5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 struct connman_session *session;
64 /* track why this service was selected */
65 enum connman_session_reason reason;
66 enum connman_service_state state;
68 struct connman_service *service;
71 GSList *pending_timeouts;
75 struct connman_session_config config;
76 enum connman_session_state state;
77 struct service_entry *entry;
78 enum connman_session_reason reason;
81 struct connman_session {
87 struct connman_session_policy *policy;
89 connman_bool_t append_all;
90 struct session_info *info;
91 struct session_info *info_last;
92 struct connman_session_config *policy_config;
93 GSList *user_allowed_bearers;
97 GSequence *service_list;
98 GHashTable *service_hash;
101 static const char *trigger2string(enum connman_session_trigger trigger)
104 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
106 case CONNMAN_SESSION_TRIGGER_SETTING:
108 case CONNMAN_SESSION_TRIGGER_CONNECT:
110 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
112 case CONNMAN_SESSION_TRIGGER_SERVICE:
114 case CONNMAN_SESSION_TRIGGER_ECALL:
121 static const char *reason2string(enum connman_session_reason reason)
124 case CONNMAN_SESSION_REASON_UNKNOWN:
126 case CONNMAN_SESSION_REASON_CONNECT:
128 case CONNMAN_SESSION_REASON_FREE_RIDE:
135 static const char *state2string(enum connman_session_state state)
138 case CONNMAN_SESSION_STATE_DISCONNECTED:
139 return "disconnected";
140 case CONNMAN_SESSION_STATE_CONNECTED:
142 case CONNMAN_SESSION_STATE_ONLINE:
149 static const char *type2string(enum connman_session_type type)
152 case CONNMAN_SESSION_TYPE_UNKNOWN:
154 case CONNMAN_SESSION_TYPE_ANY:
156 case CONNMAN_SESSION_TYPE_LOCAL:
158 case CONNMAN_SESSION_TYPE_INTERNET:
165 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
167 if (g_strcmp0(policy, "default") == 0)
168 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
169 else if (g_strcmp0(policy, "always") == 0)
170 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
171 else if (g_strcmp0(policy, "forbidden") == 0)
172 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
173 else if (g_strcmp0(policy, "national") == 0)
174 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
175 else if (g_strcmp0(policy, "international") == 0)
176 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
178 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
181 enum connman_session_type connman_session_parse_connection_type(const char *type)
183 if (g_strcmp0(type, "any") == 0)
184 return CONNMAN_SESSION_TYPE_ANY;
185 if (g_strcmp0(type, "local") == 0)
186 return CONNMAN_SESSION_TYPE_LOCAL;
187 else if (g_strcmp0(type, "internet") == 0)
188 return CONNMAN_SESSION_TYPE_INTERNET;
190 return CONNMAN_SESSION_TYPE_UNKNOWN;
193 static int bearer2service(const char *bearer, enum connman_service_type *type)
195 if (g_strcmp0(bearer, "ethernet") == 0)
196 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
197 else if (g_strcmp0(bearer, "wifi") == 0)
198 *type = CONNMAN_SERVICE_TYPE_WIFI;
199 else if (g_strcmp0(bearer, "bluetooth") == 0)
200 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
201 else if (g_strcmp0(bearer, "cellular") == 0)
202 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
203 else if (g_strcmp0(bearer, "vpn") == 0)
204 *type = CONNMAN_SERVICE_TYPE_VPN;
205 else if (g_strcmp0(bearer, "*") == 0)
206 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
213 static char *service2bearer(enum connman_service_type type)
216 case CONNMAN_SERVICE_TYPE_ETHERNET:
218 case CONNMAN_SERVICE_TYPE_WIFI:
220 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
222 case CONNMAN_SERVICE_TYPE_CELLULAR:
224 case CONNMAN_SERVICE_TYPE_VPN:
226 case CONNMAN_SERVICE_TYPE_UNKNOWN:
228 case CONNMAN_SERVICE_TYPE_SYSTEM:
229 case CONNMAN_SERVICE_TYPE_GPS:
230 case CONNMAN_SERVICE_TYPE_GADGET:
237 static void destroy_policy_config(struct connman_session *session)
239 if (session->policy == NULL) {
240 g_free(session->policy_config);
244 (*session->policy->destroy)(session);
247 static void free_session(struct connman_session *session)
252 if (session->notify_watch > 0)
253 g_dbus_remove_watch(connection, session->notify_watch);
255 destroy_policy_config(session);
256 g_slist_free(session->info->config.allowed_bearers);
257 g_free(session->owner);
258 g_free(session->session_path);
259 g_free(session->notify_path);
260 g_free(session->info);
261 g_free(session->info_last);
266 static void cleanup_session(gpointer user_data)
268 struct connman_session *session = user_data;
269 struct session_info *info = session->info;
271 DBG("remove %s", session->session_path);
273 g_slist_free(session->user_allowed_bearers);
274 g_hash_table_destroy(session->service_hash);
275 g_sequence_free(session->service_list);
277 if (info->entry != NULL &&
278 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
279 __connman_service_disconnect(info->entry->service);
282 free_session(session);
285 static int assign_policy_plugin(struct connman_session *session)
287 if (session->policy != NULL)
290 if (policy_list == NULL)
293 session->policy = policy_list->data;
299 DBusMessage *pending;
301 enum connman_session_type type;
302 GSList *allowed_bearers;
305 static void cleanup_user_config(struct user_config *user_config)
307 if (user_config == NULL)
310 if (user_config->pending != NULL)
311 dbus_message_unref(user_config->pending);
313 g_slist_free(user_config->allowed_bearers);
317 static int create_policy_config(struct connman_session *session,
318 connman_session_config_func_t cb,
319 struct user_config *user_config)
321 struct connman_session_config *config;
323 if (session->policy == NULL) {
324 config = connman_session_create_default_config();
325 if (config == NULL) {
326 free_session(session);
327 cleanup_user_config(user_config);
331 return cb(session, config, user_config, 0);
334 return (*session->policy->create)(session, cb, user_config);
337 static void probe_policy(struct connman_session_policy *policy)
342 struct connman_session *session;
344 DBG("policy %p name %s", policy, policy->name);
346 g_hash_table_iter_init(&iter, session_hash);
348 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
351 if (session->policy != NULL)
354 assign_policy_plugin(session);
358 static void remove_policy(struct connman_session_policy *policy)
362 struct connman_session *session;
364 if (session_hash == NULL)
367 DBG("policy %p name %s", policy, policy->name);
369 g_hash_table_iter_init(&iter, session_hash);
371 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
374 if (session->policy != policy)
377 session->policy = NULL;
378 assign_policy_plugin(session);
382 static gint compare_priority(gconstpointer a, gconstpointer b)
384 const struct connman_session_policy *policy1 = a;
385 const struct connman_session_policy *policy2 = b;
387 return policy2->priority - policy1->priority;
391 int connman_session_policy_register(struct connman_session_policy *policy)
393 DBG("name %s", policy->name);
395 if (policy->create == NULL || policy->destroy == NULL)
398 policy_list = g_slist_insert_sorted(policy_list, policy,
401 probe_policy(policy);
406 void connman_session_policy_unregister(struct connman_session_policy *policy)
408 DBG("name %s", policy->name);
410 policy_list = g_slist_remove(policy_list, policy);
412 remove_policy(policy);
415 void connman_session_set_default_config(struct connman_session_config *config)
417 config->priority = FALSE;
418 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
419 config->type = CONNMAN_SESSION_TYPE_ANY;
420 config->ecall = FALSE;
422 g_slist_free(config->allowed_bearers);
423 config->allowed_bearers = g_slist_prepend(NULL,
424 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
427 struct connman_session_config *connman_session_create_default_config(void)
429 struct connman_session_config *config;
431 config = g_new0(struct connman_session_config, 1);
432 connman_session_set_default_config(config);
437 static enum connman_session_type apply_policy_on_type(
438 enum connman_session_type policy,
439 enum connman_session_type type)
441 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
442 return CONNMAN_SESSION_TYPE_UNKNOWN;
444 if (policy == CONNMAN_SESSION_TYPE_ANY)
447 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
448 return CONNMAN_SESSION_TYPE_LOCAL;
450 return CONNMAN_SESSION_TYPE_INTERNET;
453 int connman_session_parse_bearers(const char *token, GSList **list)
455 enum connman_service_type bearer;
458 if (g_strcmp0(token, "") == 0)
461 err = bearer2service(token, &bearer);
465 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
470 static int parse_bearers(DBusMessageIter *iter, GSList **list)
472 DBusMessageIter array;
475 dbus_message_iter_recurse(iter, &array);
479 while ((type = dbus_message_iter_get_arg_type(&array)) !=
481 char *bearer_name = NULL;
483 if (type != DBUS_TYPE_STRING) {
489 dbus_message_iter_get_basic(&array, &bearer_name);
491 err = connman_session_parse_bearers(bearer_name, list);
498 dbus_message_iter_next(&array);
504 static int filter_bearer(GSList *policy_bearers,
505 enum connman_service_type bearer,
508 enum connman_service_type policy;
511 if (policy_bearers == NULL)
514 for (it = policy_bearers; it != NULL; it = it->next) {
515 policy = GPOINTER_TO_INT(it->data);
517 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
522 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
533 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
538 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
541 enum connman_service_type bearer;
547 for (it = bearers; it != NULL; it = it->next) {
548 bearer = GPOINTER_TO_INT(it->data);
550 err = filter_bearer(policy_bearers, bearer, list);
558 const char *connman_session_get_owner(struct connman_session *session)
560 return session->owner;
563 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
565 struct session_info *info = user_data;
568 for (list = info->config.allowed_bearers;
569 list != NULL; list = list->next) {
570 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
571 const char *name = __connman_service_type2string(bearer);
576 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
581 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
583 struct connman_service *service = user_data;
584 struct connman_ipconfig *ipconfig_ipv4;
589 if (__connman_service_is_connected_state(service,
590 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
594 ipconfig_ipv4 = __connman_service_get_ip4config(service);
595 if (ipconfig_ipv4 == NULL)
598 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
601 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
603 struct connman_service *service = user_data;
604 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
609 if (__connman_service_is_connected_state(service,
610 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
614 ipconfig_ipv4 = __connman_service_get_ip4config(service);
615 ipconfig_ipv6 = __connman_service_get_ip6config(service);
616 if (ipconfig_ipv6 == NULL)
619 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
622 static void append_notify(DBusMessageIter *dict,
623 struct connman_session *session)
625 struct session_info *info = session->info;
626 struct session_info *info_last = session->info_last;
627 struct connman_service *service;
628 const char *name, *ifname, *bearer;
630 if (session->append_all == TRUE ||
631 info->state != info_last->state) {
632 const char *state = state2string(info->state);
634 connman_dbus_dict_append_basic(dict, "State",
637 info_last->state = info->state;
640 if (session->append_all == TRUE ||
641 info->entry != info_last->entry) {
642 if (info->entry == NULL) {
648 name = info->entry->name;
649 ifname = info->entry->ifname;
650 service = info->entry->service;
651 bearer = info->entry->bearer;
654 connman_dbus_dict_append_basic(dict, "Name",
658 connman_dbus_dict_append_dict(dict, "IPv4",
659 append_ipconfig_ipv4,
662 connman_dbus_dict_append_dict(dict, "IPv6",
663 append_ipconfig_ipv6,
666 connman_dbus_dict_append_basic(dict, "Interface",
670 connman_dbus_dict_append_basic(dict, "Bearer",
674 info_last->entry = info->entry;
677 if (session->append_all == TRUE ||
678 info->config.type != info_last->config.type) {
679 const char *type = type2string(info->config.type);
681 connman_dbus_dict_append_basic(dict, "ConnectionType",
684 info_last->config.type = info->config.type;
687 if (session->append_all == TRUE ||
688 info->config.allowed_bearers != info_last->config.allowed_bearers) {
689 connman_dbus_dict_append_array(dict, "AllowedBearers",
691 append_allowed_bearers,
693 info_last->config.allowed_bearers = info->config.allowed_bearers;
696 session->append_all = FALSE;
699 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
700 enum connman_session_type type)
703 case CONNMAN_SESSION_TYPE_UNKNOWN:
705 case CONNMAN_SESSION_TYPE_ANY:
707 case CONNMAN_SESSION_TYPE_LOCAL:
708 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
709 *state = CONNMAN_SESSION_STATE_CONNECTED;
714 case CONNMAN_SESSION_TYPE_INTERNET:
715 if (*state == CONNMAN_SESSION_STATE_ONLINE)
723 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
725 struct session_info *info_last = session->info_last;
726 struct session_info *info = session->info;
728 if (session->append_all == TRUE)
731 if (info->state != info_last->state)
734 if (info->entry != info_last->entry &&
735 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
738 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
739 info->config.type != info_last->config.type)
745 static gboolean session_notify(gpointer user_data)
747 struct connman_session *session = user_data;
749 DBusMessageIter array, dict;
751 if (compute_notifiable_changes(session) == FALSE)
754 DBG("session %p owner %s notify_path %s", session,
755 session->owner, session->notify_path);
757 msg = dbus_message_new_method_call(session->owner, session->notify_path,
758 CONNMAN_NOTIFICATION_INTERFACE,
763 dbus_message_iter_init_append(msg, &array);
764 connman_dbus_dict_open(&array, &dict);
766 append_notify(&dict, session);
768 connman_dbus_dict_close(&array, &dict);
770 g_dbus_send_message(connection, msg);
775 static void ipconfig_ipv4_changed(struct connman_session *session)
777 struct session_info *info = session->info;
779 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
780 "IPv4", append_ipconfig_ipv4,
781 info->entry->service);
784 static void ipconfig_ipv6_changed(struct connman_session *session)
786 struct session_info *info = session->info;
788 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
789 "IPv6", append_ipconfig_ipv6,
790 info->entry->service);
793 static connman_bool_t service_type_match(struct connman_session *session,
794 struct connman_service *service)
796 struct session_info *info = session->info;
799 for (list = info->config.allowed_bearers;
800 list != NULL; list = list->next) {
801 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
802 enum connman_service_type service_type;
804 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
807 service_type = connman_service_get_type(service);
808 if (bearer == service_type)
815 static connman_bool_t service_match(struct connman_session *session,
816 struct connman_service *service)
818 if (service_type_match(session, service) == FALSE)
824 static int service_type_weight(enum connman_service_type type)
827 * The session doesn't care which service
828 * to use. Nevertheless we have to sort them
829 * according their type. The ordering is
838 case CONNMAN_SERVICE_TYPE_ETHERNET:
840 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
842 case CONNMAN_SERVICE_TYPE_WIFI:
844 case CONNMAN_SERVICE_TYPE_CELLULAR:
846 case CONNMAN_SERVICE_TYPE_UNKNOWN:
847 case CONNMAN_SERVICE_TYPE_SYSTEM:
848 case CONNMAN_SERVICE_TYPE_GPS:
849 case CONNMAN_SERVICE_TYPE_VPN:
850 case CONNMAN_SERVICE_TYPE_GADGET:
857 static gint sort_allowed_bearers(struct connman_service *service_a,
858 struct connman_service *service_b,
859 struct connman_session *session)
861 struct session_info *info = session->info;
863 enum connman_service_type type_a, type_b;
864 int weight_a, weight_b;
866 type_a = connman_service_get_type(service_a);
867 type_b = connman_service_get_type(service_b);
869 for (list = info->config.allowed_bearers;
870 list != NULL; list = list->next) {
871 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
873 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
874 if (type_a != type_b) {
875 weight_a = service_type_weight(type_a);
876 weight_b = service_type_weight(type_b);
878 if (weight_a > weight_b)
881 if (weight_a < weight_b)
888 if (type_a == bearer && type_b == bearer)
891 if (type_a == bearer && type_b != bearer)
894 if (type_a != bearer && type_b == bearer)
901 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
903 struct service_entry *entry_a = (void *)a;
904 struct service_entry *entry_b = (void *)b;
905 struct connman_session *session = user_data;
907 return sort_allowed_bearers(entry_a->service, entry_b->service,
911 static enum connman_session_state service_to_session_state(enum connman_service_state state)
914 case CONNMAN_SERVICE_STATE_UNKNOWN:
915 case CONNMAN_SERVICE_STATE_IDLE:
916 case CONNMAN_SERVICE_STATE_ASSOCIATION:
917 case CONNMAN_SERVICE_STATE_CONFIGURATION:
918 case CONNMAN_SERVICE_STATE_DISCONNECT:
919 case CONNMAN_SERVICE_STATE_FAILURE:
921 case CONNMAN_SERVICE_STATE_READY:
922 return CONNMAN_SESSION_STATE_CONNECTED;
923 case CONNMAN_SERVICE_STATE_ONLINE:
924 return CONNMAN_SESSION_STATE_ONLINE;
927 return CONNMAN_SESSION_STATE_DISCONNECTED;
930 static connman_bool_t is_connected(enum connman_service_state state)
933 case CONNMAN_SERVICE_STATE_UNKNOWN:
934 case CONNMAN_SERVICE_STATE_IDLE:
935 case CONNMAN_SERVICE_STATE_ASSOCIATION:
936 case CONNMAN_SERVICE_STATE_CONFIGURATION:
937 case CONNMAN_SERVICE_STATE_DISCONNECT:
938 case CONNMAN_SERVICE_STATE_FAILURE:
940 case CONNMAN_SERVICE_STATE_READY:
941 case CONNMAN_SERVICE_STATE_ONLINE:
948 static connman_bool_t is_connecting(enum connman_service_state state)
951 case CONNMAN_SERVICE_STATE_UNKNOWN:
952 case CONNMAN_SERVICE_STATE_IDLE:
954 case CONNMAN_SERVICE_STATE_ASSOCIATION:
955 case CONNMAN_SERVICE_STATE_CONFIGURATION:
957 case CONNMAN_SERVICE_STATE_DISCONNECT:
958 case CONNMAN_SERVICE_STATE_FAILURE:
959 case CONNMAN_SERVICE_STATE_READY:
960 case CONNMAN_SERVICE_STATE_ONLINE:
967 static connman_bool_t explicit_connect(enum connman_session_reason reason)
970 case CONNMAN_SESSION_REASON_UNKNOWN:
971 case CONNMAN_SESSION_REASON_FREE_RIDE:
973 case CONNMAN_SESSION_REASON_CONNECT:
980 static connman_bool_t explicit_disconnect(struct session_info *info)
982 if (info->entry == NULL)
985 DBG("reason %s service %p state %d",
986 reason2string(info->entry->reason),
987 info->entry->service, info->entry->state);
989 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
992 if (explicit_connect(info->entry->reason) == FALSE)
995 if (__connman_service_session_dec(info->entry->service) == FALSE)
1001 struct pending_data {
1002 unsigned int timeout;
1003 struct service_entry *entry;
1004 gboolean (*cb)(gpointer);
1007 static void pending_timeout_free(gpointer data, gpointer user_data)
1009 struct pending_data *pending = data;
1011 DBG("pending %p timeout %d", pending, pending->timeout);
1012 g_source_remove(pending->timeout);
1016 static void pending_timeout_remove_all(struct service_entry *entry)
1020 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1021 g_slist_free(entry->pending_timeouts);
1022 entry->pending_timeouts = NULL;
1025 static gboolean pending_timeout_cb(gpointer data)
1027 struct pending_data *pending = data;
1028 struct service_entry *entry = pending->entry;
1031 DBG("pending %p timeout %d", pending, pending->timeout);
1033 ret = pending->cb(pending->entry);
1035 entry->pending_timeouts =
1036 g_slist_remove(entry->pending_timeouts,
1043 static connman_bool_t pending_timeout_add(unsigned int seconds,
1044 gboolean (*cb)(gpointer),
1045 struct service_entry *entry)
1047 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1049 if (pending == NULL || cb == NULL || entry == NULL) {
1055 pending->entry = entry;
1056 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1058 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1061 DBG("pending %p entry %p timeout id %d", pending, entry,
1067 static gboolean call_disconnect(gpointer user_data)
1069 struct service_entry *entry = user_data;
1070 struct connman_service *service = entry->service;
1073 * TODO: We should mark this entry as pending work. In case
1074 * disconnect fails we just unassign this session from the
1075 * service and can't do anything later on it
1077 DBG("disconnect service %p", service);
1078 __connman_service_disconnect(service);
1083 static gboolean call_connect(gpointer user_data)
1085 struct service_entry *entry = user_data;
1086 struct connman_service *service = entry->service;
1088 DBG("connect service %p", service);
1089 __connman_service_connect(service);
1094 static void deselect_service(struct session_info *info)
1096 struct service_entry *entry;
1097 connman_bool_t disconnect, connected;
1101 if (info->entry == NULL)
1104 disconnect = explicit_disconnect(info);
1106 connected = is_connecting(info->entry->state) == TRUE ||
1107 is_connected(info->entry->state) == TRUE;
1109 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1110 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1112 entry = info->entry;
1115 DBG("disconnect %d connected %d", disconnect, connected);
1117 if (disconnect == TRUE && connected == TRUE)
1118 pending_timeout_add(0, call_disconnect, entry);
1121 static void deselect_and_disconnect(struct connman_session *session)
1123 struct session_info *info = session->info;
1125 deselect_service(info);
1127 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1130 static void select_connected_service(struct session_info *info,
1131 struct service_entry *entry)
1133 enum connman_session_state state;
1135 state = service_to_session_state(entry->state);
1136 if (is_type_matching_state(&state, info->config.type) == FALSE)
1139 info->state = state;
1141 info->entry = entry;
1142 info->entry->reason = info->reason;
1144 if (explicit_connect(info->reason) == FALSE)
1147 __connman_service_session_inc(info->entry->service);
1150 static void select_offline_service(struct session_info *info,
1151 struct service_entry *entry)
1153 if (explicit_connect(info->reason) == FALSE)
1156 info->state = service_to_session_state(entry->state);
1158 info->entry = entry;
1159 info->entry->reason = info->reason;
1161 __connman_service_session_inc(info->entry->service);
1162 pending_timeout_add(0, call_connect, entry);
1165 static void select_service(struct session_info *info,
1166 struct service_entry *entry)
1168 DBG("service %p", entry->service);
1170 if (is_connected(entry->state) == TRUE)
1171 select_connected_service(info, entry);
1173 select_offline_service(info, entry);
1176 static void select_and_connect(struct connman_session *session,
1177 enum connman_session_reason reason)
1179 struct session_info *info = session->info;
1180 struct service_entry *entry = NULL;
1181 GSequenceIter *iter;
1183 DBG("session %p reason %s", session, reason2string(reason));
1185 info->reason = reason;
1187 iter = g_sequence_get_begin_iter(session->service_list);
1189 while (g_sequence_iter_is_end(iter) == FALSE) {
1190 entry = g_sequence_get(iter);
1192 switch (entry->state) {
1193 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1194 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1195 case CONNMAN_SERVICE_STATE_READY:
1196 case CONNMAN_SERVICE_STATE_ONLINE:
1197 case CONNMAN_SERVICE_STATE_IDLE:
1198 case CONNMAN_SERVICE_STATE_DISCONNECT:
1199 select_service(info, entry);
1201 case CONNMAN_SERVICE_STATE_UNKNOWN:
1202 case CONNMAN_SERVICE_STATE_FAILURE:
1206 iter = g_sequence_iter_next(iter);
1210 static struct service_entry *create_service_entry(struct connman_session * session,
1211 struct connman_service *service,
1213 enum connman_service_state state)
1215 struct service_entry *entry;
1216 enum connman_service_type type;
1219 entry = g_try_new0(struct service_entry, 1);
1223 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1224 entry->state = state;
1229 entry->service = service;
1231 idx = __connman_service_get_index(entry->service);
1232 entry->ifname = connman_inet_ifname(idx);
1233 if (entry->ifname == NULL)
1234 entry->ifname = g_strdup("");
1236 type = connman_service_get_type(entry->service);
1237 entry->bearer = service2bearer(type);
1239 entry->session = session;
1244 static void destroy_service_entry(gpointer data)
1246 struct service_entry *entry = data;
1248 pending_timeout_remove_all(entry);
1249 g_free(entry->ifname);
1254 static void populate_service_list(struct connman_session *session)
1256 struct service_entry *entry;
1257 GSequenceIter *iter;
1259 session->service_hash =
1260 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1262 session->service_list = __connman_service_get_list(session,
1264 create_service_entry,
1265 destroy_service_entry);
1267 g_sequence_sort(session->service_list, sort_services, session);
1269 iter = g_sequence_get_begin_iter(session->service_list);
1271 while (g_sequence_iter_is_end(iter) == FALSE) {
1272 entry = g_sequence_get(iter);
1274 DBG("service %p type %s name %s", entry->service,
1275 service2bearer(connman_service_get_type(entry->service)),
1278 g_hash_table_replace(session->service_hash,
1279 entry->service, iter);
1281 iter = g_sequence_iter_next(iter);
1285 static void session_changed(struct connman_session *session,
1286 enum connman_session_trigger trigger)
1288 struct session_info *info = session->info;
1289 struct session_info *info_last = session->info_last;
1290 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1291 GSequence *service_list_last;
1292 GHashTable *service_hash_last;
1295 * TODO: This only a placeholder for the 'real' algorithm to
1296 * play a bit around. So we are going to improve it step by step.
1299 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1300 reason2string(info->reason));
1302 if (info->entry != NULL) {
1303 enum connman_session_state state;
1305 state = service_to_session_state(info->entry->state);
1307 if (is_type_matching_state(&state, info->config.type) == TRUE)
1308 info->state = state;
1312 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1313 DBG("ignore session changed event");
1315 case CONNMAN_SESSION_TRIGGER_SETTING:
1316 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1318 service_hash_last = session->service_hash;
1319 service_list_last = session->service_list;
1321 populate_service_list(session);
1323 if (info->entry != NULL) {
1324 service_iter_last = g_hash_table_lookup(
1326 info->entry->service);
1327 service_iter = g_hash_table_lookup(
1328 session->service_hash,
1329 info->entry->service);
1332 if (service_iter == NULL && service_iter_last != NULL) {
1334 * The currently selected service is
1335 * not part of this session anymore.
1337 deselect_and_disconnect(session);
1340 g_hash_table_remove_all(service_hash_last);
1341 g_sequence_free(service_list_last);
1344 if (info->config.type != info_last->config.type) {
1345 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1346 is_type_matching_state(&info->state,
1347 info->config.type) == FALSE)
1348 deselect_and_disconnect(session);
1351 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1352 select_and_connect(session,
1353 CONNMAN_SESSION_REASON_FREE_RIDE);
1357 case CONNMAN_SESSION_TRIGGER_ECALL:
1359 * For the time beeing we fallback to normal connect
1362 case CONNMAN_SESSION_TRIGGER_CONNECT:
1363 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1364 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1366 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1367 __connman_service_session_inc(info->entry->service);
1371 if (info->entry != NULL &&
1372 is_connecting(info->entry->state) == TRUE) {
1376 select_and_connect(session,
1377 CONNMAN_SESSION_REASON_CONNECT);
1380 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1381 deselect_and_disconnect(session);
1384 case CONNMAN_SESSION_TRIGGER_SERVICE:
1385 if (info->entry != NULL &&
1386 (is_connecting(info->entry->state) == TRUE ||
1387 is_connected(info->entry->state) == TRUE)) {
1391 deselect_and_disconnect(session);
1393 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1394 select_and_connect(session, info->reason);
1400 session_notify(session);
1403 int connman_session_config_update(struct connman_session *session)
1405 struct session_info *info = session->info;
1406 GSList *allowed_bearers;
1409 DBG("session %p", session);
1412 * We update all configuration even though only one entry
1413 * might have changed. We can still optimize this later.
1416 err = apply_policy_on_bearers(
1417 session->policy_config->allowed_bearers,
1418 session->user_allowed_bearers,
1423 g_slist_free(info->config.allowed_bearers);
1424 info->config.allowed_bearers = allowed_bearers;
1426 info->config.type = apply_policy_on_type(
1427 session->policy_config->type,
1430 info->config.roaming_policy = session->policy_config->roaming_policy;
1432 info->config.ecall = session->policy_config->ecall;
1433 if (info->config.ecall == TRUE)
1434 ecall_session = session;
1436 info->config.priority = session->policy_config->priority;
1438 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1443 static DBusMessage *connect_session(DBusConnection *conn,
1444 DBusMessage *msg, void *user_data)
1446 struct connman_session *session = user_data;
1448 DBG("session %p", session);
1450 if (ecall_session != NULL) {
1451 if (ecall_session->ecall == TRUE && ecall_session != session)
1452 return __connman_error_failed(msg, EBUSY);
1454 session->ecall = TRUE;
1455 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1457 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1459 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1462 static DBusMessage *disconnect_session(DBusConnection *conn,
1463 DBusMessage *msg, void *user_data)
1465 struct connman_session *session = user_data;
1467 DBG("session %p", session);
1469 if (ecall_session != NULL) {
1470 if (ecall_session->ecall == TRUE && ecall_session != session)
1471 return __connman_error_failed(msg, EBUSY);
1473 session->ecall = FALSE;
1476 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1478 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1481 static DBusMessage *change_session(DBusConnection *conn,
1482 DBusMessage *msg, void *user_data)
1484 struct connman_session *session = user_data;
1485 struct session_info *info = session->info;
1486 DBusMessageIter iter, value;
1489 GSList *allowed_bearers;
1492 DBG("session %p", session);
1493 if (dbus_message_iter_init(msg, &iter) == FALSE)
1494 return __connman_error_invalid_arguments(msg);
1496 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1497 return __connman_error_invalid_arguments(msg);
1499 dbus_message_iter_get_basic(&iter, &name);
1500 dbus_message_iter_next(&iter);
1502 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1503 return __connman_error_invalid_arguments(msg);
1505 dbus_message_iter_recurse(&iter, &value);
1507 switch (dbus_message_iter_get_arg_type(&value)) {
1508 case DBUS_TYPE_ARRAY:
1509 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1510 err = parse_bearers(&value, &allowed_bearers);
1512 return __connman_error_failed(msg, err);
1514 g_slist_free(info->config.allowed_bearers);
1515 session->user_allowed_bearers = allowed_bearers;
1517 err = apply_policy_on_bearers(
1518 session->policy_config->allowed_bearers,
1519 session->user_allowed_bearers,
1520 &info->config.allowed_bearers);
1523 return __connman_error_failed(msg, err);
1528 case DBUS_TYPE_STRING:
1529 if (g_str_equal(name, "ConnectionType") == TRUE) {
1530 dbus_message_iter_get_basic(&value, &val);
1531 info->config.type = apply_policy_on_type(
1532 session->policy_config->type,
1533 connman_session_parse_connection_type(val));
1542 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1544 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1547 return __connman_error_invalid_arguments(msg);
1550 static void release_session(gpointer key, gpointer value, gpointer user_data)
1552 struct connman_session *session = value;
1553 DBusMessage *message;
1555 DBG("owner %s path %s", session->owner, session->notify_path);
1557 if (session->notify_watch > 0)
1558 g_dbus_remove_watch(connection, session->notify_watch);
1560 g_dbus_unregister_interface(connection, session->session_path,
1561 CONNMAN_SESSION_INTERFACE);
1563 message = dbus_message_new_method_call(session->owner,
1564 session->notify_path,
1565 CONNMAN_NOTIFICATION_INTERFACE,
1567 if (message == NULL)
1570 dbus_message_set_no_reply(message, TRUE);
1572 g_dbus_send_message(connection, message);
1575 static int session_disconnect(struct connman_session *session)
1577 DBG("session %p, %s", session, session->owner);
1579 if (session->notify_watch > 0)
1580 g_dbus_remove_watch(connection, session->notify_watch);
1582 g_dbus_unregister_interface(connection, session->session_path,
1583 CONNMAN_SESSION_INTERFACE);
1585 deselect_and_disconnect(session);
1587 g_hash_table_remove(session_hash, session->session_path);
1592 static void owner_disconnect(DBusConnection *conn, void *user_data)
1594 struct connman_session *session = user_data;
1596 DBG("session %p, %s died", session, session->owner);
1598 session_disconnect(session);
1601 static DBusMessage *destroy_session(DBusConnection *conn,
1602 DBusMessage *msg, void *user_data)
1604 struct connman_session *session = user_data;
1606 DBG("session %p", session);
1608 if (ecall_session != NULL && ecall_session != session)
1609 return __connman_error_failed(msg, EBUSY);
1611 session_disconnect(session);
1613 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1616 static const GDBusMethodTable session_methods[] = {
1617 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1618 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1619 { GDBUS_METHOD("Disconnect", NULL, NULL,
1620 disconnect_session ) },
1621 { GDBUS_METHOD("Change",
1622 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1623 NULL, change_session) },
1627 static int session_create_cb(struct connman_session *session,
1628 struct connman_session_config *config,
1629 void *user_data, int err)
1632 struct user_config *user_config = user_data;
1633 struct session_info *info, *info_last;
1635 DBG("session %p config %p", session, config);
1640 session->policy_config = config;
1642 info = session->info;
1643 info_last = session->info_last;
1645 if (session->policy_config->ecall == TRUE)
1646 ecall_session = session;
1648 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1649 info->config.type = apply_policy_on_type(
1650 session->policy_config->type,
1652 info->config.priority = session->policy_config->priority;
1653 info->config.roaming_policy = session->policy_config->roaming_policy;
1656 session->user_allowed_bearers = user_config->allowed_bearers;
1657 user_config->allowed_bearers = NULL;
1659 err = apply_policy_on_bearers(
1660 session->policy_config->allowed_bearers,
1661 session->user_allowed_bearers,
1662 &info->config.allowed_bearers);
1666 g_hash_table_replace(session_hash, session->session_path, session);
1668 DBG("add %s", session->session_path);
1670 if (g_dbus_register_interface(connection, session->session_path,
1671 CONNMAN_SESSION_INTERFACE,
1672 session_methods, NULL,
1673 NULL, session, NULL) == FALSE) {
1674 connman_error("Failed to register %s", session->session_path);
1675 g_hash_table_remove(session_hash, session->session_path);
1680 reply = g_dbus_create_reply(user_config->pending,
1681 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1683 g_dbus_send_message(connection, reply);
1684 user_config->pending = NULL;
1686 populate_service_list(session);
1688 info_last->state = info->state;
1689 info_last->config.priority = info->config.priority;
1690 info_last->config.roaming_policy = info->config.roaming_policy;
1691 info_last->entry = info->entry;
1692 info_last->config.allowed_bearers = info->config.allowed_bearers;
1694 session->append_all = TRUE;
1696 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1700 reply = __connman_error_failed(user_config->pending, -err);
1701 g_dbus_send_message(connection, reply);
1703 free_session(session);
1706 cleanup_user_config(user_config);
1711 int __connman_session_create(DBusMessage *msg)
1713 const char *owner, *notify_path;
1714 char *session_path = NULL;
1715 DBusMessageIter iter, array;
1716 struct connman_session *session = NULL;
1717 struct user_config *user_config = NULL;
1718 connman_bool_t user_allowed_bearers = FALSE;
1719 connman_bool_t user_connection_type = FALSE;
1722 owner = dbus_message_get_sender(msg);
1724 DBG("owner %s", owner);
1726 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1728 * If there is an emergency call already going on,
1729 * ignore session creation attempt
1735 user_config = g_try_new0(struct user_config, 1);
1736 if (user_config == NULL) {
1741 user_config->pending = dbus_message_ref(msg);
1743 dbus_message_iter_init(msg, &iter);
1744 dbus_message_iter_recurse(&iter, &array);
1746 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1747 DBusMessageIter entry, value;
1748 const char *key, *val;
1750 dbus_message_iter_recurse(&array, &entry);
1751 dbus_message_iter_get_basic(&entry, &key);
1753 dbus_message_iter_next(&entry);
1754 dbus_message_iter_recurse(&entry, &value);
1756 switch (dbus_message_iter_get_arg_type(&value)) {
1757 case DBUS_TYPE_ARRAY:
1758 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1759 err = parse_bearers(&value,
1760 &user_config->allowed_bearers);
1764 user_allowed_bearers = TRUE;
1770 case DBUS_TYPE_STRING:
1771 if (g_str_equal(key, "ConnectionType") == TRUE) {
1772 dbus_message_iter_get_basic(&value, &val);
1774 connman_session_parse_connection_type(val);
1776 user_connection_type = TRUE;
1782 dbus_message_iter_next(&array);
1786 * If the user hasn't provided a configuration, we set
1787 * the default configuration.
1789 * For AllowedBearers this is '*', ...
1791 if (user_allowed_bearers == FALSE) {
1792 user_config->allowed_bearers =
1793 g_slist_append(NULL,
1794 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1795 if (user_config->allowed_bearers == NULL) {
1801 /* ... and for ConnectionType it is 'any'. */
1802 if (user_connection_type == FALSE)
1803 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1805 dbus_message_iter_next(&iter);
1806 dbus_message_iter_get_basic(&iter, ¬ify_path);
1808 if (notify_path == NULL) {
1813 session_path = g_strdup_printf("/sessions%s", notify_path);
1814 if (session_path == NULL) {
1819 session = g_hash_table_lookup(session_hash, session_path);
1820 if (session != NULL) {
1821 g_free(session_path);
1827 session = g_try_new0(struct connman_session, 1);
1828 if (session == NULL) {
1829 g_free(session_path);
1834 session->session_path = session_path;
1836 session->info = g_try_new0(struct session_info, 1);
1837 if (session->info == NULL) {
1842 session->info_last = g_try_new0(struct session_info, 1);
1843 if (session->info_last == NULL) {
1848 session->owner = g_strdup(owner);
1849 session->notify_path = g_strdup(notify_path);
1850 session->notify_watch =
1851 g_dbus_add_disconnect_watch(connection, session->owner,
1852 owner_disconnect, session, NULL);
1854 err = assign_policy_plugin(session);
1858 err = create_policy_config(session, session_create_cb, user_config);
1859 if (err < 0 && err != -EINPROGRESS)
1862 return -EINPROGRESS;
1865 connman_error("Failed to create session");
1867 free_session(session);
1869 cleanup_user_config(user_config);
1873 void connman_session_destroy(struct connman_session *session)
1875 DBG("session %p", session);
1877 session_disconnect(session);
1880 int __connman_session_destroy(DBusMessage *msg)
1882 const char *owner, *session_path;
1883 struct connman_session *session;
1885 owner = dbus_message_get_sender(msg);
1887 DBG("owner %s", owner);
1889 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1891 if (session_path == NULL)
1894 session = g_hash_table_lookup(session_hash, session_path);
1895 if (session == NULL)
1898 if (g_strcmp0(owner, session->owner) != 0)
1901 connman_session_destroy(session);
1906 connman_bool_t __connman_session_mode()
1911 void __connman_session_set_mode(connman_bool_t enable)
1913 DBG("enable %d", enable);
1915 if (sessionmode != enable) {
1916 sessionmode = enable;
1918 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1919 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1920 DBUS_TYPE_BOOLEAN, &sessionmode);
1923 if (sessionmode == TRUE)
1924 __connman_service_disconnect_all();
1927 static void service_add(struct connman_service *service,
1930 GHashTableIter iter;
1931 GSequenceIter *iter_service_list;
1932 gpointer key, value;
1933 struct connman_session *session;
1934 struct service_entry *entry;
1936 DBG("service %p", service);
1938 g_hash_table_iter_init(&iter, session_hash);
1940 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1943 if (service_match(session, service) == FALSE)
1946 entry = create_service_entry(session, service, name,
1947 CONNMAN_SERVICE_STATE_IDLE);
1952 g_sequence_insert_sorted(session->service_list,
1953 entry, sort_services,
1956 g_hash_table_replace(session->service_hash, service,
1959 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1963 static void service_remove(struct connman_service *service)
1966 GHashTableIter iter;
1967 gpointer key, value;
1968 struct connman_session *session;
1969 struct session_info *info;
1971 DBG("service %p", service);
1973 g_hash_table_iter_init(&iter, session_hash);
1975 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1976 GSequenceIter *seq_iter;
1978 info = session->info;
1980 seq_iter = g_hash_table_lookup(session->service_hash, service);
1981 if (seq_iter == NULL)
1984 g_sequence_remove(seq_iter);
1986 if (info->entry != NULL && info->entry->service == service)
1988 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1992 static void service_state_changed(struct connman_service *service,
1993 enum connman_service_state state)
1995 GHashTableIter iter;
1996 gpointer key, value;
1998 DBG("service %p state %d", service, state);
2000 g_hash_table_iter_init(&iter, session_hash);
2002 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2003 struct connman_session *session = value;
2004 GSequenceIter *service_iter;
2006 service_iter = g_hash_table_lookup(session->service_hash, service);
2007 if (service_iter != NULL) {
2008 struct service_entry *entry;
2010 entry = g_sequence_get(service_iter);
2011 entry->state = state;
2014 session_changed(session,
2015 CONNMAN_SESSION_TRIGGER_SERVICE);
2019 static void ipconfig_changed(struct connman_service *service,
2020 struct connman_ipconfig *ipconfig)
2022 GHashTableIter iter;
2023 gpointer key, value;
2024 struct connman_session *session;
2025 struct session_info *info;
2026 enum connman_ipconfig_type type;
2028 DBG("service %p ipconfig %p", service, ipconfig);
2030 type = __connman_ipconfig_get_config_type(ipconfig);
2032 g_hash_table_iter_init(&iter, session_hash);
2034 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2036 info = session->info;
2038 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2041 if (info->entry != NULL && info->entry->service == service) {
2042 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2043 ipconfig_ipv4_changed(session);
2044 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2045 ipconfig_ipv6_changed(session);
2050 static struct connman_notifier session_notifier = {
2052 .service_add = service_add,
2053 .service_remove = service_remove,
2054 .service_state_changed = service_state_changed,
2055 .ipconfig_changed = ipconfig_changed,
2058 int __connman_session_init(void)
2064 connection = connman_dbus_get_connection();
2065 if (connection == NULL)
2068 err = connman_notifier_register(&session_notifier);
2070 dbus_connection_unref(connection);
2074 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2075 NULL, cleanup_session);
2077 sessionmode = FALSE;
2081 void __connman_session_cleanup(void)
2085 if (connection == NULL)
2088 connman_notifier_unregister(&session_notifier);
2090 g_hash_table_foreach(session_hash, release_session, NULL);
2091 g_hash_table_destroy(session_hash);
2092 session_hash = NULL;
2094 dbus_connection_unref(connection);