table_destroy(session->service_hash);
891 g_sequence_free(session->service_list);
893 if (info->entry != NULL &&
894 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
895 __connman_service_disconnect(info->entry->service);
898 free_session(session);
901 static enum connman_session_state service_to_session_state(enum connman_service_state state)
904 case CONNMAN_SERVICE_STATE_UNKNOWN:
905 case CONNMAN_SERVICE_STATE_IDLE:
906 case CONNMAN_SERVICE_STATE_ASSOCIATION:
907 case CONNMAN_SERVICE_STATE_CONFIGURATION:
908 case CONNMAN_SERVICE_STATE_DISCONNECT:
909 case CONNMAN_SERVICE_STATE_FAILURE:
911 case CONNMAN_SERVICE_STATE_READY:
912 return CONNMAN_SESSION_STATE_CONNECTED;
913 case CONNMAN_SERVICE_STATE_ONLINE:
914 return CONNMAN_SESSION_STATE_ONLINE;
917 return CONNMAN_SESSION_STATE_DISCONNECTED;
920 static connman_bool_t is_connected(enum connman_service_state state)
923 case CONNMAN_SERVICE_STATE_UNKNOWN:
924 case CONNMAN_SERVICE_STATE_IDLE:
925 case CONNMAN_SERVICE_STATE_ASSOCIATION:
926 case CONNMAN_SERVICE_STATE_CONFIGURATION:
927 case CONNMAN_SERVICE_STATE_DISCONNECT:
928 case CONNMAN_SERVICE_STATE_FAILURE:
930 case CONNMAN_SERVICE_STATE_READY:
931 case CONNMAN_SERVICE_STATE_ONLINE:
938 static connman_bool_t is_connecting(enum connman_service_state state)
941 case CONNMAN_SERVICE_STATE_UNKNOWN:
942 case CONNMAN_SERVICE_STATE_IDLE:
944 case CONNMAN_SERVICE_STATE_ASSOCIATION:
945 case CONNMAN_SERVICE_STATE_CONFIGURATION:
947 case CONNMAN_SERVICE_STATE_DISCONNECT:
948 case CONNMAN_SERVICE_STATE_FAILURE:
949 case CONNMAN_SERVICE_STATE_READY:
950 case CONNMAN_SERVICE_STATE_ONLINE:
957 static connman_bool_t explicit_connect(enum connman_session_reason reason)
960 case CONNMAN_SESSION_REASON_UNKNOWN:
961 case CONNMAN_SESSION_REASON_FREE_RIDE:
963 case CONNMAN_SESSION_REASON_CONNECT:
970 static connman_bool_t explicit_disconnect(struct session_info *info)
972 if (info->entry == NULL)
975 DBG("reason %s service %p state %d",
976 reason2string(info->entry->reason),
977 info->entry->service, info->entry->state);
979 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
982 if (explicit_connect(info->entry->reason) == FALSE)
985 if (__connman_service_session_dec(info->entry->service) == FALSE)
991 struct pending_data {
992 unsigned int timeout;
993 struct service_entry *entry;
994 gboolean (*cb)(gpointer);
997 static void pending_timeout_free(gpointer data, gpointer user_data)
999 struct pending_data *pending = data;
1001 DBG("pending %p timeout %d", pending, pending->timeout);
1002 g_source_remove(pending->timeout);
1006 static void pending_timeout_remove_all(struct service_entry *entry)
1010 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1011 g_slist_free(entry->pending_timeouts);
1012 entry->pending_timeouts = NULL;
1015 static gboolean pending_timeout_cb(gpointer data)
1017 struct pending_data *pending = data;
1018 struct service_entry *entry = pending->entry;
1021 DBG("pending %p timeout %d", pending, pending->timeout);
1023 ret = pending->cb(pending->entry);
1025 entry->pending_timeouts =
1026 g_slist_remove(entry->pending_timeouts,
1033 static connman_bool_t pending_timeout_add(unsigned int seconds,
1034 gboolean (*cb)(gpointer),
1035 struct service_entry *entry)
1037 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1039 if (pending == NULL || cb == NULL || entry == NULL) {
1045 pending->entry = entry;
1046 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1048 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1051 DBG("pending %p entry %p timeout id %d", pending, entry,
1057 static gboolean call_disconnect(gpointer user_data)
1059 struct service_entry *entry = user_data;
1060 struct connman_service *service = entry->service;
1063 * TODO: We should mark this entry as pending work. In case
1064 * disconnect fails we just unassign this session from the
1065 * service and can't do anything later on it
1067 DBG("disconnect service %p", service);
1068 __connman_service_disconnect(service);
1073 static gboolean call_connect(gpointer user_data)
1075 struct service_entry *entry = user_data;
1076 struct connman_service *service = entry->service;
1078 DBG("connect service %p", service);
1079 __connman_service_connect(service);
1084 static void deselect_service(struct session_info *info)
1086 struct service_entry *entry;
1087 connman_bool_t disconnect, connected;
1091 if (info->entry == NULL)
1094 disconnect = explicit_disconnect(info);
1096 connected = is_connecting(info->entry->state) == TRUE ||
1097 is_connected(info->entry->state) == TRUE;
1099 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1100 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1102 entry = info->entry;
1105 DBG("disconnect %d connected %d", disconnect, connected);
1107 if (disconnect == TRUE && connected == TRUE)
1108 pending_timeout_add(0, call_disconnect, entry);
1111 static void deselect_and_disconnect(struct connman_session *session)
1113 struct session_info *info = session->info;
1115 deselect_service(info);
1117 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1120 static void select_connected_service(struct session_info *info,
1121 struct service_entry *entry)
1123 enum connman_session_state state;
1125 state = service_to_session_state(entry->state);
1126 if (is_type_matching_state(&state, info->config.type) == FALSE)
1129 info->state = state;
1131 info->entry = entry;
1132 info->entry->reason = info->reason;
1134 if (explicit_connect(info->reason) == FALSE)
1137 __connman_service_session_inc(info->entry->service);
1140 static void select_offline_service(struct session_info *info,
1141 struct service_entry *entry)
1143 if (explicit_connect(info->reason) == FALSE)
1146 info->state = service_to_session_state(entry->state);
1148 info->entry = entry;
1149 info->entry->reason = info->reason;
1151 __connman_service_session_inc(info->entry->service);
1152 pending_timeout_add(0, call_connect, entry);
1155 static void select_service(struct session_info *info,
1156 struct service_entry *entry)
1158 DBG("service %p", entry->service);
1160 if (is_connected(entry->state) == TRUE)
1161 select_connected_service(info, entry);
1163 select_offline_service(info, entry);
1166 static void select_and_connect(struct connman_session *session,
1167 enum connman_session_reason reason)
1169 struct session_info *info = session->info;
1170 struct service_entry *entry = NULL;
1171 GSequenceIter *iter;
1173 DBG("session %p reason %s", session, reason2string(reason));
1175 info->reason = reason;
1177 iter = g_sequence_get_begin_iter(session->service_list);
1179 while (g_sequence_iter_is_end(iter) == FALSE) {
1180 entry = g_sequence_get(iter);
1182 switch (entry->state) {
1183 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1184 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1185 case CONNMAN_SERVICE_STATE_READY:
1186 case CONNMAN_SERVICE_STATE_ONLINE:
1187 case CONNMAN_SERVICE_STATE_IDLE:
1188 case CONNMAN_SERVICE_STATE_DISCONNECT:
1189 select_service(info, entry);
1191 case CONNMAN_SERVICE_STATE_UNKNOWN:
1192 case CONNMAN_SERVICE_STATE_FAILURE:
1196 iter = g_sequence_iter_next(iter);
1200 static struct service_entry *create_service_entry(struct connman_service *service,
1202 enum connman_service_state state)
1204 struct service_entry *entry;
1205 enum connman_service_type type;
1208 entry = g_try_new0(struct service_entry, 1);
1212 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1213 entry->state = state;
1218 entry->service = service;
1220 idx = __connman_service_get_index(entry->service);
1221 entry->ifname = connman_inet_ifname(idx);
1222 if (entry->ifname == NULL)
1223 entry->ifname = g_strdup("");
1225 type = connman_service_get_type(entry->service);
1226 entry->bearer = service2bearer(type);
1231 static void destroy_service_entry(gpointer data)
1233 struct service_entry *entry = data;
1235 pending_timeout_remove_all(entry);
1236 g_free(entry->ifname);
1241 static void populate_service_list(struct connman_session *session)
1243 struct service_entry *entry;
1244 GSequenceIter *iter;
1246 session->service_hash =
1247 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1249 session->service_list = __connman_service_get_list(session,
1251 create_service_entry,
1252 destroy_service_entry);
1254 g_sequence_sort(session->service_list, sort_services, session);
1256 iter = g_sequence_get_begin_iter(session->service_list);
1258 while (g_sequence_iter_is_end(iter) == FALSE) {
1259 entry = g_sequence_get(iter);
1261 DBG("service %p type %s name %s", entry->service,
1262 service2bearer(connman_service_get_type(entry->service)),
1265 g_hash_table_replace(session->service_hash,
1266 entry->service, iter);
1268 iter = g_sequence_iter_next(iter);
1272 static void session_changed(struct connman_session *session,
1273 enum connman_session_trigger trigger)
1275 struct session_info *info = session->info;
1276 struct session_info *info_last = session->info_last;
1277 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1278 GSequence *service_list_last;
1279 GHashTable *service_hash_last;
1282 * TODO: This only a placeholder for the 'real' algorithm to
1283 * play a bit around. So we are going to improve it step by step.
1286 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1287 reason2string(info->reason));
1289 if (info->entry != NULL) {
1290 enum connman_session_state state;
1292 state = service_to_session_state(info->entry->state);
1294 if (is_type_matching_state(&state, info->config.type) == TRUE)
1295 info->state = state;
1299 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1300 DBG("ignore session changed event");
1302 case CONNMAN_SESSION_TRIGGER_SETTING:
1303 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1305 service_hash_last = session->service_hash;
1306 service_list_last = session->service_list;
1308 populate_service_list(session);
1310 if (info->entry != NULL) {
1311 service_iter_last = g_hash_table_lookup(
1313 info->entry->service);
1314 service_iter = g_hash_table_lookup(
1315 session->service_hash,
1316 info->entry->service);
1319 if (service_iter == NULL && service_iter_last != NULL) {
1321 * The currently selected service is
1322 * not part of this session anymore.
1324 deselect_and_disconnect(session);
1327 g_hash_table_remove_all(service_hash_last);
1328 g_sequence_free(service_list_last);
1331 if (info->config.type != info_last->config.type) {
1332 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1333 is_type_matching_state(&info->state,
1334 info->config.type) == FALSE)
1335 deselect_and_disconnect(session);
1338 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1339 select_and_connect(session,
1340 CONNMAN_SESSION_REASON_FREE_RIDE);
1344 case CONNMAN_SESSION_TRIGGER_ECALL:
1346 * For the time beeing we fallback to normal connect
1349 case CONNMAN_SESSION_TRIGGER_CONNECT:
1350 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1351 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1353 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1354 __connman_service_session_inc(info->entry->service);
1358 if (info->entry != NULL &&
1359 is_connecting(info->entry->state) == TRUE) {
1363 select_and_connect(session,
1364 CONNMAN_SESSION_REASON_CONNECT);
1367 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1368 deselect_and_disconnect(session);
1371 case CONNMAN_SESSION_TRIGGER_SERVICE:
1372 if (info->entry != NULL &&
1373 (is_connecting(info->entry->state) == TRUE ||
1374 is_connected(info->entry->state) == TRUE)) {
1378 deselect_and_disconnect(session);
1380 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1381 select_and_connect(session, info->reason);
1387 session_notify(session);
1390 int connman_session_config_update(struct connman_session *session)
1392 struct session_info *info = session->info;
1393 GSList *allowed_bearers;
1396 DBG("session %p", session);
1399 * We update all configuration even though only one entry
1400 * might have changed. We can still optimize this later.
1403 err = apply_policy_on_bearers(
1404 session->policy_config->allowed_bearers,
1405 session->user_allowed_bearers,
1410 g_slist_free(info->config.allowed_bearers);
1411 info->config.allowed_bearers = allowed_bearers;
1413 info->config.type = apply_policy_on_type(
1414 session->policy_config->type,
1417 info->config.roaming_policy = session->policy_config->roaming_policy;
1419 info->config.ecall = session->policy_config->ecall;
1420 if (info->config.ecall == TRUE)
1421 ecall_session = session;
1423 info->config.priority = session->policy_config->priority;
1425 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1430 static DBusMessage *connect_session(DBusConnection *conn,
1431 DBusMessage *msg, void *user_data)
1433 struct connman_session *session = user_data;
1435 DBG("session %p", session);
1437 if (ecall_session != NULL) {
1438 if (ecall_session->ecall == TRUE && ecall_session != session)
1439 return __connman_error_failed(msg, EBUSY);
1441 session->ecall = TRUE;
1442 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1444 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1446 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1449 static DBusMessage *disconnect_session(DBusConnection *conn,
1450 DBusMessage *msg, void *user_data)
1452 struct connman_session *session = user_data;
1454 DBG("session %p", session);
1456 if (ecall_session != NULL) {
1457 if (ecall_session->ecall == TRUE && ecall_session != session)
1458 return __connman_error_failed(msg, EBUSY);
1460 session->ecall = FALSE;
1463 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1465 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1468 static DBusMessage *change_session(DBusConnection *conn,
1469 DBusMessage *msg, void *user_data)
1471 struct connman_session *session = user_data;
1472 struct session_info *info = session->info;
1473 DBusMessageIter iter, value;
1476 GSList *allowed_bearers;
1479 DBG("session %p", session);
1480 if (dbus_message_iter_init(msg, &iter) == FALSE)
1481 return __connman_error_invalid_arguments(msg);
1483 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1484 return __connman_error_invalid_arguments(msg);
1486 dbus_message_iter_get_basic(&iter, &name);
1487 dbus_message_iter_next(&iter);
1489 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1490 return __connman_error_invalid_arguments(msg);
1492 dbus_message_iter_recurse(&iter, &value);
1494 switch (dbus_message_iter_get_arg_type(&value)) {
1495 case DBUS_TYPE_ARRAY:
1496 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1497 err = parse_bearers(&value, &allowed_bearers);
1499 return __connman_error_failed(msg, err);
1501 g_slist_free(info->config.allowed_bearers);
1502 session->user_allowed_bearers = allowed_bearers;
1504 err = apply_policy_on_bearers(
1505 session->policy_config->allowed_bearers,
1506 session->user_allowed_bearers,
1507 &info->config.allowed_bearers);
1510 return __connman_error_failed(msg, err);
1515 case DBUS_TYPE_STRING:
1516 if (g_str_equal(name, "ConnectionType") == TRUE) {
1517 dbus_message_iter_get_basic(&value, &val);
1518 info->config.type = apply_policy_on_type(
1519 session->policy_config->type,
1520 connman_session_parse_connection_type(val));
1529 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1531 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1534 return __connman_error_invalid_arguments(msg);
1537 static void release_session(gpointer key, gpointer value, gpointer user_data)
1539 struct connman_session *session = value;
1540 DBusMessage *message;
1542 DBG("owner %s path %s", session->owner, session->notify_path);
1544 if (session->notify_watch > 0)
1545 g_dbus_remove_watch(connection, session->notify_watch);
1547 g_dbus_unregister_interface(connection, session->session_path,
1548 CONNMAN_SESSION_INTERFACE);
1550 message = dbus_message_new_method_call(session->owner,
1551 session->notify_path,
1552 CONNMAN_NOTIFICATION_INTERFACE,
1554 if (message == NULL)
1557 dbus_message_set_no_reply(message, TRUE);
1559 g_dbus_send_message(connection, message);
1562 static int session_disconnect(struct connman_session *session)
1564 DBG("session %p, %s", session, session->owner);
1566 if (session->notify_watch > 0)
1567 g_dbus_remove_watch(connection, session->notify_watch);
1569 g_dbus_unregister_interface(connection, session->session_path,
1570 CONNMAN_SESSION_INTERFACE);
1572 deselect_and_disconnect(session);
1574 g_hash_table_remove(session_hash, session->session_path);
1579 static void owner_disconnect(DBusConnection *conn, void *user_data)
1581 struct connman_session *session = user_data;
1583 DBG("session %p, %s died", session, session->owner);
1585 session_disconnect(session);
1588 static DBusMessage *destroy_session(DBusConnection *conn,
1589 DBusMessage *msg, void *user_data)
1591 struct connman_session *session = user_data;
1593 DBG("session %p", session);
1595 if (ecall_session != NULL && ecall_session != session)
1596 return __connman_error_failed(msg, EBUSY);
1598 session_disconnect(session);
1600 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1603 static const GDBusMethodTable session_methods[] = {
1604 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1605 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1606 { GDBUS_METHOD("Disconnect", NULL, NULL,
1607 disconnect_session ) },
1608 { GDBUS_METHOD("Change",
1609 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1610 NULL, change_session) },
1614 struct user_config {
1615 DBusMessage *pending;
1617 enum connman_session_type type;
1618 GSList *allowed_bearers;
1621 static void session_create_cb(struct connman_session *session,
1622 struct connman_session_config *config,
1623 void *user_data, int err)
1626 struct user_config *user_config = user_data;
1627 struct session_info *info, *info_last;
1629 DBG("session %p config %p", session, config);
1634 session->policy_config = config;
1636 info = session->info;
1637 info_last = session->info_last;
1639 if (session->policy_config->ecall == TRUE)
1640 ecall_session = session;
1642 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1643 info->config.type = apply_policy_on_type(
1644 session->policy_config->type,
1646 info->config.priority = session->policy_config->priority;
1647 info->config.roaming_policy = session->policy_config->roaming_policy;
1650 session->user_allowed_bearers = user_config->allowed_bearers;
1652 err = apply_policy_on_bearers(
1653 session->policy_config->allowed_bearers,
1654 session->user_allowed_bearers,
1655 &info->config.allowed_bearers);
1659 g_hash_table_replace(session_hash, session->session_path, session);
1661 DBG("add %s", session->session_path);
1663 if (g_dbus_register_interface(connection, session->session_path,
1664 CONNMAN_SESSION_INTERFACE,
1665 session_methods, NULL,
1666 NULL, session, NULL) == FALSE) {
1667 connman_error("Failed to register %s", session->session_path);
1668 g_hash_table_remove(session_hash, session->session_path);
1673 reply = g_dbus_create_reply(user_config->pending,
1674 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1676 g_dbus_send_message(connection, reply);
1678 populate_service_list(session);
1680 info_last->state = info->state;
1681 info_last->config.priority = info->config.priority;
1682 info_last->config.roaming_policy = info->config.roaming_policy;
1683 info_last->entry = info->entry;
1684 info_last->config.allowed_bearers = info->config.allowed_bearers;
1686 session->append_all = TRUE;
1688 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1692 __connman_error_failed(user_config->pending, -err);
1693 free_session(session);
1696 dbus_message_unref(user_config->pending);
1697 g_free(user_config);
1700 int __connman_session_create(DBusMessage *msg)
1702 const char *owner, *notify_path;
1703 char *session_path = NULL;
1704 DBusMessageIter iter, array;
1705 struct connman_session *session = NULL;
1706 struct user_config *user_config = NULL;
1707 connman_bool_t user_allowed_bearers = FALSE;
1708 connman_bool_t user_connection_type = FALSE;
1711 owner = dbus_message_get_sender(msg);
1713 DBG("owner %s", owner);
1715 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1717 * If there is an emergency call already going on,
1718 * ignore session creation attempt
1724 user_config = g_try_new0(struct user_config, 1);
1725 if (user_config == NULL) {
1730 user_config->pending = dbus_message_ref(msg);
1732 dbus_message_iter_init(msg, &iter);
1733 dbus_message_iter_recurse(&iter, &array);
1735 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1736 DBusMessageIter entry, value;
1737 const char *key, *val;
1739 dbus_message_iter_recurse(&array, &entry);
1740 dbus_message_iter_get_basic(&entry, &key);
1742 dbus_message_iter_next(&entry);
1743 dbus_message_iter_recurse(&entry, &value);
1745 switch (dbus_message_iter_get_arg_type(&value)) {
1746 case DBUS_TYPE_ARRAY:
1747 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1748 err = parse_bearers(&value,
1749 &user_config->allowed_bearers);
1753 user_allowed_bearers = TRUE;
1759 case DBUS_TYPE_STRING:
1760 if (g_str_equal(key, "ConnectionType") == TRUE) {
1761 dbus_message_iter_get_basic(&value, &val);
1763 connman_session_parse_connection_type(val);
1765 user_connection_type = TRUE;
1771 dbus_message_iter_next(&array);
1775 * If the user hasn't provided a configuration, we set
1776 * the default configuration.
1778 * For AllowedBearers this is '*', ...
1780 if (user_allowed_bearers == FALSE) {
1781 user_config->allowed_bearers =
1782 g_slist_append(NULL,
1783 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1784 if (user_config->allowed_bearers == NULL) {
1790 /* ... and for ConnectionType it is 'any'. */
1791 if (user_connection_type == FALSE)
1792 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1794 dbus_message_iter_next(&iter);
1795 dbus_message_iter_get_basic(&iter, ¬ify_path);
1797 if (notify_path == NULL) {
1802 session_path = g_strdup_printf("/sessions%s", notify_path);
1803 if (session_path == NULL) {
1808 session = g_hash_table_lookup(session_hash, session_path);
1809 if (session != NULL) {
1810 g_free(session_path);
1816 session = g_try_new0(struct connman_session, 1);
1817 if (session == NULL) {
1818 g_free(session_path);
1823 session->session_path = session_path;
1825 session->info = g_try_new0(struct session_info, 1);
1826 if (session->info == NULL) {
1831 session->info_last = g_try_new0(struct session_info, 1);
1832 if (session->info_last == NULL) {
1837 session->owner = g_strdup(owner);
1838 session->notify_path = g_strdup(notify_path);
1839 session->notify_watch =
1840 g_dbus_add_disconnect_watch(connection, session->owner,
1841 owner_disconnect, session, NULL);
1843 err = assign_policy_plugin(session);
1847 err = create_policy_config(session, session_create_cb, user_config);
1851 return -EINPROGRESS;
1854 connman_error("Failed to create session");
1856 free_session(session);
1858 if (user_config != NULL) {
1859 dbus_message_unref(user_config->pending);
1860 g_slist_free(user_config->allowed_bearers);
1861 g_free(user_config);
1866 void connman_session_destroy(struct connman_session *session)
1868 DBG("session %p", session);
1870 session_disconnect(session);
1873 int __connman_session_destroy(DBusMessage *msg)
1875 const char *owner, *session_path;
1876 struct connman_session *session;
1878 owner = dbus_message_get_sender(msg);
1880 DBG("owner %s", owner);
1882 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1884 if (session_path == NULL)
1887 session = g_hash_table_lookup(session_hash, session_path);
1888 if (session == NULL)
1891 if (g_strcmp0(owner, session->owner) != 0)
1894 connman_session_destroy(session);
1899 connman_bool_t __connman_session_mode()
1904 void __connman_session_set_mode(connman_bool_t enable)
1906 DBG("enable %d", enable);
1908 if (sessionmode != enable) {
1909 sessionmode = enable;
1911 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1912 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1913 DBUS_TYPE_BOOLEAN, &sessionmode);
1916 if (sessionmode == TRUE)
1917 __connman_service_disconnect_all();
1920 static void service_add(struct connman_service *service,
1923 GHashTableIter iter;
1924 GSequenceIter *iter_service_list;
1925 gpointer key, value;
1926 struct connman_session *session;
1927 struct service_entry *entry;
1929 DBG("service %p", service);
1931 g_hash_table_iter_init(&iter, session_hash);
1933 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1936 if (service_match(session, service) == FALSE)
1939 entry = create_service_entry(service, name,
1940 CONNMAN_SERVICE_STATE_IDLE);
1945 g_sequence_insert_sorted(session->service_list,
1946 entry, sort_services,
1949 g_hash_table_replace(session->service_hash, service,
1952 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1956 static void service_remove(struct connman_service *service)
1959 GHashTableIter iter;
1960 gpointer key, value;
1961 struct connman_session *session;
1962 struct session_info *info;
1964 DBG("service %p", service);
1966 g_hash_table_iter_init(&iter, session_hash);
1968 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1969 GSequenceIter *seq_iter;
1971 info = session->info;
1973 seq_iter = g_hash_table_lookup(session->service_hash, service);
1974 if (seq_iter == NULL)
1977 g_sequence_remove(seq_iter);
1979 if (info->entry != NULL && info->entry->service == service)
1981 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1985 static void service_state_changed(struct connman_service *service,
1986 enum connman_service_state state)
1988 GHashTableIter iter;
1989 gpointer key, value;
1991 DBG("service %p state %d", service, state);
1993 g_hash_table_iter_init(&iter, session_hash);
1995 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1996 struct connman_session *session = value;
1997 GSequenceIter *service_iter;
1999 service_iter = g_hash_table_lookup(session->service_hash, service);
2000 if (service_iter != NULL) {
2001 struct service_entry *entry;
2003 entry = g_sequence_get(service_iter);
2004 entry->state = state;
2007 session_changed(session,
2008 CONNMAN_SESSION_TRIGGER_SERVICE);
2012 static void ipconfig_changed(struct connman_service *service,
2013 struct connman_ipconfig *ipconfig)
2015 GHashTableIter iter;
2016 gpointer key, value;
2017 struct connman_session *session;
2018 struct session_info *info;
2019 enum connman_ipconfig_type type;
2021 DBG("service %p ipconfig %p", service, ipconfig);
2023 type = __connman_ipconfig_get_config_type(ipconfig);
2025 g_hash_table_iter_init(&iter, session_hash);
2027 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2029 info = session->info;
2031 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2034 if (info->entry != NULL && info->entry->service == service) {
2035 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2036 ipconfig_ipv4_changed(session);
2037 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2038 ipconfig_ipv6_changed(session);
2043 static struct connman_notifier session_notifier = {
2045 .service_add = service_add,
2046 .service_remove = service_remove,
2047 .service_state_changed = service_state_changed,
2048 .ipconfig_changed = ipconfig_changed,
2051 int __connman_session_init(void)
2057 connection = connman_dbus_get_connection();
2058 if (connection == NULL)
2061 err = connman_notifier_register(&session_notifier);
2063 dbus_connection_unref(connection);
2067 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2068 NULL, cleanup_session);
2070 sessionmode = FALSE;
2074 void __connman_session_cleanup(void)
2078 if (connection == NULL)
2081 connman_notifier_unregister(&session_notifier);
2083 g_hash_table_foreach(session_hash, release_session, NULL);
2084 g_hash_table_destroy(session_hash);
2085 session_hash = NULL;
2087 dbus_connection_unref(connection);