session: Pass session_info pointer into functions
[framework/connectivity/connman.git] / src / session.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2010  Intel Corporation. All rights reserved.
6  *  Copyright (C) 2011  BWM CarIT GmbH. All rights reserved.
7  *
8  *  This program is free software; you can redistribute it and/or modify
9  *  it under the terms of the GNU General Public License version 2 as
10  *  published by the Free Software Foundation.
11  *
12  *  This program is distributed in the hope that it will be useful,
13  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
14  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15  *  GNU General Public License for more details.
16  *
17  *  You should have received a copy of the GNU General Public License
18  *  along with this program; if not, write to the Free Software
19  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
20  *
21  */
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <errno.h>
28
29 #include <gdbus.h>
30
31 #include "connman.h"
32
33 static DBusConnection *connection;
34 static GHashTable *session_hash;
35 static connman_bool_t sessionmode;
36 static struct session_info *ecall_info;
37
38 enum connman_session_trigger {
39         CONNMAN_SESSION_TRIGGER_UNKNOWN         = 0,
40         CONNMAN_SESSION_TRIGGER_SETTING         = 1,
41         CONNMAN_SESSION_TRIGGER_CONNECT         = 2,
42         CONNMAN_SESSION_TRIGGER_DISCONNECT      = 3,
43         CONNMAN_SESSION_TRIGGER_PERIODIC        = 4,
44         CONNMAN_SESSION_TRIGGER_SERVICE         = 5,
45         CONNMAN_SESSION_TRIGGER_ECALL           = 6,
46 };
47
48 enum connman_session_reason {
49         CONNMAN_SESSION_REASON_UNKNOWN          = 0,
50         CONNMAN_SESSION_REASON_CONNECT          = 1,
51         CONNMAN_SESSION_REASON_FREE_RIDE        = 2,
52         CONNMAN_SESSION_REASON_PERIODIC         = 3,
53 };
54
55 enum connman_session_roaming_policy {
56         CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN          = 0,
57         CONNMAN_SESSION_ROAMING_POLICY_DEFAULT          = 1,
58         CONNMAN_SESSION_ROAMING_POLICY_ALWAYS           = 2,
59         CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN        = 3,
60         CONNMAN_SESSION_ROAMING_POLICY_NATIONAL         = 4,
61         CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL    = 5,
62 };
63
64 struct service_entry {
65         /* track why this service was selected */
66         enum connman_session_reason reason;
67         enum connman_service_state state;
68         const char *name;
69         struct connman_service *service;
70         char *ifname;
71         const char *bearer;
72 };
73
74 struct session_info {
75         connman_bool_t online;
76         connman_bool_t priority;
77         GSList *allowed_bearers;
78         connman_bool_t avoid_handover;
79         connman_bool_t stay_connected;
80         unsigned int periodic_connect;
81         unsigned int idle_timeout;
82         connman_bool_t ecall;
83         enum connman_session_roaming_policy roaming_policy;
84         unsigned int marker;
85
86         struct service_entry *entry;
87         enum connman_session_reason reason;
88 };
89
90 struct connman_session {
91         char *owner;
92         char *session_path;
93         char *notify_path;
94         guint notify_watch;
95
96         connman_bool_t append_all;
97         connman_bool_t info_dirty;
98         struct session_info *info;
99         struct session_info *info_last;
100
101         GSequence *service_list;
102         GHashTable *service_hash;
103 };
104
105 struct bearer_info {
106         char *name;
107         connman_bool_t match_all;
108         enum connman_service_type service_type;
109 };
110
111 static const char *trigger2string(enum connman_session_trigger trigger)
112 {
113         switch (trigger) {
114         case CONNMAN_SESSION_TRIGGER_UNKNOWN:
115                 break;
116         case CONNMAN_SESSION_TRIGGER_SETTING:
117                 return "setting";
118         case CONNMAN_SESSION_TRIGGER_CONNECT:
119                 return "connect";
120         case CONNMAN_SESSION_TRIGGER_DISCONNECT:
121                 return "disconnect";
122         case CONNMAN_SESSION_TRIGGER_PERIODIC:
123                 return "periodic";
124         case CONNMAN_SESSION_TRIGGER_SERVICE:
125                 return "service";
126         case CONNMAN_SESSION_TRIGGER_ECALL:
127                 return "ecall";
128         }
129
130         return NULL;
131 }
132
133 static const char *reason2string(enum connman_session_reason reason)
134 {
135         switch (reason) {
136         case CONNMAN_SESSION_REASON_UNKNOWN:
137                 return "unknown";
138         case CONNMAN_SESSION_REASON_CONNECT:
139                 return "connect";
140         case CONNMAN_SESSION_REASON_FREE_RIDE:
141                 return "free-ride";
142         case CONNMAN_SESSION_REASON_PERIODIC:
143                 return "periodic";
144         }
145
146         return NULL;
147 }
148
149 static const char *roamingpolicy2string(enum connman_session_roaming_policy policy)
150 {
151         switch (policy) {
152         case CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN:
153                 return "unknown";
154         case CONNMAN_SESSION_ROAMING_POLICY_DEFAULT:
155                 return "default";
156         case CONNMAN_SESSION_ROAMING_POLICY_ALWAYS:
157                 return "always";
158         case CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN:
159                 return "forbidden";
160         case CONNMAN_SESSION_ROAMING_POLICY_NATIONAL:
161                 return "national";
162         case CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL:
163                 return "international";
164         }
165
166         return NULL;
167 }
168
169 static enum connman_session_roaming_policy string2roamingpolicy(const char *policy)
170 {
171         if (g_strcmp0(policy, "default") == 0)
172                 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
173         else if (g_strcmp0(policy, "always") == 0)
174                 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
175         else if (g_strcmp0(policy, "forbidden") == 0)
176                 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
177         else if (g_strcmp0(policy, "national") == 0)
178                 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
179         else if (g_strcmp0(policy, "international") == 0)
180                 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
181         else
182                 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
183 }
184
185 static enum connman_service_type bearer2service(const char *bearer)
186 {
187         if (bearer == NULL)
188                 return CONNMAN_SERVICE_TYPE_UNKNOWN;
189
190         if (g_strcmp0(bearer, "ethernet") == 0)
191                 return CONNMAN_SERVICE_TYPE_ETHERNET;
192         else if (g_strcmp0(bearer, "wifi") == 0)
193                 return CONNMAN_SERVICE_TYPE_WIFI;
194         else if (g_strcmp0(bearer, "wimax") == 0)
195                 return CONNMAN_SERVICE_TYPE_WIMAX;
196         else if (g_strcmp0(bearer, "bluetooth") == 0)
197                 return CONNMAN_SERVICE_TYPE_BLUETOOTH;
198         else if (g_strcmp0(bearer, "3g") == 0)
199                 return CONNMAN_SERVICE_TYPE_CELLULAR;
200         else if (g_strcmp0(bearer, "vpn") == 0)
201                 return CONNMAN_SERVICE_TYPE_VPN;
202         else
203                 return CONNMAN_SERVICE_TYPE_UNKNOWN;
204 }
205
206 static char *service2bearer(enum connman_service_type type)
207 {
208         switch (type) {
209         case CONNMAN_SERVICE_TYPE_ETHERNET:
210                 return "ethernet";
211         case CONNMAN_SERVICE_TYPE_WIFI:
212                 return "wifi";
213         case CONNMAN_SERVICE_TYPE_WIMAX:
214                 return "wimax";
215         case CONNMAN_SERVICE_TYPE_BLUETOOTH:
216                 return "bluetooth";
217         case CONNMAN_SERVICE_TYPE_CELLULAR:
218                 return "3g";
219         case CONNMAN_SERVICE_TYPE_VPN:
220                 return "vpn";
221         case CONNMAN_SERVICE_TYPE_UNKNOWN:
222         case CONNMAN_SERVICE_TYPE_SYSTEM:
223         case CONNMAN_SERVICE_TYPE_GPS:
224         case CONNMAN_SERVICE_TYPE_GADGET:
225                 return "";
226         }
227
228         return "";
229 }
230
231 static void cleanup_bearer_info(gpointer data, gpointer user_data)
232 {
233         struct bearer_info *info = data;
234
235         g_free(info->name);
236         g_free(info);
237 }
238
239 static GSList *session_parse_allowed_bearers(DBusMessageIter *iter)
240 {
241         struct bearer_info *info;
242         DBusMessageIter array;
243         GSList *list = NULL;
244
245         dbus_message_iter_recurse(iter, &array);
246
247         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_STRING) {
248                 char *bearer = NULL;
249
250                 dbus_message_iter_get_basic(&array, &bearer);
251
252                 info = g_try_new0(struct bearer_info, 1);
253                 if (info == NULL) {
254                         g_slist_foreach(list, cleanup_bearer_info, NULL);
255                         g_slist_free(list);
256
257                         return NULL;
258                 }
259
260                 info->name = g_strdup(bearer);
261                 info->service_type = bearer2service(info->name);
262
263                 if (info->service_type == CONNMAN_SERVICE_TYPE_UNKNOWN &&
264                                 g_strcmp0(info->name, "*") == 0) {
265                         info->match_all = TRUE;
266                 } else {
267                         info->match_all = FALSE;
268                 }
269
270                 list = g_slist_append(list, info);
271
272                 dbus_message_iter_next(&array);
273         }
274
275         return list;
276 }
277
278 static GSList *session_allowed_bearers_any(void)
279 {
280         struct bearer_info *info;
281         GSList *list = NULL;
282
283         info = g_try_new0(struct bearer_info, 1);
284         if (info == NULL) {
285                 g_slist_free(list);
286
287                 return NULL;
288         }
289
290         info->name = g_strdup("");
291         info->match_all = TRUE;
292         info->service_type = CONNMAN_SERVICE_TYPE_UNKNOWN;
293
294         list = g_slist_append(list, info);
295
296         return list;
297 }
298
299 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
300 {
301         struct session_info *info = user_data;
302         GSList *list;
303
304         for (list = info->allowed_bearers;
305                         list != NULL; list = list->next) {
306                 struct bearer_info *info = list->data;
307
308                 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
309                                                 &info->name);
310         }
311 }
312
313 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
314 {
315         struct connman_service *service = user_data;
316         struct connman_ipconfig *ipconfig_ipv4;
317
318         if (service == NULL)
319                 return;
320
321         ipconfig_ipv4 = __connman_service_get_ip4config(service);
322         if (ipconfig_ipv4 == NULL)
323                 return;
324
325         __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
326 }
327
328 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
329 {
330         struct connman_service *service = user_data;
331         struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
332
333         if (service == NULL)
334                 return;
335
336         ipconfig_ipv4 = __connman_service_get_ip4config(service);
337         ipconfig_ipv6 = __connman_service_get_ip6config(service);
338         if (ipconfig_ipv6 == NULL)
339                 return;
340
341         __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
342 }
343
344 static void append_notify(DBusMessageIter *dict,
345                                         struct connman_session *session)
346 {
347         struct session_info *info = session->info;
348         struct session_info *info_last = session->info_last;
349         const char *policy;
350         struct connman_service *service;
351         const char *name, *ifname, *bearer;
352
353         if (session->append_all == TRUE ||
354                         info->online != info_last->online) {
355                 connman_dbus_dict_append_basic(dict, "Online",
356                                                 DBUS_TYPE_BOOLEAN,
357                                                 &info->online);
358                 info_last->online = info->online;
359         }
360
361         if (session->append_all == TRUE ||
362                         info->entry != info_last->entry) {
363                 if (info->entry == NULL) {
364                         name = "";
365                         ifname = "";
366                         service = NULL;
367                         bearer = "";
368                 } else {
369                         name = info->entry->name;
370                         ifname = info->entry->ifname;
371                         service = info->entry->service;
372                         bearer = info->entry->bearer;
373                 }
374
375                 connman_dbus_dict_append_basic(dict, "Name",
376                                                 DBUS_TYPE_STRING,
377                                                 &name);
378
379                 connman_dbus_dict_append_dict(dict, "IPv4",
380                                                 append_ipconfig_ipv4,
381                                                 service);
382
383                 connman_dbus_dict_append_dict(dict, "IPv6",
384                                                 append_ipconfig_ipv6,
385                                                 service);
386
387                 connman_dbus_dict_append_basic(dict, "Interface",
388                                                 DBUS_TYPE_STRING,
389                                                 &ifname);
390
391                 connman_dbus_dict_append_basic(dict, "Bearer",
392                                                 DBUS_TYPE_STRING,
393                                                 &bearer);
394
395                 info_last->entry = info->entry;
396         }
397
398
399         if (session->append_all == TRUE ||
400                         info->priority != info_last->priority) {
401                 connman_dbus_dict_append_basic(dict, "Priority",
402                                                 DBUS_TYPE_BOOLEAN,
403                                                 &info->priority);
404                 info_last->priority = info->priority;
405         }
406
407         if (session->append_all == TRUE ||
408                         info->allowed_bearers != info_last->allowed_bearers) {
409                 connman_dbus_dict_append_array(dict, "AllowedBearers",
410                                                 DBUS_TYPE_STRING,
411                                                 append_allowed_bearers,
412                                                 info);
413                 info_last->allowed_bearers = info->allowed_bearers;
414         }
415
416         if (session->append_all == TRUE ||
417                         info->avoid_handover != info_last->avoid_handover) {
418                 connman_dbus_dict_append_basic(dict, "AvoidHandover",
419                                                 DBUS_TYPE_BOOLEAN,
420                                                 &info->avoid_handover);
421                 info_last->avoid_handover = info->avoid_handover;
422         }
423
424         if (session->append_all == TRUE ||
425                         info->stay_connected != info_last->stay_connected) {
426                 connman_dbus_dict_append_basic(dict, "StayConnected",
427                                                 DBUS_TYPE_BOOLEAN,
428                                                 &info->stay_connected);
429                 info_last->stay_connected = info->stay_connected;
430         }
431
432         if (session->append_all == TRUE ||
433                         info->periodic_connect != info_last->periodic_connect) {
434                 connman_dbus_dict_append_basic(dict, "PeriodicConnect",
435                                                 DBUS_TYPE_UINT32,
436                                                 &info->periodic_connect);
437                 info_last->periodic_connect = info->periodic_connect;
438         }
439
440         if (session->append_all == TRUE ||
441                         info->idle_timeout != info_last->idle_timeout) {
442                 connman_dbus_dict_append_basic(dict, "IdleTimeout",
443                                                 DBUS_TYPE_UINT32,
444                                                 &info->idle_timeout);
445                 info_last->idle_timeout = info->idle_timeout;
446         }
447
448         if (session->append_all == TRUE ||
449                         info->ecall != info_last->ecall) {
450                 connman_dbus_dict_append_basic(dict, "EmergencyCall",
451                                                 DBUS_TYPE_BOOLEAN,
452                                                 &info->ecall);
453                 info_last->ecall = info->ecall;
454         }
455
456         if (session->append_all == TRUE ||
457                         info->roaming_policy != info_last->roaming_policy) {
458                 policy = roamingpolicy2string(info->roaming_policy);
459                 connman_dbus_dict_append_basic(dict, "RoamingPolicy",
460                                                 DBUS_TYPE_STRING,
461                                                 &policy);
462                 info_last->roaming_policy = info->roaming_policy;
463         }
464
465         if (session->append_all == TRUE ||
466                         info->marker != info_last->marker) {
467                 connman_dbus_dict_append_basic(dict, "SessionMarker",
468                                                 DBUS_TYPE_UINT32,
469                                                 &info->marker);
470                 info_last->marker = info->marker;
471         }
472
473         session->append_all = FALSE;
474         session->info_dirty = FALSE;
475 }
476
477 static gboolean session_notify(gpointer user_data)
478 {
479         struct connman_session *session = user_data;
480         DBusMessage *msg;
481         DBusMessageIter array, dict;
482
483         if (session->info_dirty == FALSE)
484                 return 0;
485
486         DBG("session %p owner %s notify_path %s", session,
487                 session->owner, session->notify_path);
488
489         msg = dbus_message_new_method_call(session->owner, session->notify_path,
490                                                 CONNMAN_NOTIFICATION_INTERFACE,
491                                                 "Update");
492         if (msg == NULL)
493                 return FALSE;
494
495         dbus_message_iter_init_append(msg, &array);
496         connman_dbus_dict_open(&array, &dict);
497
498         append_notify(&dict, session);
499
500         connman_dbus_dict_close(&array, &dict);
501
502         g_dbus_send_message(connection, msg);
503
504         session->info_dirty = FALSE;
505
506         return FALSE;
507 }
508
509 static void ipconfig_ipv4_changed(struct connman_session *session)
510 {
511         struct session_info *info = session->info;
512
513         connman_dbus_setting_changed_dict(session->owner, session->notify_path,
514                                                 "IPv4", append_ipconfig_ipv4,
515                                                 info->entry->service);
516 }
517
518 static void ipconfig_ipv6_changed(struct connman_session *session)
519 {
520         struct session_info *info = session->info;
521
522         connman_dbus_setting_changed_dict(session->owner, session->notify_path,
523                                                 "IPv6", append_ipconfig_ipv6,
524                                                 info->entry->service);
525 }
526
527 static connman_bool_t service_type_match(struct connman_session *session,
528                                         struct connman_service *service)
529 {
530         struct session_info *info = session->info;
531         GSList *list;
532
533         for (list = info->allowed_bearers;
534                         list != NULL; list = list->next) {
535                 struct bearer_info *info = list->data;
536                 enum connman_service_type service_type;
537
538                 if (info->match_all == TRUE)
539                         return TRUE;
540
541                 service_type = connman_service_get_type(service);
542                 if (info->service_type == service_type)
543                         return TRUE;
544         }
545
546         return FALSE;
547 }
548
549 static connman_bool_t service_match(struct connman_session *session,
550                                         struct connman_service *service)
551 {
552         if (service_type_match(session, service) == FALSE)
553                 return FALSE;
554
555         return TRUE;
556 }
557
558 static int service_type_weight(enum connman_service_type type)
559 {
560         /*
561          * The session doesn't care which service
562          * to use. Nevertheless we have to sort them
563          * according their type. The ordering is
564          *
565          * 1. Ethernet
566          * 2. Bluetooth
567          * 3. WiFi/WiMAX
568          * 4. GSM/UTMS/3G
569          */
570
571         switch (type) {
572         case CONNMAN_SERVICE_TYPE_ETHERNET:
573                 return 4;
574         case CONNMAN_SERVICE_TYPE_BLUETOOTH:
575                 return 3;
576         case CONNMAN_SERVICE_TYPE_WIFI:
577         case CONNMAN_SERVICE_TYPE_WIMAX:
578                 return 2;
579         case CONNMAN_SERVICE_TYPE_CELLULAR:
580                 return 1;
581         case CONNMAN_SERVICE_TYPE_UNKNOWN:
582         case CONNMAN_SERVICE_TYPE_SYSTEM:
583         case CONNMAN_SERVICE_TYPE_GPS:
584         case CONNMAN_SERVICE_TYPE_VPN:
585         case CONNMAN_SERVICE_TYPE_GADGET:
586                 break;
587         }
588
589         return 0;
590 }
591
592 static gint sort_allowed_bearers(struct connman_service *service_a,
593                                         struct connman_service *service_b,
594                                         struct connman_session *session)
595 {
596         struct session_info *info = session->info;
597         GSList *list;
598         enum connman_service_type type_a, type_b;
599         int weight_a, weight_b;
600
601         type_a = connman_service_get_type(service_a);
602         type_b = connman_service_get_type(service_b);
603
604         for (list = info->allowed_bearers;
605                         list != NULL; list = list->next) {
606                 struct bearer_info *info = list->data;
607
608                 if (info->match_all == TRUE) {
609                         if (type_a != type_b) {
610                                 weight_a = service_type_weight(type_a);
611                                 weight_b = service_type_weight(type_b);
612
613                                 if (weight_a > weight_b)
614                                         return -1;
615
616                                 if (weight_a < weight_b)
617                                         return 1;
618
619                                 return 0;
620                         }
621                 }
622
623                 if (type_a == info->service_type &&
624                                 type_b == info->service_type) {
625                         return 0;
626                 }
627
628                 if (type_a == info->service_type &&
629                                 type_b != info->service_type) {
630                         return -1;
631                 }
632
633                 if (type_a != info->service_type &&
634                                 type_b == info->service_type) {
635                         return 1;
636                 }
637         }
638
639         return 0;
640 }
641
642 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
643 {
644         struct service_entry *entry_a = (void *)a;
645         struct service_entry *entry_b = (void *)b;
646         struct connman_session *session = user_data;
647
648         return sort_allowed_bearers(entry_a->service, entry_b->service,
649                                 session);
650 }
651
652 static void cleanup_session(gpointer user_data)
653 {
654         struct connman_session *session = user_data;
655         struct session_info *info = session->info;
656
657         DBG("remove %s", session->session_path);
658
659         g_hash_table_destroy(session->service_hash);
660         g_sequence_free(session->service_list);
661
662         if (info->entry != NULL &&
663                         info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
664                 __connman_service_disconnect(info->entry->service);
665         }
666
667         g_slist_foreach(info->allowed_bearers, cleanup_bearer_info, NULL);
668         g_slist_free(info->allowed_bearers);
669
670         g_free(session->owner);
671         g_free(session->session_path);
672         g_free(session->notify_path);
673         g_free(session->info);
674         g_free(session->info_last);
675
676         g_free(session);
677 }
678
679 static connman_bool_t is_online(enum connman_service_state state)
680 {
681         switch (state) {
682         case CONNMAN_SERVICE_STATE_UNKNOWN:
683         case CONNMAN_SERVICE_STATE_IDLE:
684         case CONNMAN_SERVICE_STATE_ASSOCIATION:
685         case CONNMAN_SERVICE_STATE_CONFIGURATION:
686         case CONNMAN_SERVICE_STATE_DISCONNECT:
687         case CONNMAN_SERVICE_STATE_FAILURE:
688         case CONNMAN_SERVICE_STATE_READY:
689                 break;
690         case CONNMAN_SERVICE_STATE_ONLINE:
691                 return TRUE;
692         }
693
694         return FALSE;
695 }
696
697 static connman_bool_t is_connecting(enum connman_service_state state)
698 {
699         switch (state) {
700         case CONNMAN_SERVICE_STATE_UNKNOWN:
701         case CONNMAN_SERVICE_STATE_IDLE:
702                 break;
703         case CONNMAN_SERVICE_STATE_ASSOCIATION:
704         case CONNMAN_SERVICE_STATE_CONFIGURATION:
705         case CONNMAN_SERVICE_STATE_READY:
706                 return TRUE;
707         case CONNMAN_SERVICE_STATE_DISCONNECT:
708         case CONNMAN_SERVICE_STATE_FAILURE:
709         case CONNMAN_SERVICE_STATE_ONLINE:
710                 break;
711         }
712
713         return FALSE;
714 }
715
716 static connman_bool_t explicit_connect(enum connman_session_reason reason)
717 {
718         switch (reason) {
719         case CONNMAN_SESSION_REASON_UNKNOWN:
720         case CONNMAN_SESSION_REASON_FREE_RIDE:
721                 break;
722         case CONNMAN_SESSION_REASON_CONNECT:
723         case CONNMAN_SESSION_REASON_PERIODIC:
724                 return TRUE;
725         }
726
727         return FALSE;
728 }
729
730 static connman_bool_t explicit_disconnect(struct session_info *info)
731 {
732         if (info->entry == NULL)
733                 return FALSE;
734
735         DBG("reason %s service %p state %d",
736                 reason2string(info->entry->reason),
737                 info->entry->service, info->entry->state);
738
739         if (info->entry->reason == CONNMAN_SESSION_REASON_UNKNOWN)
740                 return FALSE;
741
742         if (explicit_connect(info->entry->reason) == FALSE)
743                 return FALSE;
744
745         if (__connman_service_session_dec(info->entry->service) == FALSE)
746                 return FALSE;
747
748         if (ecall_info != NULL && ecall_info != info)
749                 return FALSE;
750
751         return TRUE;
752 }
753
754 static gboolean call_disconnect(gpointer user_data)
755 {
756         struct connman_service *service = user_data;
757
758         /*
759          * TODO: We should mark this entry as pending work. In case
760          * disconnect fails we just unassign this session from the
761          * service and can't do anything later on it
762          */
763         DBG("disconnect service %p", service);
764         __connman_service_disconnect(service);
765
766         return FALSE;
767 }
768
769 static gboolean call_connect(gpointer user_data)
770 {
771         struct connman_service *service = user_data;
772
773         DBG("connect service %p", service);
774         __connman_service_connect(service);
775
776         return FALSE;
777 }
778
779 static void deselect_service(struct session_info *info)
780 {
781         struct connman_service *service;
782         connman_bool_t disconnect, online;
783
784         if (info->entry == NULL)
785                 return;
786
787         disconnect = explicit_disconnect(info);
788
789         online = is_connecting(info->entry->state) == TRUE ||
790                         is_online(info->entry->state) == TRUE;
791
792         info->online = FALSE;
793         info->reason = CONNMAN_SESSION_REASON_UNKNOWN;
794         info->entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
795
796         service = info->entry->service;
797         info->entry = NULL;
798
799         if (disconnect == TRUE && online == TRUE)
800                 g_timeout_add_seconds(0, call_disconnect, service);
801 }
802
803 static void deselect_and_disconnect(struct connman_session *session)
804 {
805         struct session_info *info = session->info;
806
807         deselect_service(info);
808 }
809
810 static void select_online_service(struct session_info *info,
811                                         struct service_entry *entry)
812 {
813         info->online = TRUE;
814
815         info->entry = entry;
816         info->entry->reason = info->reason;
817
818         if (explicit_connect(info->reason) == FALSE)
819                 return;
820
821         __connman_service_session_inc(info->entry->service);
822 }
823
824 static void select_offline_service(struct session_info *info,
825                                         struct service_entry *entry)
826 {
827         if (explicit_connect(info->reason) == FALSE) {
828                 /* Don't select this service. It is not online and we
829                  * don't call connect on it. This happends for example
830                  * when the system is idle and we create a new session
831                  * which is in free ride mode.
832                  */
833                 deselect_service(info);
834                 return;
835         }
836
837         info->online = FALSE;
838
839         info->entry = entry;
840         info->entry->reason = info->reason;
841
842         __connman_service_session_inc(info->entry->service);
843         g_timeout_add_seconds(0, call_connect, info->entry->service);
844 }
845
846 static void select_service(struct session_info *info,
847                                 struct service_entry *entry)
848 {
849         DBG("service %p", entry->service);
850
851         if (is_online(entry->state) == TRUE)
852                 select_online_service(info, entry);
853         else
854                 select_offline_service(info, entry);
855 }
856
857 static void select_and_connect(struct connman_session *session,
858                                 enum connman_session_reason reason)
859 {
860         struct session_info *info = session->info;
861         struct service_entry *entry = NULL;
862         GSequenceIter *iter;
863
864         DBG("session %p reason %s", session, reason2string(reason));
865
866         info->reason = reason;
867
868         iter = g_sequence_get_begin_iter(session->service_list);
869
870         while (g_sequence_iter_is_end(iter) == FALSE) {
871                 entry = g_sequence_get(iter);
872
873                 switch (entry->state) {
874                 case CONNMAN_SERVICE_STATE_ASSOCIATION:
875                 case CONNMAN_SERVICE_STATE_CONFIGURATION:
876                 case CONNMAN_SERVICE_STATE_READY:
877                 case CONNMAN_SERVICE_STATE_ONLINE:
878                 case CONNMAN_SERVICE_STATE_IDLE:
879                 case CONNMAN_SERVICE_STATE_DISCONNECT:
880                         select_service(info, entry);
881                         return;
882                 case CONNMAN_SERVICE_STATE_UNKNOWN:
883                 case CONNMAN_SERVICE_STATE_FAILURE:
884                         break;
885                 }
886
887                 iter = g_sequence_iter_next(iter);
888         }
889 }
890
891 static void session_changed(struct connman_session *session,
892                                 enum connman_session_trigger trigger)
893 {
894         struct session_info *info = session->info;
895         struct session_info *info_last = session->info_last;
896         GSequenceIter *iter;
897
898         /*
899          * TODO: This only a placeholder for the 'real' algorithm to
900          * play a bit around. So we are going to improve it step by step.
901          */
902
903         DBG("session %p trigger %s", session, trigger2string(trigger));
904
905         switch (trigger) {
906         case CONNMAN_SESSION_TRIGGER_UNKNOWN:
907                 DBG("ignore session changed event");
908                 return;
909         case CONNMAN_SESSION_TRIGGER_SETTING:
910                 if (info->entry != NULL) {
911                         iter = g_hash_table_lookup(session->service_hash,
912                                                         info->entry->service);
913                         if (iter == NULL) {
914                                 /*
915                                  * This service is not part of this
916                                  * session anymore.
917                                  */
918                                 deselect_and_disconnect(session);
919                         }
920                 }
921
922                 if (info->online == FALSE) {
923                         select_and_connect(session,
924                                         CONNMAN_SESSION_REASON_FREE_RIDE);
925                 }
926
927                 break;
928         case CONNMAN_SESSION_TRIGGER_CONNECT:
929                 if (info->online == TRUE) {
930                         if (info->entry->reason == CONNMAN_SESSION_REASON_CONNECT)
931                                 break;
932                         info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
933                         __connman_service_session_inc(info->entry->service);
934                         break;
935                 }
936
937                 select_and_connect(session,
938                                 CONNMAN_SESSION_REASON_CONNECT);
939
940                 break;
941         case CONNMAN_SESSION_TRIGGER_DISCONNECT:
942                 deselect_and_disconnect(session);
943
944                 break;
945         case CONNMAN_SESSION_TRIGGER_PERIODIC:
946                 if (info->online == TRUE) {
947                         info->entry->reason = CONNMAN_SESSION_REASON_PERIODIC;
948                         __connman_service_session_inc(info->entry->service);
949                         break;
950                 }
951
952                 select_and_connect(session,
953                                 CONNMAN_SESSION_REASON_PERIODIC);
954
955                 break;
956         case CONNMAN_SESSION_TRIGGER_SERVICE:
957                 if (info->entry != NULL &&
958                                 (is_connecting(info->entry->state) == TRUE ||
959                                         is_online(info->entry->state) == TRUE)) {
960                         break;
961                 }
962
963                 switch (info->reason) {
964                 case CONNMAN_SESSION_REASON_CONNECT:
965                         /*
966                          * We are not online, we are not connecting, that
967                          * means we could still have a valid info->entry.
968                          * Though something has changed from the service layer.
969                          * Therefore we want to restart the algorithm. Before we
970                          * can do that we have to cleanup a potientional old entry.
971                          */
972                         deselect_and_disconnect(session);
973                         info->reason = CONNMAN_SESSION_REASON_CONNECT; /* restore value */
974
975                         DBG("Retry to find a matching session");
976                         /*
977                          * The user called Connect() but there was no
978                          * matching session available at this point.
979                          * Now there might be a new one. Let's retry
980                          * to select and connect
981                          */
982                         select_and_connect(session,
983                                         CONNMAN_SESSION_REASON_CONNECT);
984                         break;
985                 case CONNMAN_SESSION_REASON_PERIODIC:
986                 case CONNMAN_SESSION_REASON_FREE_RIDE:
987                         if (info->stay_connected == TRUE) {
988                                 DBG("StayConnected");
989                                 select_and_connect(session,
990                                         CONNMAN_SESSION_REASON_CONNECT);
991                         } else {
992                                 select_and_connect(session,
993                                         CONNMAN_SESSION_REASON_FREE_RIDE);
994                         }
995                         break;
996                 case CONNMAN_SESSION_REASON_UNKNOWN:
997                         break;
998                 }
999                 break;
1000         case CONNMAN_SESSION_TRIGGER_ECALL:
1001                 if (info->online == FALSE && info->entry != NULL &&
1002                                 info->entry->service != NULL) {
1003                         deselect_and_disconnect(session);
1004                 }
1005
1006                 break;
1007         }
1008
1009         if (info->entry != info_last->entry)
1010                 session->info_dirty = TRUE;
1011
1012         session_notify(session);
1013 }
1014
1015 static DBusMessage *connect_session(DBusConnection *conn,
1016                                         DBusMessage *msg, void *user_data)
1017 {
1018         struct connman_session *session = user_data;
1019         struct session_info *info = session->info;
1020
1021         DBG("session %p", session);
1022
1023         if (ecall_info != NULL && ecall_info != info)
1024                 return __connman_error_failed(msg, EBUSY);
1025
1026         session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
1027
1028         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1029 }
1030
1031 static DBusMessage *disconnect_session(DBusConnection *conn,
1032                                         DBusMessage *msg, void *user_data)
1033 {
1034         struct connman_session *session = user_data;
1035         struct session_info *info = session->info;
1036
1037         DBG("session %p", session);
1038
1039         if (ecall_info != NULL && ecall_info != info)
1040                 return __connman_error_failed(msg, EBUSY);
1041
1042         session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
1043
1044         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1045 }
1046
1047 static struct service_entry *create_service_entry(struct connman_service *service,
1048                                         const char *name,
1049                                         enum connman_service_state state)
1050 {
1051         struct service_entry *entry;
1052         enum connman_service_type type;
1053         int idx;
1054
1055         entry = g_try_new0(struct service_entry, 1);
1056         if (entry == NULL)
1057                 return entry;
1058
1059         entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
1060         entry->state = state;
1061         if (name != NULL)
1062                 entry->name = name;
1063         else
1064                 entry->name = "";
1065         entry->service = service;
1066
1067         idx = __connman_service_get_index(entry->service);
1068         entry->ifname = connman_inet_ifname(idx);
1069         if (entry->ifname == NULL)
1070                 entry->ifname = g_strdup("");
1071
1072         type = connman_service_get_type(entry->service);
1073         entry->bearer = service2bearer(type);
1074
1075         return entry;
1076 }
1077
1078 static void destroy_service_entry(gpointer data)
1079 {
1080         struct service_entry *entry = data;
1081
1082         g_free(entry->ifname);
1083
1084         g_free(entry);
1085 }
1086
1087 static void update_allowed_bearers(struct connman_session *session)
1088 {
1089         struct service_entry *entry;
1090         GSequenceIter *iter;
1091
1092         if (session->service_list != NULL) {
1093                 g_hash_table_remove_all(session->service_hash);
1094                 g_sequence_free(session->service_list);
1095         }
1096
1097         session->service_list = __connman_service_get_list(session,
1098                                                         service_match,
1099                                                         create_service_entry,
1100                                                         destroy_service_entry);
1101
1102         g_sequence_sort(session->service_list, sort_services, session);
1103
1104         iter = g_sequence_get_begin_iter(session->service_list);
1105
1106         while (g_sequence_iter_is_end(iter) == FALSE) {
1107                 entry = g_sequence_get(iter);
1108
1109                 DBG("service %p type %s name %s", entry->service,
1110                         service2bearer(connman_service_get_type(entry->service)),
1111                         entry->name);
1112
1113                 g_hash_table_replace(session->service_hash,
1114                                         entry->service, iter);
1115
1116                 iter = g_sequence_iter_next(iter);
1117         }
1118
1119         session->info_dirty = TRUE;
1120 }
1121
1122 static void update_ecall_sessions(struct connman_session *session)
1123 {
1124         struct session_info *info = session->info;
1125         struct connman_session *session_iter;
1126         GHashTableIter iter;
1127         gpointer key, value;
1128
1129         g_hash_table_iter_init(&iter, session_hash);
1130
1131         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1132                 session_iter = value;
1133
1134                 if (session_iter == session)
1135                         continue;
1136
1137                 session_iter->info->ecall = info->ecall;
1138                 session_iter->info_dirty = TRUE;
1139
1140                 session_changed(session_iter, CONNMAN_SESSION_TRIGGER_ECALL);
1141         }
1142 }
1143
1144 static void update_ecall(struct connman_session *session)
1145 {
1146         struct session_info *info = session->info;
1147         struct session_info *info_last = session->info_last;
1148
1149         DBG("session %p ecall_info %p ecall %d -> %d", session,
1150                 ecall_info, info_last->ecall, info->ecall);
1151
1152         if (ecall_info == NULL) {
1153                 if (!(info_last->ecall == FALSE && info->ecall == TRUE))
1154                         goto err;
1155
1156                 ecall_info = info;
1157         } else if (ecall_info == info) {
1158                 if (!(info_last->ecall == TRUE && info->ecall == FALSE))
1159                         goto err;
1160
1161                 ecall_info = NULL;
1162         } else {
1163                 goto err;
1164         }
1165
1166         update_ecall_sessions(session);
1167
1168         session->info_dirty = TRUE;
1169         return;
1170
1171 err:
1172         /* not a valid transition */
1173         info->ecall = info_last->ecall;
1174 }
1175
1176 static DBusMessage *change_session(DBusConnection *conn,
1177                                         DBusMessage *msg, void *user_data)
1178 {
1179         struct connman_session *session = user_data;
1180         struct session_info *info = session->info;
1181         struct session_info *info_last = session->info_last;
1182         DBusMessageIter iter, value;
1183         const char *name;
1184         GSList *allowed_bearers;
1185
1186         DBG("session %p", session);
1187         if (dbus_message_iter_init(msg, &iter) == FALSE)
1188                 return __connman_error_invalid_arguments(msg);
1189
1190         dbus_message_iter_get_basic(&iter, &name);
1191         dbus_message_iter_next(&iter);
1192         dbus_message_iter_recurse(&iter, &value);
1193
1194         switch (dbus_message_iter_get_arg_type(&value)) {
1195         case DBUS_TYPE_ARRAY:
1196                 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1197                         allowed_bearers = session_parse_allowed_bearers(&value);
1198
1199                         g_slist_foreach(info->allowed_bearers,
1200                                         cleanup_bearer_info, NULL);
1201                         g_slist_free(info->allowed_bearers);
1202
1203                         if (allowed_bearers == NULL) {
1204                                 allowed_bearers = session_allowed_bearers_any();
1205
1206                                 if (allowed_bearers == NULL)
1207                                         return __connman_error_failed(msg, ENOMEM);
1208                         }
1209
1210                         info->allowed_bearers = allowed_bearers;
1211
1212                         update_allowed_bearers(session);
1213                 } else {
1214                         goto err;
1215                 }
1216                 break;
1217         case DBUS_TYPE_BOOLEAN:
1218                 if (g_str_equal(name, "Priority") == TRUE) {
1219                         dbus_message_iter_get_basic(&value,
1220                                         &info->priority);
1221
1222                         if (info_last->priority != info->priority)
1223                                 session->info_dirty = TRUE;
1224                 } else if (g_str_equal(name, "AvoidHandover") == TRUE) {
1225                         dbus_message_iter_get_basic(&value,
1226                                         &info->avoid_handover);
1227
1228                         if (info_last->avoid_handover != info->avoid_handover)
1229                                 session->info_dirty = TRUE;
1230                 } else if (g_str_equal(name, "StayConnected") == TRUE) {
1231                         dbus_message_iter_get_basic(&value,
1232                                         &info->stay_connected);
1233
1234                         if (info_last->stay_connected != info->stay_connected)
1235                                 session->info_dirty = TRUE;
1236                 } else if (g_str_equal(name, "EmergencyCall") == TRUE) {
1237                         dbus_message_iter_get_basic(&value,
1238                                         &info->ecall);
1239
1240                         update_ecall(session);
1241                 } else {
1242                         goto err;
1243                 }
1244                 break;
1245         case DBUS_TYPE_UINT32:
1246                 if (g_str_equal(name, "PeriodicConnect") == TRUE) {
1247                         dbus_message_iter_get_basic(&value,
1248                                         &info->periodic_connect);
1249
1250                         if (info_last->periodic_connect != info->periodic_connect)
1251                                 session->info_dirty = TRUE;
1252                 } else if (g_str_equal(name, "IdleTimeout") == TRUE) {
1253                         dbus_message_iter_get_basic(&value,
1254                                         &info->idle_timeout);
1255
1256                         if (info_last->idle_timeout != info->idle_timeout)
1257                                 session->info_dirty = TRUE;
1258                 } else {
1259                         goto err;
1260                 }
1261                 break;
1262         case DBUS_TYPE_STRING:
1263                 if (g_str_equal(name, "RoamingPolicy") == TRUE) {
1264                         const char *val;
1265                         dbus_message_iter_get_basic(&value, &val);
1266                         info->roaming_policy =
1267                                         string2roamingpolicy(val);
1268
1269                         if (info_last->roaming_policy != info->roaming_policy)
1270                                 session->info_dirty = TRUE;
1271                 } else {
1272                         goto err;
1273                 }
1274                 break;
1275         default:
1276                 goto err;
1277         }
1278
1279         if (session->info_dirty == TRUE)
1280                 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1281
1282         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1283
1284 err:
1285         return __connman_error_invalid_arguments(msg);
1286 }
1287
1288 static void release_session(gpointer key, gpointer value, gpointer user_data)
1289 {
1290         struct connman_session *session = value;
1291         DBusMessage *message;
1292
1293         DBG("owner %s path %s", session->owner, session->notify_path);
1294
1295         if (session->notify_watch > 0)
1296                 g_dbus_remove_watch(connection, session->notify_watch);
1297
1298         g_dbus_unregister_interface(connection, session->session_path,
1299                                                 CONNMAN_SESSION_INTERFACE);
1300
1301         message = dbus_message_new_method_call(session->owner,
1302                                                 session->notify_path,
1303                                                 CONNMAN_NOTIFICATION_INTERFACE,
1304                                                 "Release");
1305         if (message == NULL)
1306                 return;
1307
1308         dbus_message_set_no_reply(message, TRUE);
1309
1310         g_dbus_send_message(connection, message);
1311 }
1312
1313 static int session_disconnect(struct connman_session *session)
1314 {
1315         DBG("session %p, %s", session, session->owner);
1316
1317         if (session->notify_watch > 0)
1318                 g_dbus_remove_watch(connection, session->notify_watch);
1319
1320         g_dbus_unregister_interface(connection, session->session_path,
1321                                                 CONNMAN_SESSION_INTERFACE);
1322
1323         deselect_and_disconnect(session);
1324
1325         g_hash_table_remove(session_hash, session->session_path);
1326
1327         return 0;
1328 }
1329
1330 static void owner_disconnect(DBusConnection *conn, void *user_data)
1331 {
1332         struct connman_session *session = user_data;
1333
1334         DBG("session %p, %s died", session, session->owner);
1335
1336         session_disconnect(session);
1337 }
1338
1339 static DBusMessage *destroy_session(DBusConnection *conn,
1340                                         DBusMessage *msg, void *user_data)
1341 {
1342         struct connman_session *session = user_data;
1343
1344         DBG("session %p", session);
1345
1346         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1347 }
1348
1349 static GDBusMethodTable session_methods[] = {
1350         { "Destroy",    "",   "", destroy_session    },
1351         { "Connect",    "",   "", connect_session    },
1352         { "Disconnect", "",   "", disconnect_session },
1353         { "Change",     "sv", "", change_session     },
1354         { },
1355 };
1356
1357 int __connman_session_create(DBusMessage *msg)
1358 {
1359         const char *owner, *notify_path;
1360         char *session_path = NULL;
1361         DBusMessageIter iter, array;
1362         struct connman_session *session = NULL;
1363         struct session_info *info, *info_last;
1364
1365         connman_bool_t priority = FALSE, avoid_handover = FALSE;
1366         connman_bool_t stay_connected = FALSE, ecall = FALSE;
1367         enum connman_session_roaming_policy roaming_policy =
1368                                 CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
1369         GSList *allowed_bearers = NULL;
1370         unsigned int periodic_connect = 0;
1371         unsigned int idle_timeout = 0;
1372
1373         int err;
1374
1375         owner = dbus_message_get_sender(msg);
1376
1377         DBG("owner %s", owner);
1378
1379         if (ecall_info != NULL) {
1380                 /*
1381                  * If there is an emergency call already going on,
1382                  * ignore session creation attempt
1383                  */
1384                 err = -EBUSY;
1385                 goto err;
1386         }
1387
1388         dbus_message_iter_init(msg, &iter);
1389         dbus_message_iter_recurse(&iter, &array);
1390
1391         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1392                 DBusMessageIter entry, value;
1393                 const char *key, *val;
1394
1395                 dbus_message_iter_recurse(&array, &entry);
1396                 dbus_message_iter_get_basic(&entry, &key);
1397
1398                 dbus_message_iter_next(&entry);
1399                 dbus_message_iter_recurse(&entry, &value);
1400
1401                 switch (dbus_message_iter_get_arg_type(&value)) {
1402                 case DBUS_TYPE_ARRAY:
1403                         if (g_str_equal(key, "AllowedBearers") == TRUE) {
1404                                 allowed_bearers =
1405                                         session_parse_allowed_bearers(&value);
1406                         } else {
1407                                 return -EINVAL;
1408                         }
1409                         break;
1410                 case DBUS_TYPE_BOOLEAN:
1411                         if (g_str_equal(key, "Priority") == TRUE) {
1412                                 dbus_message_iter_get_basic(&value,
1413                                                         &priority);
1414                         } else if (g_str_equal(key, "AvoidHandover") == TRUE) {
1415                                 dbus_message_iter_get_basic(&value,
1416                                                         &avoid_handover);
1417                         } else if (g_str_equal(key, "StayConnected") == TRUE) {
1418                                 dbus_message_iter_get_basic(&value,
1419                                                         &stay_connected);
1420                         } else if (g_str_equal(key, "EmergencyCall") == TRUE) {
1421                                 dbus_message_iter_get_basic(&value,
1422                                                         &ecall);
1423                         } else {
1424                                 return -EINVAL;
1425                         }
1426                         break;
1427                 case DBUS_TYPE_UINT32:
1428                         if (g_str_equal(key, "PeriodicConnect") == TRUE) {
1429                                 dbus_message_iter_get_basic(&value,
1430                                                         &periodic_connect);
1431                         } else if (g_str_equal(key, "IdleTimeout") == TRUE) {
1432                                 dbus_message_iter_get_basic(&value,
1433                                                         &idle_timeout);
1434                         } else {
1435                                 return -EINVAL;
1436                         }
1437                         break;
1438                 case DBUS_TYPE_STRING:
1439                         if (g_str_equal(key, "RoamingPolicy") == TRUE) {
1440                                 dbus_message_iter_get_basic(&value, &val);
1441                                 roaming_policy = string2roamingpolicy(val);
1442                         } else {
1443                                 return -EINVAL;
1444                         }
1445                 }
1446                 dbus_message_iter_next(&array);
1447         }
1448
1449         dbus_message_iter_next(&iter);
1450         dbus_message_iter_get_basic(&iter, &notify_path);
1451
1452         if (notify_path == NULL) {
1453                 err = -EINVAL;
1454                 goto err;
1455         }
1456
1457         session_path = g_strdup_printf("/sessions%s", notify_path);
1458         if (session_path == NULL) {
1459                 err = -ENOMEM;
1460                 goto err;
1461         }
1462
1463         session = g_hash_table_lookup(session_hash, session_path);
1464         if (session != NULL) {
1465                 session = NULL;
1466                 err = -EEXIST;
1467                 goto err;
1468         }
1469
1470         session = g_try_new0(struct connman_session, 1);
1471         if (session == NULL) {
1472                 err = -ENOMEM;
1473                 goto err;
1474         }
1475
1476         session->info = g_try_new0(struct session_info, 1);
1477         if (session->info == NULL) {
1478                 err = -ENOMEM;
1479                 goto err;
1480         }
1481
1482         session->info_last = g_try_new0(struct session_info, 1);
1483         if (session->info_last == NULL) {
1484                 err = -ENOMEM;
1485                 goto err;
1486         }
1487
1488         info = session->info;
1489         info_last = session->info_last;
1490
1491         session->owner = g_strdup(owner);
1492         session->session_path = session_path;
1493         session->notify_path = g_strdup(notify_path);
1494         session->notify_watch =
1495                 g_dbus_add_disconnect_watch(connection, session->owner,
1496                                         owner_disconnect, session, NULL);
1497
1498         session->service_hash = g_hash_table_new_full(g_direct_hash, g_direct_equal,
1499                                                 NULL, NULL);
1500
1501         info->online = FALSE;
1502         info->priority = priority;
1503         info->avoid_handover = avoid_handover;
1504         info->stay_connected = stay_connected;
1505         info->periodic_connect = periodic_connect;
1506         info->idle_timeout = idle_timeout;
1507         info->ecall = ecall;
1508         info->roaming_policy = roaming_policy;
1509         info->entry = NULL;
1510         info->marker = 0;
1511
1512         if (allowed_bearers == NULL) {
1513                 info->allowed_bearers =
1514                                 session_allowed_bearers_any();
1515
1516                 if (info->allowed_bearers == NULL) {
1517                         err = -ENOMEM;
1518                         goto err;
1519                 }
1520         } else {
1521                 info->allowed_bearers = allowed_bearers;
1522         }
1523
1524         g_hash_table_replace(session_hash, session->session_path, session);
1525
1526         DBG("add %s", session->session_path);
1527
1528         if (g_dbus_register_interface(connection, session->session_path,
1529                                         CONNMAN_SESSION_INTERFACE,
1530                                         session_methods, NULL,
1531                                         NULL, session, NULL) == FALSE) {
1532                 connman_error("Failed to register %s", session->session_path);
1533                 g_hash_table_remove(session_hash, session->session_path);
1534                 session = NULL;
1535
1536                 err = -EINVAL;
1537                 goto err;
1538         }
1539
1540         g_dbus_send_reply(connection, msg,
1541                                 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1542                                 DBUS_TYPE_INVALID);
1543
1544
1545         update_allowed_bearers(session);
1546         if (info->ecall == TRUE) {
1547                 ecall_info = info;
1548                 update_ecall_sessions(session);
1549         }
1550
1551         info_last->online = info->online;
1552         info_last->priority = info->priority;
1553         info_last->avoid_handover = info->avoid_handover;
1554         info_last->stay_connected = info->stay_connected;
1555         info_last->periodic_connect = info->periodic_connect;
1556         info_last->idle_timeout = info->idle_timeout;
1557         info_last->ecall = info->ecall;
1558         info_last->roaming_policy = info->roaming_policy;
1559         info_last->entry = info->entry;
1560         info_last->marker = info->marker;
1561         info_last->allowed_bearers = info->allowed_bearers;
1562
1563         session->info_dirty = TRUE;
1564         session->append_all = TRUE;
1565
1566         session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1567
1568         return 0;
1569
1570 err:
1571         connman_error("Failed to create session");
1572
1573         if (session != NULL) {
1574                 if (session->info_last != NULL)
1575                         g_free(session->info_last);
1576                 if (session->info != NULL)
1577                         g_free(session->info);
1578                 g_free(session);
1579         }
1580
1581         g_free(session_path);
1582
1583         g_slist_foreach(allowed_bearers, cleanup_bearer_info, NULL);
1584         g_slist_free(allowed_bearers);
1585
1586         return err;
1587 }
1588
1589 int __connman_session_destroy(DBusMessage *msg)
1590 {
1591         const char *owner, *session_path;
1592         struct connman_session *session;
1593
1594         owner = dbus_message_get_sender(msg);
1595
1596         DBG("owner %s", owner);
1597
1598         dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1599                                                         DBUS_TYPE_INVALID);
1600         if (session_path == NULL)
1601                 return -EINVAL;
1602
1603         session = g_hash_table_lookup(session_hash, session_path);
1604         if (session == NULL)
1605                 return -EINVAL;
1606
1607         if (g_strcmp0(owner, session->owner) != 0)
1608                 return -EACCES;
1609
1610         session_disconnect(session);
1611
1612         return 0;
1613 }
1614
1615 connman_bool_t __connman_session_mode()
1616 {
1617         return sessionmode;
1618 }
1619
1620 void __connman_session_set_mode(connman_bool_t enable)
1621 {
1622         DBG("enable %d", enable);
1623
1624         sessionmode = enable;
1625
1626         if (sessionmode == TRUE)
1627                 __connman_service_disconnect_all();
1628 }
1629
1630 static void service_add(struct connman_service *service,
1631                         const char *name)
1632 {
1633         GHashTableIter iter;
1634         GSequenceIter *iter_service_list;
1635         gpointer key, value;
1636         struct connman_session *session;
1637         struct service_entry *entry;
1638
1639         DBG("service %p", service);
1640
1641         g_hash_table_iter_init(&iter, session_hash);
1642
1643         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1644                 session = value;
1645
1646                 if (service_match(session, service) == FALSE)
1647                         continue;
1648
1649                 entry = create_service_entry(service, name,
1650                                                 CONNMAN_SERVICE_STATE_IDLE);
1651                 if (entry == NULL)
1652                         continue;
1653
1654                 iter_service_list =
1655                         g_sequence_insert_sorted(session->service_list,
1656                                                         entry, sort_services,
1657                                                         session);
1658
1659                 g_hash_table_replace(session->service_hash, service,
1660                                         iter_service_list);
1661
1662                 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1663         }
1664 }
1665
1666 static void service_remove(struct connman_service *service)
1667 {
1668
1669         GHashTableIter iter;
1670         gpointer key, value;
1671         struct connman_session *session;
1672         struct session_info *info;
1673
1674         DBG("service %p", service);
1675
1676         g_hash_table_iter_init(&iter, session_hash);
1677
1678         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1679                 GSequenceIter *iter;
1680                 session = value;
1681                 info = session->info;
1682
1683                 iter = g_hash_table_lookup(session->service_hash, service);
1684                 if (iter == NULL)
1685                         continue;
1686
1687                 g_sequence_remove(iter);
1688
1689                 if (info->entry != NULL && info->entry->service == service)
1690                         info->entry = NULL;
1691                 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1692         }
1693 }
1694
1695 static void service_state_changed(struct connman_service *service,
1696                                         enum connman_service_state state)
1697 {
1698         GHashTableIter iter;
1699         gpointer key, value;
1700         struct connman_session *session;
1701         struct session_info *info, *info_last;
1702
1703         DBG("service %p state %d", service, state);
1704
1705         g_hash_table_iter_init(&iter, session_hash);
1706
1707         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1708                 GSequenceIter *service_iter;
1709
1710                 session = value;
1711                 info = session->info;
1712                 info_last = session->info_last;
1713
1714                 service_iter = g_hash_table_lookup(session->service_hash, service);
1715                 if (service_iter != NULL) {
1716                         struct service_entry *entry;
1717
1718                         entry = g_sequence_get(service_iter);
1719                         entry->state = state;
1720
1721                         if (info->entry == entry) {
1722                                 info->online = is_online(entry->state);
1723                                 if (info_last->online != info->online)
1724                                         session->info_dirty = TRUE;
1725                         }
1726                 }
1727
1728                 session_changed(session,
1729                                 CONNMAN_SESSION_TRIGGER_SERVICE);
1730         }
1731 }
1732
1733 static void ipconfig_changed(struct connman_service *service,
1734                                 struct connman_ipconfig *ipconfig)
1735 {
1736         GHashTableIter iter;
1737         gpointer key, value;
1738         struct connman_session *session;
1739         struct session_info *info;
1740         enum connman_ipconfig_type type;
1741
1742         DBG("service %p ipconfig %p", service, ipconfig);
1743
1744         type = __connman_ipconfig_get_config_type(ipconfig);
1745
1746         g_hash_table_iter_init(&iter, session_hash);
1747
1748         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1749                 session = value;
1750                 info = session->info;
1751
1752                 if (info->entry != NULL && info->entry->service == service) {
1753                         if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
1754                                 ipconfig_ipv4_changed(session);
1755                         else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
1756                                 ipconfig_ipv6_changed(session);
1757                 }
1758         }
1759 }
1760
1761 static struct connman_notifier session_notifier = {
1762         .name                   = "session",
1763         .service_add            = service_add,
1764         .service_remove         = service_remove,
1765         .service_state_changed  = service_state_changed,
1766         .ipconfig_changed       = ipconfig_changed,
1767 };
1768
1769 int __connman_session_init(void)
1770 {
1771         int err;
1772
1773         DBG("");
1774
1775         connection = connman_dbus_get_connection();
1776         if (connection == NULL)
1777                 return -1;
1778
1779         err = connman_notifier_register(&session_notifier);
1780         if (err < 0) {
1781                 dbus_connection_unref(connection);
1782                 return err;
1783         }
1784
1785         session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1786                                                 NULL, cleanup_session);
1787
1788         sessionmode = FALSE;
1789         return 0;
1790 }
1791
1792 void __connman_session_cleanup(void)
1793 {
1794         DBG("");
1795
1796         if (connection == NULL)
1797                 return;
1798
1799         connman_notifier_unregister(&session_notifier);
1800
1801         g_hash_table_foreach(session_hash, release_session, NULL);
1802         g_hash_table_destroy(session_hash);
1803         session_hash = NULL;
1804
1805         dbus_connection_unref(connection);
1806 }