session: Disconnect on destroy if needed
[framework/connectivity/connman.git] / src / session.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2010  Intel Corporation. All rights reserved.
6  *  Copyright (C) 2011  BWM CarIT GmbH. All rights reserved.
7  *
8  *  This program is free software; you can redistribute it and/or modify
9  *  it under the terms of the GNU General Public License version 2 as
10  *  published by the Free Software Foundation.
11  *
12  *  This program is distributed in the hope that it will be useful,
13  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
14  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15  *  GNU General Public License for more details.
16  *
17  *  You should have received a copy of the GNU General Public License
18  *  along with this program; if not, write to the Free Software
19  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
20  *
21  */
22
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
26
27 #include <errno.h>
28
29 #include <gdbus.h>
30
31 #include "connman.h"
32
33 static DBusConnection *connection;
34 static GHashTable *session_hash;
35 static connman_bool_t sessionmode;
36 static struct connman_session *ecall_session;
37
38 enum connman_session_trigger {
39         CONNMAN_SESSION_TRIGGER_UNKNOWN         = 0,
40         CONNMAN_SESSION_TRIGGER_SETTING         = 1,
41         CONNMAN_SESSION_TRIGGER_CONNECT         = 2,
42         CONNMAN_SESSION_TRIGGER_DISCONNECT      = 3,
43         CONNMAN_SESSION_TRIGGER_PERIODIC        = 4,
44         CONNMAN_SESSION_TRIGGER_SERVICE         = 5,
45         CONNMAN_SESSION_TRIGGER_ECALL           = 6,
46 };
47
48 enum connman_session_reason {
49         CONNMAN_SESSION_REASON_UNKNOWN          = 0,
50         CONNMAN_SESSION_REASON_CONNECT          = 1,
51         CONNMAN_SESSION_REASON_FREE_RIDE        = 2,
52         CONNMAN_SESSION_REASON_PERIODIC         = 3,
53 };
54
55 enum connman_session_roaming_policy {
56         CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN          = 0,
57         CONNMAN_SESSION_ROAMING_POLICY_DEFAULT          = 1,
58         CONNMAN_SESSION_ROAMING_POLICY_ALWAYS           = 2,
59         CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN        = 3,
60         CONNMAN_SESSION_ROAMING_POLICY_NATIONAL         = 4,
61         CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL    = 5,
62 };
63
64 struct service_entry {
65         /* track why this service was selected */
66         enum connman_session_reason reason;
67         enum connman_service_state state;
68         const char *name;
69         struct connman_service *service;
70         const char *ifname;
71         const char *bearer;
72 };
73
74 struct session_info {
75         connman_bool_t online;
76         connman_bool_t priority;
77         GSList *allowed_bearers;
78         connman_bool_t avoid_handover;
79         connman_bool_t stay_connected;
80         unsigned int periodic_connect;
81         unsigned int idle_timeout;
82         connman_bool_t ecall;
83         enum connman_session_roaming_policy roaming_policy;
84         unsigned int marker;
85
86         struct service_entry *entry;
87 };
88
89 struct connman_session {
90         char *owner;
91         char *session_path;
92         char *notify_path;
93         guint notify_watch;
94
95         connman_bool_t append_all;
96         connman_bool_t info_dirty;
97         struct session_info *info;
98         struct session_info *info_last;
99
100         GSequence *service_list;
101         GHashTable *service_hash;
102 };
103
104 struct bearer_info {
105         char *name;
106         connman_bool_t match_all;
107         enum connman_service_type service_type;
108 };
109
110 static const char *trigger2string(enum connman_session_trigger trigger)
111 {
112         switch (trigger) {
113         case CONNMAN_SESSION_TRIGGER_UNKNOWN:
114                 break;
115         case CONNMAN_SESSION_TRIGGER_SETTING:
116                 return "setting";
117         case CONNMAN_SESSION_TRIGGER_CONNECT:
118                 return "connect";
119         case CONNMAN_SESSION_TRIGGER_DISCONNECT:
120                 return "disconnect";
121         case CONNMAN_SESSION_TRIGGER_PERIODIC:
122                 return "periodic";
123         case CONNMAN_SESSION_TRIGGER_SERVICE:
124                 return "service";
125         case CONNMAN_SESSION_TRIGGER_ECALL:
126                 return "ecall";
127         }
128
129         return NULL;
130 }
131
132 static const char *reason2string(enum connman_session_reason reason)
133 {
134         switch (reason) {
135         case CONNMAN_SESSION_REASON_UNKNOWN:
136                 break;
137         case CONNMAN_SESSION_REASON_CONNECT:
138                 return "connect";
139         case CONNMAN_SESSION_REASON_FREE_RIDE:
140                 return "free-ride";
141         case CONNMAN_SESSION_REASON_PERIODIC:
142                 return "periodic";
143         }
144
145         return NULL;
146 }
147
148 static const char *roamingpolicy2string(enum connman_session_roaming_policy policy)
149 {
150         switch (policy) {
151         case CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN:
152                 return "unknown";
153         case CONNMAN_SESSION_ROAMING_POLICY_DEFAULT:
154                 return "default";
155         case CONNMAN_SESSION_ROAMING_POLICY_ALWAYS:
156                 return "always";
157         case CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN:
158                 return "forbidden";
159         case CONNMAN_SESSION_ROAMING_POLICY_NATIONAL:
160                 return "national";
161         case CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL:
162                 return "international";
163         }
164
165         return NULL;
166 }
167
168 static enum connman_session_roaming_policy string2roamingpolicy(const char *policy)
169 {
170         if (g_strcmp0(policy, "default") == 0)
171                 return CONNMAN_SESSION_ROAMING_POLICY_DEFAULT;
172         else if (g_strcmp0(policy, "always") == 0)
173                 return CONNMAN_SESSION_ROAMING_POLICY_ALWAYS;
174         else if (g_strcmp0(policy, "forbidden") == 0)
175                 return CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
176         else if (g_strcmp0(policy, "national") == 0)
177                 return CONNMAN_SESSION_ROAMING_POLICY_NATIONAL;
178         else if (g_strcmp0(policy, "international") == 0)
179                 return CONNMAN_SESSION_ROAMING_POLICY_INTERNATIONAL;
180         else
181                 return CONNMAN_SESSION_ROAMING_POLICY_UNKNOWN;
182 }
183
184 static enum connman_service_type bearer2service(const char *bearer)
185 {
186         if (bearer == NULL)
187                 return CONNMAN_SERVICE_TYPE_UNKNOWN;
188
189         if (g_strcmp0(bearer, "ethernet") == 0)
190                 return CONNMAN_SERVICE_TYPE_ETHERNET;
191         else if (g_strcmp0(bearer, "wifi") == 0)
192                 return CONNMAN_SERVICE_TYPE_WIFI;
193         else if (g_strcmp0(bearer, "wimax") == 0)
194                 return CONNMAN_SERVICE_TYPE_WIMAX;
195         else if (g_strcmp0(bearer, "bluetooth") == 0)
196                 return CONNMAN_SERVICE_TYPE_BLUETOOTH;
197         else if (g_strcmp0(bearer, "3g") == 0)
198                 return CONNMAN_SERVICE_TYPE_CELLULAR;
199         else if (g_strcmp0(bearer, "vpn") == 0)
200                 return CONNMAN_SERVICE_TYPE_VPN;
201         else
202                 return CONNMAN_SERVICE_TYPE_UNKNOWN;
203 }
204
205 static char *service2bearer(enum connman_service_type type)
206 {
207         switch (type) {
208         case CONNMAN_SERVICE_TYPE_ETHERNET:
209                 return "ethernet";
210         case CONNMAN_SERVICE_TYPE_WIFI:
211                 return "wifi";
212         case CONNMAN_SERVICE_TYPE_WIMAX:
213                 return "wimax";
214         case CONNMAN_SERVICE_TYPE_BLUETOOTH:
215                 return "bluetooth";
216         case CONNMAN_SERVICE_TYPE_CELLULAR:
217                 return "3g";
218         case CONNMAN_SERVICE_TYPE_VPN:
219                 return "vpn";
220         case CONNMAN_SERVICE_TYPE_UNKNOWN:
221         case CONNMAN_SERVICE_TYPE_SYSTEM:
222         case CONNMAN_SERVICE_TYPE_GPS:
223         case CONNMAN_SERVICE_TYPE_GADGET:
224                 return "";
225         }
226
227         return "";
228 }
229
230 static void cleanup_bearer_info(gpointer data, gpointer user_data)
231 {
232         struct bearer_info *info = data;
233
234         g_free(info->name);
235         g_free(info);
236 }
237
238 static GSList *session_parse_allowed_bearers(DBusMessageIter *iter)
239 {
240         struct bearer_info *info;
241         DBusMessageIter array;
242         GSList *list = NULL;
243
244         dbus_message_iter_recurse(iter, &array);
245
246         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_STRING) {
247                 char *bearer = NULL;
248
249                 dbus_message_iter_get_basic(&array, &bearer);
250
251                 info = g_try_new0(struct bearer_info, 1);
252                 if (info == NULL) {
253                         g_slist_foreach(list, cleanup_bearer_info, NULL);
254                         g_slist_free(list);
255
256                         return NULL;
257                 }
258
259                 info->name = g_strdup(bearer);
260                 info->service_type = bearer2service(info->name);
261
262                 if (info->service_type == CONNMAN_SERVICE_TYPE_UNKNOWN &&
263                                 g_strcmp0(info->name, "*") == 0) {
264                         info->match_all = TRUE;
265                 } else {
266                         info->match_all = FALSE;
267                 }
268
269                 list = g_slist_append(list, info);
270
271                 dbus_message_iter_next(&array);
272         }
273
274         return list;
275 }
276
277 static GSList *session_allowed_bearers_any(void)
278 {
279         struct bearer_info *info;
280         GSList *list = NULL;
281
282         info = g_try_new0(struct bearer_info, 1);
283         if (info == NULL) {
284                 g_slist_free(list);
285
286                 return NULL;
287         }
288
289         info->name = g_strdup("");
290         info->match_all = TRUE;
291         info->service_type = CONNMAN_SERVICE_TYPE_UNKNOWN;
292
293         list = g_slist_append(list, info);
294
295         return list;
296 }
297
298 static void append_allowed_bearers(DBusMessageIter *iter, void *user_data)
299 {
300         struct session_info *info = user_data;
301         GSList *list;
302
303         for (list = info->allowed_bearers;
304                         list != NULL; list = list->next) {
305                 struct bearer_info *info = list->data;
306
307                 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
308                                                 &info->name);
309         }
310 }
311
312 static void append_ipconfig_ipv4(DBusMessageIter *iter, void *user_data)
313 {
314         struct connman_service *service = user_data;
315         struct connman_ipconfig *ipconfig_ipv4;
316
317         if (service == NULL)
318                 return;
319
320         ipconfig_ipv4 = __connman_service_get_ip4config(service);
321         if (ipconfig_ipv4 == NULL)
322                 return;
323
324         __connman_ipconfig_append_ipv4(ipconfig_ipv4, iter);
325 }
326
327 static void append_ipconfig_ipv6(DBusMessageIter *iter, void *user_data)
328 {
329         struct connman_service *service = user_data;
330         struct connman_ipconfig *ipconfig_ipv4, *ipconfig_ipv6;
331
332         if (service == NULL)
333                 return;
334
335         ipconfig_ipv4 = __connman_service_get_ip4config(service);
336         ipconfig_ipv6 = __connman_service_get_ip6config(service);
337         if (ipconfig_ipv6 == NULL)
338                 return;
339
340         __connman_ipconfig_append_ipv6(ipconfig_ipv6, iter, ipconfig_ipv4);
341 }
342
343 static void append_notify(DBusMessageIter *dict,
344                                         struct connman_session *session)
345 {
346         struct session_info *info = session->info;
347         struct session_info *info_last = session->info_last;
348         const char *policy;
349         struct connman_service *service;
350         const char *name, *ifname, *bearer;
351
352         if (session->append_all == TRUE ||
353                         info->online != info_last->online) {
354                 connman_dbus_dict_append_basic(dict, "Online",
355                                                 DBUS_TYPE_BOOLEAN,
356                                                 &info->online);
357                 info_last->online = info->online;
358         }
359
360         if (session->append_all == TRUE ||
361                         info->entry != info_last->entry) {
362                 if (info->entry == NULL) {
363                         name = "";
364                         ifname = "";
365                         service = NULL;
366                         bearer = "";
367                 } else {
368                         name = info->entry->name;
369                         ifname = info->entry->ifname;
370                         service = info->entry->service;
371                         bearer = info->entry->bearer;
372                 }
373
374                 connman_dbus_dict_append_basic(dict, "Name",
375                                                 DBUS_TYPE_STRING,
376                                                 &name);
377
378                 connman_dbus_dict_append_dict(dict, "IPv4",
379                                                 append_ipconfig_ipv4,
380                                                 service);
381
382                 connman_dbus_dict_append_dict(dict, "IPv6",
383                                                 append_ipconfig_ipv6,
384                                                 service);
385
386                 connman_dbus_dict_append_basic(dict, "Interface",
387                                                 DBUS_TYPE_STRING,
388                                                 &ifname);
389
390                 connman_dbus_dict_append_basic(dict, "Bearer",
391                                                 DBUS_TYPE_STRING,
392                                                 &bearer);
393
394                 info_last->entry = info->entry;
395         }
396
397
398         if (session->append_all == TRUE ||
399                         info->priority != info_last->priority) {
400                 connman_dbus_dict_append_basic(dict, "Priority",
401                                                 DBUS_TYPE_BOOLEAN,
402                                                 &info->priority);
403                 info_last->priority = info->priority;
404         }
405
406         if (session->append_all == TRUE ||
407                         info->allowed_bearers != info_last->allowed_bearers) {
408                 connman_dbus_dict_append_array(dict, "AllowedBearers",
409                                                 DBUS_TYPE_STRING,
410                                                 append_allowed_bearers,
411                                                 info);
412                 info_last->allowed_bearers = info->allowed_bearers;
413         }
414
415         if (session->append_all == TRUE ||
416                         info->avoid_handover != info_last->avoid_handover) {
417                 connman_dbus_dict_append_basic(dict, "AvoidHandover",
418                                                 DBUS_TYPE_BOOLEAN,
419                                                 &info->avoid_handover);
420                 info_last->avoid_handover = info->avoid_handover;
421         }
422
423         if (session->append_all == TRUE ||
424                         info->stay_connected != info_last->stay_connected) {
425                 connman_dbus_dict_append_basic(dict, "StayConnected",
426                                                 DBUS_TYPE_BOOLEAN,
427                                                 &info->stay_connected);
428                 info_last->stay_connected = info->stay_connected;
429         }
430
431         if (session->append_all == TRUE ||
432                         info->periodic_connect != info_last->periodic_connect) {
433                 connman_dbus_dict_append_basic(dict, "PeriodicConnect",
434                                                 DBUS_TYPE_UINT32,
435                                                 &info->periodic_connect);
436                 info_last->periodic_connect = info->periodic_connect;
437         }
438
439         if (session->append_all == TRUE ||
440                         info->idle_timeout != info_last->idle_timeout) {
441                 connman_dbus_dict_append_basic(dict, "IdleTimeout",
442                                                 DBUS_TYPE_UINT32,
443                                                 &info->idle_timeout);
444                 info_last->idle_timeout = info->idle_timeout;
445         }
446
447         if (session->append_all == TRUE ||
448                         info->ecall != info_last->ecall) {
449                 connman_dbus_dict_append_basic(dict, "EmergencyCall",
450                                                 DBUS_TYPE_BOOLEAN,
451                                                 &info->ecall);
452                 info_last->ecall = info->ecall;
453         }
454
455         if (session->append_all == TRUE ||
456                         info->roaming_policy != info_last->roaming_policy) {
457                 policy = roamingpolicy2string(info->roaming_policy);
458                 connman_dbus_dict_append_basic(dict, "RoamingPolicy",
459                                                 DBUS_TYPE_STRING,
460                                                 &policy);
461                 info_last->roaming_policy = info->roaming_policy;
462         }
463
464         if (session->append_all == TRUE ||
465                         info->marker != info_last->marker) {
466                 connman_dbus_dict_append_basic(dict, "SessionMarker",
467                                                 DBUS_TYPE_UINT32,
468                                                 &info->marker);
469                 info_last->marker = info->marker;
470         }
471
472         session->append_all = FALSE;
473         session->info_dirty = FALSE;
474 }
475
476 static gboolean session_notify(gpointer user_data)
477 {
478         struct connman_session *session = user_data;
479         DBusMessage *msg;
480         DBusMessageIter array, dict;
481
482         if (session->info_dirty == FALSE)
483                 return 0;
484
485         DBG("session %p owner %s notify_path %s", session,
486                 session->owner, session->notify_path);
487
488         msg = dbus_message_new_method_call(session->owner, session->notify_path,
489                                                 CONNMAN_NOTIFICATION_INTERFACE,
490                                                 "Update");
491         if (msg == NULL)
492                 return FALSE;
493
494         dbus_message_iter_init_append(msg, &array);
495         connman_dbus_dict_open(&array, &dict);
496
497         append_notify(&dict, session);
498
499         connman_dbus_dict_close(&array, &dict);
500
501         g_dbus_send_message(connection, msg);
502
503         session->info_dirty = FALSE;
504
505         return FALSE;
506 }
507
508 static void ipconfig_ipv4_changed(struct connman_session *session)
509 {
510         struct session_info *info = session->info;
511
512         connman_dbus_setting_changed_dict(session->owner, session->notify_path,
513                                                 "IPv4", append_ipconfig_ipv4,
514                                                 info->entry->service);
515 }
516
517 static void ipconfig_ipv6_changed(struct connman_session *session)
518 {
519         struct session_info *info = session->info;
520
521         connman_dbus_setting_changed_dict(session->owner, session->notify_path,
522                                                 "IPv6", append_ipconfig_ipv6,
523                                                 info->entry->service);
524 }
525
526 static connman_bool_t service_type_match(struct connman_session *session,
527                                         struct connman_service *service)
528 {
529         struct session_info *info = session->info;
530         GSList *list;
531
532         for (list = info->allowed_bearers;
533                         list != NULL; list = list->next) {
534                 struct bearer_info *info = list->data;
535                 enum connman_service_type service_type;
536
537                 if (info->match_all == TRUE)
538                         return TRUE;
539
540                 service_type = connman_service_get_type(service);
541                 if (info->service_type == service_type)
542                         return TRUE;
543         }
544
545         return FALSE;
546 }
547
548 static connman_bool_t service_match(struct connman_session *session,
549                                         struct connman_service *service)
550 {
551         if (service_type_match(session, service) == FALSE)
552                 return FALSE;
553
554         return TRUE;
555 }
556
557 static int service_type_weight(enum connman_service_type type)
558 {
559         /*
560          * The session doesn't care which service
561          * to use. Nevertheless we have to sort them
562          * according their type. The ordering is
563          *
564          * 1. Ethernet
565          * 2. Bluetooth
566          * 3. WiFi/WiMAX
567          * 4. GSM/UTMS/3G
568          */
569
570         switch (type) {
571         case CONNMAN_SERVICE_TYPE_ETHERNET:
572                 return 4;
573         case CONNMAN_SERVICE_TYPE_BLUETOOTH:
574                 return 3;
575         case CONNMAN_SERVICE_TYPE_WIFI:
576         case CONNMAN_SERVICE_TYPE_WIMAX:
577                 return 2;
578         case CONNMAN_SERVICE_TYPE_CELLULAR:
579                 return 1;
580         case CONNMAN_SERVICE_TYPE_UNKNOWN:
581         case CONNMAN_SERVICE_TYPE_SYSTEM:
582         case CONNMAN_SERVICE_TYPE_GPS:
583         case CONNMAN_SERVICE_TYPE_VPN:
584         case CONNMAN_SERVICE_TYPE_GADGET:
585                 break;
586         }
587
588         return 0;
589 }
590
591 static gint sort_allowed_bearers(struct connman_service *service_a,
592                                         struct connman_service *service_b,
593                                         struct connman_session *session)
594 {
595         struct session_info *info = session->info;
596         GSList *list;
597         enum connman_service_type type_a, type_b;
598         int weight_a, weight_b;
599
600         type_a = connman_service_get_type(service_a);
601         type_b = connman_service_get_type(service_b);
602
603         for (list = info->allowed_bearers;
604                         list != NULL; list = list->next) {
605                 struct bearer_info *info = list->data;
606
607                 if (info->match_all == TRUE) {
608                         if (type_a != type_b) {
609                                 weight_a = service_type_weight(type_a);
610                                 weight_b = service_type_weight(type_b);
611
612                                 if (weight_a > weight_b)
613                                         return -1;
614
615                                 if (weight_a < weight_b)
616                                         return 1;
617
618                                 return 0;
619                         }
620                 }
621
622                 if (type_a == info->service_type &&
623                                 type_b == info->service_type) {
624                         return 0;
625                 }
626
627                 if (type_a == info->service_type &&
628                                 type_b != info->service_type) {
629                         return -1;
630                 }
631
632                 if (type_a != info->service_type &&
633                                 type_b == info->service_type) {
634                         return 1;
635                 }
636         }
637
638         return 0;
639 }
640
641 static gint sort_services(gconstpointer a, gconstpointer b, gpointer user_data)
642 {
643         struct service_entry *entry_a = (void *)a;
644         struct service_entry *entry_b = (void *)b;
645         struct connman_session *session = user_data;
646
647         return sort_allowed_bearers(entry_a->service, entry_b->service,
648                                 session);
649 }
650
651 static void cleanup_session(gpointer user_data)
652 {
653         struct connman_session *session = user_data;
654         struct session_info *info = session->info;
655
656         DBG("remove %s", session->session_path);
657
658         g_hash_table_destroy(session->service_hash);
659         g_sequence_free(session->service_list);
660
661         if (info->entry != NULL &&
662                         info->entry->reason == CONNMAN_SESSION_REASON_CONNECT) {
663                 __connman_service_disconnect(info->entry->service);
664         }
665
666         g_slist_foreach(info->allowed_bearers, cleanup_bearer_info, NULL);
667         g_slist_free(info->allowed_bearers);
668
669         g_free(session->owner);
670         g_free(session->session_path);
671         g_free(session->notify_path);
672         g_free(session->info);
673         g_free(session->info_last);
674
675         g_free(session);
676 }
677
678 static connman_bool_t is_online(enum connman_service_state state)
679 {
680         switch (state) {
681         case CONNMAN_SERVICE_STATE_UNKNOWN:
682         case CONNMAN_SERVICE_STATE_IDLE:
683         case CONNMAN_SERVICE_STATE_ASSOCIATION:
684         case CONNMAN_SERVICE_STATE_CONFIGURATION:
685         case CONNMAN_SERVICE_STATE_DISCONNECT:
686         case CONNMAN_SERVICE_STATE_FAILURE:
687         case CONNMAN_SERVICE_STATE_READY:
688                 break;
689         case CONNMAN_SERVICE_STATE_ONLINE:
690                 return TRUE;
691         }
692
693         return FALSE;
694 }
695
696 static connman_bool_t is_connecting(enum connman_service_state state)
697 {
698         switch (state) {
699         case CONNMAN_SERVICE_STATE_UNKNOWN:
700         case CONNMAN_SERVICE_STATE_IDLE:
701                 break;
702         case CONNMAN_SERVICE_STATE_ASSOCIATION:
703         case CONNMAN_SERVICE_STATE_CONFIGURATION:
704         case CONNMAN_SERVICE_STATE_READY:
705                 return TRUE;
706         case CONNMAN_SERVICE_STATE_DISCONNECT:
707         case CONNMAN_SERVICE_STATE_FAILURE:
708         case CONNMAN_SERVICE_STATE_ONLINE:
709                 break;
710         }
711
712         return FALSE;
713 }
714
715 static connman_bool_t explicit_connect(enum connman_session_reason reason)
716 {
717         switch (reason) {
718         case CONNMAN_SESSION_REASON_UNKNOWN:
719         case CONNMAN_SESSION_REASON_FREE_RIDE:
720                 break;
721         case CONNMAN_SESSION_REASON_CONNECT:
722         case CONNMAN_SESSION_REASON_PERIODIC:
723                 return TRUE;
724         }
725
726         return FALSE;
727 }
728
729 static connman_bool_t explicit_disconnect(struct connman_session *session)
730 {
731         struct session_info *info = session->info;
732
733         if (info->entry == NULL)
734                 return FALSE;
735
736         DBG("session %p, reason %s service %p state %d",
737                 session, reason2string(info->entry->reason),
738                 info->entry->service, info->entry->state);
739
740         if (explicit_connect(info->entry->reason) == FALSE)
741                 return FALSE;
742
743         if (__connman_service_session_dec(info->entry->service) == FALSE)
744                 return FALSE;
745
746         if (ecall_session != NULL && ecall_session != session)
747                 return FALSE;
748
749         return TRUE;
750 }
751
752 static void test_and_disconnect(struct connman_session *session)
753 {
754         struct session_info *info = session->info;
755         struct service_entry *entry;
756         connman_bool_t disconnect;
757
758         disconnect = explicit_disconnect(session);
759
760         entry = info->entry;
761
762         info->online = FALSE;
763         info->entry = NULL;
764
765         if (disconnect == TRUE) {
766                 DBG("disconnect service %p", entry->service);
767
768                 /*
769                  * TODO: We should mark this entry as pending work. In case
770                  * disconnect fails we just unassign this session from the
771                  * service and can't do anything later on it
772                  */
773                 __connman_service_disconnect(entry->service);
774         }
775 }
776
777 static void select_and_connect(struct connman_session *session,
778                                 enum connman_session_reason reason)
779 {
780         struct session_info *info = session->info;
781         struct service_entry *entry = NULL;
782         GSequenceIter *iter;
783         connman_bool_t do_connect = FALSE;
784
785         DBG("session %p reason %s", session, reason2string(reason));
786
787         iter = g_sequence_get_begin_iter(session->service_list);
788
789         while (g_sequence_iter_is_end(iter) == FALSE) {
790                 entry = g_sequence_get(iter);
791
792                 switch (entry->state) {
793                 case CONNMAN_SERVICE_STATE_ASSOCIATION:
794                 case CONNMAN_SERVICE_STATE_CONFIGURATION:
795                 case CONNMAN_SERVICE_STATE_READY:
796                 case CONNMAN_SERVICE_STATE_ONLINE:
797                         /* connecting or connected */
798                         break;
799                 case CONNMAN_SERVICE_STATE_IDLE:
800                 case CONNMAN_SERVICE_STATE_DISCONNECT:
801                         if (explicit_connect(reason) == TRUE)
802                                 do_connect = TRUE;
803                         break;
804                 case CONNMAN_SERVICE_STATE_UNKNOWN:
805                 case CONNMAN_SERVICE_STATE_FAILURE:
806                         entry = NULL;
807                         break;
808                 }
809
810                 if (entry != NULL)
811                         break;
812
813                 iter = g_sequence_iter_next(iter);
814         }
815
816         if (info->entry != NULL && info->entry != entry)
817                 test_and_disconnect(session);
818
819         if (entry != NULL) {
820                 info->entry = entry;
821                 info->entry->reason = reason;
822
823                 if (explicit_connect(reason) == TRUE)
824                         __connman_service_session_inc(info->entry->service);
825
826                 if (do_connect == TRUE)
827                         __connman_service_connect(info->entry->service);
828                 else
829                         info->online = is_online(entry->state);
830         }
831 }
832
833 static void session_changed(struct connman_session *session,
834                                 enum connman_session_trigger trigger)
835 {
836         struct session_info *info = session->info;
837         struct session_info *info_last = session->info_last;
838         GSequenceIter *iter;
839
840         /*
841          * TODO: This only a placeholder for the 'real' algorithm to
842          * play a bit around. So we are going to improve it step by step.
843          */
844
845         DBG("session %p trigger %s", session, trigger2string(trigger));
846
847         switch (trigger) {
848         case CONNMAN_SESSION_TRIGGER_UNKNOWN:
849                 DBG("ignore session changed event");
850                 return;
851         case CONNMAN_SESSION_TRIGGER_SETTING:
852                 if (info->entry != NULL) {
853                         iter = g_hash_table_lookup(session->service_hash,
854                                                         info->entry->service);
855                         if (iter == NULL) {
856                                 /*
857                                  * This service is not part of this
858                                  * session anymore.
859                                  */
860                                 test_and_disconnect(session);
861                         }
862                 }
863
864                 if (info->online == FALSE) {
865                         select_and_connect(session,
866                                         CONNMAN_SESSION_REASON_FREE_RIDE);
867                 }
868
869                 break;
870         case CONNMAN_SESSION_TRIGGER_CONNECT:
871                 if (info->online == TRUE) {
872                         info->entry->reason = CONNMAN_SESSION_REASON_CONNECT;
873                         __connman_service_session_inc(info->entry->service);
874                         break;
875                 }
876
877                 select_and_connect(session,
878                                 CONNMAN_SESSION_REASON_CONNECT);
879
880                 break;
881         case CONNMAN_SESSION_TRIGGER_DISCONNECT:
882                 test_and_disconnect(session);
883
884                 break;
885         case CONNMAN_SESSION_TRIGGER_PERIODIC:
886                 if (info->online == TRUE) {
887                         info->entry->reason = CONNMAN_SESSION_REASON_PERIODIC;
888                         __connman_service_session_inc(info->entry->service);
889                         break;
890                 }
891
892                 select_and_connect(session,
893                                 CONNMAN_SESSION_REASON_PERIODIC);
894
895                 break;
896         case CONNMAN_SESSION_TRIGGER_SERVICE:
897                 if (info->online == TRUE)
898                         break;
899
900                 if (info->entry != NULL &&
901                                 is_connecting(info->entry->state) == TRUE) {
902                         break;
903                 }
904
905                 if (info->stay_connected == TRUE) {
906                         DBG("StayConnected");
907                         select_and_connect(session,
908                                         CONNMAN_SESSION_REASON_CONNECT);
909
910                         break;
911                 }
912
913                 select_and_connect(session,
914                                 CONNMAN_SESSION_REASON_FREE_RIDE);
915
916                 break;
917         case CONNMAN_SESSION_TRIGGER_ECALL:
918                 if (info->online == FALSE && info->entry->service != NULL)
919                         test_and_disconnect(session);
920
921                 break;
922         }
923
924         if (info->entry != info_last->entry)
925                 session->info_dirty = TRUE;
926
927         session_notify(session);
928 }
929
930 static DBusMessage *connect_session(DBusConnection *conn,
931                                         DBusMessage *msg, void *user_data)
932 {
933         struct connman_session *session = user_data;
934
935         DBG("session %p", session);
936
937         if (ecall_session != NULL && ecall_session != session)
938                 return __connman_error_failed(msg, EBUSY);
939
940         session_changed(session, CONNMAN_SESSION_TRIGGER_CONNECT);
941
942         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
943 }
944
945 static DBusMessage *disconnect_session(DBusConnection *conn,
946                                         DBusMessage *msg, void *user_data)
947 {
948         struct connman_session *session = user_data;
949
950         DBG("session %p", session);
951
952         if (ecall_session != NULL && ecall_session != session)
953                 return __connman_error_failed(msg, EBUSY);
954
955         session_changed(session, CONNMAN_SESSION_TRIGGER_DISCONNECT);
956
957         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
958 }
959
960 static struct service_entry *create_service_entry(struct connman_service *service,
961                                         const char *name,
962                                         enum connman_service_state state)
963 {
964         struct service_entry *entry;
965         enum connman_service_type type;
966         int idx;
967
968         entry = g_try_new0(struct service_entry, 1);
969         if (entry == NULL)
970                 return entry;
971
972         entry->reason = CONNMAN_SESSION_REASON_UNKNOWN;
973         entry->state = state;
974         entry->name = name;
975         entry->service = service;
976
977         idx = __connman_service_get_index(entry->service);
978         entry->ifname = connman_inet_ifname(idx);
979         if (entry->ifname == NULL)
980                 entry->ifname = "";
981
982         type = connman_service_get_type(entry->service);
983         entry->bearer = service2bearer(type);
984
985         return entry;
986 }
987
988 static void destroy_service_entry(gpointer data)
989 {
990         struct service_entry *entry = data;
991
992         g_free(entry);
993 }
994
995 static void update_allowed_bearers(struct connman_session *session)
996 {
997         struct service_entry *entry;
998         GSequenceIter *iter;
999
1000         if (session->service_list != NULL) {
1001                 g_hash_table_remove_all(session->service_hash);
1002                 g_sequence_free(session->service_list);
1003         }
1004
1005         session->service_list = __connman_service_get_list(session,
1006                                                         service_match,
1007                                                         create_service_entry,
1008                                                         destroy_service_entry);
1009
1010         g_sequence_sort(session->service_list, sort_services, session);
1011
1012         iter = g_sequence_get_begin_iter(session->service_list);
1013
1014         while (g_sequence_iter_is_end(iter) == FALSE) {
1015                 entry = g_sequence_get(iter);
1016
1017                 DBG("service %p type %s name %s", entry->service,
1018                         service2bearer(connman_service_get_type(entry->service)),
1019                         entry->name);
1020
1021                 g_hash_table_replace(session->service_hash,
1022                                         entry->service, iter);
1023
1024                 iter = g_sequence_iter_next(iter);
1025         }
1026
1027         session->info_dirty = TRUE;
1028 }
1029
1030 static void update_ecall_sessions(struct connman_session *session)
1031 {
1032         struct session_info *info = session->info;
1033         struct connman_session *session_iter;
1034         GHashTableIter iter;
1035         gpointer key, value;
1036
1037         g_hash_table_iter_init(&iter, session_hash);
1038
1039         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1040                 session_iter = value;
1041
1042                 if (session_iter == session)
1043                         continue;
1044
1045                 session_iter->info->ecall = info->ecall;
1046                 session_iter->info_dirty = TRUE;
1047
1048                 session_changed(session_iter, CONNMAN_SESSION_TRIGGER_ECALL);
1049         }
1050 }
1051
1052 static void update_ecall(struct connman_session *session)
1053 {
1054         struct session_info *info = session->info;
1055         struct session_info *info_last = session->info_last;
1056
1057         DBG("session %p ecall_session %p ecall %d -> %d", session,
1058                 ecall_session, info_last->ecall, info->ecall);
1059
1060         if (ecall_session == NULL) {
1061                 if (!(info_last->ecall == FALSE && info->ecall == TRUE))
1062                         goto err;
1063
1064                 ecall_session = session;
1065         } else if (ecall_session == session) {
1066                 if (!(info_last->ecall == TRUE && info->ecall == FALSE))
1067                         goto err;
1068
1069                 ecall_session = NULL;
1070         } else {
1071                 goto err;
1072         }
1073
1074         update_ecall_sessions(session);
1075
1076         session->info_dirty = TRUE;
1077         return;
1078
1079 err:
1080         /* not a valid transition */
1081         info->ecall = info_last->ecall;
1082 }
1083
1084 static DBusMessage *change_session(DBusConnection *conn,
1085                                         DBusMessage *msg, void *user_data)
1086 {
1087         struct connman_session *session = user_data;
1088         struct session_info *info = session->info;
1089         struct session_info *info_last = session->info_last;
1090         DBusMessageIter iter, value;
1091         const char *name;
1092         GSList *allowed_bearers;
1093
1094         DBG("session %p", session);
1095         if (dbus_message_iter_init(msg, &iter) == FALSE)
1096                 return __connman_error_invalid_arguments(msg);
1097
1098         dbus_message_iter_get_basic(&iter, &name);
1099         dbus_message_iter_next(&iter);
1100         dbus_message_iter_recurse(&iter, &value);
1101
1102         switch (dbus_message_iter_get_arg_type(&value)) {
1103         case DBUS_TYPE_ARRAY:
1104                 if (g_str_equal(name, "AllowedBearers") == TRUE) {
1105                         allowed_bearers = session_parse_allowed_bearers(&value);
1106
1107                         g_slist_foreach(info->allowed_bearers,
1108                                         cleanup_bearer_info, NULL);
1109                         g_slist_free(info->allowed_bearers);
1110
1111                         if (allowed_bearers == NULL) {
1112                                 allowed_bearers = session_allowed_bearers_any();
1113
1114                                 if (allowed_bearers == NULL)
1115                                         return __connman_error_failed(msg, ENOMEM);
1116                         }
1117
1118                         info->allowed_bearers = allowed_bearers;
1119
1120                         update_allowed_bearers(session);
1121                 } else {
1122                         goto err;
1123                 }
1124                 break;
1125         case DBUS_TYPE_BOOLEAN:
1126                 if (g_str_equal(name, "Priority") == TRUE) {
1127                         dbus_message_iter_get_basic(&value,
1128                                         &info->priority);
1129
1130                         if (info_last->priority != info->priority)
1131                                 session->info_dirty = TRUE;
1132                 } else if (g_str_equal(name, "AvoidHandover") == TRUE) {
1133                         dbus_message_iter_get_basic(&value,
1134                                         &info->avoid_handover);
1135
1136                         if (info_last->avoid_handover != info->avoid_handover)
1137                                 session->info_dirty = TRUE;
1138                 } else if (g_str_equal(name, "StayConnected") == TRUE) {
1139                         dbus_message_iter_get_basic(&value,
1140                                         &info->stay_connected);
1141
1142                         if (info_last->stay_connected != info->stay_connected)
1143                                 session->info_dirty = TRUE;
1144                 } else if (g_str_equal(name, "EmergencyCall") == TRUE) {
1145                         dbus_message_iter_get_basic(&value,
1146                                         &info->ecall);
1147
1148                         update_ecall(session);
1149                 } else {
1150                         goto err;
1151                 }
1152                 break;
1153         case DBUS_TYPE_UINT32:
1154                 if (g_str_equal(name, "PeriodicConnect") == TRUE) {
1155                         dbus_message_iter_get_basic(&value,
1156                                         &info->periodic_connect);
1157
1158                         if (info_last->periodic_connect != info->periodic_connect)
1159                                 session->info_dirty = TRUE;
1160                 } else if (g_str_equal(name, "IdleTimeout") == TRUE) {
1161                         dbus_message_iter_get_basic(&value,
1162                                         &info->idle_timeout);
1163
1164                         if (info_last->idle_timeout != info->idle_timeout)
1165                                 session->info_dirty = TRUE;
1166                 } else {
1167                         goto err;
1168                 }
1169                 break;
1170         case DBUS_TYPE_STRING:
1171                 if (g_str_equal(name, "RoamingPolicy") == TRUE) {
1172                         const char *val;
1173                         dbus_message_iter_get_basic(&value, &val);
1174                         info->roaming_policy =
1175                                         string2roamingpolicy(val);
1176
1177                         if (info_last->roaming_policy != info->roaming_policy)
1178                                 session->info_dirty = TRUE;
1179                 } else {
1180                         goto err;
1181                 }
1182                 break;
1183         default:
1184                 goto err;
1185         }
1186
1187         if (session->info_dirty == TRUE)
1188                 session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1189
1190         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1191
1192 err:
1193         return __connman_error_invalid_arguments(msg);
1194 }
1195
1196 static void release_session(gpointer key, gpointer value, gpointer user_data)
1197 {
1198         struct connman_session *session = value;
1199         DBusMessage *message;
1200
1201         DBG("owner %s path %s", session->owner, session->notify_path);
1202
1203         if (session->notify_watch > 0)
1204                 g_dbus_remove_watch(connection, session->notify_watch);
1205
1206         g_dbus_unregister_interface(connection, session->session_path,
1207                                                 CONNMAN_SESSION_INTERFACE);
1208
1209         message = dbus_message_new_method_call(session->owner,
1210                                                 session->notify_path,
1211                                                 CONNMAN_NOTIFICATION_INTERFACE,
1212                                                 "Release");
1213         if (message == NULL)
1214                 return;
1215
1216         dbus_message_set_no_reply(message, TRUE);
1217
1218         g_dbus_send_message(connection, message);
1219 }
1220
1221 static int session_disconnect(struct connman_session *session)
1222 {
1223         DBG("session %p, %s", session, session->owner);
1224
1225         if (session->notify_watch > 0)
1226                 g_dbus_remove_watch(connection, session->notify_watch);
1227
1228         g_dbus_unregister_interface(connection, session->session_path,
1229                                                 CONNMAN_SESSION_INTERFACE);
1230
1231         test_and_disconnect(session);
1232
1233         g_hash_table_remove(session_hash, session->session_path);
1234
1235         return 0;
1236 }
1237
1238 static void owner_disconnect(DBusConnection *conn, void *user_data)
1239 {
1240         struct connman_session *session = user_data;
1241
1242         DBG("session %p, %s died", session, session->owner);
1243
1244         session_disconnect(session);
1245 }
1246
1247 static DBusMessage *destroy_session(DBusConnection *conn,
1248                                         DBusMessage *msg, void *user_data)
1249 {
1250         struct connman_session *session = user_data;
1251
1252         DBG("session %p", session);
1253
1254         return g_dbus_create_reply(msg, DBUS_TYPE_INVALID);
1255 }
1256
1257 static GDBusMethodTable session_methods[] = {
1258         { "Destroy",    "",   "", destroy_session    },
1259         { "Connect",    "",   "", connect_session    },
1260         { "Disconnect", "",   "", disconnect_session },
1261         { "Change",     "sv", "", change_session     },
1262         { },
1263 };
1264
1265 int __connman_session_create(DBusMessage *msg)
1266 {
1267         const char *owner, *notify_path;
1268         char *session_path = NULL;
1269         DBusMessageIter iter, array;
1270         struct connman_session *session = NULL;
1271         struct session_info *info, *info_last;
1272
1273         connman_bool_t priority = FALSE, avoid_handover = FALSE;
1274         connman_bool_t stay_connected = FALSE, ecall = FALSE;
1275         enum connman_session_roaming_policy roaming_policy =
1276                                 CONNMAN_SESSION_ROAMING_POLICY_FORBIDDEN;
1277         GSList *allowed_bearers = NULL;
1278         unsigned int periodic_connect = 0;
1279         unsigned int idle_timeout = 0;
1280
1281         int err;
1282
1283         owner = dbus_message_get_sender(msg);
1284
1285         DBG("owner %s", owner);
1286
1287         if (ecall_session != NULL) {
1288                 /*
1289                  * If there is an emergency call already going on,
1290                  * ignore session creation attempt
1291                  */
1292                 err = -EBUSY;
1293                 goto err;
1294         }
1295
1296         dbus_message_iter_init(msg, &iter);
1297         dbus_message_iter_recurse(&iter, &array);
1298
1299         while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_DICT_ENTRY) {
1300                 DBusMessageIter entry, value;
1301                 const char *key, *val;
1302
1303                 dbus_message_iter_recurse(&array, &entry);
1304                 dbus_message_iter_get_basic(&entry, &key);
1305
1306                 dbus_message_iter_next(&entry);
1307                 dbus_message_iter_recurse(&entry, &value);
1308
1309                 switch (dbus_message_iter_get_arg_type(&value)) {
1310                 case DBUS_TYPE_ARRAY:
1311                         if (g_str_equal(key, "AllowedBearers") == TRUE) {
1312                                 allowed_bearers =
1313                                         session_parse_allowed_bearers(&value);
1314                         } else {
1315                                 return -EINVAL;
1316                         }
1317                         break;
1318                 case DBUS_TYPE_BOOLEAN:
1319                         if (g_str_equal(key, "Priority") == TRUE) {
1320                                 dbus_message_iter_get_basic(&value,
1321                                                         &priority);
1322                         } else if (g_str_equal(key, "AvoidHandover") == TRUE) {
1323                                 dbus_message_iter_get_basic(&value,
1324                                                         &avoid_handover);
1325                         } else if (g_str_equal(key, "StayConnected") == TRUE) {
1326                                 dbus_message_iter_get_basic(&value,
1327                                                         &stay_connected);
1328                         } else if (g_str_equal(key, "EmergencyCall") == TRUE) {
1329                                 dbus_message_iter_get_basic(&value,
1330                                                         &ecall);
1331                         } else {
1332                                 return -EINVAL;
1333                         }
1334                         break;
1335                 case DBUS_TYPE_UINT32:
1336                         if (g_str_equal(key, "PeriodicConnect") == TRUE) {
1337                                 dbus_message_iter_get_basic(&value,
1338                                                         &periodic_connect);
1339                         } else if (g_str_equal(key, "IdleTimeout") == TRUE) {
1340                                 dbus_message_iter_get_basic(&value,
1341                                                         &idle_timeout);
1342                         } else {
1343                                 return -EINVAL;
1344                         }
1345                         break;
1346                 case DBUS_TYPE_STRING:
1347                         if (g_str_equal(key, "RoamingPolicy") == TRUE) {
1348                                 dbus_message_iter_get_basic(&value, &val);
1349                                 roaming_policy = string2roamingpolicy(val);
1350                         } else {
1351                                 return -EINVAL;
1352                         }
1353                 }
1354                 dbus_message_iter_next(&array);
1355         }
1356
1357         dbus_message_iter_next(&iter);
1358         dbus_message_iter_get_basic(&iter, &notify_path);
1359
1360         if (notify_path == NULL) {
1361                 err = -EINVAL;
1362                 goto err;
1363         }
1364
1365         session_path = g_strdup_printf("/sessions%s", notify_path);
1366         if (session_path == NULL) {
1367                 err = -ENOMEM;
1368                 goto err;
1369         }
1370
1371         session = g_hash_table_lookup(session_hash, session_path);
1372         if (session != NULL) {
1373                 session = NULL;
1374                 err = -EEXIST;
1375                 goto err;
1376         }
1377
1378         session = g_try_new0(struct connman_session, 1);
1379         if (session == NULL) {
1380                 err = -ENOMEM;
1381                 goto err;
1382         }
1383
1384         session->info = g_try_new0(struct session_info, 1);
1385         if (session->info == NULL) {
1386                 err = -ENOMEM;
1387                 goto err;
1388         }
1389
1390         session->info_last = g_try_new0(struct session_info, 1);
1391         if (session->info_last == NULL) {
1392                 err = -ENOMEM;
1393                 goto err;
1394         }
1395
1396         info = session->info;
1397         info_last = session->info_last;
1398
1399         session->owner = g_strdup(owner);
1400         session->session_path = session_path;
1401         session->notify_path = g_strdup(notify_path);
1402         session->notify_watch =
1403                 g_dbus_add_disconnect_watch(connection, session->owner,
1404                                         owner_disconnect, session, NULL);
1405
1406         session->service_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1407                                                 NULL, NULL);
1408
1409         info->online = FALSE;
1410         info->priority = priority;
1411         info->avoid_handover = avoid_handover;
1412         info->stay_connected = stay_connected;
1413         info->periodic_connect = periodic_connect;
1414         info->idle_timeout = idle_timeout;
1415         info->ecall = ecall;
1416         info->roaming_policy = roaming_policy;
1417         info->entry = NULL;
1418         info->marker = 0;
1419
1420         if (allowed_bearers == NULL) {
1421                 info->allowed_bearers =
1422                                 session_allowed_bearers_any();
1423
1424                 if (info->allowed_bearers == NULL) {
1425                         err = -ENOMEM;
1426                         goto err;
1427                 }
1428         } else {
1429                 info->allowed_bearers = allowed_bearers;
1430         }
1431
1432         g_hash_table_replace(session_hash, session->session_path, session);
1433
1434         DBG("add %s", session->session_path);
1435
1436         if (g_dbus_register_interface(connection, session->session_path,
1437                                         CONNMAN_SESSION_INTERFACE,
1438                                         session_methods, NULL,
1439                                         NULL, session, NULL) == FALSE) {
1440                 connman_error("Failed to register %s", session->session_path);
1441                 g_hash_table_remove(session_hash, session->session_path);
1442                 session = NULL;
1443
1444                 err = -EINVAL;
1445                 goto err;
1446         }
1447
1448         g_dbus_send_reply(connection, msg,
1449                                 DBUS_TYPE_OBJECT_PATH, &session->session_path,
1450                                 DBUS_TYPE_INVALID);
1451
1452
1453         update_allowed_bearers(session);
1454         if (info->ecall == TRUE) {
1455                 ecall_session = session;
1456                 update_ecall_sessions(session);
1457         }
1458
1459         info_last->online = info->online;
1460         info_last->priority = info->priority;
1461         info_last->avoid_handover = info->avoid_handover;
1462         info_last->stay_connected = info->stay_connected;
1463         info_last->periodic_connect = info->periodic_connect;
1464         info_last->idle_timeout = info->idle_timeout;
1465         info_last->ecall = info->ecall;
1466         info_last->roaming_policy = info->roaming_policy;
1467         info_last->entry = info->entry;
1468         info_last->marker = info->marker;
1469         info_last->allowed_bearers = info->allowed_bearers;
1470
1471         session->info_dirty = TRUE;
1472         session->append_all = TRUE;
1473
1474         session_changed(session, CONNMAN_SESSION_TRIGGER_SETTING);
1475
1476         return 0;
1477
1478 err:
1479         connman_error("Failed to create session");
1480
1481         if (session != NULL) {
1482                 if (session->info_last != NULL)
1483                         g_free(session->info_last);
1484                 if (session->info != NULL)
1485                         g_free(session->info);
1486                 g_free(session);
1487         }
1488
1489         g_free(session_path);
1490
1491         g_slist_foreach(allowed_bearers, cleanup_bearer_info, NULL);
1492         g_slist_free(allowed_bearers);
1493
1494         return err;
1495 }
1496
1497 int __connman_session_destroy(DBusMessage *msg)
1498 {
1499         const char *owner, *session_path;
1500         struct connman_session *session;
1501
1502         owner = dbus_message_get_sender(msg);
1503
1504         DBG("owner %s", owner);
1505
1506         dbus_message_get_args(msg, NULL, DBUS_TYPE_OBJECT_PATH, &session_path,
1507                                                         DBUS_TYPE_INVALID);
1508         if (session_path == NULL)
1509                 return -EINVAL;
1510
1511         session = g_hash_table_lookup(session_hash, session_path);
1512         if (session == NULL)
1513                 return -EINVAL;
1514
1515         if (g_strcmp0(owner, session->owner) != 0)
1516                 return -EACCES;
1517
1518         session_disconnect(session);
1519
1520         return 0;
1521 }
1522
1523 connman_bool_t __connman_session_mode()
1524 {
1525         return sessionmode;
1526 }
1527
1528 void __connman_session_set_mode(connman_bool_t enable)
1529 {
1530         DBG("enable %d", enable);
1531
1532         if (sessionmode == enable)
1533                 return;
1534
1535         sessionmode = enable;
1536
1537         if (sessionmode == TRUE)
1538                 __connman_service_disconnect_all();
1539 }
1540
1541 static void service_add(struct connman_service *service)
1542 {
1543         GHashTableIter iter;
1544         GSequenceIter *iter_service_list;
1545         gpointer key, value;
1546         struct connman_session *session;
1547
1548         DBG("service %p", service);
1549
1550         g_hash_table_iter_init(&iter, session_hash);
1551
1552         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1553                 session = value;
1554
1555                 if (service_match(session, service) == FALSE)
1556                         continue;
1557
1558                 iter_service_list =
1559                         g_sequence_insert_sorted(session->service_list,
1560                                                         service, sort_services,
1561                                                         session);
1562
1563                 g_hash_table_replace(session->service_hash, service,
1564                                         iter_service_list);
1565
1566                 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1567         }
1568 }
1569
1570 static void service_remove(struct connman_service *service)
1571 {
1572
1573         GHashTableIter iter;
1574         gpointer key, value;
1575         struct connman_session *session;
1576         struct session_info *info;
1577
1578         DBG("service %p", service);
1579
1580         g_hash_table_iter_init(&iter, session_hash);
1581
1582         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1583                 GSequenceIter *iter;
1584                 session = value;
1585                 info = session->info;
1586
1587                 iter = g_hash_table_lookup(session->service_hash, service);
1588                 if (iter == NULL)
1589                         continue;
1590
1591                 g_sequence_remove(iter);
1592
1593                 info->entry = NULL;
1594                 session_changed(session, CONNMAN_SESSION_TRIGGER_SERVICE);
1595         }
1596 }
1597
1598 static void service_state_changed(struct connman_service *service,
1599                                         enum connman_service_state state)
1600 {
1601         GHashTableIter iter;
1602         gpointer key, value;
1603         struct connman_session *session;
1604         struct session_info *info, *info_last;
1605
1606         DBG("service %p state %d", service, state);
1607
1608         g_hash_table_iter_init(&iter, session_hash);
1609
1610         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1611                 session = value;
1612                 info = session->info;
1613                 info_last = session->info_last;
1614
1615                 if (info->entry != NULL && info->entry->service == service) {
1616                         info->entry->state = state;
1617                         info->online = is_online(info->entry->state);
1618                         if (info_last->online != info->online)
1619                                 session->info_dirty = TRUE;
1620                 }
1621
1622                 session_changed(session,
1623                                 CONNMAN_SESSION_TRIGGER_SERVICE);
1624         }
1625 }
1626
1627 static void ipconfig_changed(struct connman_service *service,
1628                                 struct connman_ipconfig *ipconfig)
1629 {
1630         GHashTableIter iter;
1631         gpointer key, value;
1632         struct connman_session *session;
1633         struct session_info *info;
1634         enum connman_ipconfig_type type;
1635
1636         DBG("service %p ipconfig %p", service, ipconfig);
1637
1638         type = __connman_ipconfig_get_config_type(ipconfig);
1639
1640         g_hash_table_iter_init(&iter, session_hash);
1641
1642         while (g_hash_table_iter_next(&iter, &key, &value) == TRUE) {
1643                 session = value;
1644                 info = session->info;
1645
1646                 if (info->entry != NULL && info->entry->service == service) {
1647                         if (type == CONNMAN_IPCONFIG_TYPE_IPV4)
1648                                 ipconfig_ipv4_changed(session);
1649                         else if (type == CONNMAN_IPCONFIG_TYPE_IPV6)
1650                                 ipconfig_ipv6_changed(session);
1651                 }
1652         }
1653 }
1654
1655 static struct connman_notifier session_notifier = {
1656         .name                   = "session",
1657         .service_add            = service_add,
1658         .service_remove         = service_remove,
1659         .service_state_changed  = service_state_changed,
1660         .ipconfig_changed       = ipconfig_changed,
1661 };
1662
1663 int __connman_session_init(void)
1664 {
1665         int err;
1666
1667         DBG("");
1668
1669         connection = connman_dbus_get_connection();
1670         if (connection == NULL)
1671                 return -1;
1672
1673         err = connman_notifier_register(&session_notifier);
1674         if (err < 0) {
1675                 dbus_connection_unref(connection);
1676                 return err;
1677         }
1678
1679         session_hash = g_hash_table_new_full(g_str_hash, g_str_equal,
1680                                                 NULL, cleanup_session);
1681
1682         sessionmode = FALSE;
1683         return 0;
1684 }
1685
1686 void __connman_session_cleanup(void)
1687 {
1688         DBG("");
1689
1690         if (connection == NULL)
1691                 return;
1692
1693         connman_notifier_unregister(&session_notifier);
1694
1695         g_hash_table_foreach(session_hash, release_session, NULL);
1696         g_hash_table_destroy(session_hash);
1697
1698         dbus_connection_unref(connection);
1699 }