5 * Copyright (C) 2007-2013 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
32 #include <sys/signalfd.h>
42 #define CONF_ARRAY_SIZE(x) (sizeof(x)/sizeof(x[0]) - 1)
44 #define DEFAULT_INPUT_REQUEST_TIMEOUT (120 * 1000)
45 #define DEFAULT_BROWSER_LAUNCH_TIMEOUT (300 * 1000)
48 * We set the integer to 1 sec so that we have a chance to get
49 * necessary IPv6 router advertisement messages that might have
52 #define DEFAULT_ONLINE_CHECK_INITIAL_INTERVAL 1
53 #define DEFAULT_ONLINE_CHECK_MAX_INTERVAL 12
55 #define MAINFILE "main.conf"
56 #define CONFIGMAINFILE CONFIGDIR "/" MAINFILE
58 static char *default_auto_connect[] = {
65 static char *default_favorite_techs[] = {
70 static char *default_blacklist[] = {
82 char **pref_timeservers;
83 unsigned int *auto_connect;
84 unsigned int *favorite_techs;
85 unsigned int *preferred_techs;
86 unsigned int *always_connected_techs;
87 char **fallback_nameservers;
88 unsigned int timeout_inputreq;
89 unsigned int timeout_browserlaunch;
90 char **blacklisted_interfaces;
91 bool allow_hostname_updates;
92 bool allow_domainname_updates;
94 char **tethering_technologies;
95 bool persistent_tethering_mode;
97 char *vendor_class_id;
98 bool enable_online_check;
99 bool enable_online_to_ready_transition;
100 unsigned int online_check_initial_interval;
101 unsigned int online_check_max_interval;
102 bool auto_connect_roaming_services;
104 bool use_gateways_as_timeservers;
105 } connman_settings = {
107 .pref_timeservers = NULL,
108 .auto_connect = NULL,
109 .favorite_techs = NULL,
110 .preferred_techs = NULL,
111 .always_connected_techs = NULL,
112 .fallback_nameservers = NULL,
113 .timeout_inputreq = DEFAULT_INPUT_REQUEST_TIMEOUT,
114 .timeout_browserlaunch = DEFAULT_BROWSER_LAUNCH_TIMEOUT,
115 .blacklisted_interfaces = NULL,
116 .allow_hostname_updates = true,
117 .allow_domainname_updates = true,
118 .single_tech = false,
119 .tethering_technologies = NULL,
120 .persistent_tethering_mode = false,
121 .enable_6to4 = false,
122 .vendor_class_id = NULL,
123 .enable_online_check = true,
124 .enable_online_to_ready_transition = false,
125 .online_check_initial_interval = DEFAULT_ONLINE_CHECK_INITIAL_INTERVAL,
126 .online_check_max_interval = DEFAULT_ONLINE_CHECK_MAX_INTERVAL,
127 .auto_connect_roaming_services = false,
129 .use_gateways_as_timeservers = false,
132 #define CONF_BG_SCAN "BackgroundScanning"
133 #define CONF_PREF_TIMESERVERS "FallbackTimeservers"
134 #define CONF_AUTO_CONNECT_TECHS "DefaultAutoConnectTechnologies"
135 #define CONF_FAVORITE_TECHS "DefaultFavoriteTechnologies"
136 #define CONF_ALWAYS_CONNECTED_TECHS "AlwaysConnectedTechnologies"
137 #define CONF_PREFERRED_TECHS "PreferredTechnologies"
138 #define CONF_FALLBACK_NAMESERVERS "FallbackNameservers"
139 #define CONF_TIMEOUT_INPUTREQ "InputRequestTimeout"
140 #define CONF_TIMEOUT_BROWSERLAUNCH "BrowserLaunchTimeout"
141 #define CONF_BLACKLISTED_INTERFACES "NetworkInterfaceBlacklist"
142 #define CONF_ALLOW_HOSTNAME_UPDATES "AllowHostnameUpdates"
143 #define CONF_ALLOW_DOMAINNAME_UPDATES "AllowDomainnameUpdates"
144 #define CONF_SINGLE_TECH "SingleConnectedTechnology"
145 #define CONF_TETHERING_TECHNOLOGIES "TetheringTechnologies"
146 #define CONF_PERSISTENT_TETHERING_MODE "PersistentTetheringMode"
147 #define CONF_ENABLE_6TO4 "Enable6to4"
148 #define CONF_VENDOR_CLASS_ID "VendorClassID"
149 #define CONF_ENABLE_ONLINE_CHECK "EnableOnlineCheck"
150 #define CONF_ENABLE_ONLINE_TO_READY_TRANSITION "EnableOnlineToReadyTransition"
151 #define CONF_ONLINE_CHECK_INITIAL_INTERVAL "OnlineCheckInitialInterval"
152 #define CONF_ONLINE_CHECK_MAX_INTERVAL "OnlineCheckMaxInterval"
153 #define CONF_AUTO_CONNECT_ROAMING_SERVICES "AutoConnectRoamingServices"
154 #define CONF_ACD "AddressConflictDetection"
155 #define CONF_USE_GATEWAYS_AS_TIMESERVERS "UseGatewaysAsTimeservers"
157 static const char *supported_options[] = {
159 CONF_PREF_TIMESERVERS,
160 CONF_AUTO_CONNECT_TECHS,
162 CONF_ALWAYS_CONNECTED_TECHS,
163 CONF_PREFERRED_TECHS,
164 CONF_FALLBACK_NAMESERVERS,
165 CONF_TIMEOUT_INPUTREQ,
166 CONF_TIMEOUT_BROWSERLAUNCH,
167 CONF_BLACKLISTED_INTERFACES,
168 CONF_ALLOW_HOSTNAME_UPDATES,
169 CONF_ALLOW_DOMAINNAME_UPDATES,
171 CONF_TETHERING_TECHNOLOGIES,
172 CONF_PERSISTENT_TETHERING_MODE,
174 CONF_VENDOR_CLASS_ID,
175 CONF_ENABLE_ONLINE_CHECK,
176 CONF_ENABLE_ONLINE_TO_READY_TRANSITION,
177 CONF_ONLINE_CHECK_INITIAL_INTERVAL,
178 CONF_ONLINE_CHECK_MAX_INTERVAL,
179 CONF_AUTO_CONNECT_ROAMING_SERVICES,
181 CONF_USE_GATEWAYS_AS_TIMESERVERS,
185 static GKeyFile *load_config(const char *file)
190 keyfile = g_key_file_new();
192 g_key_file_set_list_separator(keyfile, ',');
194 if (!g_key_file_load_from_file(keyfile, file, 0, &err)) {
195 if (err->code != G_FILE_ERROR_NOENT) {
196 connman_error("Parsing %s failed: %s", file,
201 g_key_file_free(keyfile);
208 static uint *parse_service_types(char **str_list, gsize len)
210 unsigned int *type_list;
212 enum connman_service_type type;
214 type_list = g_try_new0(unsigned int, len + 1);
220 while (str_list[i]) {
221 type = __connman_service_string2type(str_list[i]);
223 if (type != CONNMAN_SERVICE_TYPE_UNKNOWN) {
230 type_list[j] = CONNMAN_SERVICE_TYPE_UNKNOWN;
235 static char **parse_fallback_nameservers(char **nameservers, gsize len)
240 servers = g_try_new0(char *, len + 1);
246 while (nameservers[i]) {
247 if (connman_inet_check_ipaddress(nameservers[i]) > 0) {
248 servers[j] = g_strdup(nameservers[i]);
257 static void check_config(GKeyFile *config)
265 keys = g_key_file_get_groups(config, NULL);
267 for (j = 0; keys && keys[j]; j++) {
268 if (g_strcmp0(keys[j], "General") != 0)
269 connman_warn("Unknown group %s in %s",
275 keys = g_key_file_get_keys(config, "General", NULL, NULL);
277 for (j = 0; keys && keys[j]; j++) {
282 for (i = 0; supported_options[i]; i++) {
283 if (g_strcmp0(keys[j], supported_options[i]) == 0) {
288 if (!found && !supported_options[i])
289 connman_warn("Unknown option %s in %s",
296 static void parse_config(GKeyFile *config)
298 GError *error = NULL;
309 connman_settings.auto_connect =
310 parse_service_types(default_auto_connect, CONF_ARRAY_SIZE(default_auto_connect));
311 connman_settings.favorite_techs =
312 parse_service_types(default_favorite_techs, CONF_ARRAY_SIZE(default_favorite_techs));
313 connman_settings.blacklisted_interfaces =
314 g_strdupv(default_blacklist);
318 DBG("parsing %s", MAINFILE);
320 boolean = g_key_file_get_boolean(config, "General",
321 CONF_BG_SCAN, &error);
323 connman_settings.bg_scan = boolean;
325 g_clear_error(&error);
327 timeservers = __connman_config_get_string_list(config, "General",
328 CONF_PREF_TIMESERVERS, NULL, &error);
330 connman_settings.pref_timeservers = timeservers;
332 g_clear_error(&error);
334 str_list = __connman_config_get_string_list(config, "General",
335 CONF_AUTO_CONNECT_TECHS, &len, &error);
338 connman_settings.auto_connect =
339 parse_service_types(str_list, len);
341 connman_settings.auto_connect =
342 parse_service_types(default_auto_connect, CONF_ARRAY_SIZE(default_auto_connect));
344 g_clear_error(&error);
346 str_list = __connman_config_get_string_list(config, "General",
347 CONF_FAVORITE_TECHS, &len, &error);
350 connman_settings.favorite_techs =
351 parse_service_types(str_list, len);
353 connman_settings.favorite_techs =
354 parse_service_types(default_favorite_techs, CONF_ARRAY_SIZE(default_favorite_techs));
356 g_strfreev(str_list);
358 g_clear_error(&error);
360 str_list = __connman_config_get_string_list(config, "General",
361 CONF_PREFERRED_TECHS, &len, &error);
364 connman_settings.preferred_techs =
365 parse_service_types(str_list, len);
367 g_strfreev(str_list);
369 g_clear_error(&error);
371 str_list = __connman_config_get_string_list(config, "General",
372 CONF_ALWAYS_CONNECTED_TECHS, &len, &error);
375 connman_settings.always_connected_techs =
376 parse_service_types(str_list, len);
378 g_strfreev(str_list);
380 g_clear_error(&error);
382 str_list = __connman_config_get_string_list(config, "General",
383 CONF_FALLBACK_NAMESERVERS, &len, &error);
386 connman_settings.fallback_nameservers =
387 parse_fallback_nameservers(str_list, len);
389 g_strfreev(str_list);
391 g_clear_error(&error);
393 integer = g_key_file_get_integer(config, "General",
394 CONF_TIMEOUT_INPUTREQ, &error);
395 if (!error && integer >= 0)
396 connman_settings.timeout_inputreq = integer * 1000;
398 g_clear_error(&error);
400 integer = g_key_file_get_integer(config, "General",
401 CONF_TIMEOUT_BROWSERLAUNCH, &error);
402 if (!error && integer >= 0)
403 connman_settings.timeout_browserlaunch = integer * 1000;
405 g_clear_error(&error);
407 interfaces = __connman_config_get_string_list(config, "General",
408 CONF_BLACKLISTED_INTERFACES, &len, &error);
411 connman_settings.blacklisted_interfaces = interfaces;
413 connman_settings.blacklisted_interfaces =
414 g_strdupv(default_blacklist);
416 g_clear_error(&error);
418 boolean = __connman_config_get_bool(config, "General",
419 CONF_ALLOW_HOSTNAME_UPDATES,
422 connman_settings.allow_hostname_updates = boolean;
424 g_clear_error(&error);
426 boolean = __connman_config_get_bool(config, "General",
427 CONF_ALLOW_DOMAINNAME_UPDATES,
430 connman_settings.allow_domainname_updates = boolean;
432 g_clear_error(&error);
434 boolean = __connman_config_get_bool(config, "General",
435 CONF_SINGLE_TECH, &error);
437 connman_settings.single_tech = boolean;
439 g_clear_error(&error);
441 tethering = __connman_config_get_string_list(config, "General",
442 CONF_TETHERING_TECHNOLOGIES, &len, &error);
445 connman_settings.tethering_technologies = tethering;
447 g_clear_error(&error);
449 boolean = __connman_config_get_bool(config, "General",
450 CONF_PERSISTENT_TETHERING_MODE,
453 connman_settings.persistent_tethering_mode = boolean;
455 g_clear_error(&error);
457 boolean = __connman_config_get_bool(config, "General",
458 CONF_ENABLE_6TO4, &error);
460 connman_settings.enable_6to4 = boolean;
462 g_clear_error(&error);
464 string = __connman_config_get_string(config, "General",
465 CONF_VENDOR_CLASS_ID, &error);
467 connman_settings.vendor_class_id = string;
469 g_clear_error(&error);
471 boolean = __connman_config_get_bool(config, "General",
472 CONF_ENABLE_ONLINE_CHECK, &error);
474 connman_settings.enable_online_check = boolean;
476 connman_info("Online check disabled by main config.");
479 g_clear_error(&error);
481 boolean = __connman_config_get_bool(config, "General",
482 CONF_ENABLE_ONLINE_TO_READY_TRANSITION, &error);
484 connman_settings.enable_online_to_ready_transition = boolean;
487 g_clear_error(&error);
489 integer = g_key_file_get_integer(config, "General",
490 CONF_ONLINE_CHECK_INITIAL_INTERVAL, &error);
491 if (!error && integer >= 0)
492 connman_settings.online_check_initial_interval = integer;
494 g_clear_error(&error);
496 integer = g_key_file_get_integer(config, "General",
497 CONF_ONLINE_CHECK_MAX_INTERVAL, &error);
498 if (!error && integer >= 0)
499 connman_settings.online_check_max_interval = integer;
501 g_clear_error(&error);
503 if (connman_settings.online_check_initial_interval < 1 ||
504 connman_settings.online_check_initial_interval >
505 connman_settings.online_check_max_interval) {
506 connman_warn("Incorrect online check intervals [%u, %u]",
507 connman_settings.online_check_initial_interval,
508 connman_settings.online_check_max_interval);
509 connman_settings.online_check_initial_interval =
510 DEFAULT_ONLINE_CHECK_INITIAL_INTERVAL;
511 connman_settings.online_check_max_interval =
512 DEFAULT_ONLINE_CHECK_MAX_INTERVAL;
515 boolean = __connman_config_get_bool(config, "General",
516 CONF_AUTO_CONNECT_ROAMING_SERVICES, &error);
518 connman_settings.auto_connect_roaming_services = boolean;
520 g_clear_error(&error);
522 boolean = __connman_config_get_bool(config, "General", CONF_ACD, &error);
524 connman_settings.acd = boolean;
526 g_clear_error(&error);
528 boolean = __connman_config_get_bool(config, "General",
529 CONF_USE_GATEWAYS_AS_TIMESERVERS, &error);
531 connman_settings.use_gateways_as_timeservers = boolean;
533 g_clear_error(&error);
536 static int config_init(const char *file)
540 config = load_config(file);
541 check_config(config);
542 parse_config(config);
544 g_key_file_free(config);
549 static GMainLoop *main_loop = NULL;
551 static unsigned int __terminated = 0;
553 static gboolean signal_handler(GIOChannel *channel, GIOCondition cond,
556 struct signalfd_siginfo si;
560 if (cond & (G_IO_NVAL | G_IO_ERR | G_IO_HUP))
563 fd = g_io_channel_unix_get_fd(channel);
565 result = read(fd, &si, sizeof(si));
566 if (result != sizeof(si))
569 switch (si.ssi_signo) {
572 if (__terminated == 0) {
573 connman_info("Terminating");
574 g_main_loop_quit(main_loop);
584 static guint setup_signalfd(void)
592 sigaddset(&mask, SIGINT);
593 sigaddset(&mask, SIGTERM);
595 if (sigprocmask(SIG_BLOCK, &mask, NULL) < 0) {
596 perror("Failed to set signal mask");
600 fd = signalfd(-1, &mask, 0);
602 perror("Failed to create signal descriptor");
606 channel = g_io_channel_unix_new(fd);
608 g_io_channel_set_close_on_unref(channel, TRUE);
609 g_io_channel_set_encoding(channel, NULL, NULL);
610 g_io_channel_set_buffered(channel, FALSE);
612 source = g_io_add_watch(channel,
613 G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
614 signal_handler, NULL);
616 g_io_channel_unref(channel);
621 static void disconnect_callback(DBusConnection *conn, void *user_data)
623 connman_error("D-Bus disconnect");
625 g_main_loop_quit(main_loop);
628 static gchar *option_config = NULL;
629 static gchar *option_debug = NULL;
630 static gchar *option_device = NULL;
631 static gchar *option_plugin = NULL;
632 static gchar *option_nodevice = NULL;
633 static gchar *option_noplugin = NULL;
634 static gchar *option_wifi = NULL;
635 static gboolean option_detach = TRUE;
636 static gboolean option_dnsproxy = TRUE;
637 static gboolean option_backtrace = TRUE;
638 static gboolean option_version = FALSE;
640 static bool parse_debug(const char *key, const char *value,
641 gpointer user_data, GError **error)
645 char *prev = option_debug;
647 option_debug = g_strconcat(prev, ",", value, NULL);
650 option_debug = g_strdup(value);
653 g_free(option_debug);
654 option_debug = g_strdup("*");
660 static bool parse_noplugin(const char *key, const char *value,
661 gpointer user_data, GError **error)
663 if (option_noplugin) {
664 char *prev = option_noplugin;
666 option_noplugin = g_strconcat(prev, ",", value, NULL);
669 option_noplugin = g_strdup(value);
675 static GOptionEntry options[] = {
676 { "config", 'c', 0, G_OPTION_ARG_STRING, &option_config,
677 "Load the specified configuration file "
678 "instead of " CONFIGMAINFILE, "FILE" },
679 { "debug", 'd', G_OPTION_FLAG_OPTIONAL_ARG,
680 G_OPTION_ARG_CALLBACK, parse_debug,
681 "Specify debug options to enable", "DEBUG" },
682 { "device", 'i', 0, G_OPTION_ARG_STRING, &option_device,
683 "Specify networking devices or interfaces", "DEV,..." },
684 { "nodevice", 'I', 0, G_OPTION_ARG_STRING, &option_nodevice,
685 "Specify networking interfaces to ignore", "DEV,..." },
686 { "plugin", 'p', 0, G_OPTION_ARG_STRING, &option_plugin,
687 "Specify plugins to load", "NAME,..." },
688 { "noplugin", 'P', 0, G_OPTION_ARG_CALLBACK, &parse_noplugin,
689 "Specify plugins not to load", "NAME,..." },
690 { "wifi", 'W', 0, G_OPTION_ARG_STRING, &option_wifi,
691 "Specify driver for WiFi/Supplicant", "NAME" },
692 { "nodaemon", 'n', G_OPTION_FLAG_REVERSE,
693 G_OPTION_ARG_NONE, &option_detach,
694 "Don't fork daemon to background" },
695 { "nodnsproxy", 'r', G_OPTION_FLAG_REVERSE,
696 G_OPTION_ARG_NONE, &option_dnsproxy,
697 "Don't support DNS resolving" },
698 { "nobacktrace", 0, G_OPTION_FLAG_REVERSE,
699 G_OPTION_ARG_NONE, &option_backtrace,
700 "Don't print out backtrace information" },
701 { "version", 'v', 0, G_OPTION_ARG_NONE, &option_version,
702 "Show version information and exit" },
706 char *connman_setting_get_string(const char *key)
708 if (g_str_equal(key, CONF_VENDOR_CLASS_ID))
709 return connman_settings.vendor_class_id;
711 if (g_strcmp0(key, "wifi") == 0) {
713 return "nl80211,wext";
721 bool connman_setting_get_bool(const char *key)
723 if (g_str_equal(key, CONF_BG_SCAN))
724 return connman_settings.bg_scan;
726 if (g_str_equal(key, CONF_ALLOW_HOSTNAME_UPDATES))
727 return connman_settings.allow_hostname_updates;
729 if (g_str_equal(key, CONF_ALLOW_DOMAINNAME_UPDATES))
730 return connman_settings.allow_domainname_updates;
732 if (g_str_equal(key, CONF_SINGLE_TECH))
733 return connman_settings.single_tech;
735 if (g_str_equal(key, CONF_PERSISTENT_TETHERING_MODE))
736 return connman_settings.persistent_tethering_mode;
738 if (g_str_equal(key, CONF_ENABLE_6TO4))
739 return connman_settings.enable_6to4;
741 if (g_str_equal(key, CONF_ENABLE_ONLINE_CHECK))
742 return connman_settings.enable_online_check;
744 if (g_str_equal(key, CONF_ENABLE_ONLINE_TO_READY_TRANSITION))
745 return connman_settings.enable_online_to_ready_transition;
747 if (g_str_equal(key, CONF_AUTO_CONNECT_ROAMING_SERVICES))
748 return connman_settings.auto_connect_roaming_services;
750 if (g_str_equal(key, CONF_ACD))
751 return connman_settings.acd;
753 if (g_str_equal(key, CONF_USE_GATEWAYS_AS_TIMESERVERS))
754 return connman_settings.use_gateways_as_timeservers;
759 unsigned int connman_setting_get_uint(const char *key)
761 if (g_str_equal(key, CONF_ONLINE_CHECK_INITIAL_INTERVAL))
762 return connman_settings.online_check_initial_interval;
764 if (g_str_equal(key, CONF_ONLINE_CHECK_MAX_INTERVAL))
765 return connman_settings.online_check_max_interval;
770 char **connman_setting_get_string_list(const char *key)
772 if (g_str_equal(key, CONF_PREF_TIMESERVERS))
773 return connman_settings.pref_timeservers;
775 if (g_str_equal(key, CONF_FALLBACK_NAMESERVERS))
776 return connman_settings.fallback_nameservers;
778 if (g_str_equal(key, CONF_BLACKLISTED_INTERFACES))
779 return connman_settings.blacklisted_interfaces;
781 if (g_str_equal(key, CONF_TETHERING_TECHNOLOGIES))
782 return connman_settings.tethering_technologies;
787 unsigned int *connman_setting_get_uint_list(const char *key)
789 if (g_str_equal(key, CONF_AUTO_CONNECT_TECHS))
790 return connman_settings.auto_connect;
792 if (g_str_equal(key, CONF_FAVORITE_TECHS))
793 return connman_settings.favorite_techs;
795 if (g_str_equal(key, CONF_PREFERRED_TECHS))
796 return connman_settings.preferred_techs;
798 if (g_str_equal(key, CONF_ALWAYS_CONNECTED_TECHS))
799 return connman_settings.always_connected_techs;
804 unsigned int connman_timeout_input_request(void)
806 return connman_settings.timeout_inputreq;
809 unsigned int connman_timeout_browser_launch(void)
811 return connman_settings.timeout_browserlaunch;
814 int main(int argc, char *argv[])
816 GOptionContext *context;
817 GError *error = NULL;
818 DBusConnection *conn;
822 context = g_option_context_new(NULL);
823 g_option_context_add_main_entries(context, options, NULL);
825 if (!g_option_context_parse(context, &argc, &argv, &error)) {
827 g_printerr("%s\n", error->message);
830 g_printerr("An unknown error occurred\n");
834 g_option_context_free(context);
836 if (option_version) {
837 printf("%s\n", VERSION);
843 perror("Can't start daemon");
848 if (mkdir(STORAGEDIR, S_IRUSR | S_IWUSR | S_IXUSR |
849 S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) < 0) {
851 perror("Failed to create storage directory");
856 main_loop = g_main_loop_new(NULL, FALSE);
858 signal = setup_signalfd();
860 dbus_error_init(&err);
862 conn = g_dbus_setup_bus(DBUS_BUS_SYSTEM, CONNMAN_SERVICE, &err);
864 if (dbus_error_is_set(&err)) {
865 fprintf(stderr, "%s\n", err.message);
866 dbus_error_free(&err);
868 fprintf(stderr, "Can't register with system bus\n");
872 g_dbus_set_disconnect_function(conn, disconnect_callback, NULL, NULL);
874 __connman_log_init(argv[0], option_debug, option_detach,
875 option_backtrace, "Connection Manager", VERSION);
877 __connman_dbus_init(conn);
880 config_init(CONFIGMAINFILE);
882 config_init(option_config);
884 __connman_util_init();
885 __connman_inotify_init();
886 __connman_technology_init();
887 __connman_notifier_init();
888 __connman_agent_init();
889 __connman_service_init();
890 __connman_peer_service_init();
891 __connman_peer_init();
892 __connman_provider_init();
893 __connman_network_init();
894 __connman_config_init();
895 __connman_device_init(option_device, option_nodevice);
897 __connman_ippool_init();
898 __connman_firewall_init();
899 __connman_nat_init();
900 __connman_tethering_init();
901 __connman_counter_init();
902 __connman_manager_init();
903 __connman_stats_init();
904 __connman_clock_init();
906 __connman_ipconfig_init();
907 __connman_rtnl_init();
908 __connman_task_init();
909 __connman_proxy_init();
910 __connman_detect_init();
911 __connman_session_init();
912 __connman_timeserver_init();
913 __connman_connection_init();
915 __connman_plugin_init(option_plugin, option_noplugin);
917 __connman_resolver_init(option_dnsproxy);
918 __connman_rtnl_start();
919 __connman_dhcp_init();
920 __connman_dhcpv6_init();
921 __connman_wpad_init();
922 __connman_wispr_init();
923 __connman_rfkill_init();
924 __connman_machine_init();
926 g_free(option_config);
927 g_free(option_device);
928 g_free(option_plugin);
929 g_free(option_nodevice);
930 g_free(option_noplugin);
932 g_main_loop_run(main_loop);
934 g_source_remove(signal);
936 __connman_machine_cleanup();
937 __connman_rfkill_cleanup();
938 __connman_wispr_cleanup();
939 __connman_wpad_cleanup();
940 __connman_dhcpv6_cleanup();
941 __connman_session_cleanup();
942 __connman_plugin_cleanup();
943 __connman_provider_cleanup();
944 __connman_connection_cleanup();
945 __connman_timeserver_cleanup();
946 __connman_detect_cleanup();
947 __connman_proxy_cleanup();
948 __connman_task_cleanup();
949 __connman_rtnl_cleanup();
950 __connman_resolver_cleanup();
952 __connman_clock_cleanup();
953 __connman_stats_cleanup();
954 __connman_config_cleanup();
955 __connman_manager_cleanup();
956 __connman_counter_cleanup();
957 __connman_tethering_cleanup();
958 __connman_nat_cleanup();
959 __connman_firewall_cleanup();
960 __connman_peer_service_cleanup();
961 __connman_peer_cleanup();
962 __connman_ippool_cleanup();
963 __connman_device_cleanup();
964 __connman_network_cleanup();
965 __connman_dhcp_cleanup();
966 __connman_service_cleanup();
967 __connman_agent_cleanup();
968 __connman_ipconfig_cleanup();
969 __connman_notifier_cleanup();
970 __connman_technology_cleanup();
971 __connman_inotify_cleanup();
973 __connman_util_cleanup();
974 __connman_dbus_cleanup();
976 __connman_log_cleanup(option_backtrace);
978 dbus_connection_unref(conn);
980 g_main_loop_unref(main_loop);
982 if (connman_settings.pref_timeservers)
983 g_strfreev(connman_settings.pref_timeservers);
985 g_free(connman_settings.auto_connect);
986 g_free(connman_settings.favorite_techs);
987 g_free(connman_settings.preferred_techs);
988 g_strfreev(connman_settings.fallback_nameservers);
989 g_strfreev(connman_settings.blacklisted_interfaces);
990 g_strfreev(connman_settings.tethering_technologies);
991 g_free(connman_settings.vendor_class_id);
993 g_free(option_debug);