5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
33 static DBusConnection *connection;
34 static GHashTable *session_hash;
35 static connman_bool_t sessionmode;
36 static struct connman_session *ecall_session;
38 enum connman_session_trigger {
39 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
40 CONNMAN_SESSION_TRIGGER_SETTING = 1,
41 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
42 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
43 CONNMAN_SESSION_TRIGGER_PERIODIC = 4,
44 CONNMAN_SESSION_TRIGGER_SERVICE = 5,
45 CONNMAN_SESSION_TRIGGER_ECALL = 6,
48 enum connman_session_reason {
49 CONNMAN_SESSION_REASON_UNKNOWN = 0,
50 CONNMAN_SESSION_REASON_CONNECT = 1,
51 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
52 CONNMAN_SESSION_REASON_PERIODIC = 3,
55 enum connman_session_roaming_policy {
56 CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN = 0,
57 CONNMAN_SESSION_ROAMING_POLICY_DEFAULT = 1,
58 CONNMAN_SESSION_ROAMING_POLICY_ALWAYS = 2,
59 CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN = 3,
60 CONNMAN_SESSION_ROAMING_POLICY_NATIONAL = 4,
61 CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL = 5,
64 struct service_entry {
65 /* track why this service was selected */
66 enum connman_session_reason reason;
67 enum connman_service_state state;
69 struct connman_service *service;
75 connman_bool_t online;
76 connman_bool_t priority;
77 GSList *allowed_bearers;
78 connman_bool_t avoid_handover;
79 connman_bool_t stay_connected;
80 unsigned int periodic_connect;
81 unsigned int idle_timeout;
83 enum connman_session_roaming_policy roaming_policy;
86 struct service_entry *entry;
87 enum connman_session_reason reason;
90 struct connman_session {
96 connman_bool_t append_all;
97 connman_bool_t info_dirty;
98 struct session_info *info;
99 struct session_info *info_last;
101 GSequence *service_list;
102 GHashTable *service_hash;
107 connman_bool_t match_all;
108 enum connman_service_type service_type;
111 static const char *trigger2string(enum connman_session_trigger trigger)
114 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
116 case CONNMAN_SESSION_TRIGGER_SETTING:
118 case CONNMAN_SESSION_TRIGGER_CONNECT:
120 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
122 case CONNMAN_SESSION_TRIGGER_PERIODIC:
124 case CONNMAN_SESSION_TRIGGER_SERVICE:
126 case CONNMAN_SESSION_TRIGGER_ECALL:
133 static const char *reason2string(enum connman_session_reason reason)
136 case CONNMAN_SESSION_REASON_UNKNOWN:
138 case CONNMAN_SESSION_REASON_CONNECT:
140 case CONNMAN_SESSION_REASON_FREE_RIDE:
142 case CONNMAN_SESSION_REASON_PERIODIC:
149 static const char *roamingpolicy2string(enum connman_session_roaming_policy policy)
152 case CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN:
154 case CONNMAN_SESSION_ROAMING_POLICY_DEFAULT:
156 case CONNMAN_SESSION_ROAMING_POLICY_ALWAYS:
158 case CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN:
160 case CONNMAN_SESSION_ROAMING_POLICY_NATIONAL:
162 case CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL:
163 return "international";
169 static enum connman_session_roaming_policy string2roamingpolicy(const char *policy)
171 if (g_strcmp0(policy, "default") == 0)
172 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
173 else if (g_strcmp0(policy, "always") == 0)
174 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
175 else if (g_strcmp0(policy, "forbidden") == 0)
176 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
177 else if (g_strcmp0(policy, "national") == 0)
178 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
179 else if (g_strcmp0(policy, "international") == 0)
180 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
182 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
185 static enum connman_service_type bearer2service(const char *bearer)
188 return CONNMAN_SERVICE_TYPE_UNKNOWN;
190 if (g_strcmp0(bearer, "ethernet") == 0)
191 return CONNMAN_SERVICE_TYPE_ETHERNET;
192 else if (g_strcmp0(bearer, "wifi") == 0)
193 return CONNMAN_SERVICE_TYPE_WIFI;
194 else if (g_strcmp0(bearer, "wimax") == 0)
195 return CONNMAN_SERVICE_TYPE_WIMAX;
196 else if (g_strcmp0(bearer, "bluetooth") == 0)
197 return CONNMAN_SERVICE_TYPE_BLUETOOTH;
198 else if (g_strcmp0(bearer, "3g") == 0)
199 return CONNMAN_SERVICE_TYPE_CELLULAR;
200 else if (g_strcmp0(bearer, "vpn") == 0)
201 return CONNMAN_SERVICE_TYPE_VPN;
203 return CONNMAN_SERVICE_TYPE_UNKNOWN;
206 static char *service2bearer(enum connman_service_type type)
209 case CONNMAN_SERVICE_TYPE_ETHERNET:
211 case CONNMAN_SERVICE_TYPE_WIFI:
213 case CONNMAN_SERVICE_TYPE_WIMAX:
215 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
217 case CONNMAN_SERVICE_TYPE_CELLULAR:
219 case CONNMAN_SERVICE_TYPE_VPN:
221 case CONNMAN_SERVICE_TYPE_UNKNOWN:
222 case CONNMAN_SERVICE_TYPE_SYSTEM:
223 case CONNMAN_SERVICE_TYPE_GPS:
224 case CONNMAN_SERVICE_TYPE_GADGET:
231 static void cleanup_bearer_info(gpointer data, gpointer user_data)
233 struct bearer_info *info = data;
239 static GSList *session_parse_allowed_bearers(DBusMessageIter *iter)
241 struct bearer_info *info;
242 DBusMessageIter array;
245 dbus_message_iter_recurse(iter, &array);
247 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_STRING) {
250 dbus_message_iter_get_basic(&array, &bearer);
252 info = g_try_new0(struct bearer_info, 1);
254 g_slist_foreach(list, cleanup_bearer_info, NULL);
260 info->name = g_strdup(bearer);
261 info->service_type = bearer2service(info->name);
263 if (info->service_type == CONNMAN_SERVICE_TYPE_UNKNOWN &&
264 g_strcmp0(info->name, "*") == 0) {
265 info->match_all = TRUE;
267 info->match_all = FALSE;
270 list = g_slist_append(list, info);
272 dbus_message_iter_next(&array);
278 static GSList *session_allowed_bearers_any(void)
280 struct bearer_info *info;
283 info = g_try_new0(struct bearer_info, 1);
290 info->name = g_strdup("");
291 info->match_all = TRUE;
292 info->service_type = CONNMAN_SERVICE_TYPE_UNKNOWN;
294 list = g_slist_append(list, info);
299 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
301 struct session_info *info = user_data;
304 for (list = info->allowed_bearers;
305 list != NULL; list = list->next) {
306 struct bearer_info *info = list->data;
308 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
313 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
315 struct connman_service *service = user_data;
316 struct connman_ipconfig *ipconfig_ipv4;
321 ipconfig_ipv4 = __connman_service_get_ip4config(service);
322 if (ipconfig_ipv4 == NULL)
325 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
328 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
330 struct connman_service *service = user_data;
331 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
336 ipconfig_ipv4 = __connman_service_get_ip4config(service);
337 ipconfig_ipv6 = __connman_service_get_ip6config(service);
338 if (ipconfig_ipv6 == NULL)
341 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
344 static void append_notify(DBusMessageIter *dict,
345 struct connman_session *session)
347 struct session_info *info = session->info;
348 struct session_info *info_last = session->info_last;
350 struct connman_service *service;
351 const char *name, *ifname, *bearer;
353 if (session->append_all == TRUE ||
354 info->online != info_last->online) {
355 connman_dbus_dict_append_basic(dict, "Online",
358 info_last->online = info->online;
361 if (session->append_all == TRUE ||
362 info->entry != info_last->entry) {
363 if (info->entry == NULL) {
369 name = info->entry->name;
370 ifname = info->entry->ifname;
371 service = info->entry->service;
372 bearer = info->entry->bearer;
375 connman_dbus_dict_append_basic(dict, "Name",
379 connman_dbus_dict_append_dict(dict, "IPv4",
380 append_ipconfig_ipv4,
383 connman_dbus_dict_append_dict(dict, "IPv6",
384 append_ipconfig_ipv6,
387 connman_dbus_dict_append_basic(dict, "Interface",
391 connman_dbus_dict_append_basic(dict, "Bearer",
395 info_last->entry = info->entry;
399 if (session->append_all == TRUE ||
400 info->priority != info_last->priority) {
401 connman_dbus_dict_append_basic(dict, "Priority",
404 info_last->priority = info->priority;
407 if (session->append_all == TRUE ||
408 info->allowed_bearers != info_last->allowed_bearers) {
409 connman_dbus_dict_append_array(dict, "AllowedBearers",
411 append_allowed_bearers,
413 info_last->allowed_bearers = info->allowed_bearers;
416 if (session->append_all == TRUE ||
417 info->avoid_handover != info_last->avoid_handover) {
418 connman_dbus_dict_append_basic(dict, "AvoidHandover",
420 &info->avoid_handover);
421 info_last->avoid_handover = info->avoid_handover;
424 if (session->append_all == TRUE ||
425 info->stay_connected != info_last->stay_connected) {
426 connman_dbus_dict_append_basic(dict, "StayConnected",
428 &info->stay_connected);
429 info_last->stay_connected = info->stay_connected;
432 if (session->append_all == TRUE ||
433 info->periodic_connect != info_last->periodic_connect) {
434 connman_dbus_dict_append_basic(dict, "PeriodicConnect",
436 &info->periodic_connect);
437 info_last->periodic_connect = info->periodic_connect;
440 if (session->append_all == TRUE ||
441 info->idle_timeout != info_last->idle_timeout) {
442 connman_dbus_dict_append_basic(dict, "IdleTimeout",
444 &info->idle_timeout);
445 info_last->idle_timeout = info->idle_timeout;
448 if (session->append_all == TRUE ||
449 info->ecall != info_last->ecall) {
450 connman_dbus_dict_append_basic(dict, "EmergencyCall",
453 info_last->ecall = info->ecall;
456 if (session->append_all == TRUE ||
457 info->roaming_policy != info_last->roaming_policy) {
458 policy = roamingpolicy2string(info->roaming_policy);
459 connman_dbus_dict_append_basic(dict, "RoamingPolicy",
462 info_last->roaming_policy = info->roaming_policy;
465 if (session->append_all == TRUE ||
466 info->marker != info_last->marker) {
467 connman_dbus_dict_append_basic(dict, "SessionMarker",
470 info_last->marker = info->marker;
473 session->append_all = FALSE;
474 session->info_dirty = FALSE;
477 static gboolean session_notify(gpointer user_data)
479 struct connman_session *session = user_data;
481 DBusMessageIter array, dict;
483 if (session->info_dirty == FALSE)
486 DBG("session %p owner %s notify_path %s", session,
487 session->owner, session->notify_path);
489 msg = dbus_message_new_method_call(session->owner, session->notify_path,
490 CONNMAN_NOTIFICATION_INTERFACE,
495 dbus_message_iter_init_append(msg, &array);
496 connman_dbus_dict_open(&array, &dict);
498 append_notify(&dict, session);
500 connman_dbus_dict_close(&array, &dict);
502 g_dbus_send_message(connection, msg);
504 session->info_dirty = FALSE;
509 static void ipconfig_ipv4_changed(struct connman_session *session)
511 struct session_info *info = session->info;
513 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
514 "IPv4", append_ipconfig_ipv4,
515 info->entry->service);
518 static void ipconfig_ipv6_changed(struct connman_session *session)
520 struct session_info *info = session->info;
522 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
523 "IPv6", append_ipconfig_ipv6,
524 info->entry->service);
527 static connman_bool_t service_type_match(struct connman_session *session,
528 struct connman_service *service)
530 struct session_info *info = session->info;
533 for (list = info->allowed_bearers;
534 list != NULL; list = list->next) {
535 struct bearer_info *info = list->data;
536 enum connman_service_type service_type;
538 if (info->match_all == TRUE)
541 service_type = connman_service_get_type(service);
542 if (info->service_type == service_type)
549 static connman_bool_t service_match(struct connman_session *session,
550 struct connman_service *service)
552 if (service_type_match(session, service) == FALSE)
558 static int service_type_weight(enum connman_service_type type)
561 * The session doesn't care which service
562 * to use. Nevertheless we have to sort them
563 * according their type. The ordering is
572 case CONNMAN_SERVICE_TYPE_ETHERNET:
574 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
576 case CONNMAN_SERVICE_TYPE_WIFI:
577 case CONNMAN_SERVICE_TYPE_WIMAX:
579 case CONNMAN_SERVICE_TYPE_CELLULAR:
581 case CONNMAN_SERVICE_TYPE_UNKNOWN:
582 case CONNMAN_SERVICE_TYPE_SYSTEM:
583 case CONNMAN_SERVICE_TYPE_GPS:
584 case CONNMAN_SERVICE_TYPE_VPN:
585 case CONNMAN_SERVICE_TYPE_GADGET:
592 static gint sort_allowed_bearers(struct connman_service *service_a,
593 struct connman_service *service_b,
594 struct connman_session *session)
596 struct session_info *info = session->info;
598 enum connman_service_type type_a, type_b;
599 int weight_a, weight_b;
601 type_a = connman_service_get_type(service_a);
602 type_b = connman_service_get_type(service_b);
604 for (list = info->allowed_bearers;
605 list != NULL; list = list->next) {
606 struct bearer_info *info = list->data;
608 if (info->match_all == TRUE) {
609 if (type_a != type_b) {
610 weight_a = service_type_weight(type_a);
611 weight_b = service_type_weight(type_b);
613 if (weight_a > weight_b)
616 if (weight_a < weight_b)
623 if (type_a == info->service_type &&
624 type_b == info->service_type) {
628 if (type_a == info->service_type &&
629 type_b != info->service_type) {
633 if (type_a != info->service_type &&
634 type_b == info->service_type) {
642 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
644 struct service_entry *entry_a = (void *)a;
645 struct service_entry *entry_b = (void *)b;
646 struct connman_session *session = user_data;
648 return sort_allowed_bearers(entry_a->service, entry_b->service,
652 static void cleanup_session(gpointer user_data)
654 struct connman_session *session = user_data;
655 struct session_info *info = session->info;
657 DBG("remove %s", session->session_path);
659 g_hash_table_destroy(session->service_hash);
660 g_sequence_free(session->service_list);
662 if (info->entry != NULL &&
663 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
664 __connman_service_disconnect(info->entry->service);
667 g_slist_foreach(info->allowed_bearers, cleanup_bearer_info, NULL);
668 g_slist_free(info->allowed_bearers);
670 g_free(session->owner);
671 g_free(session->session_path);
672 g_free(session->notify_path);
673 g_free(session->info);
674 g_free(session->info_last);
679 static connman_bool_t is_online(enum connman_service_state state)
682 case CONNMAN_SERVICE_STATE_UNKNOWN:
683 case CONNMAN_SERVICE_STATE_IDLE:
684 case CONNMAN_SERVICE_STATE_ASSOCIATION:
685 case CONNMAN_SERVICE_STATE_CONFIGURATION:
686 case CONNMAN_SERVICE_STATE_DISCONNECT:
687 case CONNMAN_SERVICE_STATE_FAILURE:
688 case CONNMAN_SERVICE_STATE_READY:
690 case CONNMAN_SERVICE_STATE_ONLINE:
697 static connman_bool_t is_connecting(enum connman_service_state state)
700 case CONNMAN_SERVICE_STATE_UNKNOWN:
701 case CONNMAN_SERVICE_STATE_IDLE:
703 case CONNMAN_SERVICE_STATE_ASSOCIATION:
704 case CONNMAN_SERVICE_STATE_CONFIGURATION:
705 case CONNMAN_SERVICE_STATE_READY:
707 case CONNMAN_SERVICE_STATE_DISCONNECT:
708 case CONNMAN_SERVICE_STATE_FAILURE:
709 case CONNMAN_SERVICE_STATE_ONLINE:
716 static connman_bool_t explicit_connect(enum connman_session_reason reason)
719 case CONNMAN_SESSION_REASON_UNKNOWN:
720 case CONNMAN_SESSION_REASON_FREE_RIDE:
722 case CONNMAN_SESSION_REASON_CONNECT:
723 case CONNMAN_SESSION_REASON_PERIODIC:
730 static connman_bool_t explicit_disconnect(struct connman_session *session)
732 struct session_info *info = session->info;
734 if (info->entry == NULL)
737 DBG("session %p, reason %s service %p state %d",
738 session, reason2string(info->entry->reason),
739 info->entry->service, info->entry->state);
741 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
744 if (explicit_connect(info->entry->reason) == FALSE)
747 if (__connman_service_session_dec(info->entry->service) == FALSE)
750 if (ecall_session != NULL && ecall_session != session)
756 static gboolean call_disconnect(gpointer user_data)
758 struct connman_service *service = user_data;
761 * TODO: We should mark this entry as pending work. In case
762 * disconnect fails we just unassign this session from the
763 * service and can't do anything later on it
765 DBG("disconnect service %p", service);
766 __connman_service_disconnect(service);
771 static gboolean call_connect(gpointer user_data)
773 struct connman_service *service = user_data;
775 DBG("connect service %p", service);
776 __connman_service_connect(service);
781 static void test_and_disconnect(struct connman_session *session)
783 struct session_info *info = session->info;
784 struct connman_service *service;
785 connman_bool_t disconnect;
787 if (info->entry == NULL)
790 disconnect = explicit_disconnect(session);
792 info->online = FALSE;
793 info->reason = CONNMAN_SESSION_REASON_UNKNOWN;
794 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
796 service = info->entry->service;
799 if (disconnect == TRUE)
800 g_timeout_add_seconds(0, call_disconnect, service);
803 static void select_and_connect(struct connman_session *session,
804 enum connman_session_reason reason)
806 struct session_info *info = session->info;
807 struct service_entry *entry = NULL;
809 connman_bool_t do_connect = FALSE;
811 DBG("session %p reason %s", session, reason2string(reason));
813 info->reason = reason;
815 iter = g_sequence_get_begin_iter(session->service_list);
817 while (g_sequence_iter_is_end(iter) == FALSE) {
818 entry = g_sequence_get(iter);
820 switch (entry->state) {
821 case CONNMAN_SERVICE_STATE_ASSOCIATION:
822 case CONNMAN_SERVICE_STATE_CONFIGURATION:
823 case CONNMAN_SERVICE_STATE_READY:
824 case CONNMAN_SERVICE_STATE_ONLINE:
825 /* connecting or connected */
827 case CONNMAN_SERVICE_STATE_IDLE:
828 case CONNMAN_SERVICE_STATE_DISCONNECT:
829 if (explicit_connect(reason) == TRUE)
832 case CONNMAN_SERVICE_STATE_UNKNOWN:
833 case CONNMAN_SERVICE_STATE_FAILURE:
841 iter = g_sequence_iter_next(iter);
844 if (info->entry != NULL && info->entry != entry)
845 test_and_disconnect(session);
853 info->entry->reason = reason;
855 if (do_connect == TRUE) {
856 __connman_service_session_inc(info->entry->service);
857 g_timeout_add_seconds(0, call_connect, info->entry->service);
858 } else if (reason == CONNMAN_SESSION_REASON_CONNECT) {
859 /* session is already online take ref */
860 __connman_service_session_inc(info->entry->service);
863 info->online = is_online(entry->state);
866 static void session_changed(struct connman_session *session,
867 enum connman_session_trigger trigger)
869 struct session_info *info = session->info;
870 struct session_info *info_last = session->info_last;
874 * TODO: This only a placeholder for the 'real' algorithm to
875 * play a bit around. So we are going to improve it step by step.
878 DBG("session %p trigger %s", session, trigger2string(trigger));
881 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
882 DBG("ignore session changed event");
884 case CONNMAN_SESSION_TRIGGER_SETTING:
885 if (info->entry != NULL) {
886 iter = g_hash_table_lookup(session->service_hash,
887 info->entry->service);
890 * This service is not part of this
893 test_and_disconnect(session);
897 if (info->online == FALSE) {
898 select_and_connect(session,
899 CONNMAN_SESSION_REASON_FREE_RIDE);
903 case CONNMAN_SESSION_TRIGGER_CONNECT:
904 if (info->online == TRUE) {
905 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
907 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
908 __connman_service_session_inc(info->entry->service);
912 select_and_connect(session,
913 CONNMAN_SESSION_REASON_CONNECT);
916 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
917 test_and_disconnect(session);
920 case CONNMAN_SESSION_TRIGGER_PERIODIC:
921 if (info->online == TRUE) {
922 info->entry->reason = CONNMAN_SESSION_REASON_PERIODIC;
923 __connman_service_session_inc(info->entry->service);
927 select_and_connect(session,
928 CONNMAN_SESSION_REASON_PERIODIC);
931 case CONNMAN_SESSION_TRIGGER_SERVICE:
932 switch (info->reason) {
933 case CONNMAN_SESSION_REASON_CONNECT:
934 if (info->entry != NULL &&
935 (is_connecting(info->entry->state) == TRUE ||
936 is_online(info->entry->state) == TRUE)) {
941 * We are not online, we are not connecting, that
942 * means we could still have a valid info->entry.
943 * Though something has changed from the service layer.
944 * Therefore we want to restart the algorithm. Before we
945 * can do that we have to cleanup a potientional old entry.
947 test_and_disconnect(session);
948 info->reason = CONNMAN_SESSION_REASON_CONNECT; /* restore value */
950 DBG("Retry to find a matching session");
952 * The user called Connect() but there was no
953 * matching session available at this point.
954 * Now there might be a new one. Let's retry
955 * to select and connect
957 select_and_connect(session,
958 CONNMAN_SESSION_REASON_CONNECT);
960 case CONNMAN_SESSION_REASON_PERIODIC:
961 case CONNMAN_SESSION_REASON_FREE_RIDE:
962 if (info->stay_connected == TRUE) {
963 DBG("StayConnected");
964 select_and_connect(session,
965 CONNMAN_SESSION_REASON_CONNECT);
967 select_and_connect(session,
968 CONNMAN_SESSION_REASON_FREE_RIDE);
971 case CONNMAN_SESSION_REASON_UNKNOWN:
975 case CONNMAN_SESSION_TRIGGER_ECALL:
976 if (info->online == FALSE && info->entry->service != NULL)
977 test_and_disconnect(session);
982 if (info->entry != info_last->entry)
983 session->info_dirty = TRUE;
985 session_notify(session);
988 static DBusMessage *connect_session(DBusConnection *conn,
989 DBusMessage *msg, void *user_data)
991 struct connman_session *session = user_data;
993 DBG("session %p", session);
995 if (ecall_session != NULL && ecall_session != session)
996 return __connman_error_failed(msg, EBUSY);
998 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1000 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1003 static DBusMessage *disconnect_session(DBusConnection *conn,
1004 DBusMessage *msg, void *user_data)
1006 struct connman_session *session = user_data;
1008 DBG("session %p", session);
1010 if (ecall_session != NULL && ecall_session != session)
1011 return __connman_error_failed(msg, EBUSY);
1013 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1015 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1018 static struct service_entry *create_service_entry(struct connman_service *service,
1020 enum connman_service_state state)
1022 struct service_entry *entry;
1023 enum connman_service_type type;
1026 entry = g_try_new0(struct service_entry, 1);
1030 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1031 entry->state = state;
1036 entry->service = service;
1038 idx = __connman_service_get_index(entry->service);
1039 entry->ifname = connman_inet_ifname(idx);
1040 if (entry->ifname == NULL)
1041 entry->ifname = g_strdup("");
1043 type = connman_service_get_type(entry->service);
1044 entry->bearer = service2bearer(type);
1049 static void destroy_service_entry(gpointer data)
1051 struct service_entry *entry = data;
1053 g_free(entry->ifname);
1058 static void update_allowed_bearers(struct connman_session *session)
1060 struct service_entry *entry;
1061 GSequenceIter *iter;
1063 if (session->service_list != NULL) {
1064 g_hash_table_remove_all(session->service_hash);
1065 g_sequence_free(session->service_list);
1068 session->service_list = __connman_service_get_list(session,
1070 create_service_entry,
1071 destroy_service_entry);
1073 g_sequence_sort(session->service_list, sort_services, session);
1075 iter = g_sequence_get_begin_iter(session->service_list);
1077 while (g_sequence_iter_is_end(iter) == FALSE) {
1078 entry = g_sequence_get(iter);
1080 DBG("service %p type %s name %s", entry->service,
1081 service2bearer(connman_service_get_type(entry->service)),
1084 g_hash_table_replace(session->service_hash,
1085 entry->service, iter);
1087 iter = g_sequence_iter_next(iter);
1090 session->info_dirty = TRUE;
1093 static void update_ecall_sessions(struct connman_session *session)
1095 struct session_info *info = session->info;
1096 struct connman_session *session_iter;
1097 GHashTableIter iter;
1098 gpointer key, value;
1100 g_hash_table_iter_init(&iter, session_hash);
1102 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1103 session_iter = value;
1105 if (session_iter == session)
1108 session_iter->info->ecall = info->ecall;
1109 session_iter->info_dirty = TRUE;
1111 session_changed(session_iter, CONNMAN_SESSION_TRIGGER_ECALL);
1115 static void update_ecall(struct connman_session *session)
1117 struct session_info *info = session->info;
1118 struct session_info *info_last = session->info_last;
1120 DBG("session %p ecall_session %p ecall %d -> %d", session,
1121 ecall_session, info_last->ecall, info->ecall);
1123 if (ecall_session == NULL) {
1124 if (!(info_last->ecall == FALSE && info->ecall == TRUE))
1127 ecall_session = session;
1128 } else if (ecall_session == session) {
1129 if (!(info_last->ecall == TRUE && info->ecall == FALSE))
1132 ecall_session = NULL;
1137 update_ecall_sessions(session);
1139 session->info_dirty = TRUE;
1143 /* not a valid transition */
1144 info->ecall = info_last->ecall;
1147 static DBusMessage *change_session(DBusConnection *conn,
1148 DBusMessage *msg, void *user_data)
1150 struct connman_session *session = user_data;
1151 struct session_info *info = session->info;
1152 struct session_info *info_last = session->info_last;
1153 DBusMessageIter iter, value;
1155 GSList *allowed_bearers;
1157 DBG("session %p", session);
1158 if (dbus_message_iter_init(msg, &iter) == FALSE)
1159 return __connman_error_invalid_arguments(msg);
1161 dbus_message_iter_get_basic(&iter, &name);
1162 dbus_message_iter_next(&iter);
1163 dbus_message_iter_recurse(&iter, &value);
1165 switch (dbus_message_iter_get_arg_type(&value)) {
1166 case DBUS_TYPE_ARRAY:
1167 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1168 allowed_bearers = session_parse_allowed_bearers(&value);
1170 g_slist_foreach(info->allowed_bearers,
1171 cleanup_bearer_info, NULL);
1172 g_slist_free(info->allowed_bearers);
1174 if (allowed_bearers == NULL) {
1175 allowed_bearers = session_allowed_bearers_any();
1177 if (allowed_bearers == NULL)
1178 return __connman_error_failed(msg, ENOMEM);
1181 info->allowed_bearers = allowed_bearers;
1183 update_allowed_bearers(session);
1188 case DBUS_TYPE_BOOLEAN:
1189 if (g_str_equal(name, "Priority") == TRUE) {
1190 dbus_message_iter_get_basic(&value,
1193 if (info_last->priority != info->priority)
1194 session->info_dirty = TRUE;
1195 } else if (g_str_equal(name, "AvoidHandover") == TRUE) {
1196 dbus_message_iter_get_basic(&value,
1197 &info->avoid_handover);
1199 if (info_last->avoid_handover != info->avoid_handover)
1200 session->info_dirty = TRUE;
1201 } else if (g_str_equal(name, "StayConnected") == TRUE) {
1202 dbus_message_iter_get_basic(&value,
1203 &info->stay_connected);
1205 if (info_last->stay_connected != info->stay_connected)
1206 session->info_dirty = TRUE;
1207 } else if (g_str_equal(name, "EmergencyCall") == TRUE) {
1208 dbus_message_iter_get_basic(&value,
1211 update_ecall(session);
1216 case DBUS_TYPE_UINT32:
1217 if (g_str_equal(name, "PeriodicConnect") == TRUE) {
1218 dbus_message_iter_get_basic(&value,
1219 &info->periodic_connect);
1221 if (info_last->periodic_connect != info->periodic_connect)
1222 session->info_dirty = TRUE;
1223 } else if (g_str_equal(name, "IdleTimeout") == TRUE) {
1224 dbus_message_iter_get_basic(&value,
1225 &info->idle_timeout);
1227 if (info_last->idle_timeout != info->idle_timeout)
1228 session->info_dirty = TRUE;
1233 case DBUS_TYPE_STRING:
1234 if (g_str_equal(name, "RoamingPolicy") == TRUE) {
1236 dbus_message_iter_get_basic(&value, &val);
1237 info->roaming_policy =
1238 string2roamingpolicy(val);
1240 if (info_last->roaming_policy != info->roaming_policy)
1241 session->info_dirty = TRUE;
1250 if (session->info_dirty == TRUE)
1251 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1253 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1256 return __connman_error_invalid_arguments(msg);
1259 static void release_session(gpointer key, gpointer value, gpointer user_data)
1261 struct connman_session *session = value;
1262 DBusMessage *message;
1264 DBG("owner %s path %s", session->owner, session->notify_path);
1266 if (session->notify_watch > 0)
1267 g_dbus_remove_watch(connection, session->notify_watch);
1269 g_dbus_unregister_interface(connection, session->session_path,
1270 CONNMAN_SESSION_INTERFACE);
1272 message = dbus_message_new_method_call(session->owner,
1273 session->notify_path,
1274 CONNMAN_NOTIFICATION_INTERFACE,
1276 if (message == NULL)
1279 dbus_message_set_no_reply(message, TRUE);
1281 g_dbus_send_message(connection, message);
1284 static int session_disconnect(struct connman_session *session)
1286 DBG("session %p, %s", session, session->owner);
1288 if (session->notify_watch > 0)
1289 g_dbus_remove_watch(connection, session->notify_watch);
1291 g_dbus_unregister_interface(connection, session->session_path,
1292 CONNMAN_SESSION_INTERFACE);
1294 test_and_disconnect(session);
1296 g_hash_table_remove(session_hash, session->session_path);
1301 static void owner_disconnect(DBusConnection *conn, void *user_data)
1303 struct connman_session *session = user_data;
1305 DBG("session %p, %s died", session, session->owner);
1307 session_disconnect(session);
1310 static DBusMessage *destroy_session(DBusConnection *conn,
1311 DBusMessage *msg, void *user_data)
1313 struct connman_session *session = user_data;
1315 DBG("session %p", session);
1317 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1320 static GDBusMethodTable session_methods[] = {
1321 { "Destroy", "", "", destroy_session },
1322 { "Connect", "", "", connect_session },
1323 { "Disconnect", "", "", disconnect_session },
1324 { "Change", "sv", "", change_session },
1328 int __connman_session_create(DBusMessage *msg)
1330 const char *owner, *notify_path;
1331 char *session_path = NULL;
1332 DBusMessageIter iter, array;
1333 struct connman_session *session = NULL;
1334 struct session_info *info, *info_last;
1336 connman_bool_t priority = FALSE, avoid_handover = FALSE;
1337 connman_bool_t stay_connected = FALSE, ecall = FALSE;
1338 enum connman_session_roaming_policy roaming_policy =
1339 CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
1340 GSList *allowed_bearers = NULL;
1341 unsigned int periodic_connect = 0;
1342 unsigned int idle_timeout = 0;
1346 owner = dbus_message_get_sender(msg);
1348 DBG("owner %s", owner);
1350 if (ecall_session != NULL) {
1352 * If there is an emergency call already going on,
1353 * ignore session creation attempt
1359 dbus_message_iter_init(msg, &iter);
1360 dbus_message_iter_recurse(&iter, &array);
1362 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1363 DBusMessageIter entry, value;
1364 const char *key, *val;
1366 dbus_message_iter_recurse(&array, &entry);
1367 dbus_message_iter_get_basic(&entry, &key);
1369 dbus_message_iter_next(&entry);
1370 dbus_message_iter_recurse(&entry, &value);
1372 switch (dbus_message_iter_get_arg_type(&value)) {
1373 case DBUS_TYPE_ARRAY:
1374 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1376 session_parse_allowed_bearers(&value);
1381 case DBUS_TYPE_BOOLEAN:
1382 if (g_str_equal(key, "Priority") == TRUE) {
1383 dbus_message_iter_get_basic(&value,
1385 } else if (g_str_equal(key, "AvoidHandover") == TRUE) {
1386 dbus_message_iter_get_basic(&value,
1388 } else if (g_str_equal(key, "StayConnected") == TRUE) {
1389 dbus_message_iter_get_basic(&value,
1391 } else if (g_str_equal(key, "EmergencyCall") == TRUE) {
1392 dbus_message_iter_get_basic(&value,
1398 case DBUS_TYPE_UINT32:
1399 if (g_str_equal(key, "PeriodicConnect") == TRUE) {
1400 dbus_message_iter_get_basic(&value,
1402 } else if (g_str_equal(key, "IdleTimeout") == TRUE) {
1403 dbus_message_iter_get_basic(&value,
1409 case DBUS_TYPE_STRING:
1410 if (g_str_equal(key, "RoamingPolicy") == TRUE) {
1411 dbus_message_iter_get_basic(&value, &val);
1412 roaming_policy = string2roamingpolicy(val);
1417 dbus_message_iter_next(&array);
1420 dbus_message_iter_next(&iter);
1421 dbus_message_iter_get_basic(&iter, ¬ify_path);
1423 if (notify_path == NULL) {
1428 session_path = g_strdup_printf("/sessions%s", notify_path);
1429 if (session_path == NULL) {
1434 session = g_hash_table_lookup(session_hash, session_path);
1435 if (session != NULL) {
1441 session = g_try_new0(struct connman_session, 1);
1442 if (session == NULL) {
1447 session->info = g_try_new0(struct session_info, 1);
1448 if (session->info == NULL) {
1453 session->info_last = g_try_new0(struct session_info, 1);
1454 if (session->info_last == NULL) {
1459 info = session->info;
1460 info_last = session->info_last;
1462 session->owner = g_strdup(owner);
1463 session->session_path = session_path;
1464 session->notify_path = g_strdup(notify_path);
1465 session->notify_watch =
1466 g_dbus_add_disconnect_watch(connection, session->owner,
1467 owner_disconnect, session, NULL);
1469 session->service_hash = g_hash_table_new_full(g_direct_hash, g_direct_equal,
1472 info->online = FALSE;
1473 info->priority = priority;
1474 info->avoid_handover = avoid_handover;
1475 info->stay_connected = stay_connected;
1476 info->periodic_connect = periodic_connect;
1477 info->idle_timeout = idle_timeout;
1478 info->ecall = ecall;
1479 info->roaming_policy = roaming_policy;
1483 if (allowed_bearers == NULL) {
1484 info->allowed_bearers =
1485 session_allowed_bearers_any();
1487 if (info->allowed_bearers == NULL) {
1492 info->allowed_bearers = allowed_bearers;
1495 g_hash_table_replace(session_hash, session->session_path, session);
1497 DBG("add %s", session->session_path);
1499 if (g_dbus_register_interface(connection, session->session_path,
1500 CONNMAN_SESSION_INTERFACE,
1501 session_methods, NULL,
1502 NULL, session, NULL) == FALSE) {
1503 connman_error("Failed to register %s", session->session_path);
1504 g_hash_table_remove(session_hash, session->session_path);
1511 g_dbus_send_reply(connection, msg,
1512 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1516 update_allowed_bearers(session);
1517 if (info->ecall == TRUE) {
1518 ecall_session = session;
1519 update_ecall_sessions(session);
1522 info_last->online = info->online;
1523 info_last->priority = info->priority;
1524 info_last->avoid_handover = info->avoid_handover;
1525 info_last->stay_connected = info->stay_connected;
1526 info_last->periodic_connect = info->periodic_connect;
1527 info_last->idle_timeout = info->idle_timeout;
1528 info_last->ecall = info->ecall;
1529 info_last->roaming_policy = info->roaming_policy;
1530 info_last->entry = info->entry;
1531 info_last->marker = info->marker;
1532 info_last->allowed_bearers = info->allowed_bearers;
1534 session->info_dirty = TRUE;
1535 session->append_all = TRUE;
1537 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1542 connman_error("Failed to create session");
1544 if (session != NULL) {
1545 if (session->info_last != NULL)
1546 g_free(session->info_last);
1547 if (session->info != NULL)
1548 g_free(session->info);
1552 g_free(session_path);
1554 g_slist_foreach(allowed_bearers, cleanup_bearer_info, NULL);
1555 g_slist_free(allowed_bearers);
1560 int __connman_session_destroy(DBusMessage *msg)
1562 const char *owner, *session_path;
1563 struct connman_session *session;
1565 owner = dbus_message_get_sender(msg);
1567 DBG("owner %s", owner);
1569 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1571 if (session_path == NULL)
1574 session = g_hash_table_lookup(session_hash, session_path);
1575 if (session == NULL)
1578 if (g_strcmp0(owner, session->owner) != 0)
1581 session_disconnect(session);
1586 connman_bool_t __connman_session_mode()
1591 void __connman_session_set_mode(connman_bool_t enable)
1593 DBG("enable %d", enable);
1595 sessionmode = enable;
1597 if (sessionmode == TRUE)
1598 __connman_service_disconnect_all();
1601 static void service_add(struct connman_service *service,
1604 GHashTableIter iter;
1605 GSequenceIter *iter_service_list;
1606 gpointer key, value;
1607 struct connman_session *session;
1608 struct service_entry *entry;
1610 DBG("service %p", service);
1612 g_hash_table_iter_init(&iter, session_hash);
1614 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1617 if (service_match(session, service) == FALSE)
1620 entry = create_service_entry(service, name,
1621 CONNMAN_SERVICE_STATE_IDLE);
1626 g_sequence_insert_sorted(session->service_list,
1627 entry, sort_services,
1630 g_hash_table_replace(session->service_hash, service,
1633 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1637 static void service_remove(struct connman_service *service)
1640 GHashTableIter iter;
1641 gpointer key, value;
1642 struct connman_session *session;
1643 struct session_info *info;
1645 DBG("service %p", service);
1647 g_hash_table_iter_init(&iter, session_hash);
1649 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1650 GSequenceIter *iter;
1652 info = session->info;
1654 iter = g_hash_table_lookup(session->service_hash, service);
1658 g_sequence_remove(iter);
1660 if (info->entry != NULL && info->entry->service == service)
1662 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1666 static void service_state_changed(struct connman_service *service,
1667 enum connman_service_state state)
1669 GHashTableIter iter;
1670 gpointer key, value;
1671 struct connman_session *session;
1672 struct session_info *info, *info_last;
1674 DBG("service %p state %d", service, state);
1676 g_hash_table_iter_init(&iter, session_hash);
1678 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1679 GSequenceIter *service_iter;
1682 info = session->info;
1683 info_last = session->info_last;
1685 service_iter = g_hash_table_lookup(session->service_hash, service);
1686 if (service_iter != NULL) {
1687 struct service_entry *entry;
1689 entry = g_sequence_get(service_iter);
1690 entry->state = state;
1692 if (info->entry == entry) {
1693 info->online = is_online(entry->state);
1694 if (info_last->online != info->online)
1695 session->info_dirty = TRUE;
1699 session_changed(session,
1700 CONNMAN_SESSION_TRIGGER_SERVICE);
1704 static void ipconfig_changed(struct connman_service *service,
1705 struct connman_ipconfig *ipconfig)
1707 GHashTableIter iter;
1708 gpointer key, value;
1709 struct connman_session *session;
1710 struct session_info *info;
1711 enum connman_ipconfig_type type;
1713 DBG("service %p ipconfig %p", service, ipconfig);
1715 type = __connman_ipconfig_get_config_type(ipconfig);
1717 g_hash_table_iter_init(&iter, session_hash);
1719 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1721 info = session->info;
1723 if (info->entry != NULL && info->entry->service == service) {
1724 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
1725 ipconfig_ipv4_changed(session);
1726 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
1727 ipconfig_ipv6_changed(session);
1732 static struct connman_notifier session_notifier = {
1734 .service_add = service_add,
1735 .service_remove = service_remove,
1736 .service_state_changed = service_state_changed,
1737 .ipconfig_changed = ipconfig_changed,
1740 int __connman_session_init(void)
1746 connection = connman_dbus_get_connection();
1747 if (connection == NULL)
1750 err = connman_notifier_register(&session_notifier);
1752 dbus_connection_unref(connection);
1756 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1757 NULL, cleanup_session);
1759 sessionmode = FALSE;
1763 void __connman_session_cleanup(void)
1767 if (connection == NULL)
1770 connman_notifier_unregister(&session_notifier);
1772 g_hash_table_foreach(session_hash, release_session, NULL);
1773 g_hash_table_destroy(session_hash);
1774 session_hash = NULL;
1776 dbus_connection_unref(connection);