5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 struct connman_session *session;
64 /* track why this service was selected */
65 enum connman_session_reason reason;
66 enum connman_service_state state;
68 struct connman_service *service;
71 GSList *pending_timeouts;
75 struct connman_session_config config;
76 enum connman_session_state state;
77 struct service_entry *entry;
78 enum connman_session_reason reason;
81 struct connman_session {
87 struct connman_session_policy *policy;
89 connman_bool_t append_all;
90 struct session_info *info;
91 struct session_info *info_last;
92 struct connman_session_config *policy_config;
93 GSList *user_allowed_bearers;
97 GSequence *service_list;
98 GHashTable *service_hash;
101 static const char *trigger2string(enum connman_session_trigger trigger)
104 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
106 case CONNMAN_SESSION_TRIGGER_SETTING:
108 case CONNMAN_SESSION_TRIGGER_CONNECT:
110 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
112 case CONNMAN_SESSION_TRIGGER_SERVICE:
114 case CONNMAN_SESSION_TRIGGER_ECALL:
121 static const char *reason2string(enum connman_session_reason reason)
124 case CONNMAN_SESSION_REASON_UNKNOWN:
126 case CONNMAN_SESSION_REASON_CONNECT:
128 case CONNMAN_SESSION_REASON_FREE_RIDE:
135 static const char *state2string(enum connman_session_state state)
138 case CONNMAN_SESSION_STATE_DISCONNECTED:
139 return "disconnected";
140 case CONNMAN_SESSION_STATE_CONNECTED:
142 case CONNMAN_SESSION_STATE_ONLINE:
149 static const char *type2string(enum connman_session_type type)
152 case CONNMAN_SESSION_TYPE_UNKNOWN:
154 case CONNMAN_SESSION_TYPE_ANY:
156 case CONNMAN_SESSION_TYPE_LOCAL:
158 case CONNMAN_SESSION_TYPE_INTERNET:
165 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
167 if (g_strcmp0(policy, "default") == 0)
168 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
169 else if (g_strcmp0(policy, "always") == 0)
170 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
171 else if (g_strcmp0(policy, "forbidden") == 0)
172 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
173 else if (g_strcmp0(policy, "national") == 0)
174 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
175 else if (g_strcmp0(policy, "international") == 0)
176 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
178 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
181 enum connman_session_type connman_session_parse_connection_type(const char *type)
183 if (g_strcmp0(type, "any") == 0)
184 return CONNMAN_SESSION_TYPE_ANY;
185 if (g_strcmp0(type, "local") == 0)
186 return CONNMAN_SESSION_TYPE_LOCAL;
187 else if (g_strcmp0(type, "internet") == 0)
188 return CONNMAN_SESSION_TYPE_INTERNET;
190 return CONNMAN_SESSION_TYPE_UNKNOWN;
193 static int bearer2service(const char *bearer, enum connman_service_type *type)
195 if (g_strcmp0(bearer, "ethernet") == 0)
196 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
197 else if (g_strcmp0(bearer, "wifi") == 0)
198 *type = CONNMAN_SERVICE_TYPE_WIFI;
199 else if (g_strcmp0(bearer, "bluetooth") == 0)
200 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
201 else if (g_strcmp0(bearer, "cellular") == 0)
202 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
203 else if (g_strcmp0(bearer, "vpn") == 0)
204 *type = CONNMAN_SERVICE_TYPE_VPN;
205 else if (g_strcmp0(bearer, "*") == 0)
206 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
213 static char *service2bearer(enum connman_service_type type)
216 case CONNMAN_SERVICE_TYPE_ETHERNET:
218 case CONNMAN_SERVICE_TYPE_WIFI:
220 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
222 case CONNMAN_SERVICE_TYPE_CELLULAR:
224 case CONNMAN_SERVICE_TYPE_VPN:
226 case CONNMAN_SERVICE_TYPE_UNKNOWN:
228 case CONNMAN_SERVICE_TYPE_SYSTEM:
229 case CONNMAN_SERVICE_TYPE_GPS:
230 case CONNMAN_SERVICE_TYPE_GADGET:
237 static void destroy_policy_config(struct connman_session *session)
239 if (session->policy == NULL) {
240 g_free(session->policy_config);
244 (*session->policy->destroy)(session);
247 static void free_session(struct connman_session *session)
252 if (session->notify_watch > 0)
253 g_dbus_remove_watch(connection, session->notify_watch);
255 destroy_policy_config(session);
256 g_slist_free(session->info->config.allowed_bearers);
257 g_free(session->owner);
258 g_free(session->session_path);
259 g_free(session->notify_path);
260 g_free(session->info);
261 g_free(session->info_last);
266 static void cleanup_session(gpointer user_data)
268 struct connman_session *session = user_data;
269 struct session_info *info = session->info;
271 DBG("remove %s", session->session_path);
273 g_slist_free(session->user_allowed_bearers);
274 g_hash_table_destroy(session->service_hash);
275 g_sequence_free(session->service_list);
277 if (info->entry != NULL &&
278 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
279 __connman_service_disconnect(info->entry->service);
282 free_session(session);
285 static int assign_policy_plugin(struct connman_session *session)
287 if (session->policy != NULL)
290 if (policy_list == NULL)
293 session->policy = policy_list->data;
299 DBusMessage *pending;
301 enum connman_session_type type;
302 GSList *allowed_bearers;
305 static void cleanup_user_config(struct user_config *user_config)
307 if (user_config == NULL)
310 if (user_config->pending != NULL)
311 dbus_message_unref(user_config->pending);
313 g_slist_free(user_config->allowed_bearers);
317 static int create_policy_config(struct connman_session *session,
318 connman_session_config_func_t cb,
319 struct user_config *user_config)
321 struct connman_session_config *config;
323 if (session->policy == NULL) {
324 config = connman_session_create_default_config();
325 if (config == NULL) {
326 free_session(session);
327 cleanup_user_config(user_config);
331 return cb(session, config, user_config, 0);
334 return (*session->policy->create)(session, cb, user_config);
337 static void probe_policy(struct connman_session_policy *policy)
342 struct connman_session *session;
344 DBG("policy %p name %s", policy, policy->name);
346 g_hash_table_iter_init(&iter, session_hash);
348 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
351 if (session->policy != NULL)
354 assign_policy_plugin(session);
358 static void remove_policy(struct connman_session_policy *policy)
362 struct connman_session *session;
364 if (session_hash == NULL)
367 DBG("policy %p name %s", policy, policy->name);
369 g_hash_table_iter_init(&iter, session_hash);
371 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
374 if (session->policy != policy)
377 session->policy = NULL;
378 assign_policy_plugin(session);
382 static gint compare_priority(gconstpointer a, gconstpointer b)
384 const struct connman_session_policy *policy1 = a;
385 const struct connman_session_policy *policy2 = b;
387 return policy2->priority - policy1->priority;
391 int connman_session_policy_register(struct connman_session_policy *policy)
393 DBG("name %s", policy->name);
395 if (policy->create == NULL || policy->destroy == NULL)
398 policy_list = g_slist_insert_sorted(policy_list, policy,
401 probe_policy(policy);
406 void connman_session_policy_unregister(struct connman_session_policy *policy)
408 DBG("name %s", policy->name);
410 policy_list = g_slist_remove(policy_list, policy);
412 remove_policy(policy);
415 void connman_session_set_default_config(struct connman_session_config *config)
417 config->priority = FALSE;
418 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
419 config->type = CONNMAN_SESSION_TYPE_ANY;
420 config->ecall = FALSE;
422 g_slist_free(config->allowed_bearers);
423 config->allowed_bearers = g_slist_prepend(NULL,
424 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
427 struct connman_session_config *connman_session_create_default_config(void)
429 struct connman_session_config *config;
431 config = g_new0(struct connman_session_config, 1);
432 connman_session_set_default_config(config);
437 static enum connman_session_type apply_policy_on_type(
438 enum connman_session_type policy,
439 enum connman_session_type type)
441 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
442 return CONNMAN_SESSION_TYPE_UNKNOWN;
444 if (policy == CONNMAN_SESSION_TYPE_ANY)
447 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
448 return CONNMAN_SESSION_TYPE_LOCAL;
450 return CONNMAN_SESSION_TYPE_INTERNET;
453 int connman_session_parse_bearers(const char *token, GSList **list)
455 enum connman_service_type bearer;
458 if (g_strcmp0(token, "") == 0)
461 err = bearer2service(token, &bearer);
465 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
470 static int parse_bearers(DBusMessageIter *iter, GSList **list)
472 DBusMessageIter array;
475 dbus_message_iter_recurse(iter, &array);
479 while ((type = dbus_message_iter_get_arg_type(&array)) !=
481 char *bearer_name = NULL;
483 if (type != DBUS_TYPE_STRING) {
489 dbus_message_iter_get_basic(&array, &bearer_name);
491 err = connman_session_parse_bearers(bearer_name, list);
498 dbus_message_iter_next(&array);
504 static int filter_bearer(GSList *policy_bearers,
505 enum connman_service_type bearer,
508 enum connman_service_type policy;
511 if (policy_bearers == NULL)
514 for (it = policy_bearers; it != NULL; it = it->next) {
515 policy = GPOINTER_TO_INT(it->data);
517 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
522 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
533 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
538 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
541 enum connman_service_type bearer;
547 for (it = bearers; it != NULL; it = it->next) {
548 bearer = GPOINTER_TO_INT(it->data);
550 err = filter_bearer(policy_bearers, bearer, list);
558 const char *connman_session_get_owner(struct connman_session *session)
560 return session->owner;
563 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
565 struct session_info *info = user_data;
568 for (list = info->config.allowed_bearers;
569 list != NULL; list = list->next) {
570 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
571 const char *name = __connman_service_type2string(bearer);
576 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
581 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
583 struct connman_service *service = user_data;
584 struct connman_ipconfig *ipconfig_ipv4;
589 if (__connman_service_is_connected_state(service,
590 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
594 ipconfig_ipv4 = __connman_service_get_ip4config(service);
595 if (ipconfig_ipv4 == NULL)
598 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
601 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
603 struct connman_service *service = user_data;
604 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
609 if (__connman_service_is_connected_state(service,
610 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
614 ipconfig_ipv4 = __connman_service_get_ip4config(service);
615 ipconfig_ipv6 = __connman_service_get_ip6config(service);
616 if (ipconfig_ipv6 == NULL)
619 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
622 static void append_notify(DBusMessageIter *dict,
623 struct connman_session *session)
625 struct session_info *info = session->info;
626 struct session_info *info_last = session->info_last;
627 struct connman_service *service;
628 const char *name, *ifname, *bearer;
630 if (session->append_all == TRUE ||
631 info->state != info_last->state) {
632 const char *state = state2string(info->state);
634 connman_dbus_dict_append_basic(dict, "State",
637 info_last->state = info->state;
640 if (session->append_all == TRUE ||
641 info->entry != info_last->entry) {
642 if (info->entry == NULL) {
648 name = info->entry->name;
649 ifname = info->entry->ifname;
650 service = info->entry->service;
651 bearer = info->entry->bearer;
654 connman_dbus_dict_append_basic(dict, "Name",
658 connman_dbus_dict_append_dict(dict, "IPv4",
659 append_ipconfig_ipv4,
662 connman_dbus_dict_append_dict(dict, "IPv6",
663 append_ipconfig_ipv6,
666 connman_dbus_dict_append_basic(dict, "Interface",
670 connman_dbus_dict_append_basic(dict, "Bearer",
674 info_last->entry = info->entry;
677 if (session->append_all == TRUE ||
678 info->config.type != info_last->config.type) {
679 const char *type = type2string(info->config.type);
681 connman_dbus_dict_append_basic(dict, "ConnectionType",
684 info_last->config.type = info->config.type;
687 if (session->append_all == TRUE ||
688 info->config.allowed_bearers != info_last->config.allowed_bearers) {
689 connman_dbus_dict_append_array(dict, "AllowedBearers",
691 append_allowed_bearers,
693 info_last->config.allowed_bearers = info->config.allowed_bearers;
696 session->append_all = FALSE;
699 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
700 enum connman_session_type type)
703 case CONNMAN_SESSION_TYPE_UNKNOWN:
705 case CONNMAN_SESSION_TYPE_ANY:
707 case CONNMAN_SESSION_TYPE_LOCAL:
708 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
709 *state = CONNMAN_SESSION_STATE_CONNECTED;
714 case CONNMAN_SESSION_TYPE_INTERNET:
715 if (*state == CONNMAN_SESSION_STATE_ONLINE)
723 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
725 struct session_info *info_last = session->info_last;
726 struct session_info *info = session->info;
728 if (session->append_all == TRUE)
731 if (info->state != info_last->state)
734 if (info->entry != info_last->entry &&
735 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
738 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
739 info->config.type != info_last->config.type)
745 static gboolean session_notify(gpointer user_data)
747 struct connman_session *session = user_data;
749 DBusMessageIter array, dict;
751 if (compute_notifiable_changes(session) == FALSE)
754 DBG("session %p owner %s notify_path %s", session,
755 session->owner, session->notify_path);
757 msg = dbus_message_new_method_call(session->owner, session->notify_path,
758 CONNMAN_NOTIFICATION_INTERFACE,
763 dbus_message_iter_init_append(msg, &array);
764 connman_dbus_dict_open(&array, &dict);
766 append_notify(&dict, session);
768 connman_dbus_dict_close(&array, &dict);
770 g_dbus_send_message(connection, msg);
775 static void ipconfig_ipv4_changed(struct connman_session *session)
777 struct session_info *info = session->info;
779 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
780 "IPv4", append_ipconfig_ipv4,
781 info->entry->service);
784 static void ipconfig_ipv6_changed(struct connman_session *session)
786 struct session_info *info = session->info;
788 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
789 "IPv6", append_ipconfig_ipv6,
790 info->entry->service);
793 static connman_bool_t service_type_match(struct connman_session *session,
794 struct connman_service *service)
796 struct session_info *info = session->info;
799 for (list = info->config.allowed_bearers;
800 list != NULL; list = list->next) {
801 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
802 enum connman_service_type service_type;
804 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
807 service_type = connman_service_get_type(service);
808 if (bearer == service_type)
815 static connman_bool_t service_match(struct connman_session *session,
816 struct connman_service *service)
818 if (service_type_match(session, service) == FALSE)
824 static int service_type_weight(enum connman_service_type type)
827 * The session doesn't care which service
828 * to use. Nevertheless we have to sort them
829 * according their type. The ordering is
838 case CONNMAN_SERVICE_TYPE_ETHERNET:
840 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
842 case CONNMAN_SERVICE_TYPE_WIFI:
844 case CONNMAN_SERVICE_TYPE_CELLULAR:
846 case CONNMAN_SERVICE_TYPE_UNKNOWN:
847 case CONNMAN_SERVICE_TYPE_SYSTEM:
848 case CONNMAN_SERVICE_TYPE_GPS:
849 case CONNMAN_SERVICE_TYPE_VPN:
850 case CONNMAN_SERVICE_TYPE_GADGET:
857 static gint sort_allowed_bearers(struct connman_service *service_a,
858 struct connman_service *service_b,
859 struct connman_session *session)
861 struct session_info *info = session->info;
863 enum connman_service_type type_a, type_b;
864 int weight_a, weight_b;
866 type_a = connman_service_get_type(service_a);
867 type_b = connman_service_get_type(service_b);
869 for (list = info->config.allowed_bearers;
870 list != NULL; list = list->next) {
871 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
873 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
874 if (type_a != type_b) {
875 weight_a = service_type_weight(type_a);
876 weight_b = service_type_weight(type_b);
878 if (weight_a > weight_b)
881 if (weight_a < weight_b)
888 if (type_a == bearer && type_b == bearer)
891 if (type_a == bearer && type_b != bearer)
894 if (type_a != bearer && type_b == bearer)
901 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
903 struct service_entry *entry_a = (void *)a;
904 struct service_entry *entry_b = (void *)b;
905 struct connman_session *session = user_data;
907 return sort_allowed_bearers(entry_a->service, entry_b->service,
911 static enum connman_session_state service_to_session_state(enum connman_service_state state)
914 case CONNMAN_SERVICE_STATE_UNKNOWN:
915 case CONNMAN_SERVICE_STATE_IDLE:
916 case CONNMAN_SERVICE_STATE_ASSOCIATION:
917 case CONNMAN_SERVICE_STATE_CONFIGURATION:
918 case CONNMAN_SERVICE_STATE_DISCONNECT:
919 case CONNMAN_SERVICE_STATE_FAILURE:
921 case CONNMAN_SERVICE_STATE_READY:
922 return CONNMAN_SESSION_STATE_CONNECTED;
923 case CONNMAN_SERVICE_STATE_ONLINE:
924 return CONNMAN_SESSION_STATE_ONLINE;
927 return CONNMAN_SESSION_STATE_DISCONNECTED;
930 static connman_bool_t is_connected(enum connman_service_state state)
933 case CONNMAN_SERVICE_STATE_UNKNOWN:
934 case CONNMAN_SERVICE_STATE_IDLE:
935 case CONNMAN_SERVICE_STATE_ASSOCIATION:
936 case CONNMAN_SERVICE_STATE_CONFIGURATION:
937 case CONNMAN_SERVICE_STATE_DISCONNECT:
938 case CONNMAN_SERVICE_STATE_FAILURE:
940 case CONNMAN_SERVICE_STATE_READY:
941 case CONNMAN_SERVICE_STATE_ONLINE:
948 static connman_bool_t is_connecting(enum connman_service_state state)
951 case CONNMAN_SERVICE_STATE_UNKNOWN:
952 case CONNMAN_SERVICE_STATE_IDLE:
954 case CONNMAN_SERVICE_STATE_ASSOCIATION:
955 case CONNMAN_SERVICE_STATE_CONFIGURATION:
957 case CONNMAN_SERVICE_STATE_DISCONNECT:
958 case CONNMAN_SERVICE_STATE_FAILURE:
959 case CONNMAN_SERVICE_STATE_READY:
960 case CONNMAN_SERVICE_STATE_ONLINE:
967 static connman_bool_t explicit_connect(enum connman_session_reason reason)
970 case CONNMAN_SESSION_REASON_UNKNOWN:
971 case CONNMAN_SESSION_REASON_FREE_RIDE:
973 case CONNMAN_SESSION_REASON_CONNECT:
980 static connman_bool_t explicit_disconnect(struct session_info *info)
982 if (info->entry == NULL)
985 DBG("reason %s service %p state %d",
986 reason2string(info->entry->reason),
987 info->entry->service, info->entry->state);
989 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
992 if (explicit_connect(info->entry->reason) == FALSE)
995 if (__connman_service_session_dec(info->entry->service) == FALSE)
1001 struct pending_data {
1002 unsigned int timeout;
1003 struct service_entry *entry;
1004 gboolean (*cb)(gpointer);
1007 static void pending_timeout_free(gpointer data, gpointer user_data)
1009 struct pending_data *pending = data;
1011 DBG("pending %p timeout %d", pending, pending->timeout);
1012 g_source_remove(pending->timeout);
1016 static void pending_timeout_remove_all(struct service_entry *entry)
1020 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1021 g_slist_free(entry->pending_timeouts);
1022 entry->pending_timeouts = NULL;
1025 static gboolean pending_timeout_cb(gpointer data)
1027 struct pending_data *pending = data;
1028 struct service_entry *entry = pending->entry;
1031 DBG("pending %p timeout %d", pending, pending->timeout);
1033 ret = pending->cb(pending->entry);
1035 entry->pending_timeouts =
1036 g_slist_remove(entry->pending_timeouts,
1043 static connman_bool_t pending_timeout_add(unsigned int seconds,
1044 gboolean (*cb)(gpointer),
1045 struct service_entry *entry)
1047 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1049 if (pending == NULL || cb == NULL || entry == NULL) {
1055 pending->entry = entry;
1056 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1058 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1061 DBG("pending %p entry %p timeout id %d", pending, entry,
1067 static gboolean call_disconnect(gpointer user_data)
1069 struct service_entry *entry = user_data;
1070 struct connman_service *service = entry->service;
1073 * TODO: We should mark this entry as pending work. In case
1074 * disconnect fails we just unassign this session from the
1075 * service and can't do anything later on it
1077 DBG("disconnect service %p", service);
1078 __connman_service_disconnect(service);
1083 static gboolean call_connect(gpointer user_data)
1085 struct service_entry *entry = user_data;
1086 struct connman_service *service = entry->service;
1088 DBG("connect service %p", service);
1089 __connman_service_connect(service);
1094 static void deselect_service(struct session_info *info)
1096 struct service_entry *entry;
1097 connman_bool_t disconnect, connected;
1101 if (info->entry == NULL)
1104 disconnect = explicit_disconnect(info);
1106 connected = is_connecting(info->entry->state) == TRUE ||
1107 is_connected(info->entry->state) == TRUE;
1109 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1110 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1112 entry = info->entry;
1115 DBG("disconnect %d connected %d", disconnect, connected);
1117 if (disconnect == TRUE && connected == TRUE)
1118 pending_timeout_add(0, call_disconnect, entry);
1121 static void deselect_and_disconnect(struct connman_session *session)
1123 struct session_info *info = session->info;
1125 deselect_service(info);
1127 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1130 static void select_connected_service(struct session_info *info,
1131 struct service_entry *entry)
1133 enum connman_session_state state;
1135 state = service_to_session_state(entry->state);
1136 if (is_type_matching_state(&state, info->config.type) == FALSE)
1139 info->state = state;
1141 info->entry = entry;
1142 info->entry->reason = info->reason;
1144 if (explicit_connect(info->reason) == FALSE)
1147 __connman_service_session_inc(info->entry->service);
1150 static void select_offline_service(struct session_info *info,
1151 struct service_entry *entry)
1153 if (explicit_connect(info->reason) == FALSE)
1156 info->state = service_to_session_state(entry->state);
1158 info->entry = entry;
1159 info->entry->reason = info->reason;
1161 __connman_service_session_inc(info->entry->service);
1162 pending_timeout_add(0, call_connect, entry);
1165 static void select_service(struct session_info *info,
1166 struct service_entry *entry)
1168 DBG("service %p", entry->service);
1170 if (is_connected(entry->state) == TRUE)
1171 select_connected_service(info, entry);
1173 select_offline_service(info, entry);
1176 static void select_and_connect(struct connman_session *session,
1177 enum connman_session_reason reason)
1179 struct session_info *info = session->info;
1180 struct service_entry *entry = NULL;
1181 GSequenceIter *iter;
1183 DBG("session %p reason %s", session, reason2string(reason));
1185 info->reason = reason;
1187 iter = g_sequence_get_begin_iter(session->service_list);
1189 while (g_sequence_iter_is_end(iter) == FALSE) {
1190 entry = g_sequence_get(iter);
1192 switch (entry->state) {
1193 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1194 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1195 case CONNMAN_SERVICE_STATE_READY:
1196 case CONNMAN_SERVICE_STATE_ONLINE:
1197 case CONNMAN_SERVICE_STATE_IDLE:
1198 case CONNMAN_SERVICE_STATE_DISCONNECT:
1199 select_service(info, entry);
1201 case CONNMAN_SERVICE_STATE_UNKNOWN:
1202 case CONNMAN_SERVICE_STATE_FAILURE:
1206 iter = g_sequence_iter_next(iter);
1210 static struct service_entry *create_service_entry(struct connman_session * session,
1211 struct connman_service *service,
1213 enum connman_service_state state)
1215 struct service_entry *entry;
1216 enum connman_service_type type;
1219 entry = g_try_new0(struct service_entry, 1);
1223 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1224 entry->state = state;
1229 entry->service = service;
1231 idx = __connman_service_get_index(entry->service);
1232 entry->ifname = connman_inet_ifname(idx);
1233 if (entry->ifname == NULL)
1234 entry->ifname = g_strdup("");
1236 type = connman_service_get_type(entry->service);
1237 entry->bearer = service2bearer(type);
1239 entry->session = session;
1244 static void destroy_service_entry(gpointer data)
1246 struct service_entry *entry = data;
1247 struct session_info *info = entry->session->info;
1248 struct connman_session *session;
1250 if (info != NULL && info->entry == entry) {
1251 session = entry->session;
1252 deselect_and_disconnect(session);
1255 pending_timeout_remove_all(entry);
1256 g_free(entry->ifname);
1261 static void populate_service_list(struct connman_session *session)
1263 struct service_entry *entry;
1264 GSequenceIter *iter;
1266 session->service_hash =
1267 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1269 session->service_list = __connman_service_get_list(session,
1271 create_service_entry,
1272 destroy_service_entry);
1274 g_sequence_sort(session->service_list, sort_services, session);
1276 iter = g_sequence_get_begin_iter(session->service_list);
1278 while (g_sequence_iter_is_end(iter) == FALSE) {
1279 entry = g_sequence_get(iter);
1281 DBG("service %p type %s name %s", entry->service,
1282 service2bearer(connman_service_get_type(entry->service)),
1285 g_hash_table_replace(session->service_hash,
1286 entry->service, iter);
1288 iter = g_sequence_iter_next(iter);
1292 static void session_changed(struct connman_session *session,
1293 enum connman_session_trigger trigger)
1295 struct session_info *info = session->info;
1296 struct session_info *info_last = session->info_last;
1297 struct connman_service *service;
1298 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1299 GSequence *service_list_last;
1300 GHashTable *service_hash_last;
1303 * TODO: This only a placeholder for the 'real' algorithm to
1304 * play a bit around. So we are going to improve it step by step.
1307 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1308 reason2string(info->reason));
1310 if (info->entry != NULL) {
1311 enum connman_session_state state;
1313 state = service_to_session_state(info->entry->state);
1315 if (is_type_matching_state(&state, info->config.type) == TRUE)
1316 info->state = state;
1320 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1321 DBG("ignore session changed event");
1323 case CONNMAN_SESSION_TRIGGER_SETTING:
1324 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1326 service_hash_last = session->service_hash;
1327 service_list_last = session->service_list;
1329 if (info->entry != NULL)
1330 service = info->entry->service;
1334 populate_service_list(session);
1336 if (service != NULL) {
1337 service_iter_last = g_hash_table_lookup(
1340 service_iter = g_hash_table_lookup(
1341 session->service_hash,
1345 if (service_iter == NULL && service_iter_last != NULL) {
1347 * The currently selected service is
1348 * not part of this session anymore.
1350 deselect_and_disconnect(session);
1353 g_hash_table_remove_all(service_hash_last);
1354 g_sequence_free(service_list_last);
1357 if (info->config.type != info_last->config.type) {
1358 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1359 is_type_matching_state(&info->state,
1360 info->config.type) == FALSE)
1361 deselect_and_disconnect(session);
1364 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1365 select_and_connect(session,
1366 CONNMAN_SESSION_REASON_FREE_RIDE);
1370 case CONNMAN_SESSION_TRIGGER_ECALL:
1372 * For the time beeing we fallback to normal connect
1375 case CONNMAN_SESSION_TRIGGER_CONNECT:
1376 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1377 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1379 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1380 __connman_service_session_inc(info->entry->service);
1384 if (info->entry != NULL &&
1385 is_connecting(info->entry->state) == TRUE) {
1389 select_and_connect(session,
1390 CONNMAN_SESSION_REASON_CONNECT);
1393 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1394 deselect_and_disconnect(session);
1397 case CONNMAN_SESSION_TRIGGER_SERVICE:
1398 if (info->entry != NULL &&
1399 (is_connecting(info->entry->state) == TRUE ||
1400 is_connected(info->entry->state) == TRUE)) {
1404 deselect_and_disconnect(session);
1406 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1407 select_and_connect(session, info->reason);
1413 session_notify(session);
1416 int connman_session_config_update(struct connman_session *session)
1418 struct session_info *info = session->info;
1419 GSList *allowed_bearers;
1422 DBG("session %p", session);
1425 * We update all configuration even though only one entry
1426 * might have changed. We can still optimize this later.
1429 err = apply_policy_on_bearers(
1430 session->policy_config->allowed_bearers,
1431 session->user_allowed_bearers,
1436 g_slist_free(info->config.allowed_bearers);
1437 info->config.allowed_bearers = allowed_bearers;
1439 info->config.type = apply_policy_on_type(
1440 session->policy_config->type,
1443 info->config.roaming_policy = session->policy_config->roaming_policy;
1445 info->config.ecall = session->policy_config->ecall;
1446 if (info->config.ecall == TRUE)
1447 ecall_session = session;
1449 info->config.priority = session->policy_config->priority;
1451 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1456 static DBusMessage *connect_session(DBusConnection *conn,
1457 DBusMessage *msg, void *user_data)
1459 struct connman_session *session = user_data;
1461 DBG("session %p", session);
1463 if (ecall_session != NULL) {
1464 if (ecall_session->ecall == TRUE && ecall_session != session)
1465 return __connman_error_failed(msg, EBUSY);
1467 session->ecall = TRUE;
1468 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1470 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1472 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1475 static DBusMessage *disconnect_session(DBusConnection *conn,
1476 DBusMessage *msg, void *user_data)
1478 struct connman_session *session = user_data;
1480 DBG("session %p", session);
1482 if (ecall_session != NULL) {
1483 if (ecall_session->ecall == TRUE && ecall_session != session)
1484 return __connman_error_failed(msg, EBUSY);
1486 session->ecall = FALSE;
1489 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1491 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1494 static DBusMessage *change_session(DBusConnection *conn,
1495 DBusMessage *msg, void *user_data)
1497 struct connman_session *session = user_data;
1498 struct session_info *info = session->info;
1499 DBusMessageIter iter, value;
1502 GSList *allowed_bearers;
1505 DBG("session %p", session);
1506 if (dbus_message_iter_init(msg, &iter) == FALSE)
1507 return __connman_error_invalid_arguments(msg);
1509 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1510 return __connman_error_invalid_arguments(msg);
1512 dbus_message_iter_get_basic(&iter, &name);
1513 dbus_message_iter_next(&iter);
1515 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1516 return __connman_error_invalid_arguments(msg);
1518 dbus_message_iter_recurse(&iter, &value);
1520 switch (dbus_message_iter_get_arg_type(&value)) {
1521 case DBUS_TYPE_ARRAY:
1522 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1523 err = parse_bearers(&value, &allowed_bearers);
1525 return __connman_error_failed(msg, err);
1527 g_slist_free(info->config.allowed_bearers);
1528 session->user_allowed_bearers = allowed_bearers;
1530 err = apply_policy_on_bearers(
1531 session->policy_config->allowed_bearers,
1532 session->user_allowed_bearers,
1533 &info->config.allowed_bearers);
1536 return __connman_error_failed(msg, err);
1541 case DBUS_TYPE_STRING:
1542 if (g_str_equal(name, "ConnectionType") == TRUE) {
1543 dbus_message_iter_get_basic(&value, &val);
1544 info->config.type = apply_policy_on_type(
1545 session->policy_config->type,
1546 connman_session_parse_connection_type(val));
1555 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1557 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1560 return __connman_error_invalid_arguments(msg);
1563 static void release_session(gpointer key, gpointer value, gpointer user_data)
1565 struct connman_session *session = value;
1566 DBusMessage *message;
1568 DBG("owner %s path %s", session->owner, session->notify_path);
1570 if (session->notify_watch > 0)
1571 g_dbus_remove_watch(connection, session->notify_watch);
1573 g_dbus_unregister_interface(connection, session->session_path,
1574 CONNMAN_SESSION_INTERFACE);
1576 message = dbus_message_new_method_call(session->owner,
1577 session->notify_path,
1578 CONNMAN_NOTIFICATION_INTERFACE,
1580 if (message == NULL)
1583 dbus_message_set_no_reply(message, TRUE);
1585 g_dbus_send_message(connection, message);
1588 static int session_disconnect(struct connman_session *session)
1590 DBG("session %p, %s", session, session->owner);
1592 if (session->notify_watch > 0)
1593 g_dbus_remove_watch(connection, session->notify_watch);
1595 g_dbus_unregister_interface(connection, session->session_path,
1596 CONNMAN_SESSION_INTERFACE);
1598 deselect_and_disconnect(session);
1600 g_hash_table_remove(session_hash, session->session_path);
1605 static void owner_disconnect(DBusConnection *conn, void *user_data)
1607 struct connman_session *session = user_data;
1609 DBG("session %p, %s died", session, session->owner);
1611 session_disconnect(session);
1614 static DBusMessage *destroy_session(DBusConnection *conn,
1615 DBusMessage *msg, void *user_data)
1617 struct connman_session *session = user_data;
1619 DBG("session %p", session);
1621 if (ecall_session != NULL && ecall_session != session)
1622 return __connman_error_failed(msg, EBUSY);
1624 session_disconnect(session);
1626 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1629 static const GDBusMethodTable session_methods[] = {
1630 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1631 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1632 { GDBUS_METHOD("Disconnect", NULL, NULL,
1633 disconnect_session ) },
1634 { GDBUS_METHOD("Change",
1635 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1636 NULL, change_session) },
1640 static int session_create_cb(struct connman_session *session,
1641 struct connman_session_config *config,
1642 void *user_data, int err)
1645 struct user_config *user_config = user_data;
1646 struct session_info *info, *info_last;
1648 DBG("session %p config %p", session, config);
1653 session->policy_config = config;
1655 info = session->info;
1656 info_last = session->info_last;
1658 if (session->policy_config->ecall == TRUE)
1659 ecall_session = session;
1661 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1662 info->config.type = apply_policy_on_type(
1663 session->policy_config->type,
1665 info->config.priority = session->policy_config->priority;
1666 info->config.roaming_policy = session->policy_config->roaming_policy;
1669 session->user_allowed_bearers = user_config->allowed_bearers;
1670 user_config->allowed_bearers = NULL;
1672 err = apply_policy_on_bearers(
1673 session->policy_config->allowed_bearers,
1674 session->user_allowed_bearers,
1675 &info->config.allowed_bearers);
1679 g_hash_table_replace(session_hash, session->session_path, session);
1681 DBG("add %s", session->session_path);
1683 if (g_dbus_register_interface(connection, session->session_path,
1684 CONNMAN_SESSION_INTERFACE,
1685 session_methods, NULL,
1686 NULL, session, NULL) == FALSE) {
1687 connman_error("Failed to register %s", session->session_path);
1688 g_hash_table_remove(session_hash, session->session_path);
1693 reply = g_dbus_create_reply(user_config->pending,
1694 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1696 g_dbus_send_message(connection, reply);
1697 user_config->pending = NULL;
1699 populate_service_list(session);
1701 info_last->state = info->state;
1702 info_last->config.priority = info->config.priority;
1703 info_last->config.roaming_policy = info->config.roaming_policy;
1704 info_last->entry = info->entry;
1705 info_last->config.allowed_bearers = info->config.allowed_bearers;
1707 session->append_all = TRUE;
1709 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1713 reply = __connman_error_failed(user_config->pending, -err);
1714 g_dbus_send_message(connection, reply);
1716 free_session(session);
1719 cleanup_user_config(user_config);
1724 int __connman_session_create(DBusMessage *msg)
1726 const char *owner, *notify_path;
1727 char *session_path = NULL;
1728 DBusMessageIter iter, array;
1729 struct connman_session *session = NULL;
1730 struct user_config *user_config = NULL;
1731 connman_bool_t user_allowed_bearers = FALSE;
1732 connman_bool_t user_connection_type = FALSE;
1735 owner = dbus_message_get_sender(msg);
1737 DBG("owner %s", owner);
1739 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1741 * If there is an emergency call already going on,
1742 * ignore session creation attempt
1748 user_config = g_try_new0(struct user_config, 1);
1749 if (user_config == NULL) {
1754 user_config->pending = dbus_message_ref(msg);
1756 dbus_message_iter_init(msg, &iter);
1757 dbus_message_iter_recurse(&iter, &array);
1759 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1760 DBusMessageIter entry, value;
1761 const char *key, *val;
1763 dbus_message_iter_recurse(&array, &entry);
1764 dbus_message_iter_get_basic(&entry, &key);
1766 dbus_message_iter_next(&entry);
1767 dbus_message_iter_recurse(&entry, &value);
1769 switch (dbus_message_iter_get_arg_type(&value)) {
1770 case DBUS_TYPE_ARRAY:
1771 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1772 err = parse_bearers(&value,
1773 &user_config->allowed_bearers);
1777 user_allowed_bearers = TRUE;
1783 case DBUS_TYPE_STRING:
1784 if (g_str_equal(key, "ConnectionType") == TRUE) {
1785 dbus_message_iter_get_basic(&value, &val);
1787 connman_session_parse_connection_type(val);
1789 user_connection_type = TRUE;
1795 dbus_message_iter_next(&array);
1799 * If the user hasn't provided a configuration, we set
1800 * the default configuration.
1802 * For AllowedBearers this is '*', ...
1804 if (user_allowed_bearers == FALSE) {
1805 user_config->allowed_bearers =
1806 g_slist_append(NULL,
1807 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1808 if (user_config->allowed_bearers == NULL) {
1814 /* ... and for ConnectionType it is 'any'. */
1815 if (user_connection_type == FALSE)
1816 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1818 dbus_message_iter_next(&iter);
1819 dbus_message_iter_get_basic(&iter, ¬ify_path);
1821 if (notify_path == NULL) {
1826 session_path = g_strdup_printf("/sessions%s", notify_path);
1827 if (session_path == NULL) {
1832 session = g_hash_table_lookup(session_hash, session_path);
1833 if (session != NULL) {
1834 g_free(session_path);
1840 session = g_try_new0(struct connman_session, 1);
1841 if (session == NULL) {
1842 g_free(session_path);
1847 session->session_path = session_path;
1849 session->info = g_try_new0(struct session_info, 1);
1850 if (session->info == NULL) {
1855 session->info_last = g_try_new0(struct session_info, 1);
1856 if (session->info_last == NULL) {
1861 session->owner = g_strdup(owner);
1862 session->notify_path = g_strdup(notify_path);
1863 session->notify_watch =
1864 g_dbus_add_disconnect_watch(connection, session->owner,
1865 owner_disconnect, session, NULL);
1867 err = assign_policy_plugin(session);
1871 err = create_policy_config(session, session_create_cb, user_config);
1872 if (err < 0 && err != -EINPROGRESS)
1875 return -EINPROGRESS;
1878 connman_error("Failed to create session");
1880 free_session(session);
1882 cleanup_user_config(user_config);
1886 void connman_session_destroy(struct connman_session *session)
1888 DBG("session %p", session);
1890 session_disconnect(session);
1893 int __connman_session_destroy(DBusMessage *msg)
1895 const char *owner, *session_path;
1896 struct connman_session *session;
1898 owner = dbus_message_get_sender(msg);
1900 DBG("owner %s", owner);
1902 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1904 if (session_path == NULL)
1907 session = g_hash_table_lookup(session_hash, session_path);
1908 if (session == NULL)
1911 if (g_strcmp0(owner, session->owner) != 0)
1914 connman_session_destroy(session);
1919 connman_bool_t __connman_session_mode()
1924 void __connman_session_set_mode(connman_bool_t enable)
1926 DBG("enable %d", enable);
1928 if (sessionmode != enable) {
1929 sessionmode = enable;
1931 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1932 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1933 DBUS_TYPE_BOOLEAN, &sessionmode);
1936 if (sessionmode == TRUE)
1937 __connman_service_disconnect_all();
1940 static void service_add(struct connman_service *service,
1943 GHashTableIter iter;
1944 GSequenceIter *iter_service_list;
1945 gpointer key, value;
1946 struct connman_session *session;
1947 struct service_entry *entry;
1949 DBG("service %p", service);
1951 g_hash_table_iter_init(&iter, session_hash);
1953 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1956 if (service_match(session, service) == FALSE)
1959 entry = create_service_entry(session, service, name,
1960 CONNMAN_SERVICE_STATE_IDLE);
1965 g_sequence_insert_sorted(session->service_list,
1966 entry, sort_services,
1969 g_hash_table_replace(session->service_hash, service,
1972 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1976 static void service_remove(struct connman_service *service)
1979 GHashTableIter iter;
1980 gpointer key, value;
1981 struct connman_session *session;
1982 struct session_info *info;
1984 DBG("service %p", service);
1986 g_hash_table_iter_init(&iter, session_hash);
1988 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1989 GSequenceIter *seq_iter;
1991 info = session->info;
1993 seq_iter = g_hash_table_lookup(session->service_hash, service);
1994 if (seq_iter == NULL)
1997 g_sequence_remove(seq_iter);
1999 if (info->entry != NULL && info->entry->service == service)
2001 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
2005 static void service_state_changed(struct connman_service *service,
2006 enum connman_service_state state)
2008 GHashTableIter iter;
2009 gpointer key, value;
2011 DBG("service %p state %d", service, state);
2013 g_hash_table_iter_init(&iter, session_hash);
2015 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2016 struct connman_session *session = value;
2017 GSequenceIter *service_iter;
2019 service_iter = g_hash_table_lookup(session->service_hash, service);
2020 if (service_iter != NULL) {
2021 struct service_entry *entry;
2023 entry = g_sequence_get(service_iter);
2024 entry->state = state;
2027 session_changed(session,
2028 CONNMAN_SESSION_TRIGGER_SERVICE);
2032 static void ipconfig_changed(struct connman_service *service,
2033 struct connman_ipconfig *ipconfig)
2035 GHashTableIter iter;
2036 gpointer key, value;
2037 struct connman_session *session;
2038 struct session_info *info;
2039 enum connman_ipconfig_type type;
2041 DBG("service %p ipconfig %p", service, ipconfig);
2043 type = __connman_ipconfig_get_config_type(ipconfig);
2045 g_hash_table_iter_init(&iter, session_hash);
2047 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2049 info = session->info;
2051 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2054 if (info->entry != NULL && info->entry->service == service) {
2055 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2056 ipconfig_ipv4_changed(session);
2057 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2058 ipconfig_ipv6_changed(session);
2063 static struct connman_notifier session_notifier = {
2065 .service_add = service_add,
2066 .service_remove = service_remove,
2067 .service_state_changed = service_state_changed,
2068 .ipconfig_changed = ipconfig_changed,
2071 int __connman_session_init(void)
2077 connection = connman_dbus_get_connection();
2078 if (connection == NULL)
2081 err = connman_notifier_register(&session_notifier);
2083 dbus_connection_unref(connection);
2087 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2088 NULL, cleanup_session);
2090 sessionmode = FALSE;
2094 void __connman_session_cleanup(void)
2098 if (connection == NULL)
2101 connman_notifier_unregister(&session_notifier);
2103 g_hash_table_foreach(session_hash, release_session, NULL);
2104 g_hash_table_destroy(session_hash);
2105 session_hash = NULL;
2107 dbus_connection_unref(connection);