session: Move code
[framework/connectivity/connman.git] / src / session.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2010  Intel Corporation. All rights reserved.
6  *  Copyright (C) 2011  BWM CarIT GmbH. All rights reserved.
7  *
8  *  This program is free software; you can redistribute it and/or modify
9  *  it under the terms of the GNU General Public License version 2 as
10  *  published by the Free Software Foundation.
11  *
12  *  This program is distributed in the hope that it will be useful,
13  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
14  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15  *  GNU General Public License for more details.
16  *
17  *  You should have received a copy of the GNU General Public License
18  *  along with this program; if not, write to the Free Software
19  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
20  *
21  */
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <errno.h>
28
29 #include <gdbus.h>
30
31 #include "connman.h"
32
33 static DBusConnection *connection;
34 static GHashTable *session_hash;
35 static connman_bool_t sessionmode;
36 static struct connman_session *ecall_session;
37
38 enum connman_session_trigger {
39         CONNMAN_SESSION_TRIGGER_UNKNOWN         = 0,
40         CONNMAN_SESSION_TRIGGER_SETTING         = 1,
41         CONNMAN_SESSION_TRIGGER_CONNECT         = 2,
42         CONNMAN_SESSION_TRIGGER_DISCONNECT      = 3,
43         CONNMAN_SESSION_TRIGGER_PERIODIC        = 4,
44         CONNMAN_SESSION_TRIGGER_SERVICE         = 5,
45         CONNMAN_SESSION_TRIGGER_ECALL           = 6,
46 };
47
48 enum connman_session_reason {
49         CONNMAN_SESSION_REASON_UNKNOWN          = 0,
50         CONNMAN_SESSION_REASON_CONNECT          = 1,
51         CONNMAN_SESSION_REASON_FREE_RIDE        = 2,
52         CONNMAN_SESSION_REASON_PERIODIC         = 3,
53 };
54
55 enum connman_session_roaming_policy {
56         CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN          = 0,
57         CONNMAN_SESSION_ROAMING_POLICY_DEFAULT          = 1,
58         CONNMAN_SESSION_ROAMING_POLICY_ALWAYS           = 2,
59         CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN        = 3,
60         CONNMAN_SESSION_ROAMING_POLICY_NATIONAL         = 4,
61         CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL    = 5,
62 };
63
64 struct service_entry {
65         /* track why this service was selected */
66         enum connman_session_reason reason;
67         enum connman_service_state state;
68         const char *name;
69         struct connman_service *service;
70         const char *ifname;
71         const char *bearer;
72 };
73
74 struct session_info {
75         connman_bool_t online;
76         connman_bool_t priority;
77         GSList *allowed_bearers;
78         connman_bool_t avoid_handover;
79         connman_bool_t stay_connected;
80         unsigned int periodic_connect;
81         unsigned int idle_timeout;
82         connman_bool_t ecall;
83         enum connman_session_roaming_policy roaming_policy;
84         unsigned int marker;
85
86         struct service_entry *entry;
87 };
88
89 struct connman_session {
90         char *owner;
91         char *session_path;
92         char *notify_path;
93         guint notify_watch;
94
95         connman_bool_t append_all;
96         connman_bool_t info_dirty;
97         struct session_info *info;
98         struct session_info *info_last;
99
100         GSequence *service_list;
101         GHashTable *service_hash;
102 };
103
104 struct bearer_info {
105         char *name;
106         connman_bool_t match_all;
107         enum connman_service_type service_type;
108 };
109
110 static const char *trigger2string(enum connman_session_trigger trigger)
111 {
112         switch (trigger) {
113         case CONNMAN_SESSION_TRIGGER_UNKNOWN:
114                 break;
115         case CONNMAN_SESSION_TRIGGER_SETTING:
116                 return "setting";
117         case CONNMAN_SESSION_TRIGGER_CONNECT:
118                 return "connect";
119         case CONNMAN_SESSION_TRIGGER_DISCONNECT:
120                 return "disconnect";
121         case CONNMAN_SESSION_TRIGGER_PERIODIC:
122                 return "periodic";
123         case CONNMAN_SESSION_TRIGGER_SERVICE:
124                 return "service";
125         case CONNMAN_SESSION_TRIGGER_ECALL:
126                 return "ecall";
127         }
128
129         return NULL;
130 }
131
132 static const char *reason2string(enum connman_session_reason reason)
133 {
134         switch (reason) {
135         case CONNMAN_SESSION_REASON_UNKNOWN:
136                 break;
137         case CONNMAN_SESSION_REASON_CONNECT:
138                 return "connect";
139         case CONNMAN_SESSION_REASON_FREE_RIDE:
140                 return "free-ride";
141         case CONNMAN_SESSION_REASON_PERIODIC:
142                 return "periodic";
143         }
144
145         return NULL;
146 }
147
148 static const char *roamingpolicy2string(enum connman_session_roaming_policy policy)
149 {
150         switch (policy) {
151         case CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN:
152                 return "unknown";
153         case CONNMAN_SESSION_ROAMING_POLICY_DEFAULT:
154                 return "default";
155         case CONNMAN_SESSION_ROAMING_POLICY_ALWAYS:
156                 return "always";
157         case CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN:
158                 return "forbidden";
159         case CONNMAN_SESSION_ROAMING_POLICY_NATIONAL:
160                 return "national";
161         case CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL:
162                 return "international";
163         }
164
165         return NULL;
166 }
167
168 static enum connman_session_roaming_policy string2roamingpolicy(const char *policy)
169 {
170         if (g_strcmp0(policy, "default") == 0)
171                 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
172         else if (g_strcmp0(policy, "always") == 0)
173                 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
174         else if (g_strcmp0(policy, "forbidden") == 0)
175                 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
176         else if (g_strcmp0(policy, "national") == 0)
177                 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
178         else if (g_strcmp0(policy, "international") == 0)
179                 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
180         else
181                 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
182 }
183
184 static enum connman_service_type bearer2service(const char *bearer)
185 {
186         if (bearer == NULL)
187                 return CONNMAN_SERVICE_TYPE_UNKNOWN;
188
189         if (g_strcmp0(bearer, "ethernet") == 0)
190                 return CONNMAN_SERVICE_TYPE_ETHERNET;
191         else if (g_strcmp0(bearer, "wifi") == 0)
192                 return CONNMAN_SERVICE_TYPE_WIFI;
193         else if (g_strcmp0(bearer, "wimax") == 0)
194                 return CONNMAN_SERVICE_TYPE_WIMAX;
195         else if (g_strcmp0(bearer, "bluetooth") == 0)
196                 return CONNMAN_SERVICE_TYPE_BLUETOOTH;
197         else if (g_strcmp0(bearer, "3g") == 0)
198                 return CONNMAN_SERVICE_TYPE_CELLULAR;
199         else if (g_strcmp0(bearer, "vpn") == 0)
200                 return CONNMAN_SERVICE_TYPE_VPN;
201         else
202                 return CONNMAN_SERVICE_TYPE_UNKNOWN;
203 }
204
205 static char *service2bearer(enum connman_service_type type)
206 {
207         switch (type) {
208         case CONNMAN_SERVICE_TYPE_ETHERNET:
209                 return "ethernet";
210         case CONNMAN_SERVICE_TYPE_WIFI:
211                 return "wifi";
212         case CONNMAN_SERVICE_TYPE_WIMAX:
213                 return "wimax";
214         case CONNMAN_SERVICE_TYPE_BLUETOOTH:
215                 return "bluetooth";
216         case CONNMAN_SERVICE_TYPE_CELLULAR:
217                 return "3g";
218         case CONNMAN_SERVICE_TYPE_VPN:
219                 return "vpn";
220         case CONNMAN_SERVICE_TYPE_UNKNOWN:
221         case CONNMAN_SERVICE_TYPE_SYSTEM:
222         case CONNMAN_SERVICE_TYPE_GPS:
223         case CONNMAN_SERVICE_TYPE_GADGET:
224                 return "";
225         }
226
227         return "";
228 }
229
230 static void cleanup_bearer_info(gpointer data, gpointer user_data)
231 {
232         struct bearer_info *info = data;
233
234         g_free(info->name);
235         g_free(info);
236 }
237
238 static GSList *session_parse_allowed_bearers(DBusMessageIter *iter)
239 {
240         struct bearer_info *info;
241         DBusMessageIter array;
242         GSList *list = NULL;
243
244         dbus_message_iter_recurse(iter, &array);
245
246         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_STRING) {
247                 char *bearer = NULL;
248
249                 dbus_message_iter_get_basic(&array, &bearer);
250
251                 info = g_try_new0(struct bearer_info, 1);
252                 if (info == NULL) {
253                         g_slist_foreach(list, cleanup_bearer_info, NULL);
254                         g_slist_free(list);
255
256                         return NULL;
257                 }
258
259                 info->name = g_strdup(bearer);
260                 info->service_type = bearer2service(info->name);
261
262                 if (info->service_type == CONNMAN_SERVICE_TYPE_UNKNOWN &&
263                                 g_strcmp0(info->name, "*") == 0) {
264                         info->match_all = TRUE;
265                 } else {
266                         info->match_all = FALSE;
267                 }
268
269                 list = g_slist_append(list, info);
270
271                 dbus_message_iter_next(&array);
272         }
273
274         return list;
275 }
276
277 static GSList *session_allowed_bearers_any(void)
278 {
279         struct bearer_info *info;
280         GSList *list = NULL;
281
282         info = g_try_new0(struct bearer_info, 1);
283         if (info == NULL) {
284                 g_slist_free(list);
285
286                 return NULL;
287         }
288
289         info->name = g_strdup("");
290         info->match_all = TRUE;
291         info->service_type = CONNMAN_SERVICE_TYPE_UNKNOWN;
292
293         list = g_slist_append(list, info);
294
295         return list;
296 }
297
298 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
299 {
300         struct session_info *info = user_data;
301         GSList *list;
302
303         for (list = info->allowed_bearers;
304                         list != NULL; list = list->next) {
305                 struct bearer_info *info = list->data;
306
307                 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
308                                                 &info->name);
309         }
310 }
311
312 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
313 {
314         struct connman_service *service = user_data;
315         struct connman_ipconfig *ipconfig_ipv4;
316
317         if (service == NULL)
318                 return;
319
320         ipconfig_ipv4 = __connman_service_get_ip4config(service);
321         if (ipconfig_ipv4 == NULL)
322                 return;
323
324         __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
325 }
326
327 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
328 {
329         struct connman_service *service = user_data;
330         struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
331
332         if (service == NULL)
333                 return;
334
335         ipconfig_ipv4 = __connman_service_get_ip4config(service);
336         ipconfig_ipv6 = __connman_service_get_ip6config(service);
337         if (ipconfig_ipv6 == NULL)
338                 return;
339
340         __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
341 }
342
343 static void append_notify(DBusMessageIter *dict,
344                                         struct connman_session *session)
345 {
346         struct session_info *info = session->info;
347         struct session_info *info_last = session->info_last;
348         const char *policy;
349         struct connman_service *service;
350         const char *name, *ifname, *bearer;
351
352         if (session->append_all == TRUE ||
353                         info->online != info_last->online) {
354                 connman_dbus_dict_append_basic(dict, "Online",
355                                                 DBUS_TYPE_BOOLEAN,
356                                                 &info->online);
357                 info_last->online = info->online;
358         }
359
360         if (session->append_all == TRUE ||
361                         info->entry != info_last->entry) {
362                 if (info->entry == NULL) {
363                         name = "";
364                         ifname = "";
365                         service = NULL;
366                         bearer = "";
367                 } else {
368                         name = info->entry->name;
369                         ifname = info->entry->ifname;
370                         service = info->entry->service;
371                         bearer = info->entry->bearer;
372                 }
373
374                 connman_dbus_dict_append_basic(dict, "Name",
375                                                 DBUS_TYPE_STRING,
376                                                 &name);
377
378                 connman_dbus_dict_append_dict(dict, "IPv4",
379                                                 append_ipconfig_ipv4,
380                                                 service);
381
382                 connman_dbus_dict_append_dict(dict, "IPv6",
383                                                 append_ipconfig_ipv6,
384                                                 service);
385
386                 connman_dbus_dict_append_basic(dict, "Interface",
387                                                 DBUS_TYPE_STRING,
388                                                 &ifname);
389
390                 connman_dbus_dict_append_basic(dict, "Bearer",
391                                                 DBUS_TYPE_STRING,
392                                                 &bearer);
393
394                 info_last->entry = info->entry;
395         }
396
397
398         if (session->append_all == TRUE ||
399                         info->priority != info_last->priority) {
400                 connman_dbus_dict_append_basic(dict, "Priority",
401                                                 DBUS_TYPE_BOOLEAN,
402                                                 &info->priority);
403                 info_last->priority = info->priority;
404         }
405
406         if (session->append_all == TRUE ||
407                         info->allowed_bearers != info_last->allowed_bearers) {
408                 connman_dbus_dict_append_array(dict, "AllowedBearers",
409                                                 DBUS_TYPE_STRING,
410                                                 append_allowed_bearers,
411                                                 info);
412                 info_last->allowed_bearers = info->allowed_bearers;
413         }
414
415         if (session->append_all == TRUE ||
416                         info->avoid_handover != info_last->avoid_handover) {
417                 connman_dbus_dict_append_basic(dict, "AvoidHandover",
418                                                 DBUS_TYPE_BOOLEAN,
419                                                 &info->avoid_handover);
420                 info_last->avoid_handover = info->avoid_handover;
421         }
422
423         if (session->append_all == TRUE ||
424                         info->stay_connected != info_last->stay_connected) {
425                 connman_dbus_dict_append_basic(dict, "StayConnected",
426                                                 DBUS_TYPE_BOOLEAN,
427                                                 &info->stay_connected);
428                 info_last->stay_connected = info->stay_connected;
429         }
430
431         if (session->append_all == TRUE ||
432                         info->periodic_connect != info_last->periodic_connect) {
433                 connman_dbus_dict_append_basic(dict, "PeriodicConnect",
434                                                 DBUS_TYPE_UINT32,
435                                                 &info->periodic_connect);
436                 info_last->periodic_connect = info->periodic_connect;
437         }
438
439         if (session->append_all == TRUE ||
440                         info->idle_timeout != info_last->idle_timeout) {
441                 connman_dbus_dict_append_basic(dict, "IdleTimeout",
442                                                 DBUS_TYPE_UINT32,
443                                                 &info->idle_timeout);
444                 info_last->idle_timeout = info->idle_timeout;
445         }
446
447         if (session->append_all == TRUE ||
448                         info->ecall != info_last->ecall) {
449                 connman_dbus_dict_append_basic(dict, "EmergencyCall",
450                                                 DBUS_TYPE_BOOLEAN,
451                                                 &info->ecall);
452                 info_last->ecall = info->ecall;
453         }
454
455         if (session->append_all == TRUE ||
456                         info->roaming_policy != info_last->roaming_policy) {
457                 policy = roamingpolicy2string(info->roaming_policy);
458                 connman_dbus_dict_append_basic(dict, "RoamingPolicy",
459                                                 DBUS_TYPE_STRING,
460                                                 &policy);
461                 info_last->roaming_policy = info->roaming_policy;
462         }
463
464         if (session->append_all == TRUE ||
465                         info->marker != info_last->marker) {
466                 connman_dbus_dict_append_basic(dict, "SessionMarker",
467                                                 DBUS_TYPE_UINT32,
468                                                 &info->marker);
469                 info_last->marker = info->marker;
470         }
471
472         session->append_all = FALSE;
473         session->info_dirty = FALSE;
474 }
475
476 static gboolean session_notify(gpointer user_data)
477 {
478         struct connman_session *session = user_data;
479         DBusMessage *msg;
480         DBusMessageIter array, dict;
481
482         if (session->info_dirty == FALSE)
483                 return 0;
484
485         DBG("session %p owner %s notify_path %s", session,
486                 session->owner, session->notify_path);
487
488         msg = dbus_message_new_method_call(session->owner, session->notify_path,
489                                                 CONNMAN_NOTIFICATION_INTERFACE,
490                                                 "Update");
491         if (msg == NULL)
492                 return FALSE;
493
494         dbus_message_iter_init_append(msg, &array);
495         connman_dbus_dict_open(&array, &dict);
496
497         append_notify(&dict, session);
498
499         connman_dbus_dict_close(&array, &dict);
500
501         g_dbus_send_message(connection, msg);
502
503         session->info_dirty = FALSE;
504
505         return FALSE;
506 }
507
508 static void ipconfig_ipv4_changed(struct connman_session *session)
509 {
510         struct session_info *info = session->info;
511
512         connman_dbus_setting_changed_dict(session->owner, session->notify_path,
513                                                 "IPv4", append_ipconfig_ipv4,
514                                                 info->entry->service);
515 }
516
517 static void ipconfig_ipv6_changed(struct connman_session *session)
518 {
519         struct session_info *info = session->info;
520
521         connman_dbus_setting_changed_dict(session->owner, session->notify_path,
522                                                 "IPv6", append_ipconfig_ipv6,
523                                                 info->entry->service);
524 }
525
526 static connman_bool_t service_type_match(struct connman_session *session,
527                                         struct connman_service *service)
528 {
529         struct session_info *info = session->info;
530         GSList *list;
531
532         for (list = info->allowed_bearers;
533                         list != NULL; list = list->next) {
534                 struct bearer_info *info = list->data;
535                 enum connman_service_type service_type;
536
537                 if (info->match_all == TRUE)
538                         return TRUE;
539
540                 service_type = connman_service_get_type(service);
541                 if (info->service_type == service_type)
542                         return TRUE;
543         }
544
545         return FALSE;
546 }
547
548 static connman_bool_t service_match(struct connman_session *session,
549                                         struct connman_service *service)
550 {
551         if (service_type_match(session, service) == FALSE)
552                 return FALSE;
553
554         return TRUE;
555 }
556
557 static int service_type_weight(enum connman_service_type type)
558 {
559         /*
560          * The session doesn't care which service
561          * to use. Nevertheless we have to sort them
562          * according their type. The ordering is
563          *
564          * 1. Ethernet
565          * 2. Bluetooth
566          * 3. WiFi/WiMAX
567          * 4. GSM/UTMS/3G
568          */
569
570         switch (type) {
571         case CONNMAN_SERVICE_TYPE_ETHERNET:
572                 return 4;
573         case CONNMAN_SERVICE_TYPE_BLUETOOTH:
574                 return 3;
575         case CONNMAN_SERVICE_TYPE_WIFI:
576         case CONNMAN_SERVICE_TYPE_WIMAX:
577                 return 2;
578         case CONNMAN_SERVICE_TYPE_CELLULAR:
579                 return 1;
580         case CONNMAN_SERVICE_TYPE_UNKNOWN:
581         case CONNMAN_SERVICE_TYPE_SYSTEM:
582         case CONNMAN_SERVICE_TYPE_GPS:
583         case CONNMAN_SERVICE_TYPE_VPN:
584         case CONNMAN_SERVICE_TYPE_GADGET:
585                 break;
586         }
587
588         return 0;
589 }
590
591 static gint sort_allowed_bearers(struct connman_service *service_a,
592                                         struct connman_service *service_b,
593                                         struct connman_session *session)
594 {
595         struct session_info *info = session->info;
596         GSList *list;
597         enum connman_service_type type_a, type_b;
598         int weight_a, weight_b;
599
600         type_a = connman_service_get_type(service_a);
601         type_b = connman_service_get_type(service_b);
602
603         for (list = info->allowed_bearers;
604                         list != NULL; list = list->next) {
605                 struct bearer_info *info = list->data;
606
607                 if (info->match_all == TRUE) {
608                         if (type_a != type_b) {
609                                 weight_a = service_type_weight(type_a);
610                                 weight_b = service_type_weight(type_b);
611
612                                 if (weight_a > weight_b)
613                                         return -1;
614
615                                 if (weight_a < weight_b)
616                                         return 1;
617
618                                 return 0;
619                         }
620                 }
621
622                 if (type_a == info->service_type &&
623                                 type_b == info->service_type) {
624                         return 0;
625                 }
626
627                 if (type_a == info->service_type &&
628                                 type_b != info->service_type) {
629                         return -1;
630                 }
631
632                 if (type_a != info->service_type &&
633                                 type_b == info->service_type) {
634                         return 1;
635                 }
636         }
637
638         return 0;
639 }
640
641 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
642 {
643         struct service_entry *entry_a = (void *)a;
644         struct service_entry *entry_b = (void *)b;
645         struct connman_session *session = user_data;
646
647         return sort_allowed_bearers(entry_a->service, entry_b->service,
648                                 session);
649 }
650
651 static void cleanup_session(gpointer user_data)
652 {
653         struct connman_session *session = user_data;
654         struct session_info *info = session->info;
655
656         DBG("remove %s", session->session_path);
657
658         g_hash_table_destroy(session->service_hash);
659         g_sequence_free(session->service_list);
660
661         if (info->entry != NULL &&
662                         info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
663                 __connman_service_disconnect(info->entry->service);
664         }
665
666         g_slist_foreach(info->allowed_bearers, cleanup_bearer_info, NULL);
667         g_slist_free(info->allowed_bearers);
668
669         g_free(session->owner);
670         g_free(session->session_path);
671         g_free(session->notify_path);
672         g_free(session->info);
673         g_free(session->info_last);
674
675         g_free(session);
676 }
677
678 static connman_bool_t is_online(enum connman_service_state state)
679 {
680         switch (state) {
681         case CONNMAN_SERVICE_STATE_UNKNOWN:
682         case CONNMAN_SERVICE_STATE_IDLE:
683         case CONNMAN_SERVICE_STATE_ASSOCIATION:
684         case CONNMAN_SERVICE_STATE_CONFIGURATION:
685         case CONNMAN_SERVICE_STATE_DISCONNECT:
686         case CONNMAN_SERVICE_STATE_FAILURE:
687         case CONNMAN_SERVICE_STATE_READY:
688                 break;
689         case CONNMAN_SERVICE_STATE_ONLINE:
690                 return TRUE;
691         }
692
693         return FALSE;
694 }
695
696 static connman_bool_t is_connecting(enum connman_service_state state)
697 {
698         switch (state) {
699         case CONNMAN_SERVICE_STATE_UNKNOWN:
700         case CONNMAN_SERVICE_STATE_IDLE:
701                 break;
702         case CONNMAN_SERVICE_STATE_ASSOCIATION:
703         case CONNMAN_SERVICE_STATE_CONFIGURATION:
704         case CONNMAN_SERVICE_STATE_READY:
705                 return TRUE;
706         case CONNMAN_SERVICE_STATE_DISCONNECT:
707         case CONNMAN_SERVICE_STATE_FAILURE:
708         case CONNMAN_SERVICE_STATE_ONLINE:
709                 break;
710         }
711
712         return FALSE;
713 }
714
715 static connman_bool_t explicit_connect(enum connman_session_reason reason)
716 {
717         switch (reason) {
718         case CONNMAN_SESSION_REASON_UNKNOWN:
719         case CONNMAN_SESSION_REASON_FREE_RIDE:
720                 break;
721         case CONNMAN_SESSION_REASON_CONNECT:
722         case CONNMAN_SESSION_REASON_PERIODIC:
723                 return TRUE;
724         }
725
726         return FALSE;
727 }
728
729 static connman_bool_t explicit_disconnect(struct connman_session *session)
730 {
731         struct session_info *info = session->info;
732
733         if (info->entry == NULL)
734                 return FALSE;
735
736         DBG("session %p, reason %s service %p state %d",
737                 session, reason2string(info->entry->reason),
738                 info->entry->service, info->entry->state);
739
740         if (explicit_connect(info->entry->reason) == FALSE)
741                 return FALSE;
742
743         if (__connman_service_session_dec(info->entry->service) == FALSE)
744                 return FALSE;
745
746         if (ecall_session != NULL && ecall_session != session)
747                 return FALSE;
748
749         return TRUE;
750 }
751
752 static void test_and_disconnect(struct connman_session *session)
753 {
754         struct session_info *info = session->info;
755         struct service_entry *entry;
756         connman_bool_t disconnect;
757
758         disconnect = explicit_disconnect(session);
759
760         entry = info->entry;
761
762         info->online = FALSE;
763         info->entry = NULL;
764
765         if (disconnect == TRUE) {
766                 DBG("disconnect service %p", entry->service);
767
768                 /*
769                  * TODO: We should mark this entry as pending work. In case
770                  * disconnect fails we just unassign this session from the
771                  * service and can't do anything later on it
772                  */
773                 __connman_service_disconnect(entry->service);
774         }
775 }
776
777 static void select_and_connect(struct connman_session *session,
778                                 enum connman_session_reason reason)
779 {
780         struct session_info *info = session->info;
781         struct service_entry *entry = NULL;
782         GSequenceIter *iter;
783         connman_bool_t do_connect = FALSE;
784
785         DBG("session %p reason %s", session, reason2string(reason));
786
787         iter = g_sequence_get_begin_iter(session->service_list);
788
789         while (g_sequence_iter_is_end(iter) == FALSE) {
790                 entry = g_sequence_get(iter);
791
792                 switch (entry->state) {
793                 case CONNMAN_SERVICE_STATE_ASSOCIATION:
794                 case CONNMAN_SERVICE_STATE_CONFIGURATION:
795                 case CONNMAN_SERVICE_STATE_READY:
796                 case CONNMAN_SERVICE_STATE_ONLINE:
797                         /* connecting or connected */
798                         break;
799                 case CONNMAN_SERVICE_STATE_IDLE:
800                 case CONNMAN_SERVICE_STATE_DISCONNECT:
801                         if (explicit_connect(reason) == TRUE)
802                                 do_connect = TRUE;
803                         break;
804                 case CONNMAN_SERVICE_STATE_UNKNOWN:
805                 case CONNMAN_SERVICE_STATE_FAILURE:
806                         entry = NULL;
807                         break;
808                 }
809
810                 if (entry != NULL)
811                         break;
812
813                 iter = g_sequence_iter_next(iter);
814         }
815
816         if (info->entry != NULL && info->entry != entry)
817                 test_and_disconnect(session);
818
819         if (entry != NULL) {
820                 info->entry = entry;
821                 info->entry->reason = reason;
822
823                 if (explicit_connect(reason) == TRUE)
824                         __connman_service_session_inc(info->entry->service);
825
826                 if (do_connect == TRUE)
827                         __connman_service_connect(info->entry->service);
828                 else
829                         info->online = is_online(entry->state);
830         }
831 }
832
833 static void session_changed(struct connman_session *session,
834                                 enum connman_session_trigger trigger)
835 {
836         struct session_info *info = session->info;
837         struct session_info *info_last = session->info_last;
838         GSequenceIter *iter;
839
840         /*
841          * TODO: This only a placeholder for the 'real' algorithm to
842          * play a bit around. So we are going to improve it step by step.
843          */
844
845         DBG("session %p trigger %s", session, trigger2string(trigger));
846
847         switch (trigger) {
848         case CONNMAN_SESSION_TRIGGER_UNKNOWN:
849                 DBG("ignore session changed event");
850                 return;
851         case CONNMAN_SESSION_TRIGGER_SETTING:
852                 if (info->entry != NULL) {
853                         iter = g_hash_table_lookup(session->service_hash,
854                                                         info->entry->service);
855                         if (iter == NULL) {
856                                 /*
857                                  * This service is not part of this
858                                  * session anymore.
859                                  */
860                                 test_and_disconnect(session);
861                         }
862                 }
863
864                 if (info->online == FALSE) {
865                         select_and_connect(session,
866                                         CONNMAN_SESSION_REASON_FREE_RIDE);
867                 }
868
869                 break;
870         case CONNMAN_SESSION_TRIGGER_CONNECT:
871                 if (info->online == TRUE) {
872                         info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
873                         __connman_service_session_inc(info->entry->service);
874                         break;
875                 }
876
877                 select_and_connect(session,
878                                 CONNMAN_SESSION_REASON_CONNECT);
879
880                 break;
881         case CONNMAN_SESSION_TRIGGER_DISCONNECT:
882                 test_and_disconnect(session);
883
884                 break;
885         case CONNMAN_SESSION_TRIGGER_PERIODIC:
886                 if (info->online == TRUE) {
887                         info->entry->reason = CONNMAN_SESSION_REASON_PERIODIC;
888                         __connman_service_session_inc(info->entry->service);
889                         break;
890                 }
891
892                 select_and_connect(session,
893                                 CONNMAN_SESSION_REASON_PERIODIC);
894
895                 break;
896         case CONNMAN_SESSION_TRIGGER_SERVICE:
897                 if (info->online == TRUE)
898                         break;
899
900                 if (info->entry != NULL &&
901                                 is_connecting(info->entry->state) == TRUE) {
902                         break;
903                 }
904
905                 if (info->stay_connected == TRUE) {
906                         DBG("StayConnected");
907                         select_and_connect(session,
908                                         CONNMAN_SESSION_REASON_CONNECT);
909
910                         break;
911                 }
912
913                 select_and_connect(session,
914                                 CONNMAN_SESSION_REASON_FREE_RIDE);
915
916                 break;
917         case CONNMAN_SESSION_TRIGGER_ECALL:
918                 if (info->online == FALSE && info->entry->service != NULL)
919                         test_and_disconnect(session);
920
921                 break;
922         }
923
924         if (info->entry != info_last->entry)
925                 session->info_dirty = TRUE;
926
927         session_notify(session);
928 }
929
930 static DBusMessage *connect_session(DBusConnection *conn,
931                                         DBusMessage *msg, void *user_data)
932 {
933         struct connman_session *session = user_data;
934
935         DBG("session %p", session);
936
937         if (ecall_session != NULL && ecall_session != session)
938                 return __connman_error_failed(msg, EBUSY);
939
940         session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
941
942         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
943 }
944
945 static DBusMessage *disconnect_session(DBusConnection *conn,
946                                         DBusMessage *msg, void *user_data)
947 {
948         struct connman_session *session = user_data;
949
950         DBG("session %p", session);
951
952         if (ecall_session != NULL && ecall_session != session)
953                 return __connman_error_failed(msg, EBUSY);
954
955         session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
956
957         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
958 }
959
960 static struct service_entry *create_service_entry(struct connman_service *service,
961                                         const char *name,
962                                         enum connman_service_state state)
963 {
964         struct service_entry *entry;
965         enum connman_service_type type;
966         int idx;
967
968         entry = g_try_new0(struct service_entry, 1);
969         if (entry == NULL)
970                 return entry;
971
972         entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
973         entry->state = state;
974         entry->name = name;
975         entry->service = service;
976
977         idx = __connman_service_get_index(entry->service);
978         entry->ifname = connman_inet_ifname(idx);
979         if (entry->ifname == NULL)
980                 entry->ifname = "";
981
982         type = connman_service_get_type(entry->service);
983         entry->bearer = service2bearer(type);
984
985         return entry;
986 }
987
988 static void destroy_service_entry(gpointer data)
989 {
990         struct service_entry *entry = data;
991
992         g_free(entry);
993 }
994
995 static void update_allowed_bearers(struct connman_session *session)
996 {
997         struct service_entry *entry;
998         GSequenceIter *iter;
999
1000         if (session->service_list != NULL) {
1001                 g_hash_table_remove_all(session->service_hash);
1002                 g_sequence_free(session->service_list);
1003         }
1004
1005         session->service_list = __connman_service_get_list(session,
1006                                                         service_match,
1007                                                         create_service_entry,
1008                                                         destroy_service_entry);
1009
1010         g_sequence_sort(session->service_list, sort_services, session);
1011
1012         iter = g_sequence_get_begin_iter(session->service_list);
1013
1014         while (g_sequence_iter_is_end(iter) == FALSE) {
1015                 entry = g_sequence_get(iter);
1016
1017                 DBG("service %p type %s name %s", entry->service,
1018                         service2bearer(connman_service_get_type(entry->service)),
1019                         entry->name);
1020
1021                 g_hash_table_replace(session->service_hash,
1022                                         entry->service, iter);
1023
1024                 iter = g_sequence_iter_next(iter);
1025         }
1026
1027         session->info_dirty = TRUE;
1028 }
1029
1030 static void update_ecall_sessions(struct connman_session *session)
1031 {
1032         struct session_info *info = session->info;
1033         struct connman_session *session_iter;
1034         GHashTableIter iter;
1035         gpointer key, value;
1036
1037         g_hash_table_iter_init(&iter, session_hash);
1038
1039         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1040                 session_iter = value;
1041
1042                 if (session_iter == session)
1043                         continue;
1044
1045                 session_iter->info->ecall = info->ecall;
1046                 session_iter->info_dirty = TRUE;
1047
1048                 session_changed(session_iter, CONNMAN_SESSION_TRIGGER_ECALL);
1049         }
1050 }
1051
1052 static void update_ecall(struct connman_session *session)
1053 {
1054         struct session_info *info = session->info;
1055         struct session_info *info_last = session->info_last;
1056
1057         DBG("session %p ecall_session %p ecall %d -> %d", session,
1058                 ecall_session, info_last->ecall, info->ecall);
1059
1060         if (ecall_session == NULL) {
1061                 if (!(info_last->ecall == FALSE && info->ecall == TRUE))
1062                         goto err;
1063
1064                 ecall_session = session;
1065         } else if (ecall_session == session) {
1066                 if (!(info_last->ecall == TRUE && info->ecall == FALSE))
1067                         goto err;
1068
1069                 ecall_session = NULL;
1070         } else {
1071                 goto err;
1072         }
1073
1074         update_ecall_sessions(session);
1075
1076         session->info_dirty = TRUE;
1077         return;
1078
1079 err:
1080         /* not a valid transition */
1081         info->ecall = info_last->ecall;
1082 }
1083
1084 static DBusMessage *change_session(DBusConnection *conn,
1085                                         DBusMessage *msg, void *user_data)
1086 {
1087         struct connman_session *session = user_data;
1088         struct session_info *info = session->info;
1089         struct session_info *info_last = session->info_last;
1090         DBusMessageIter iter, value;
1091         const char *name;
1092         GSList *allowed_bearers;
1093
1094         DBG("session %p", session);
1095         if (dbus_message_iter_init(msg, &iter) == FALSE)
1096                 return __connman_error_invalid_arguments(msg);
1097
1098         dbus_message_iter_get_basic(&iter, &name);
1099         dbus_message_iter_next(&iter);
1100         dbus_message_iter_recurse(&iter, &value);
1101
1102         switch (dbus_message_iter_get_arg_type(&value)) {
1103         case DBUS_TYPE_ARRAY:
1104                 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1105                         allowed_bearers = session_parse_allowed_bearers(&value);
1106
1107                         g_slist_foreach(info->allowed_bearers,
1108                                         cleanup_bearer_info, NULL);
1109                         g_slist_free(info->allowed_bearers);
1110
1111                         if (allowed_bearers == NULL) {
1112                                 allowed_bearers = session_allowed_bearers_any();
1113
1114                                 if (allowed_bearers == NULL)
1115                                         return __connman_error_failed(msg, ENOMEM);
1116                         }
1117
1118                         info->allowed_bearers = allowed_bearers;
1119
1120                         update_allowed_bearers(session);
1121                 } else {
1122                         goto err;
1123                 }
1124                 break;
1125         case DBUS_TYPE_BOOLEAN:
1126                 if (g_str_equal(name, "Priority") == TRUE) {
1127                         dbus_message_iter_get_basic(&value,
1128                                         &info->priority);
1129
1130                         if (info_last->priority != info->priority)
1131                                 session->info_dirty = TRUE;
1132                 } else if (g_str_equal(name, "AvoidHandover") == TRUE) {
1133                         dbus_message_iter_get_basic(&value,
1134                                         &info->avoid_handover);
1135
1136                         if (info_last->avoid_handover != info->avoid_handover)
1137                                 session->info_dirty = TRUE;
1138                 } else if (g_str_equal(name, "StayConnected") == TRUE) {
1139                         dbus_message_iter_get_basic(&value,
1140                                         &info->stay_connected);
1141
1142                         if (info_last->stay_connected != info->stay_connected)
1143                                 session->info_dirty = TRUE;
1144                 } else if (g_str_equal(name, "EmergencyCall") == TRUE) {
1145                         dbus_message_iter_get_basic(&value,
1146                                         &info->ecall);
1147
1148                         update_ecall(session);
1149                 } else {
1150                         goto err;
1151                 }
1152                 break;
1153         case DBUS_TYPE_UINT32:
1154                 if (g_str_equal(name, "PeriodicConnect") == TRUE) {
1155                         dbus_message_iter_get_basic(&value,
1156                                         &info->periodic_connect);
1157
1158                         if (info_last->periodic_connect != info->periodic_connect)
1159                                 session->info_dirty = TRUE;
1160                 } else if (g_str_equal(name, "IdleTimeout") == TRUE) {
1161                         dbus_message_iter_get_basic(&value,
1162                                         &info->idle_timeout);
1163
1164                         if (info_last->idle_timeout != info->idle_timeout)
1165                                 session->info_dirty = TRUE;
1166                 } else {
1167                         goto err;
1168                 }
1169                 break;
1170         case DBUS_TYPE_STRING:
1171                 if (g_str_equal(name, "RoamingPolicy") == TRUE) {
1172                         const char *val;
1173                         dbus_message_iter_get_basic(&value, &val);
1174                         info->roaming_policy =
1175                                         string2roamingpolicy(val);
1176
1177                         if (info_last->roaming_policy != info->roaming_policy)
1178                                 session->info_dirty = TRUE;
1179                 } else {
1180                         goto err;
1181                 }
1182                 break;
1183         default:
1184                 goto err;
1185         }
1186
1187         if (session->info_dirty == TRUE)
1188                 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1189
1190         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1191
1192 err:
1193         return __connman_error_invalid_arguments(msg);
1194 }
1195
1196 static void release_session(gpointer key, gpointer value, gpointer user_data)
1197 {
1198         struct connman_session *session = value;
1199         DBusMessage *message;
1200
1201         DBG("owner %s path %s", session->owner, session->notify_path);
1202
1203         if (session->notify_watch > 0)
1204                 g_dbus_remove_watch(connection, session->notify_watch);
1205
1206         g_dbus_unregister_interface(connection, session->session_path,
1207                                                 CONNMAN_SESSION_INTERFACE);
1208
1209         message = dbus_message_new_method_call(session->owner,
1210                                                 session->notify_path,
1211                                                 CONNMAN_NOTIFICATION_INTERFACE,
1212                                                 "Release");
1213         if (message == NULL)
1214                 return;
1215
1216         dbus_message_set_no_reply(message, TRUE);
1217
1218         g_dbus_send_message(connection, message);
1219 }
1220
1221 static int session_disconnect(struct connman_session *session)
1222 {
1223         DBG("session %p, %s", session, session->owner);
1224
1225         if (session->notify_watch > 0)
1226                 g_dbus_remove_watch(connection, session->notify_watch);
1227
1228         g_dbus_unregister_interface(connection, session->session_path,
1229                                                 CONNMAN_SESSION_INTERFACE);
1230
1231         g_hash_table_remove(session_hash, session->session_path);
1232
1233         return 0;
1234 }
1235
1236 static void owner_disconnect(DBusConnection *conn, void *user_data)
1237 {
1238         struct connman_session *session = user_data;
1239
1240         DBG("session %p, %s died", session, session->owner);
1241
1242         session_disconnect(session);
1243 }
1244
1245 static DBusMessage *destroy_session(DBusConnection *conn,
1246                                         DBusMessage *msg, void *user_data)
1247 {
1248         struct connman_session *session = user_data;
1249
1250         DBG("session %p", session);
1251
1252         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1253 }
1254
1255 static GDBusMethodTable session_methods[] = {
1256         { "Destroy",    "",   "", destroy_session    },
1257         { "Connect",    "",   "", connect_session    },
1258         { "Disconnect", "",   "", disconnect_session },
1259         { "Change",     "sv", "", change_session     },
1260         { },
1261 };
1262
1263 int __connman_session_create(DBusMessage *msg)
1264 {
1265         const char *owner, *notify_path;
1266         char *session_path = NULL;
1267         DBusMessageIter iter, array;
1268         struct connman_session *session = NULL;
1269         struct session_info *info, *info_last;
1270
1271         connman_bool_t priority = FALSE, avoid_handover = FALSE;
1272         connman_bool_t stay_connected = FALSE, ecall = FALSE;
1273         enum connman_session_roaming_policy roaming_policy =
1274                                 CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
1275         GSList *allowed_bearers = NULL;
1276         unsigned int periodic_connect = 0;
1277         unsigned int idle_timeout = 0;
1278
1279         int err;
1280
1281         owner = dbus_message_get_sender(msg);
1282
1283         DBG("owner %s", owner);
1284
1285         if (ecall_session != NULL) {
1286                 /*
1287                  * If there is an emergency call already going on,
1288                  * ignore session creation attempt
1289                  */
1290                 err = -EBUSY;
1291                 goto err;
1292         }
1293
1294         dbus_message_iter_init(msg, &iter);
1295         dbus_message_iter_recurse(&iter, &array);
1296
1297         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1298                 DBusMessageIter entry, value;
1299                 const char *key, *val;
1300
1301                 dbus_message_iter_recurse(&array, &entry);
1302                 dbus_message_iter_get_basic(&entry, &key);
1303
1304                 dbus_message_iter_next(&entry);
1305                 dbus_message_iter_recurse(&entry, &value);
1306
1307                 switch (dbus_message_iter_get_arg_type(&value)) {
1308                 case DBUS_TYPE_ARRAY:
1309                         if (g_str_equal(key, "AllowedBearers") == TRUE) {
1310                                 allowed_bearers =
1311                                         session_parse_allowed_bearers(&value);
1312                         } else {
1313                                 return -EINVAL;
1314                         }
1315                         break;
1316                 case DBUS_TYPE_BOOLEAN:
1317                         if (g_str_equal(key, "Priority") == TRUE) {
1318                                 dbus_message_iter_get_basic(&value,
1319                                                         &priority);
1320                         } else if (g_str_equal(key, "AvoidHandover") == TRUE) {
1321                                 dbus_message_iter_get_basic(&value,
1322                                                         &avoid_handover);
1323                         } else if (g_str_equal(key, "StayConnected") == TRUE) {
1324                                 dbus_message_iter_get_basic(&value,
1325                                                         &stay_connected);
1326                         } else if (g_str_equal(key, "EmergencyCall") == TRUE) {
1327                                 dbus_message_iter_get_basic(&value,
1328                                                         &ecall);
1329                         } else {
1330                                 return -EINVAL;
1331                         }
1332                         break;
1333                 case DBUS_TYPE_UINT32:
1334                         if (g_str_equal(key, "PeriodicConnect") == TRUE) {
1335                                 dbus_message_iter_get_basic(&value,
1336                                                         &periodic_connect);
1337                         } else if (g_str_equal(key, "IdleTimeout") == TRUE) {
1338                                 dbus_message_iter_get_basic(&value,
1339                                                         &idle_timeout);
1340                         } else {
1341                                 return -EINVAL;
1342                         }
1343                         break;
1344                 case DBUS_TYPE_STRING:
1345                         if (g_str_equal(key, "RoamingPolicy") == TRUE) {
1346                                 dbus_message_iter_get_basic(&value, &val);
1347                                 roaming_policy = string2roamingpolicy(val);
1348                         } else {
1349                                 return -EINVAL;
1350                         }
1351                 }
1352                 dbus_message_iter_next(&array);
1353         }
1354
1355         dbus_message_iter_next(&iter);
1356         dbus_message_iter_get_basic(&iter, &notify_path);
1357
1358         if (notify_path == NULL) {
1359                 err = -EINVAL;
1360                 goto err;
1361         }
1362
1363         session_path = g_strdup_printf("/sessions%s", notify_path);
1364         if (session_path == NULL) {
1365                 err = -ENOMEM;
1366                 goto err;
1367         }
1368
1369         session = g_hash_table_lookup(session_hash, session_path);
1370         if (session != NULL) {
1371                 session = NULL;
1372                 err = -EEXIST;
1373                 goto err;
1374         }
1375
1376         session = g_try_new0(struct connman_session, 1);
1377         if (session == NULL) {
1378                 err = -ENOMEM;
1379                 goto err;
1380         }
1381
1382         session->info = g_try_new0(struct session_info, 1);
1383         if (session->info == NULL) {
1384                 err = -ENOMEM;
1385                 goto err;
1386         }
1387
1388         session->info_last = g_try_new0(struct session_info, 1);
1389         if (session->info_last == NULL) {
1390                 err = -ENOMEM;
1391                 goto err;
1392         }
1393
1394         info = session->info;
1395         info_last = session->info_last;
1396
1397         session->owner = g_strdup(owner);
1398         session->session_path = session_path;
1399         session->notify_path = g_strdup(notify_path);
1400         session->notify_watch =
1401                 g_dbus_add_disconnect_watch(connection, session->owner,
1402                                         owner_disconnect, session, NULL);
1403
1404         session->service_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1405                                                 NULL, NULL);
1406
1407         info->online = FALSE;
1408         info->priority = priority;
1409         info->avoid_handover = avoid_handover;
1410         info->stay_connected = stay_connected;
1411         info->periodic_connect = periodic_connect;
1412         info->idle_timeout = idle_timeout;
1413         info->ecall = ecall;
1414         info->roaming_policy = roaming_policy;
1415         info->entry = NULL;
1416         info->marker = 0;
1417
1418         if (allowed_bearers == NULL) {
1419                 info->allowed_bearers =
1420                                 session_allowed_bearers_any();
1421
1422                 if (info->allowed_bearers == NULL) {
1423                         err = -ENOMEM;
1424                         goto err;
1425                 }
1426         } else {
1427                 info->allowed_bearers = allowed_bearers;
1428         }
1429
1430         g_hash_table_replace(session_hash, session->session_path, session);
1431
1432         DBG("add %s", session->session_path);
1433
1434         if (g_dbus_register_interface(connection, session->session_path,
1435                                         CONNMAN_SESSION_INTERFACE,
1436                                         session_methods, NULL,
1437                                         NULL, session, NULL) == FALSE) {
1438                 connman_error("Failed to register %s", session->session_path);
1439                 g_hash_table_remove(session_hash, session->session_path);
1440                 session = NULL;
1441
1442                 err = -EINVAL;
1443                 goto err;
1444         }
1445
1446         g_dbus_send_reply(connection, msg,
1447                                 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1448                                 DBUS_TYPE_INVALID);
1449
1450
1451         update_allowed_bearers(session);
1452         if (info->ecall == TRUE) {
1453                 ecall_session = session;
1454                 update_ecall_sessions(session);
1455         }
1456
1457         info_last->online = info->online;
1458         info_last->priority = info->priority;
1459         info_last->avoid_handover = info->avoid_handover;
1460         info_last->stay_connected = info->stay_connected;
1461         info_last->periodic_connect = info->periodic_connect;
1462         info_last->idle_timeout = info->idle_timeout;
1463         info_last->ecall = info->ecall;
1464         info_last->roaming_policy = info->roaming_policy;
1465         info_last->entry = info->entry;
1466         info_last->marker = info->marker;
1467         info_last->allowed_bearers = info->allowed_bearers;
1468
1469         session->info_dirty = TRUE;
1470         session->append_all = TRUE;
1471
1472         session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1473
1474         return 0;
1475
1476 err:
1477         connman_error("Failed to create session");
1478
1479         if (session != NULL) {
1480                 if (session->info_last != NULL)
1481                         g_free(session->info_last);
1482                 if (session->info != NULL)
1483                         g_free(session->info);
1484                 g_free(session);
1485         }
1486
1487         g_free(session_path);
1488
1489         g_slist_foreach(allowed_bearers, cleanup_bearer_info, NULL);
1490         g_slist_free(allowed_bearers);
1491
1492         return err;
1493 }
1494
1495 int __connman_session_destroy(DBusMessage *msg)
1496 {
1497         const char *owner, *session_path;
1498         struct connman_session *session;
1499
1500         owner = dbus_message_get_sender(msg);
1501
1502         DBG("owner %s", owner);
1503
1504         dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1505                                                         DBUS_TYPE_INVALID);
1506         if (session_path == NULL)
1507                 return -EINVAL;
1508
1509         session = g_hash_table_lookup(session_hash, session_path);
1510         if (session == NULL)
1511                 return -EINVAL;
1512
1513         if (g_strcmp0(owner, session->owner) != 0)
1514                 return -EACCES;
1515
1516         session_disconnect(session);
1517
1518         return 0;
1519 }
1520
1521 connman_bool_t __connman_session_mode()
1522 {
1523         return sessionmode;
1524 }
1525
1526 void __connman_session_set_mode(connman_bool_t enable)
1527 {
1528         DBG("enable %d", enable);
1529
1530         if (sessionmode == enable)
1531                 return;
1532
1533         sessionmode = enable;
1534
1535         if (sessionmode == TRUE)
1536                 __connman_service_disconnect_all();
1537 }
1538
1539 static void service_add(struct connman_service *service)
1540 {
1541         GHashTableIter iter;
1542         GSequenceIter *iter_service_list;
1543         gpointer key, value;
1544         struct connman_session *session;
1545
1546         DBG("service %p", service);
1547
1548         g_hash_table_iter_init(&iter, session_hash);
1549
1550         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1551                 session = value;
1552
1553                 if (service_match(session, service) == FALSE)
1554                         continue;
1555
1556                 iter_service_list =
1557                         g_sequence_insert_sorted(session->service_list,
1558                                                         service, sort_services,
1559                                                         session);
1560
1561                 g_hash_table_replace(session->service_hash, service,
1562                                         iter_service_list);
1563
1564                 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1565         }
1566 }
1567
1568 static void service_remove(struct connman_service *service)
1569 {
1570
1571         GHashTableIter iter;
1572         gpointer key, value;
1573         struct connman_session *session;
1574         struct session_info *info;
1575
1576         DBG("service %p", service);
1577
1578         g_hash_table_iter_init(&iter, session_hash);
1579
1580         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1581                 GSequenceIter *iter;
1582                 session = value;
1583                 info = session->info;
1584
1585                 iter = g_hash_table_lookup(session->service_hash, service);
1586                 if (iter == NULL)
1587                         continue;
1588
1589                 g_sequence_remove(iter);
1590
1591                 info->entry = NULL;
1592                 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1593         }
1594 }
1595
1596 static void service_state_changed(struct connman_service *service,
1597                                         enum connman_service_state state)
1598 {
1599         GHashTableIter iter;
1600         gpointer key, value;
1601         struct connman_session *session;
1602         struct session_info *info, *info_last;
1603
1604         DBG("service %p state %d", service, state);
1605
1606         g_hash_table_iter_init(&iter, session_hash);
1607
1608         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1609                 session = value;
1610                 info = session->info;
1611                 info_last = session->info_last;
1612
1613                 if (info->entry != NULL && info->entry->service == service) {
1614                         info->entry->state = state;
1615                         info->online = is_online(info->entry->state);
1616                         if (info_last->online != info->online)
1617                                 session->info_dirty = TRUE;
1618                 }
1619
1620                 session_changed(session,
1621                                 CONNMAN_SESSION_TRIGGER_SERVICE);
1622         }
1623 }
1624
1625 static void ipconfig_changed(struct connman_service *service,
1626                                 struct connman_ipconfig *ipconfig)
1627 {
1628         GHashTableIter iter;
1629         gpointer key, value;
1630         struct connman_session *session;
1631         struct session_info *info;
1632         enum connman_ipconfig_type type;
1633
1634         DBG("service %p ipconfig %p", service, ipconfig);
1635
1636         type = __connman_ipconfig_get_config_type(ipconfig);
1637
1638         g_hash_table_iter_init(&iter, session_hash);
1639
1640         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1641                 session = value;
1642                 info = session->info;
1643
1644                 if (info->entry != NULL && info->entry->service == service) {
1645                         if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
1646                                 ipconfig_ipv4_changed(session);
1647                         else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
1648                                 ipconfig_ipv6_changed(session);
1649                 }
1650         }
1651 }
1652
1653 static struct connman_notifier session_notifier = {
1654         .name                   = "session",
1655         .service_add            = service_add,
1656         .service_remove         = service_remove,
1657         .service_state_changed  = service_state_changed,
1658         .ipconfig_changed       = ipconfig_changed,
1659 };
1660
1661 int __connman_session_init(void)
1662 {
1663         int err;
1664
1665         DBG("");
1666
1667         connection = connman_dbus_get_connection();
1668         if (connection == NULL)
1669                 return -1;
1670
1671         err = connman_notifier_register(&session_notifier);
1672         if (err < 0) {
1673                 dbus_connection_unref(connection);
1674                 return err;
1675         }
1676
1677         session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1678                                                 NULL, cleanup_session);
1679
1680         sessionmode = FALSE;
1681         return 0;
1682 }
1683
1684 void __connman_session_cleanup(void)
1685 {
1686         DBG("");
1687
1688         if (connection == NULL)
1689                 return;
1690
1691         connman_notifier_unregister(&session_notifier);
1692
1693         g_hash_table_foreach(session_hash, release_session, NULL);
1694         g_hash_table_destroy(session_hash);
1695
1696         dbus_connection_unref(connection);
1697 }