5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 struct service_entry {
63 struct connman_session *session;
64 /* track why this service was selected */
65 enum connman_session_reason reason;
66 enum connman_service_state state;
68 struct connman_service *service;
71 GSList *pending_timeouts;
75 struct connman_session_config config;
76 enum connman_session_state state;
77 struct service_entry *entry;
78 enum connman_session_reason reason;
81 struct connman_session {
87 struct connman_session_policy *policy;
89 connman_bool_t append_all;
90 struct session_info *info;
91 struct session_info *info_last;
92 struct connman_session_config *policy_config;
93 GSList *user_allowed_bearers;
98 GHashTable *service_hash;
101 static const char *trigger2string(enum connman_session_trigger trigger)
104 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
106 case CONNMAN_SESSION_TRIGGER_SETTING:
108 case CONNMAN_SESSION_TRIGGER_CONNECT:
110 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
112 case CONNMAN_SESSION_TRIGGER_SERVICE:
114 case CONNMAN_SESSION_TRIGGER_ECALL:
121 static const char *reason2string(enum connman_session_reason reason)
124 case CONNMAN_SESSION_REASON_UNKNOWN:
126 case CONNMAN_SESSION_REASON_CONNECT:
128 case CONNMAN_SESSION_REASON_FREE_RIDE:
135 static const char *state2string(enum connman_session_state state)
138 case CONNMAN_SESSION_STATE_DISCONNECTED:
139 return "disconnected";
140 case CONNMAN_SESSION_STATE_CONNECTED:
142 case CONNMAN_SESSION_STATE_ONLINE:
149 static const char *type2string(enum connman_session_type type)
152 case CONNMAN_SESSION_TYPE_UNKNOWN:
154 case CONNMAN_SESSION_TYPE_ANY:
156 case CONNMAN_SESSION_TYPE_LOCAL:
158 case CONNMAN_SESSION_TYPE_INTERNET:
165 enum connman_session_roaming_policy connman_session_parse_roaming_policy(const char *policy)
167 if (g_strcmp0(policy, "default") == 0)
168 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
169 else if (g_strcmp0(policy, "always") == 0)
170 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
171 else if (g_strcmp0(policy, "forbidden") == 0)
172 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
173 else if (g_strcmp0(policy, "national") == 0)
174 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
175 else if (g_strcmp0(policy, "international") == 0)
176 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
178 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
181 enum connman_session_type connman_session_parse_connection_type(const char *type)
183 if (g_strcmp0(type, "any") == 0)
184 return CONNMAN_SESSION_TYPE_ANY;
185 if (g_strcmp0(type, "local") == 0)
186 return CONNMAN_SESSION_TYPE_LOCAL;
187 else if (g_strcmp0(type, "internet") == 0)
188 return CONNMAN_SESSION_TYPE_INTERNET;
190 return CONNMAN_SESSION_TYPE_UNKNOWN;
193 static int bearer2service(const char *bearer, enum connman_service_type *type)
195 if (g_strcmp0(bearer, "ethernet") == 0)
196 *type = CONNMAN_SERVICE_TYPE_ETHERNET;
197 else if (g_strcmp0(bearer, "wifi") == 0)
198 *type = CONNMAN_SERVICE_TYPE_WIFI;
199 else if (g_strcmp0(bearer, "bluetooth") == 0)
200 *type = CONNMAN_SERVICE_TYPE_BLUETOOTH;
201 else if (g_strcmp0(bearer, "cellular") == 0)
202 *type = CONNMAN_SERVICE_TYPE_CELLULAR;
203 else if (g_strcmp0(bearer, "vpn") == 0)
204 *type = CONNMAN_SERVICE_TYPE_VPN;
205 else if (g_strcmp0(bearer, "*") == 0)
206 *type = CONNMAN_SERVICE_TYPE_UNKNOWN;
213 static char *service2bearer(enum connman_service_type type)
216 case CONNMAN_SERVICE_TYPE_ETHERNET:
218 case CONNMAN_SERVICE_TYPE_WIFI:
220 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
222 case CONNMAN_SERVICE_TYPE_CELLULAR:
224 case CONNMAN_SERVICE_TYPE_VPN:
226 case CONNMAN_SERVICE_TYPE_UNKNOWN:
228 case CONNMAN_SERVICE_TYPE_SYSTEM:
229 case CONNMAN_SERVICE_TYPE_GPS:
230 case CONNMAN_SERVICE_TYPE_GADGET:
237 static void destroy_policy_config(struct connman_session *session)
239 if (session->policy == NULL) {
240 g_free(session->policy_config);
244 (*session->policy->destroy)(session);
247 static void free_session(struct connman_session *session)
252 if (session->notify_watch > 0)
253 g_dbus_remove_watch(connection, session->notify_watch);
255 destroy_policy_config(session);
256 g_slist_free(session->info->config.allowed_bearers);
257 g_free(session->owner);
258 g_free(session->session_path);
259 g_free(session->notify_path);
260 g_free(session->info);
261 g_free(session->info_last);
266 static void cleanup_session(gpointer user_data)
268 struct connman_session *session = user_data;
269 struct session_info *info = session->info;
271 DBG("remove %s", session->session_path);
273 g_slist_free(session->user_allowed_bearers);
274 if (session->service_hash != NULL)
275 g_hash_table_destroy(session->service_hash);
276 g_list_free(session->service_list);
278 if (info->entry != NULL &&
279 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
280 __connman_service_disconnect(info->entry->service);
283 free_session(session);
286 static int assign_policy_plugin(struct connman_session *session)
288 if (session->policy != NULL)
291 if (policy_list == NULL)
294 session->policy = policy_list->data;
300 DBusMessage *pending;
302 enum connman_session_type type;
303 GSList *allowed_bearers;
306 static void cleanup_user_config(struct user_config *user_config)
308 if (user_config == NULL)
311 if (user_config->pending != NULL)
312 dbus_message_unref(user_config->pending);
314 g_slist_free(user_config->allowed_bearers);
318 static int create_policy_config(struct connman_session *session,
319 connman_session_config_func_t cb,
320 struct user_config *user_config)
322 struct connman_session_config *config;
324 if (session->policy == NULL) {
325 config = connman_session_create_default_config();
326 if (config == NULL) {
327 free_session(session);
328 cleanup_user_config(user_config);
332 return cb(session, config, user_config, 0);
335 return (*session->policy->create)(session, cb, user_config);
338 static void probe_policy(struct connman_session_policy *policy)
343 struct connman_session *session;
345 DBG("policy %p name %s", policy, policy->name);
347 g_hash_table_iter_init(&iter, session_hash);
349 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
352 if (session->policy != NULL)
355 assign_policy_plugin(session);
359 static void remove_policy(struct connman_session_policy *policy)
363 struct connman_session *session;
365 if (session_hash == NULL)
368 DBG("policy %p name %s", policy, policy->name);
370 g_hash_table_iter_init(&iter, session_hash);
372 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
375 if (session->policy != policy)
378 session->policy = NULL;
379 assign_policy_plugin(session);
383 static gint compare_priority(gconstpointer a, gconstpointer b)
385 const struct connman_session_policy *policy1 = a;
386 const struct connman_session_policy *policy2 = b;
388 return policy2->priority - policy1->priority;
392 int connman_session_policy_register(struct connman_session_policy *policy)
394 DBG("name %s", policy->name);
396 if (policy->create == NULL || policy->destroy == NULL)
399 policy_list = g_slist_insert_sorted(policy_list, policy,
402 probe_policy(policy);
407 void connman_session_policy_unregister(struct connman_session_policy *policy)
409 DBG("name %s", policy->name);
411 policy_list = g_slist_remove(policy_list, policy);
413 remove_policy(policy);
416 void connman_session_set_default_config(struct connman_session_config *config)
418 config->id_type = CONNMAN_SESSION_ID_TYPE_UNKNOWN;
422 config->priority = FALSE;
423 config->roaming_policy = CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
424 config->type = CONNMAN_SESSION_TYPE_ANY;
425 config->ecall = FALSE;
427 g_slist_free(config->allowed_bearers);
428 config->allowed_bearers = g_slist_prepend(NULL,
429 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
432 struct connman_session_config *connman_session_create_default_config(void)
434 struct connman_session_config *config;
436 config = g_new0(struct connman_session_config, 1);
437 connman_session_set_default_config(config);
442 static enum connman_session_type apply_policy_on_type(
443 enum connman_session_type policy,
444 enum connman_session_type type)
446 if (type == CONNMAN_SESSION_TYPE_UNKNOWN)
447 return CONNMAN_SESSION_TYPE_UNKNOWN;
449 if (policy == CONNMAN_SESSION_TYPE_ANY)
452 if (policy == CONNMAN_SESSION_TYPE_LOCAL)
453 return CONNMAN_SESSION_TYPE_LOCAL;
455 return CONNMAN_SESSION_TYPE_INTERNET;
458 int connman_session_parse_bearers(const char *token, GSList **list)
460 enum connman_service_type bearer;
463 if (g_strcmp0(token, "") == 0)
466 err = bearer2service(token, &bearer);
470 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
475 static int parse_bearers(DBusMessageIter *iter, GSList **list)
477 DBusMessageIter array;
480 dbus_message_iter_recurse(iter, &array);
484 while ((type = dbus_message_iter_get_arg_type(&array)) !=
486 char *bearer_name = NULL;
488 if (type != DBUS_TYPE_STRING) {
494 dbus_message_iter_get_basic(&array, &bearer_name);
496 err = connman_session_parse_bearers(bearer_name, list);
503 dbus_message_iter_next(&array);
509 static int filter_bearer(GSList *policy_bearers,
510 enum connman_service_type bearer,
513 enum connman_service_type policy;
516 if (policy_bearers == NULL)
519 for (it = policy_bearers; it != NULL; it = it->next) {
520 policy = GPOINTER_TO_INT(it->data);
522 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
527 if (policy != CONNMAN_SERVICE_TYPE_UNKNOWN && policy != bearer)
538 *list = g_slist_append(*list, GINT_TO_POINTER(bearer));
543 static int apply_policy_on_bearers(GSList *policy_bearers, GSList *bearers,
546 enum connman_service_type bearer;
552 for (it = bearers; it != NULL; it = it->next) {
553 bearer = GPOINTER_TO_INT(it->data);
555 err = filter_bearer(policy_bearers, bearer, list);
563 const char *connman_session_get_owner(struct connman_session *session)
565 return session->owner;
568 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
570 struct session_info *info = user_data;
573 for (list = info->config.allowed_bearers;
574 list != NULL; list = list->next) {
575 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
576 const char *name = __connman_service_type2string(bearer);
581 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
586 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
588 struct connman_service *service = user_data;
589 struct connman_ipconfig *ipconfig_ipv4;
594 if (__connman_service_is_connected_state(service,
595 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
599 ipconfig_ipv4 = __connman_service_get_ip4config(service);
600 if (ipconfig_ipv4 == NULL)
603 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
606 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
608 struct connman_service *service = user_data;
609 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
614 if (__connman_service_is_connected_state(service,
615 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
619 ipconfig_ipv4 = __connman_service_get_ip4config(service);
620 ipconfig_ipv6 = __connman_service_get_ip6config(service);
621 if (ipconfig_ipv6 == NULL)
624 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
627 static void append_notify(DBusMessageIter *dict,
628 struct connman_session *session)
630 struct session_info *info = session->info;
631 struct session_info *info_last = session->info_last;
632 struct connman_service *service;
633 const char *name, *ifname, *bearer;
635 if (session->append_all == TRUE ||
636 info->state != info_last->state) {
637 const char *state = state2string(info->state);
639 connman_dbus_dict_append_basic(dict, "State",
642 info_last->state = info->state;
645 if (session->append_all == TRUE ||
646 info->entry != info_last->entry) {
647 if (info->entry == NULL) {
653 name = info->entry->name;
654 ifname = info->entry->ifname;
655 service = info->entry->service;
656 bearer = info->entry->bearer;
659 connman_dbus_dict_append_basic(dict, "Name",
663 connman_dbus_dict_append_dict(dict, "IPv4",
664 append_ipconfig_ipv4,
667 connman_dbus_dict_append_dict(dict, "IPv6",
668 append_ipconfig_ipv6,
671 connman_dbus_dict_append_basic(dict, "Interface",
675 connman_dbus_dict_append_basic(dict, "Bearer",
679 info_last->entry = info->entry;
682 if (session->append_all == TRUE ||
683 info->config.type != info_last->config.type) {
684 const char *type = type2string(info->config.type);
686 connman_dbus_dict_append_basic(dict, "ConnectionType",
689 info_last->config.type = info->config.type;
692 if (session->append_all == TRUE ||
693 info->config.allowed_bearers != info_last->config.allowed_bearers) {
694 connman_dbus_dict_append_array(dict, "AllowedBearers",
696 append_allowed_bearers,
698 info_last->config.allowed_bearers = info->config.allowed_bearers;
701 session->append_all = FALSE;
704 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
705 enum connman_session_type type)
708 case CONNMAN_SESSION_TYPE_UNKNOWN:
710 case CONNMAN_SESSION_TYPE_ANY:
712 case CONNMAN_SESSION_TYPE_LOCAL:
713 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
714 *state = CONNMAN_SESSION_STATE_CONNECTED;
719 case CONNMAN_SESSION_TYPE_INTERNET:
720 if (*state == CONNMAN_SESSION_STATE_ONLINE)
728 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
730 struct session_info *info_last = session->info_last;
731 struct session_info *info = session->info;
733 if (session->append_all == TRUE)
736 if (info->state != info_last->state)
739 if (info->entry != info_last->entry &&
740 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
743 if (info->config.allowed_bearers != info_last->config.allowed_bearers ||
744 info->config.type != info_last->config.type)
750 static gboolean session_notify(gpointer user_data)
752 struct connman_session *session = user_data;
754 DBusMessageIter array, dict;
756 if (compute_notifiable_changes(session) == FALSE)
759 DBG("session %p owner %s notify_path %s", session,
760 session->owner, session->notify_path);
762 msg = dbus_message_new_method_call(session->owner, session->notify_path,
763 CONNMAN_NOTIFICATION_INTERFACE,
768 dbus_message_iter_init_append(msg, &array);
769 connman_dbus_dict_open(&array, &dict);
771 append_notify(&dict, session);
773 connman_dbus_dict_close(&array, &dict);
775 g_dbus_send_message(connection, msg);
780 static void ipconfig_ipv4_changed(struct connman_session *session)
782 struct session_info *info = session->info;
784 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
785 "IPv4", append_ipconfig_ipv4,
786 info->entry->service);
789 static void ipconfig_ipv6_changed(struct connman_session *session)
791 struct session_info *info = session->info;
793 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
794 "IPv6", append_ipconfig_ipv6,
795 info->entry->service);
798 static connman_bool_t service_type_match(struct connman_session *session,
799 struct connman_service *service)
801 struct session_info *info = session->info;
804 for (list = info->config.allowed_bearers;
805 list != NULL; list = list->next) {
806 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
807 enum connman_service_type service_type;
809 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN)
812 service_type = connman_service_get_type(service);
813 if (bearer == service_type)
820 static connman_bool_t service_match(struct connman_session *session,
821 struct connman_service *service)
823 if (service_type_match(session, service) == FALSE)
829 static int service_type_weight(enum connman_service_type type)
832 * The session doesn't care which service
833 * to use. Nevertheless we have to sort them
834 * according their type. The ordering is
843 case CONNMAN_SERVICE_TYPE_ETHERNET:
845 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
847 case CONNMAN_SERVICE_TYPE_WIFI:
849 case CONNMAN_SERVICE_TYPE_CELLULAR:
851 case CONNMAN_SERVICE_TYPE_UNKNOWN:
852 case CONNMAN_SERVICE_TYPE_SYSTEM:
853 case CONNMAN_SERVICE_TYPE_GPS:
854 case CONNMAN_SERVICE_TYPE_VPN:
855 case CONNMAN_SERVICE_TYPE_GADGET:
862 static gint sort_allowed_bearers(struct connman_service *service_a,
863 struct connman_service *service_b,
864 struct connman_session *session)
866 struct session_info *info = session->info;
868 enum connman_service_type type_a, type_b;
869 int weight_a, weight_b;
871 type_a = connman_service_get_type(service_a);
872 type_b = connman_service_get_type(service_b);
874 for (list = info->config.allowed_bearers;
875 list != NULL; list = list->next) {
876 enum connman_service_type bearer = GPOINTER_TO_INT(list->data);
878 if (bearer == CONNMAN_SERVICE_TYPE_UNKNOWN) {
879 if (type_a != type_b) {
880 weight_a = service_type_weight(type_a);
881 weight_b = service_type_weight(type_b);
883 if (weight_a > weight_b)
886 if (weight_a < weight_b)
893 if (type_a == bearer && type_b == bearer)
896 if (type_a == bearer && type_b != bearer)
899 if (type_a != bearer && type_b == bearer)
906 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
908 struct service_entry *entry_a = (void *)a;
909 struct service_entry *entry_b = (void *)b;
910 struct connman_session *session = user_data;
912 return sort_allowed_bearers(entry_a->service, entry_b->service,
916 static enum connman_session_state service_to_session_state(enum connman_service_state state)
919 case CONNMAN_SERVICE_STATE_UNKNOWN:
920 case CONNMAN_SERVICE_STATE_IDLE:
921 case CONNMAN_SERVICE_STATE_ASSOCIATION:
922 case CONNMAN_SERVICE_STATE_CONFIGURATION:
923 case CONNMAN_SERVICE_STATE_DISCONNECT:
924 case CONNMAN_SERVICE_STATE_FAILURE:
926 case CONNMAN_SERVICE_STATE_READY:
927 return CONNMAN_SESSION_STATE_CONNECTED;
928 case CONNMAN_SERVICE_STATE_ONLINE:
929 return CONNMAN_SESSION_STATE_ONLINE;
932 return CONNMAN_SESSION_STATE_DISCONNECTED;
935 static connman_bool_t is_connected(enum connman_service_state state)
938 case CONNMAN_SERVICE_STATE_UNKNOWN:
939 case CONNMAN_SERVICE_STATE_IDLE:
940 case CONNMAN_SERVICE_STATE_ASSOCIATION:
941 case CONNMAN_SERVICE_STATE_CONFIGURATION:
942 case CONNMAN_SERVICE_STATE_DISCONNECT:
943 case CONNMAN_SERVICE_STATE_FAILURE:
945 case CONNMAN_SERVICE_STATE_READY:
946 case CONNMAN_SERVICE_STATE_ONLINE:
953 static connman_bool_t is_connecting(enum connman_service_state state)
956 case CONNMAN_SERVICE_STATE_UNKNOWN:
957 case CONNMAN_SERVICE_STATE_IDLE:
959 case CONNMAN_SERVICE_STATE_ASSOCIATION:
960 case CONNMAN_SERVICE_STATE_CONFIGURATION:
962 case CONNMAN_SERVICE_STATE_DISCONNECT:
963 case CONNMAN_SERVICE_STATE_FAILURE:
964 case CONNMAN_SERVICE_STATE_READY:
965 case CONNMAN_SERVICE_STATE_ONLINE:
972 static connman_bool_t explicit_connect(enum connman_session_reason reason)
975 case CONNMAN_SESSION_REASON_UNKNOWN:
976 case CONNMAN_SESSION_REASON_FREE_RIDE:
978 case CONNMAN_SESSION_REASON_CONNECT:
985 static connman_bool_t explicit_disconnect(struct session_info *info)
987 if (info->entry == NULL)
990 DBG("reason %s service %p state %d",
991 reason2string(info->entry->reason),
992 info->entry->service, info->entry->state);
994 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
997 if (explicit_connect(info->entry->reason) == FALSE)
1000 if (__connman_service_session_dec(info->entry->service) == FALSE)
1006 struct pending_data {
1007 unsigned int timeout;
1008 struct service_entry *entry;
1009 gboolean (*cb)(gpointer);
1012 static void pending_timeout_free(gpointer data, gpointer user_data)
1014 struct pending_data *pending = data;
1016 DBG("pending %p timeout %d", pending, pending->timeout);
1017 g_source_remove(pending->timeout);
1021 static void pending_timeout_remove_all(struct service_entry *entry)
1025 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
1026 g_slist_free(entry->pending_timeouts);
1027 entry->pending_timeouts = NULL;
1030 static gboolean pending_timeout_cb(gpointer data)
1032 struct pending_data *pending = data;
1033 struct service_entry *entry = pending->entry;
1036 DBG("pending %p timeout %d", pending, pending->timeout);
1038 ret = pending->cb(pending->entry);
1040 entry->pending_timeouts =
1041 g_slist_remove(entry->pending_timeouts,
1048 static connman_bool_t pending_timeout_add(unsigned int seconds,
1049 gboolean (*cb)(gpointer),
1050 struct service_entry *entry)
1052 struct pending_data *pending = g_try_new0(struct pending_data, 1);
1054 if (pending == NULL || cb == NULL || entry == NULL) {
1060 pending->entry = entry;
1061 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
1063 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
1066 DBG("pending %p entry %p timeout id %d", pending, entry,
1072 static gboolean call_disconnect(gpointer user_data)
1074 struct service_entry *entry = user_data;
1075 struct connman_service *service = entry->service;
1078 * TODO: We should mark this entry as pending work. In case
1079 * disconnect fails we just unassign this session from the
1080 * service and can't do anything later on it
1082 DBG("disconnect service %p", service);
1083 __connman_service_disconnect(service);
1088 static gboolean call_connect(gpointer user_data)
1090 struct service_entry *entry = user_data;
1091 struct connman_service *service = entry->service;
1093 DBG("connect service %p", service);
1094 __connman_service_connect(service);
1099 static void deselect_service(struct session_info *info)
1101 struct service_entry *entry;
1102 connman_bool_t disconnect, connected;
1106 if (info->entry == NULL)
1109 disconnect = explicit_disconnect(info);
1111 connected = is_connecting(info->entry->state) == TRUE ||
1112 is_connected(info->entry->state) == TRUE;
1114 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1115 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1117 entry = info->entry;
1120 DBG("disconnect %d connected %d", disconnect, connected);
1122 if (disconnect == TRUE && connected == TRUE)
1123 pending_timeout_add(0, call_disconnect, entry);
1126 static void deselect_and_disconnect(struct connman_session *session)
1128 struct session_info *info = session->info;
1130 deselect_service(info);
1132 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1135 static void select_connected_service(struct session_info *info,
1136 struct service_entry *entry)
1138 enum connman_session_state state;
1140 state = service_to_session_state(entry->state);
1141 if (is_type_matching_state(&state, info->config.type) == FALSE)
1144 info->state = state;
1146 info->entry = entry;
1147 info->entry->reason = info->reason;
1149 if (explicit_connect(info->reason) == FALSE)
1152 __connman_service_session_inc(info->entry->service);
1155 static void select_offline_service(struct session_info *info,
1156 struct service_entry *entry)
1158 if (explicit_connect(info->reason) == FALSE)
1161 info->state = service_to_session_state(entry->state);
1163 info->entry = entry;
1164 info->entry->reason = info->reason;
1166 __connman_service_session_inc(info->entry->service);
1167 pending_timeout_add(0, call_connect, entry);
1170 static void select_service(struct session_info *info,
1171 struct service_entry *entry)
1173 DBG("service %p", entry->service);
1175 if (is_connected(entry->state) == TRUE)
1176 select_connected_service(info, entry);
1178 select_offline_service(info, entry);
1181 static void select_and_connect(struct connman_session *session,
1182 enum connman_session_reason reason)
1184 struct session_info *info = session->info;
1185 struct service_entry *entry = NULL;
1188 DBG("session %p reason %s", session, reason2string(reason));
1190 info->reason = reason;
1192 for (list = session->service_list; list != NULL; list = list->next) {
1195 switch (entry->state) {
1196 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1197 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1198 case CONNMAN_SERVICE_STATE_READY:
1199 case CONNMAN_SERVICE_STATE_ONLINE:
1200 case CONNMAN_SERVICE_STATE_IDLE:
1201 case CONNMAN_SERVICE_STATE_DISCONNECT:
1202 select_service(info, entry);
1204 case CONNMAN_SERVICE_STATE_UNKNOWN:
1205 case CONNMAN_SERVICE_STATE_FAILURE:
1211 static struct service_entry *create_service_entry(struct connman_session * session,
1212 struct connman_service *service,
1214 enum connman_service_state state)
1216 struct service_entry *entry;
1217 enum connman_service_type type;
1220 entry = g_try_new0(struct service_entry, 1);
1224 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1225 entry->state = state;
1230 entry->service = service;
1232 idx = __connman_service_get_index(entry->service);
1233 entry->ifname = connman_inet_ifname(idx);
1234 if (entry->ifname == NULL)
1235 entry->ifname = g_strdup("");
1237 type = connman_service_get_type(entry->service);
1238 entry->bearer = service2bearer(type);
1240 entry->session = session;
1245 static void iterate_service_cb(struct connman_service *service,
1247 enum connman_service_state state,
1250 struct connman_session *session = user_data;
1251 struct service_entry *entry;
1253 if (service_match(session, service) == FALSE)
1256 entry = create_service_entry(session, service, name, state);
1260 g_hash_table_replace(session->service_hash, service, entry);
1263 static void destroy_service_entry(gpointer data)
1265 struct service_entry *entry = data;
1266 struct session_info *info = entry->session->info;
1267 struct connman_session *session;
1269 if (info != NULL && info->entry == entry) {
1270 session = entry->session;
1271 deselect_and_disconnect(session);
1274 pending_timeout_remove_all(entry);
1275 g_free(entry->ifname);
1280 static void populate_service_list(struct connman_session *session)
1282 GHashTableIter iter;
1283 gpointer key, value;
1285 session->service_hash =
1286 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1287 NULL, destroy_service_entry);
1288 __connman_service_iterate_services(iterate_service_cb, session);
1290 g_hash_table_iter_init(&iter, session->service_hash);
1292 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1293 struct service_entry *entry = value;
1295 DBG("service %p type %s name %s", entry->service,
1296 service2bearer(connman_service_get_type(entry->service)),
1298 session->service_list = g_list_prepend(session->service_list,
1302 session->service_list = g_list_sort_with_data(session->service_list,
1303 sort_services, session);
1306 static void session_changed(struct connman_session *session,
1307 enum connman_session_trigger trigger)
1309 struct session_info *info = session->info;
1310 struct session_info *info_last = session->info_last;
1311 struct connman_service *service;
1312 struct service_entry *entry = NULL, *entry_last = NULL;
1313 GHashTable *service_hash_last;
1316 * TODO: This only a placeholder for the 'real' algorithm to
1317 * play a bit around. So we are going to improve it step by step.
1320 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1321 reason2string(info->reason));
1323 if (info->entry != NULL) {
1324 enum connman_session_state state;
1326 state = service_to_session_state(info->entry->state);
1328 if (is_type_matching_state(&state, info->config.type) == TRUE)
1329 info->state = state;
1333 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1334 DBG("ignore session changed event");
1336 case CONNMAN_SESSION_TRIGGER_SETTING:
1337 if (info->config.allowed_bearers != info_last->config.allowed_bearers) {
1339 service_hash_last = session->service_hash;
1340 g_list_free(session->service_list);
1341 session->service_list = NULL;
1343 if (info->entry != NULL)
1344 service = info->entry->service;
1348 populate_service_list(session);
1350 if (info->entry != NULL) {
1351 entry_last = g_hash_table_lookup(
1353 info->entry->service);
1354 entry = g_hash_table_lookup(
1355 session->service_hash,
1359 if (entry == NULL && entry_last != NULL) {
1361 * The currently selected service is
1362 * not part of this session anymore.
1364 deselect_and_disconnect(session);
1367 g_hash_table_destroy(service_hash_last);
1370 if (info->config.type != info_last->config.type) {
1371 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1372 is_type_matching_state(&info->state,
1373 info->config.type) == FALSE)
1374 deselect_and_disconnect(session);
1377 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1378 select_and_connect(session,
1379 CONNMAN_SESSION_REASON_FREE_RIDE);
1383 case CONNMAN_SESSION_TRIGGER_ECALL:
1385 * For the time beeing we fallback to normal connect
1388 case CONNMAN_SESSION_TRIGGER_CONNECT:
1389 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1390 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1392 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1393 __connman_service_session_inc(info->entry->service);
1397 if (info->entry != NULL &&
1398 is_connecting(info->entry->state) == TRUE) {
1402 select_and_connect(session,
1403 CONNMAN_SESSION_REASON_CONNECT);
1406 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1407 deselect_and_disconnect(session);
1410 case CONNMAN_SESSION_TRIGGER_SERVICE:
1411 if (info->entry != NULL &&
1412 (is_connecting(info->entry->state) == TRUE ||
1413 is_connected(info->entry->state) == TRUE)) {
1417 deselect_and_disconnect(session);
1419 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1420 select_and_connect(session, info->reason);
1426 session_notify(session);
1429 int connman_session_config_update(struct connman_session *session)
1431 struct session_info *info = session->info;
1432 GSList *allowed_bearers;
1435 DBG("session %p", session);
1438 * We update all configuration even though only one entry
1439 * might have changed. We can still optimize this later.
1442 err = apply_policy_on_bearers(
1443 session->policy_config->allowed_bearers,
1444 session->user_allowed_bearers,
1449 g_slist_free(info->config.allowed_bearers);
1450 info->config.allowed_bearers = allowed_bearers;
1452 info->config.type = apply_policy_on_type(
1453 session->policy_config->type,
1456 info->config.roaming_policy = session->policy_config->roaming_policy;
1458 info->config.ecall = session->policy_config->ecall;
1459 if (info->config.ecall == TRUE)
1460 ecall_session = session;
1462 info->config.priority = session->policy_config->priority;
1464 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1469 static DBusMessage *connect_session(DBusConnection *conn,
1470 DBusMessage *msg, void *user_data)
1472 struct connman_session *session = user_data;
1474 DBG("session %p", session);
1476 if (ecall_session != NULL) {
1477 if (ecall_session->ecall == TRUE && ecall_session != session)
1478 return __connman_error_failed(msg, EBUSY);
1480 session->ecall = TRUE;
1481 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1483 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1485 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1488 static DBusMessage *disconnect_session(DBusConnection *conn,
1489 DBusMessage *msg, void *user_data)
1491 struct connman_session *session = user_data;
1493 DBG("session %p", session);
1495 if (ecall_session != NULL) {
1496 if (ecall_session->ecall == TRUE && ecall_session != session)
1497 return __connman_error_failed(msg, EBUSY);
1499 session->ecall = FALSE;
1502 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1504 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1507 static DBusMessage *change_session(DBusConnection *conn,
1508 DBusMessage *msg, void *user_data)
1510 struct connman_session *session = user_data;
1511 struct session_info *info = session->info;
1512 DBusMessageIter iter, value;
1515 GSList *allowed_bearers;
1518 DBG("session %p", session);
1519 if (dbus_message_iter_init(msg, &iter) == FALSE)
1520 return __connman_error_invalid_arguments(msg);
1522 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1523 return __connman_error_invalid_arguments(msg);
1525 dbus_message_iter_get_basic(&iter, &name);
1526 dbus_message_iter_next(&iter);
1528 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1529 return __connman_error_invalid_arguments(msg);
1531 dbus_message_iter_recurse(&iter, &value);
1533 switch (dbus_message_iter_get_arg_type(&value)) {
1534 case DBUS_TYPE_ARRAY:
1535 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1536 err = parse_bearers(&value, &allowed_bearers);
1538 return __connman_error_failed(msg, err);
1540 g_slist_free(info->config.allowed_bearers);
1541 session->user_allowed_bearers = allowed_bearers;
1543 err = apply_policy_on_bearers(
1544 session->policy_config->allowed_bearers,
1545 session->user_allowed_bearers,
1546 &info->config.allowed_bearers);
1549 return __connman_error_failed(msg, err);
1554 case DBUS_TYPE_STRING:
1555 if (g_str_equal(name, "ConnectionType") == TRUE) {
1556 dbus_message_iter_get_basic(&value, &val);
1557 info->config.type = apply_policy_on_type(
1558 session->policy_config->type,
1559 connman_session_parse_connection_type(val));
1568 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1570 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1573 return __connman_error_invalid_arguments(msg);
1576 static void release_session(gpointer key, gpointer value, gpointer user_data)
1578 struct connman_session *session = value;
1579 DBusMessage *message;
1581 DBG("owner %s path %s", session->owner, session->notify_path);
1583 if (session->notify_watch > 0)
1584 g_dbus_remove_watch(connection, session->notify_watch);
1586 g_dbus_unregister_interface(connection, session->session_path,
1587 CONNMAN_SESSION_INTERFACE);
1589 message = dbus_message_new_method_call(session->owner,
1590 session->notify_path,
1591 CONNMAN_NOTIFICATION_INTERFACE,
1593 if (message == NULL)
1596 dbus_message_set_no_reply(message, TRUE);
1598 g_dbus_send_message(connection, message);
1601 static int session_disconnect(struct connman_session *session)
1603 DBG("session %p, %s", session, session->owner);
1605 if (session->notify_watch > 0)
1606 g_dbus_remove_watch(connection, session->notify_watch);
1608 g_dbus_unregister_interface(connection, session->session_path,
1609 CONNMAN_SESSION_INTERFACE);
1611 deselect_and_disconnect(session);
1613 g_hash_table_remove(session_hash, session->session_path);
1618 static void owner_disconnect(DBusConnection *conn, void *user_data)
1620 struct connman_session *session = user_data;
1622 DBG("session %p, %s died", session, session->owner);
1624 session_disconnect(session);
1627 static DBusMessage *destroy_session(DBusConnection *conn,
1628 DBusMessage *msg, void *user_data)
1630 struct connman_session *session = user_data;
1632 DBG("session %p", session);
1634 if (ecall_session != NULL && ecall_session != session)
1635 return __connman_error_failed(msg, EBUSY);
1637 session_disconnect(session);
1639 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1642 static const GDBusMethodTable session_methods[] = {
1643 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1644 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1645 { GDBUS_METHOD("Disconnect", NULL, NULL,
1646 disconnect_session ) },
1647 { GDBUS_METHOD("Change",
1648 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1649 NULL, change_session) },
1653 static int session_create_cb(struct connman_session *session,
1654 struct connman_session_config *config,
1655 void *user_data, int err)
1658 struct user_config *user_config = user_data;
1659 struct session_info *info, *info_last;
1661 DBG("session %p config %p", session, config);
1666 session->policy_config = config;
1668 info = session->info;
1669 info_last = session->info_last;
1671 if (session->policy_config->ecall == TRUE)
1672 ecall_session = session;
1674 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1675 info->config.type = apply_policy_on_type(
1676 session->policy_config->type,
1678 info->config.priority = session->policy_config->priority;
1679 info->config.roaming_policy = session->policy_config->roaming_policy;
1682 session->user_allowed_bearers = user_config->allowed_bearers;
1683 user_config->allowed_bearers = NULL;
1685 err = apply_policy_on_bearers(
1686 session->policy_config->allowed_bearers,
1687 session->user_allowed_bearers,
1688 &info->config.allowed_bearers);
1692 g_hash_table_replace(session_hash, session->session_path, session);
1694 DBG("add %s", session->session_path);
1696 if (g_dbus_register_interface(connection, session->session_path,
1697 CONNMAN_SESSION_INTERFACE,
1698 session_methods, NULL,
1699 NULL, session, NULL) == FALSE) {
1700 connman_error("Failed to register %s", session->session_path);
1701 g_hash_table_remove(session_hash, session->session_path);
1706 reply = g_dbus_create_reply(user_config->pending,
1707 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1709 g_dbus_send_message(connection, reply);
1710 user_config->pending = NULL;
1712 populate_service_list(session);
1714 info_last->state = info->state;
1715 info_last->config.priority = info->config.priority;
1716 info_last->config.roaming_policy = info->config.roaming_policy;
1717 info_last->entry = info->entry;
1718 info_last->config.allowed_bearers = info->config.allowed_bearers;
1720 session->append_all = TRUE;
1722 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1726 reply = __connman_error_failed(user_config->pending, -err);
1727 g_dbus_send_message(connection, reply);
1729 free_session(session);
1732 cleanup_user_config(user_config);
1737 int __connman_session_create(DBusMessage *msg)
1739 const char *owner, *notify_path;
1740 char *session_path = NULL;
1741 DBusMessageIter iter, array;
1742 struct connman_session *session = NULL;
1743 struct user_config *user_config = NULL;
1744 connman_bool_t user_allowed_bearers = FALSE;
1745 connman_bool_t user_connection_type = FALSE;
1748 owner = dbus_message_get_sender(msg);
1750 DBG("owner %s", owner);
1752 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1754 * If there is an emergency call already going on,
1755 * ignore session creation attempt
1761 user_config = g_try_new0(struct user_config, 1);
1762 if (user_config == NULL) {
1767 user_config->pending = dbus_message_ref(msg);
1769 dbus_message_iter_init(msg, &iter);
1770 dbus_message_iter_recurse(&iter, &array);
1772 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1773 DBusMessageIter entry, value;
1774 const char *key, *val;
1776 dbus_message_iter_recurse(&array, &entry);
1777 dbus_message_iter_get_basic(&entry, &key);
1779 dbus_message_iter_next(&entry);
1780 dbus_message_iter_recurse(&entry, &value);
1782 switch (dbus_message_iter_get_arg_type(&value)) {
1783 case DBUS_TYPE_ARRAY:
1784 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1785 err = parse_bearers(&value,
1786 &user_config->allowed_bearers);
1790 user_allowed_bearers = TRUE;
1796 case DBUS_TYPE_STRING:
1797 if (g_str_equal(key, "ConnectionType") == TRUE) {
1798 dbus_message_iter_get_basic(&value, &val);
1800 connman_session_parse_connection_type(val);
1802 user_connection_type = TRUE;
1808 dbus_message_iter_next(&array);
1812 * If the user hasn't provided a configuration, we set
1813 * the default configuration.
1815 * For AllowedBearers this is '*', ...
1817 if (user_allowed_bearers == FALSE) {
1818 user_config->allowed_bearers =
1819 g_slist_append(NULL,
1820 GINT_TO_POINTER(CONNMAN_SERVICE_TYPE_UNKNOWN));
1821 if (user_config->allowed_bearers == NULL) {
1827 /* ... and for ConnectionType it is 'any'. */
1828 if (user_connection_type == FALSE)
1829 user_config->type = CONNMAN_SESSION_TYPE_ANY;
1831 dbus_message_iter_next(&iter);
1832 dbus_message_iter_get_basic(&iter, ¬ify_path);
1834 if (notify_path == NULL) {
1839 session_path = g_strdup_printf("/sessions%s", notify_path);
1840 if (session_path == NULL) {
1845 session = g_hash_table_lookup(session_hash, session_path);
1846 if (session != NULL) {
1847 g_free(session_path);
1853 session = g_try_new0(struct connman_session, 1);
1854 if (session == NULL) {
1855 g_free(session_path);
1860 session->session_path = session_path;
1862 session->info = g_try_new0(struct session_info, 1);
1863 if (session->info == NULL) {
1868 session->info_last = g_try_new0(struct session_info, 1);
1869 if (session->info_last == NULL) {
1874 session->owner = g_strdup(owner);
1875 session->notify_path = g_strdup(notify_path);
1876 session->notify_watch =
1877 g_dbus_add_disconnect_watch(connection, session->owner,
1878 owner_disconnect, session, NULL);
1880 err = assign_policy_plugin(session);
1884 err = create_policy_config(session, session_create_cb, user_config);
1885 if (err < 0 && err != -EINPROGRESS)
1888 return -EINPROGRESS;
1891 connman_error("Failed to create session");
1893 free_session(session);
1895 cleanup_user_config(user_config);
1899 void connman_session_destroy(struct connman_session *session)
1901 DBG("session %p", session);
1903 session_disconnect(session);
1906 int __connman_session_destroy(DBusMessage *msg)
1908 const char *owner, *session_path;
1909 struct connman_session *session;
1911 owner = dbus_message_get_sender(msg);
1913 DBG("owner %s", owner);
1915 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1917 if (session_path == NULL)
1920 session = g_hash_table_lookup(session_hash, session_path);
1921 if (session == NULL)
1924 if (g_strcmp0(owner, session->owner) != 0)
1927 connman_session_destroy(session);
1932 connman_bool_t __connman_session_mode()
1937 void __connman_session_set_mode(connman_bool_t enable)
1939 DBG("enable %d", enable);
1941 if (sessionmode != enable) {
1942 sessionmode = enable;
1944 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1945 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1946 DBUS_TYPE_BOOLEAN, &sessionmode);
1949 if (sessionmode == TRUE)
1950 __connman_service_disconnect_all();
1953 static void service_add(struct connman_service *service,
1956 GHashTableIter iter;
1957 gpointer key, value;
1958 struct connman_session *session;
1959 struct service_entry *entry;
1961 DBG("service %p", service);
1963 g_hash_table_iter_init(&iter, session_hash);
1965 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1968 if (service_match(session, service) == FALSE)
1971 entry = create_service_entry(session, service, name,
1972 CONNMAN_SERVICE_STATE_IDLE);
1976 session->service_list = g_list_insert_sorted_with_data(
1977 session->service_list, entry, sort_services, session);
1979 g_hash_table_replace(session->service_hash, service, entry);
1981 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1985 static void service_remove(struct connman_service *service)
1988 GHashTableIter iter;
1989 gpointer key, value;
1990 struct connman_session *session;
1991 struct session_info *info;
1993 DBG("service %p", service);
1995 g_hash_table_iter_init(&iter, session_hash);
1997 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1998 struct service_entry *entry;
2000 info = session->info;
2002 entry = g_hash_table_lookup(session->service_hash, service);
2006 session->service_list = g_list_remove(session->service_list,
2009 g_hash_table_remove(session->service_hash, service);
2011 if (info->entry != NULL && info->entry->service == service)
2013 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
2017 static void service_state_changed(struct connman_service *service,
2018 enum connman_service_state state)
2020 GHashTableIter iter;
2021 gpointer key, value;
2023 DBG("service %p state %d", service, state);
2025 g_hash_table_iter_init(&iter, session_hash);
2027 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2028 struct connman_session *session = value;
2029 struct service_entry *entry;
2031 entry = g_hash_table_lookup(session->service_hash, service);
2033 entry->state = state;
2035 session_changed(session,
2036 CONNMAN_SESSION_TRIGGER_SERVICE);
2040 static void ipconfig_changed(struct connman_service *service,
2041 struct connman_ipconfig *ipconfig)
2043 GHashTableIter iter;
2044 gpointer key, value;
2045 struct connman_session *session;
2046 struct session_info *info;
2047 enum connman_ipconfig_type type;
2049 DBG("service %p ipconfig %p", service, ipconfig);
2051 type = __connman_ipconfig_get_config_type(ipconfig);
2053 g_hash_table_iter_init(&iter, session_hash);
2055 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
2057 info = session->info;
2059 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
2062 if (info->entry != NULL && info->entry->service == service) {
2063 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
2064 ipconfig_ipv4_changed(session);
2065 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
2066 ipconfig_ipv6_changed(session);
2071 static struct connman_notifier session_notifier = {
2073 .service_add = service_add,
2074 .service_remove = service_remove,
2075 .service_state_changed = service_state_changed,
2076 .ipconfig_changed = ipconfig_changed,
2079 int __connman_session_init(void)
2085 connection = connman_dbus_get_connection();
2086 if (connection == NULL)
2089 err = connman_notifier_register(&session_notifier);
2091 dbus_connection_unref(connection);
2095 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
2096 NULL, cleanup_session);
2098 sessionmode = FALSE;
2102 void __connman_session_cleanup(void)
2106 if (connection == NULL)
2109 connman_notifier_unregister(&session_notifier);
2111 g_hash_table_foreach(session_hash, release_session, NULL);
2112 g_hash_table_destroy(session_hash);
2113 session_hash = NULL;
2115 dbus_connection_unref(connection);