5 * Copyright (C) 2007-2012 Intel Corporation. All rights reserved.
6 * Copyright (C) 2011 BWM CarIT GmbH. All rights reserved.
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <connman/session.h>
35 static DBusConnection *connection;
36 static GHashTable *session_hash;
37 static connman_bool_t sessionmode;
38 static struct connman_session *ecall_session;
39 static GSList *policy_list;
41 enum connman_session_trigger {
42 CONNMAN_SESSION_TRIGGER_UNKNOWN = 0,
43 CONNMAN_SESSION_TRIGGER_SETTING = 1,
44 CONNMAN_SESSION_TRIGGER_CONNECT = 2,
45 CONNMAN_SESSION_TRIGGER_DISCONNECT = 3,
46 CONNMAN_SESSION_TRIGGER_SERVICE = 4,
47 CONNMAN_SESSION_TRIGGER_ECALL = 5,
50 enum connman_session_reason {
51 CONNMAN_SESSION_REASON_UNKNOWN = 0,
52 CONNMAN_SESSION_REASON_CONNECT = 1,
53 CONNMAN_SESSION_REASON_FREE_RIDE = 2,
56 enum connman_session_state {
57 CONNMAN_SESSION_STATE_DISCONNECTED = 0,
58 CONNMAN_SESSION_STATE_CONNECTED = 1,
59 CONNMAN_SESSION_STATE_ONLINE = 2,
62 enum connman_session_type {
63 CONNMAN_SESSION_TYPE_ANY = 0,
64 CONNMAN_SESSION_TYPE_LOCAL = 1,
65 CONNMAN_SESSION_TYPE_INTERNET = 2,
68 enum connman_session_roaming_policy {
69 CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN = 0,
70 CONNMAN_SESSION_ROAMING_POLICY_DEFAULT = 1,
71 CONNMAN_SESSION_ROAMING_POLICY_ALWAYS = 2,
72 CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN = 3,
73 CONNMAN_SESSION_ROAMING_POLICY_NATIONAL = 4,
74 CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL = 5,
77 struct service_entry {
78 /* track why this service was selected */
79 enum connman_session_reason reason;
80 enum connman_service_state state;
82 struct connman_service *service;
85 GSList *pending_timeouts;
89 enum connman_session_state state;
90 enum connman_session_type type;
91 connman_bool_t priority;
92 GSList *allowed_bearers;
93 enum connman_session_roaming_policy roaming_policy;
95 struct service_entry *entry;
96 enum connman_session_reason reason;
99 struct connman_session {
105 struct connman_session_policy *policy;
107 connman_bool_t append_all;
108 struct session_info *info;
109 struct session_info *info_last;
111 connman_bool_t ecall;
113 GSequence *service_list;
114 GHashTable *service_hash;
117 static const char *trigger2string(enum connman_session_trigger trigger)
120 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
122 case CONNMAN_SESSION_TRIGGER_SETTING:
124 case CONNMAN_SESSION_TRIGGER_CONNECT:
126 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
128 case CONNMAN_SESSION_TRIGGER_SERVICE:
130 case CONNMAN_SESSION_TRIGGER_ECALL:
137 static const char *reason2string(enum connman_session_reason reason)
140 case CONNMAN_SESSION_REASON_UNKNOWN:
142 case CONNMAN_SESSION_REASON_CONNECT:
144 case CONNMAN_SESSION_REASON_FREE_RIDE:
151 static const char *state2string(enum connman_session_state state)
154 case CONNMAN_SESSION_STATE_DISCONNECTED:
155 return "disconnected";
156 case CONNMAN_SESSION_STATE_CONNECTED:
158 case CONNMAN_SESSION_STATE_ONLINE:
165 static const char *type2string(enum connman_session_type type)
168 case CONNMAN_SESSION_TYPE_ANY:
170 case CONNMAN_SESSION_TYPE_LOCAL:
172 case CONNMAN_SESSION_TYPE_INTERNET:
179 static enum connman_session_type string2type(const char *type)
181 if (g_strcmp0(type, "local") == 0)
182 return CONNMAN_SESSION_TYPE_LOCAL;
183 else if (g_strcmp0(type, "internet") == 0)
184 return CONNMAN_SESSION_TYPE_INTERNET;
186 return CONNMAN_SESSION_TYPE_ANY;
189 static enum connman_session_roaming_policy string2roamingpolicy(const char *policy)
191 if (g_strcmp0(policy, "default") == 0)
192 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
193 else if (g_strcmp0(policy, "always") == 0)
194 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
195 else if (g_strcmp0(policy, "forbidden") == 0)
196 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
197 else if (g_strcmp0(policy, "national") == 0)
198 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
199 else if (g_strcmp0(policy, "international") == 0)
200 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
202 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
205 static enum connman_service_type bearer2service(const char *bearer)
208 return CONNMAN_SERVICE_TYPE_UNKNOWN;
210 if (g_strcmp0(bearer, "ethernet") == 0)
211 return CONNMAN_SERVICE_TYPE_ETHERNET;
212 else if (g_strcmp0(bearer, "wifi") == 0)
213 return CONNMAN_SERVICE_TYPE_WIFI;
214 else if (g_strcmp0(bearer, "wimax") == 0)
215 return CONNMAN_SERVICE_TYPE_WIMAX;
216 else if (g_strcmp0(bearer, "bluetooth") == 0)
217 return CONNMAN_SERVICE_TYPE_BLUETOOTH;
218 else if (g_strcmp0(bearer, "cellular") == 0)
219 return CONNMAN_SERVICE_TYPE_CELLULAR;
220 else if (g_strcmp0(bearer, "vpn") == 0)
221 return CONNMAN_SERVICE_TYPE_VPN;
223 return CONNMAN_SERVICE_TYPE_UNKNOWN;
226 static char *service2bearer(enum connman_service_type type)
229 case CONNMAN_SERVICE_TYPE_ETHERNET:
231 case CONNMAN_SERVICE_TYPE_WIFI:
233 case CONNMAN_SERVICE_TYPE_WIMAX:
235 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
237 case CONNMAN_SERVICE_TYPE_CELLULAR:
239 case CONNMAN_SERVICE_TYPE_VPN:
241 case CONNMAN_SERVICE_TYPE_UNKNOWN:
242 case CONNMAN_SERVICE_TYPE_SYSTEM:
243 case CONNMAN_SERVICE_TYPE_GPS:
244 case CONNMAN_SERVICE_TYPE_GADGET:
251 static int policy_get_bool(struct connman_session *session, const char *id,
252 const char *key, connman_bool_t *val)
254 if (session->policy == NULL) {
259 return (*session->policy->get_bool)(session, key, val);
262 static int policy_get_string(struct connman_session *session, const char *id,
263 const char *key, char **val)
265 if (session->policy == NULL) {
270 return (*session->policy->get_string)(session, key, val);
273 static int assign_policy_plugin(struct connman_session *session)
276 struct connman_session_policy *policy;
278 if (session->policy != NULL)
281 for (list = policy_list; list != NULL; list = list->next) {
284 session->policy = policy;
291 static void probe_policy(struct connman_session_policy *policy)
296 struct connman_session *session;
298 DBG("policy %p name %s", policy, policy->name);
300 g_hash_table_iter_init(&iter, session_hash);
302 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
305 if (session->policy != NULL)
308 assign_policy_plugin(session);
312 static void remove_policy(struct connman_session_policy *policy)
316 struct connman_session *session;
318 DBG("policy %p name %s", policy, policy->name);
320 g_hash_table_iter_init(&iter, session_hash);
322 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
325 if (session->policy != policy)
328 session->policy = NULL;
329 assign_policy_plugin(session);
333 static gint compare_priority(gconstpointer a, gconstpointer b)
335 const struct connman_session_policy *policy1 = a;
336 const struct connman_session_policy *policy2 = b;
338 return policy2->priority - policy1->priority;
341 int connman_session_update_bool(struct connman_session *session, const char *key,
344 struct session_info *info;
349 info = session->info;
353 DBG("%s %d", key, val);
358 int connman_session_update_string(struct connman_session *session, const char *key,
361 struct session_info *info;
366 info = session->info;
370 DBG("%s %s", key, val);
375 int connman_session_policy_register(struct connman_session_policy *policy)
377 DBG("name %s", policy->name);
379 policy_list = g_slist_insert_sorted(policy_list, policy,
382 probe_policy(policy);
387 void connman_session_policy_unregister(struct connman_session_policy *policy)
389 DBG("name %s", policy->name);
391 policy_list = g_slist_remove(policy_list, policy);
393 remove_policy(policy);
396 static void cleanup_bearer(gpointer data, gpointer user_data)
398 struct connman_session_bearer *bearer = data;
400 g_free(bearer->name);
404 static GSList *session_parse_allowed_bearers(DBusMessageIter *iter)
406 struct connman_session_bearer *bearer;
407 DBusMessageIter array;
410 dbus_message_iter_recurse(iter, &array);
412 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_STRING) {
413 char *bearer_name = NULL;
415 dbus_message_iter_get_basic(&array, &bearer_name);
417 bearer = g_try_new0(struct connman_session_bearer, 1);
418 if (bearer == NULL) {
419 g_slist_foreach(list, cleanup_bearer, NULL);
425 bearer->name = g_strdup(bearer_name);
426 bearer->service_type = bearer2service(bearer->name);
428 if (bearer->service_type == CONNMAN_SERVICE_TYPE_UNKNOWN &&
429 g_strcmp0(bearer->name, "*") == 0) {
430 bearer->match_all = TRUE;
432 bearer->match_all = FALSE;
435 list = g_slist_append(list, bearer);
437 dbus_message_iter_next(&array);
443 static GSList *session_allowed_bearers_any(void)
445 struct connman_session_bearer *bearer;
448 bearer = g_try_new0(struct connman_session_bearer, 1);
452 bearer->name = g_strdup("");
453 bearer->match_all = TRUE;
454 bearer->service_type = CONNMAN_SERVICE_TYPE_UNKNOWN;
456 list = g_slist_append(list, bearer);
461 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
463 struct session_info *info = user_data;
466 for (list = info->allowed_bearers;
467 list != NULL; list = list->next) {
468 struct connman_session_bearer *bearer = list->data;
470 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
475 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
477 struct connman_service *service = user_data;
478 struct connman_ipconfig *ipconfig_ipv4;
483 if (__connman_service_is_connected_state(service,
484 CONNMAN_IPCONFIG_TYPE_IPV4) == FALSE) {
488 ipconfig_ipv4 = __connman_service_get_ip4config(service);
489 if (ipconfig_ipv4 == NULL)
492 __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
495 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
497 struct connman_service *service = user_data;
498 struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
503 if (__connman_service_is_connected_state(service,
504 CONNMAN_IPCONFIG_TYPE_IPV6) == FALSE) {
508 ipconfig_ipv4 = __connman_service_get_ip4config(service);
509 ipconfig_ipv6 = __connman_service_get_ip6config(service);
510 if (ipconfig_ipv6 == NULL)
513 __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
516 static void append_notify(DBusMessageIter *dict,
517 struct connman_session *session)
519 struct session_info *info = session->info;
520 struct session_info *info_last = session->info_last;
521 struct connman_service *service;
522 const char *name, *ifname, *bearer;
524 if (session->append_all == TRUE ||
525 info->state != info_last->state) {
526 const char *state = state2string(info->state);
528 connman_dbus_dict_append_basic(dict, "State",
531 info_last->state = info->state;
534 if (session->append_all == TRUE ||
535 info->entry != info_last->entry) {
536 if (info->entry == NULL) {
542 name = info->entry->name;
543 ifname = info->entry->ifname;
544 service = info->entry->service;
545 bearer = info->entry->bearer;
548 connman_dbus_dict_append_basic(dict, "Name",
552 connman_dbus_dict_append_dict(dict, "IPv4",
553 append_ipconfig_ipv4,
556 connman_dbus_dict_append_dict(dict, "IPv6",
557 append_ipconfig_ipv6,
560 connman_dbus_dict_append_basic(dict, "Interface",
564 connman_dbus_dict_append_basic(dict, "Bearer",
568 info_last->entry = info->entry;
571 if (session->append_all == TRUE || info->type != info_last->type) {
572 const char *type = type2string(info->type);
574 connman_dbus_dict_append_basic(dict, "ConnectionType",
577 info_last->type = info->type;
580 if (session->append_all == TRUE ||
581 info->allowed_bearers != info_last->allowed_bearers) {
582 connman_dbus_dict_append_array(dict, "AllowedBearers",
584 append_allowed_bearers,
586 info_last->allowed_bearers = info->allowed_bearers;
589 session->append_all = FALSE;
592 static connman_bool_t is_type_matching_state(enum connman_session_state *state,
593 enum connman_session_type type)
596 case CONNMAN_SESSION_TYPE_ANY:
598 case CONNMAN_SESSION_TYPE_LOCAL:
599 if (*state >= CONNMAN_SESSION_STATE_CONNECTED) {
600 *state = CONNMAN_SESSION_STATE_CONNECTED;
605 case CONNMAN_SESSION_TYPE_INTERNET:
606 if (*state == CONNMAN_SESSION_STATE_ONLINE)
614 static connman_bool_t compute_notifiable_changes(struct connman_session *session)
616 struct session_info *info_last = session->info_last;
617 struct session_info *info = session->info;
619 if (session->append_all == TRUE)
622 if (info->state != info_last->state)
625 if (info->entry != info_last->entry &&
626 info->state >= CONNMAN_SESSION_STATE_CONNECTED)
629 if (info->allowed_bearers != info_last->allowed_bearers ||
630 info->type != info_last->type)
636 static gboolean session_notify(gpointer user_data)
638 struct connman_session *session = user_data;
640 DBusMessageIter array, dict;
642 if (compute_notifiable_changes(session) == FALSE)
645 DBG("session %p owner %s notify_path %s", session,
646 session->owner, session->notify_path);
648 msg = dbus_message_new_method_call(session->owner, session->notify_path,
649 CONNMAN_NOTIFICATION_INTERFACE,
654 dbus_message_iter_init_append(msg, &array);
655 connman_dbus_dict_open(&array, &dict);
657 append_notify(&dict, session);
659 connman_dbus_dict_close(&array, &dict);
661 g_dbus_send_message(connection, msg);
666 static void ipconfig_ipv4_changed(struct connman_session *session)
668 struct session_info *info = session->info;
670 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
671 "IPv4", append_ipconfig_ipv4,
672 info->entry->service);
675 static void ipconfig_ipv6_changed(struct connman_session *session)
677 struct session_info *info = session->info;
679 connman_dbus_setting_changed_dict(session->owner, session->notify_path,
680 "IPv6", append_ipconfig_ipv6,
681 info->entry->service);
684 static connman_bool_t service_type_match(struct connman_session *session,
685 struct connman_service *service)
687 struct session_info *info = session->info;
690 for (list = info->allowed_bearers;
691 list != NULL; list = list->next) {
692 struct connman_session_bearer *bearer = list->data;
693 enum connman_service_type service_type;
695 if (bearer->match_all == TRUE)
698 service_type = connman_service_get_type(service);
699 if (bearer->service_type == service_type)
706 static connman_bool_t service_match(struct connman_session *session,
707 struct connman_service *service)
709 if (service_type_match(session, service) == FALSE)
715 static int service_type_weight(enum connman_service_type type)
718 * The session doesn't care which service
719 * to use. Nevertheless we have to sort them
720 * according their type. The ordering is
729 case CONNMAN_SERVICE_TYPE_ETHERNET:
731 case CONNMAN_SERVICE_TYPE_BLUETOOTH:
733 case CONNMAN_SERVICE_TYPE_WIFI:
734 case CONNMAN_SERVICE_TYPE_WIMAX:
736 case CONNMAN_SERVICE_TYPE_CELLULAR:
738 case CONNMAN_SERVICE_TYPE_UNKNOWN:
739 case CONNMAN_SERVICE_TYPE_SYSTEM:
740 case CONNMAN_SERVICE_TYPE_GPS:
741 case CONNMAN_SERVICE_TYPE_VPN:
742 case CONNMAN_SERVICE_TYPE_GADGET:
749 static gint sort_allowed_bearers(struct connman_service *service_a,
750 struct connman_service *service_b,
751 struct connman_session *session)
753 struct session_info *info = session->info;
755 enum connman_service_type type_a, type_b;
756 int weight_a, weight_b;
758 type_a = connman_service_get_type(service_a);
759 type_b = connman_service_get_type(service_b);
761 for (list = info->allowed_bearers;
762 list != NULL; list = list->next) {
763 struct connman_session_bearer *bearer = list->data;
765 if (bearer->match_all == TRUE) {
766 if (type_a != type_b) {
767 weight_a = service_type_weight(type_a);
768 weight_b = service_type_weight(type_b);
770 if (weight_a > weight_b)
773 if (weight_a < weight_b)
780 if (type_a == bearer->service_type &&
781 type_b == bearer->service_type) {
785 if (type_a == bearer->service_type &&
786 type_b != bearer->service_type) {
790 if (type_a != bearer->service_type &&
791 type_b == bearer->service_type) {
799 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
801 struct service_entry *entry_a = (void *)a;
802 struct service_entry *entry_b = (void *)b;
803 struct connman_session *session = user_data;
805 return sort_allowed_bearers(entry_a->service, entry_b->service,
809 static void cleanup_session(gpointer user_data)
811 struct connman_session *session = user_data;
812 struct session_info *info = session->info;
814 DBG("remove %s", session->session_path);
816 g_hash_table_destroy(session->service_hash);
817 g_sequence_free(session->service_list);
819 if (info->entry != NULL &&
820 info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
821 __connman_service_disconnect(info->entry->service);
824 g_slist_foreach(info->allowed_bearers, cleanup_bearer, NULL);
825 g_slist_free(info->allowed_bearers);
827 g_free(session->owner);
828 g_free(session->session_path);
829 g_free(session->notify_path);
830 g_free(session->info);
831 g_free(session->info_last);
836 static enum connman_session_state service_to_session_state(enum connman_service_state state)
839 case CONNMAN_SERVICE_STATE_UNKNOWN:
840 case CONNMAN_SERVICE_STATE_IDLE:
841 case CONNMAN_SERVICE_STATE_ASSOCIATION:
842 case CONNMAN_SERVICE_STATE_CONFIGURATION:
843 case CONNMAN_SERVICE_STATE_DISCONNECT:
844 case CONNMAN_SERVICE_STATE_FAILURE:
846 case CONNMAN_SERVICE_STATE_READY:
847 return CONNMAN_SESSION_STATE_CONNECTED;
848 case CONNMAN_SERVICE_STATE_ONLINE:
849 return CONNMAN_SESSION_STATE_ONLINE;
852 return CONNMAN_SESSION_STATE_DISCONNECTED;
855 static connman_bool_t is_connected(enum connman_service_state state)
858 case CONNMAN_SERVICE_STATE_UNKNOWN:
859 case CONNMAN_SERVICE_STATE_IDLE:
860 case CONNMAN_SERVICE_STATE_ASSOCIATION:
861 case CONNMAN_SERVICE_STATE_CONFIGURATION:
862 case CONNMAN_SERVICE_STATE_DISCONNECT:
863 case CONNMAN_SERVICE_STATE_FAILURE:
865 case CONNMAN_SERVICE_STATE_READY:
866 case CONNMAN_SERVICE_STATE_ONLINE:
873 static connman_bool_t is_connecting(enum connman_service_state state)
876 case CONNMAN_SERVICE_STATE_UNKNOWN:
877 case CONNMAN_SERVICE_STATE_IDLE:
879 case CONNMAN_SERVICE_STATE_ASSOCIATION:
880 case CONNMAN_SERVICE_STATE_CONFIGURATION:
882 case CONNMAN_SERVICE_STATE_DISCONNECT:
883 case CONNMAN_SERVICE_STATE_FAILURE:
884 case CONNMAN_SERVICE_STATE_READY:
885 case CONNMAN_SERVICE_STATE_ONLINE:
892 static connman_bool_t explicit_connect(enum connman_session_reason reason)
895 case CONNMAN_SESSION_REASON_UNKNOWN:
896 case CONNMAN_SESSION_REASON_FREE_RIDE:
898 case CONNMAN_SESSION_REASON_CONNECT:
905 static connman_bool_t explicit_disconnect(struct session_info *info)
907 if (info->entry == NULL)
910 DBG("reason %s service %p state %d",
911 reason2string(info->entry->reason),
912 info->entry->service, info->entry->state);
914 if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
917 if (explicit_connect(info->entry->reason) == FALSE)
920 if (__connman_service_session_dec(info->entry->service) == FALSE)
926 struct pending_data {
927 unsigned int timeout;
928 struct service_entry *entry;
929 gboolean (*cb)(gpointer);
932 static void pending_timeout_free(gpointer data, gpointer user_data)
934 struct pending_data *pending = data;
936 DBG("pending %p timeout %d", pending, pending->timeout);
937 g_source_remove(pending->timeout);
941 static void pending_timeout_remove_all(struct service_entry *entry)
945 g_slist_foreach(entry->pending_timeouts, pending_timeout_free, NULL);
946 g_slist_free(entry->pending_timeouts);
947 entry->pending_timeouts = NULL;
950 static gboolean pending_timeout_cb(gpointer data)
952 struct pending_data *pending = data;
953 struct service_entry *entry = pending->entry;
956 DBG("pending %p timeout %d", pending, pending->timeout);
958 ret = pending->cb(pending->entry);
960 entry->pending_timeouts =
961 g_slist_remove(entry->pending_timeouts,
968 static connman_bool_t pending_timeout_add(unsigned int seconds,
969 gboolean (*cb)(gpointer),
970 struct service_entry *entry)
972 struct pending_data *pending = g_try_new0(struct pending_data, 1);
974 if (pending == NULL || cb == NULL || entry == NULL) {
980 pending->entry = entry;
981 pending->timeout = g_timeout_add_seconds(seconds, pending_timeout_cb,
983 entry->pending_timeouts = g_slist_prepend(entry->pending_timeouts,
986 DBG("pending %p entry %p timeout id %d", pending, entry,
992 static gboolean call_disconnect(gpointer user_data)
994 struct service_entry *entry = user_data;
995 struct connman_service *service = entry->service;
998 * TODO: We should mark this entry as pending work. In case
999 * disconnect fails we just unassign this session from the
1000 * service and can't do anything later on it
1002 DBG("disconnect service %p", service);
1003 __connman_service_disconnect(service);
1008 static gboolean call_connect(gpointer user_data)
1010 struct service_entry *entry = user_data;
1011 struct connman_service *service = entry->service;
1013 DBG("connect service %p", service);
1014 __connman_service_connect(service);
1019 static void deselect_service(struct session_info *info)
1021 struct service_entry *entry;
1022 connman_bool_t disconnect, connected;
1026 if (info->entry == NULL)
1029 disconnect = explicit_disconnect(info);
1031 connected = is_connecting(info->entry->state) == TRUE ||
1032 is_connected(info->entry->state) == TRUE;
1034 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1035 info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1037 entry = info->entry;
1040 DBG("disconnect %d connected %d", disconnect, connected);
1042 if (disconnect == TRUE && connected == TRUE)
1043 pending_timeout_add(0, call_disconnect, entry);
1046 static void deselect_and_disconnect(struct connman_session *session)
1048 struct session_info *info = session->info;
1050 deselect_service(info);
1052 info->reason = CONNMAN_SESSION_REASON_FREE_RIDE;
1055 static void select_connected_service(struct session_info *info,
1056 struct service_entry *entry)
1058 enum connman_session_state state;
1060 state = service_to_session_state(entry->state);
1061 if (is_type_matching_state(&state, info->type) == FALSE)
1064 info->state = state;
1066 info->entry = entry;
1067 info->entry->reason = info->reason;
1069 if (explicit_connect(info->reason) == FALSE)
1072 __connman_service_session_inc(info->entry->service);
1075 static void select_offline_service(struct session_info *info,
1076 struct service_entry *entry)
1078 if (explicit_connect(info->reason) == FALSE)
1081 info->state = service_to_session_state(entry->state);
1083 info->entry = entry;
1084 info->entry->reason = info->reason;
1086 __connman_service_session_inc(info->entry->service);
1087 pending_timeout_add(0, call_connect, entry);
1090 static void select_service(struct session_info *info,
1091 struct service_entry *entry)
1093 DBG("service %p", entry->service);
1095 if (is_connected(entry->state) == TRUE)
1096 select_connected_service(info, entry);
1098 select_offline_service(info, entry);
1101 static void select_and_connect(struct connman_session *session,
1102 enum connman_session_reason reason)
1104 struct session_info *info = session->info;
1105 struct service_entry *entry = NULL;
1106 GSequenceIter *iter;
1108 DBG("session %p reason %s", session, reason2string(reason));
1110 info->reason = reason;
1112 iter = g_sequence_get_begin_iter(session->service_list);
1114 while (g_sequence_iter_is_end(iter) == FALSE) {
1115 entry = g_sequence_get(iter);
1117 switch (entry->state) {
1118 case CONNMAN_SERVICE_STATE_ASSOCIATION:
1119 case CONNMAN_SERVICE_STATE_CONFIGURATION:
1120 case CONNMAN_SERVICE_STATE_READY:
1121 case CONNMAN_SERVICE_STATE_ONLINE:
1122 case CONNMAN_SERVICE_STATE_IDLE:
1123 case CONNMAN_SERVICE_STATE_DISCONNECT:
1124 select_service(info, entry);
1126 case CONNMAN_SERVICE_STATE_UNKNOWN:
1127 case CONNMAN_SERVICE_STATE_FAILURE:
1131 iter = g_sequence_iter_next(iter);
1135 static struct service_entry *create_service_entry(struct connman_service *service,
1137 enum connman_service_state state)
1139 struct service_entry *entry;
1140 enum connman_service_type type;
1143 entry = g_try_new0(struct service_entry, 1);
1147 entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1148 entry->state = state;
1153 entry->service = service;
1155 idx = __connman_service_get_index(entry->service);
1156 entry->ifname = connman_inet_ifname(idx);
1157 if (entry->ifname == NULL)
1158 entry->ifname = g_strdup("");
1160 type = connman_service_get_type(entry->service);
1161 entry->bearer = service2bearer(type);
1166 static void destroy_service_entry(gpointer data)
1168 struct service_entry *entry = data;
1170 pending_timeout_remove_all(entry);
1171 g_free(entry->ifname);
1176 static void populate_service_list(struct connman_session *session)
1178 struct service_entry *entry;
1179 GSequenceIter *iter;
1181 session->service_hash =
1182 g_hash_table_new_full(g_direct_hash, g_direct_equal,
1184 session->service_list = __connman_service_get_list(session,
1186 create_service_entry,
1187 destroy_service_entry);
1189 g_sequence_sort(session->service_list, sort_services, session);
1191 iter = g_sequence_get_begin_iter(session->service_list);
1193 while (g_sequence_iter_is_end(iter) == FALSE) {
1194 entry = g_sequence_get(iter);
1196 DBG("service %p type %s name %s", entry->service,
1197 service2bearer(connman_service_get_type(entry->service)),
1200 g_hash_table_replace(session->service_hash,
1201 entry->service, iter);
1203 iter = g_sequence_iter_next(iter);
1207 static void session_changed(struct connman_session *session,
1208 enum connman_session_trigger trigger)
1210 struct session_info *info = session->info;
1211 struct session_info *info_last = session->info_last;
1212 GSequenceIter *service_iter = NULL, *service_iter_last = NULL;
1213 GSequence *service_list_last;
1214 GHashTable *service_hash_last;
1217 * TODO: This only a placeholder for the 'real' algorithm to
1218 * play a bit around. So we are going to improve it step by step.
1221 DBG("session %p trigger %s reason %s", session, trigger2string(trigger),
1222 reason2string(info->reason));
1224 if (info->entry != NULL) {
1225 enum connman_session_state state;
1227 state = service_to_session_state(info->entry->state);
1229 if (is_type_matching_state(&state, info->type) == TRUE)
1230 info->state = state;
1234 case CONNMAN_SESSION_TRIGGER_UNKNOWN:
1235 DBG("ignore session changed event");
1237 case CONNMAN_SESSION_TRIGGER_SETTING:
1238 if (info->allowed_bearers != info_last->allowed_bearers) {
1240 service_hash_last = session->service_hash;
1241 service_list_last = session->service_list;
1243 populate_service_list(session);
1245 if (info->entry != NULL) {
1246 service_iter_last = g_hash_table_lookup(
1248 info->entry->service);
1249 service_iter = g_hash_table_lookup(
1250 session->service_hash,
1251 info->entry->service);
1254 if (service_iter == NULL && service_iter_last != NULL) {
1256 * The currently selected service is
1257 * not part of this session anymore.
1259 deselect_and_disconnect(session);
1262 g_hash_table_remove_all(service_hash_last);
1263 g_sequence_free(service_list_last);
1266 if (info->type != info_last->type) {
1267 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED &&
1268 is_type_matching_state(&info->state,
1269 info->type) == FALSE)
1270 deselect_and_disconnect(session);
1273 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED) {
1274 select_and_connect(session,
1275 CONNMAN_SESSION_REASON_FREE_RIDE);
1279 case CONNMAN_SESSION_TRIGGER_ECALL:
1281 * For the time beeing we fallback to normal connect
1284 case CONNMAN_SESSION_TRIGGER_CONNECT:
1285 if (info->state >= CONNMAN_SESSION_STATE_CONNECTED) {
1286 if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
1288 info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
1289 __connman_service_session_inc(info->entry->service);
1293 if (info->entry != NULL &&
1294 is_connecting(info->entry->state) == TRUE) {
1298 select_and_connect(session,
1299 CONNMAN_SESSION_REASON_CONNECT);
1302 case CONNMAN_SESSION_TRIGGER_DISCONNECT:
1303 deselect_and_disconnect(session);
1306 case CONNMAN_SESSION_TRIGGER_SERVICE:
1307 if (info->entry != NULL &&
1308 (is_connecting(info->entry->state) == TRUE ||
1309 is_connected(info->entry->state) == TRUE)) {
1313 deselect_and_disconnect(session);
1315 if (info->reason == CONNMAN_SESSION_REASON_FREE_RIDE) {
1316 select_and_connect(session, info->reason);
1322 session_notify(session);
1325 static DBusMessage *connect_session(DBusConnection *conn,
1326 DBusMessage *msg, void *user_data)
1328 struct connman_session *session = user_data;
1330 DBG("session %p", session);
1332 if (ecall_session != NULL) {
1333 if (ecall_session->ecall == TRUE && ecall_session != session)
1334 return __connman_error_failed(msg, EBUSY);
1336 session->ecall = TRUE;
1337 session_changed(session, CONNMAN_SESSION_TRIGGER_ECALL);
1339 session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1341 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1344 static DBusMessage *disconnect_session(DBusConnection *conn,
1345 DBusMessage *msg, void *user_data)
1347 struct connman_session *session = user_data;
1349 DBG("session %p", session);
1351 if (ecall_session != NULL) {
1352 if (ecall_session->ecall == TRUE && ecall_session != session)
1353 return __connman_error_failed(msg, EBUSY);
1355 session->ecall = FALSE;
1358 session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1360 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1363 static DBusMessage *change_session(DBusConnection *conn,
1364 DBusMessage *msg, void *user_data)
1366 struct connman_session *session = user_data;
1367 struct session_info *info = session->info;
1368 DBusMessageIter iter, value;
1371 GSList *allowed_bearers;
1373 DBG("session %p", session);
1374 if (dbus_message_iter_init(msg, &iter) == FALSE)
1375 return __connman_error_invalid_arguments(msg);
1377 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
1378 return __connman_error_invalid_arguments(msg);
1380 dbus_message_iter_get_basic(&iter, &name);
1381 dbus_message_iter_next(&iter);
1383 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1384 return __connman_error_invalid_arguments(msg);
1386 dbus_message_iter_recurse(&iter, &value);
1388 switch (dbus_message_iter_get_arg_type(&value)) {
1389 case DBUS_TYPE_ARRAY:
1390 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1391 allowed_bearers = session_parse_allowed_bearers(&value);
1393 g_slist_foreach(info->allowed_bearers,
1394 cleanup_bearer, NULL);
1395 g_slist_free(info->allowed_bearers);
1397 if (allowed_bearers == NULL) {
1398 allowed_bearers = session_allowed_bearers_any();
1400 if (allowed_bearers == NULL)
1401 return __connman_error_failed(msg, ENOMEM);
1404 info->allowed_bearers = allowed_bearers;
1409 case DBUS_TYPE_STRING:
1410 if (g_str_equal(name, "ConnectionType") == TRUE) {
1411 dbus_message_iter_get_basic(&value, &val);
1412 info->type = string2type(val);
1421 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1423 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1426 return __connman_error_invalid_arguments(msg);
1429 static void release_session(gpointer key, gpointer value, gpointer user_data)
1431 struct connman_session *session = value;
1432 DBusMessage *message;
1434 DBG("owner %s path %s", session->owner, session->notify_path);
1436 if (session->notify_watch > 0)
1437 g_dbus_remove_watch(connection, session->notify_watch);
1439 g_dbus_unregister_interface(connection, session->session_path,
1440 CONNMAN_SESSION_INTERFACE);
1442 message = dbus_message_new_method_call(session->owner,
1443 session->notify_path,
1444 CONNMAN_NOTIFICATION_INTERFACE,
1446 if (message == NULL)
1449 dbus_message_set_no_reply(message, TRUE);
1451 g_dbus_send_message(connection, message);
1454 static int session_disconnect(struct connman_session *session)
1456 DBG("session %p, %s", session, session->owner);
1458 if (session->notify_watch > 0)
1459 g_dbus_remove_watch(connection, session->notify_watch);
1461 g_dbus_unregister_interface(connection, session->session_path,
1462 CONNMAN_SESSION_INTERFACE);
1464 deselect_and_disconnect(session);
1466 g_hash_table_remove(session_hash, session->session_path);
1471 static void owner_disconnect(DBusConnection *conn, void *user_data)
1473 struct connman_session *session = user_data;
1475 DBG("session %p, %s died", session, session->owner);
1477 session_disconnect(session);
1480 static DBusMessage *destroy_session(DBusConnection *conn,
1481 DBusMessage *msg, void *user_data)
1483 struct connman_session *session = user_data;
1485 DBG("session %p", session);
1487 if (ecall_session != NULL && ecall_session != session)
1488 return __connman_error_failed(msg, EBUSY);
1490 session_disconnect(session);
1492 return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1495 static const GDBusMethodTable session_methods[] = {
1496 { GDBUS_METHOD("Destroy", NULL, NULL, destroy_session) },
1497 { GDBUS_METHOD("Connect", NULL, NULL, connect_session) },
1498 { GDBUS_METHOD("Disconnect", NULL, NULL,
1499 disconnect_session ) },
1500 { GDBUS_METHOD("Change",
1501 GDBUS_ARGS({ "name", "s" }, { "value", "v" }),
1502 NULL, change_session) },
1506 int __connman_session_create(DBusMessage *msg)
1508 const char *owner, *notify_path;
1509 char *session_path = NULL;
1510 DBusMessageIter iter, array;
1511 struct connman_session *session = NULL;
1512 struct session_info *info, *info_last;
1514 enum connman_session_type type = CONNMAN_SESSION_TYPE_ANY;
1515 connman_bool_t priority;
1516 connman_bool_t ecall_app;
1517 enum connman_session_roaming_policy roaming_policy;
1518 char *roaming_policy_str;
1519 GSList *allowed_bearers = NULL;
1522 owner = dbus_message_get_sender(msg);
1524 DBG("owner %s", owner);
1526 if (ecall_session != NULL && ecall_session->ecall == TRUE) {
1528 * If there is an emergency call already going on,
1529 * ignore session creation attempt
1535 dbus_message_iter_init(msg, &iter);
1536 dbus_message_iter_recurse(&iter, &array);
1538 while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1539 DBusMessageIter entry, value;
1540 const char *key, *val;
1542 dbus_message_iter_recurse(&array, &entry);
1543 dbus_message_iter_get_basic(&entry, &key);
1545 dbus_message_iter_next(&entry);
1546 dbus_message_iter_recurse(&entry, &value);
1548 switch (dbus_message_iter_get_arg_type(&value)) {
1549 case DBUS_TYPE_ARRAY:
1550 if (g_str_equal(key, "AllowedBearers") == TRUE) {
1552 session_parse_allowed_bearers(&value);
1557 case DBUS_TYPE_STRING:
1558 if (g_str_equal(key, "ConnectionType") == TRUE) {
1559 dbus_message_iter_get_basic(&value, &val);
1560 type = string2type(val);
1565 dbus_message_iter_next(&array);
1568 dbus_message_iter_next(&iter);
1569 dbus_message_iter_get_basic(&iter, ¬ify_path);
1571 if (notify_path == NULL) {
1576 session_path = g_strdup_printf("/sessions%s", notify_path);
1577 if (session_path == NULL) {
1582 session = g_hash_table_lookup(session_hash, session_path);
1583 if (session != NULL) {
1589 session = g_try_new0(struct connman_session, 1);
1590 if (session == NULL) {
1595 session->info = g_try_new0(struct session_info, 1);
1596 if (session->info == NULL) {
1601 session->info_last = g_try_new0(struct session_info, 1);
1602 if (session->info_last == NULL) {
1607 info = session->info;
1608 info_last = session->info_last;
1610 session->owner = g_strdup(owner);
1611 session->session_path = session_path;
1612 session->notify_path = g_strdup(notify_path);
1613 session->notify_watch =
1614 g_dbus_add_disconnect_watch(connection, session->owner,
1615 owner_disconnect, session, NULL);
1617 assign_policy_plugin(session);
1619 policy_get_bool(session, owner, "Priority", &priority);
1620 policy_get_bool(session, owner, "EmergencyCall", &ecall_app);
1621 policy_get_string(session, owner, "RoamingPolicy", &roaming_policy_str);
1622 roaming_policy = string2roamingpolicy(roaming_policy_str);
1624 if (ecall_app == TRUE)
1625 ecall_session = session;
1627 info->state = CONNMAN_SESSION_STATE_DISCONNECTED;
1629 info->priority = priority;
1630 info->roaming_policy = roaming_policy;
1633 if (allowed_bearers == NULL) {
1634 info->allowed_bearers =
1635 session_allowed_bearers_any();
1637 if (info->allowed_bearers == NULL) {
1642 info->allowed_bearers = allowed_bearers;
1645 g_hash_table_replace(session_hash, session->session_path, session);
1647 DBG("add %s", session->session_path);
1649 if (g_dbus_register_interface(connection, session->session_path,
1650 CONNMAN_SESSION_INTERFACE,
1651 session_methods, NULL,
1652 NULL, session, NULL) == FALSE) {
1653 connman_error("Failed to register %s", session->session_path);
1654 g_hash_table_remove(session_hash, session->session_path);
1661 g_dbus_send_reply(connection, msg,
1662 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1666 populate_service_list(session);
1668 info_last->state = info->state;
1669 info_last->priority = info->priority;
1670 info_last->roaming_policy = info->roaming_policy;
1671 info_last->entry = info->entry;
1672 info_last->allowed_bearers = info->allowed_bearers;
1674 session->append_all = TRUE;
1676 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1681 connman_error("Failed to create session");
1683 if (session != NULL) {
1684 if (session->info_last != NULL)
1685 g_free(session->info_last);
1686 if (session->info != NULL)
1687 g_free(session->info);
1691 g_free(session_path);
1693 g_slist_foreach(allowed_bearers, cleanup_bearer, NULL);
1694 g_slist_free(allowed_bearers);
1699 int __connman_session_destroy(DBusMessage *msg)
1701 const char *owner, *session_path;
1702 struct connman_session *session;
1704 owner = dbus_message_get_sender(msg);
1706 DBG("owner %s", owner);
1708 dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1710 if (session_path == NULL)
1713 session = g_hash_table_lookup(session_hash, session_path);
1714 if (session == NULL)
1717 if (g_strcmp0(owner, session->owner) != 0)
1720 session_disconnect(session);
1725 connman_bool_t __connman_session_mode()
1730 void __connman_session_set_mode(connman_bool_t enable)
1732 DBG("enable %d", enable);
1734 if (sessionmode != enable) {
1735 sessionmode = enable;
1737 connman_dbus_property_changed_basic(CONNMAN_MANAGER_PATH,
1738 CONNMAN_MANAGER_INTERFACE, "SessionMode",
1739 DBUS_TYPE_BOOLEAN, &sessionmode);
1742 if (sessionmode == TRUE)
1743 __connman_service_disconnect_all();
1746 static void service_add(struct connman_service *service,
1749 GHashTableIter iter;
1750 GSequenceIter *iter_service_list;
1751 gpointer key, value;
1752 struct connman_session *session;
1753 struct service_entry *entry;
1755 DBG("service %p", service);
1757 g_hash_table_iter_init(&iter, session_hash);
1759 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1762 if (service_match(session, service) == FALSE)
1765 entry = create_service_entry(service, name,
1766 CONNMAN_SERVICE_STATE_IDLE);
1771 g_sequence_insert_sorted(session->service_list,
1772 entry, sort_services,
1775 g_hash_table_replace(session->service_hash, service,
1778 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1782 static void service_remove(struct connman_service *service)
1785 GHashTableIter iter;
1786 gpointer key, value;
1787 struct connman_session *session;
1788 struct session_info *info;
1790 DBG("service %p", service);
1792 g_hash_table_iter_init(&iter, session_hash);
1794 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1795 GSequenceIter *seq_iter;
1797 info = session->info;
1799 seq_iter = g_hash_table_lookup(session->service_hash, service);
1800 if (seq_iter == NULL)
1803 g_sequence_remove(seq_iter);
1805 if (info->entry != NULL && info->entry->service == service)
1807 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1811 static void service_state_changed(struct connman_service *service,
1812 enum connman_service_state state)
1814 GHashTableIter iter;
1815 gpointer key, value;
1817 DBG("service %p state %d", service, state);
1819 g_hash_table_iter_init(&iter, session_hash);
1821 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1822 struct connman_session *session = value;
1823 GSequenceIter *service_iter;
1825 service_iter = g_hash_table_lookup(session->service_hash, service);
1826 if (service_iter != NULL) {
1827 struct service_entry *entry;
1829 entry = g_sequence_get(service_iter);
1830 entry->state = state;
1833 session_changed(session,
1834 CONNMAN_SESSION_TRIGGER_SERVICE);
1838 static void ipconfig_changed(struct connman_service *service,
1839 struct connman_ipconfig *ipconfig)
1841 GHashTableIter iter;
1842 gpointer key, value;
1843 struct connman_session *session;
1844 struct session_info *info;
1845 enum connman_ipconfig_type type;
1847 DBG("service %p ipconfig %p", service, ipconfig);
1849 type = __connman_ipconfig_get_config_type(ipconfig);
1851 g_hash_table_iter_init(&iter, session_hash);
1853 while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1855 info = session->info;
1857 if (info->state == CONNMAN_SESSION_STATE_DISCONNECTED)
1860 if (info->entry != NULL && info->entry->service == service) {
1861 if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
1862 ipconfig_ipv4_changed(session);
1863 else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
1864 ipconfig_ipv6_changed(session);
1869 static struct connman_notifier session_notifier = {
1871 .service_add = service_add,
1872 .service_remove = service_remove,
1873 .service_state_changed = service_state_changed,
1874 .ipconfig_changed = ipconfig_changed,
1877 int __connman_session_init(void)
1883 connection = connman_dbus_get_connection();
1884 if (connection == NULL)
1887 err = connman_notifier_register(&session_notifier);
1889 dbus_connection_unref(connection);
1893 session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1894 NULL, cleanup_session);
1896 sessionmode = FALSE;
1900 void __connman_session_cleanup(void)
1904 if (connection == NULL)
1907 connman_notifier_unregister(&session_notifier);
1909 g_hash_table_foreach(session_hash, release_session, NULL);
1910 g_hash_table_destroy(session_hash);
1911 session_hash = NULL;
1913 dbus_connection_unref(connection);