]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/manager.h
Revert "mount: disable mount-storm protection while mount unit is starting."
[thirdparty/systemd.git] / src / core / manager.h
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
c2f1db8f 2#pragma once
60918275
LP
3
4#include <stdbool.h>
a66d02c3 5#include <stdio.h>
ea430986 6
718db961 7#include "sd-bus.h"
d0955f00 8#include "sd-device.h"
718db961 9#include "sd-event.h"
71d35b6b 10
4ad49000 11#include "cgroup-util.h"
400f1a33 12#include "fdset.h"
2e5c94b9 13#include "hashmap.h"
6a48d82f 14#include "ip-address-access.h"
2e5c94b9 15#include "list.h"
2e5c94b9 16#include "ratelimit.h"
a16e1123 17
227b8a76 18struct libmnt_monitor;
57b7a260 19typedef struct Unit Unit;
227b8a76 20
4f0f902f 21/* Enforce upper limit how many names we allow */
59d1a833 22#define MANAGER_MAX_NAMES 131072 /* 128K */
4f0f902f 23
60918275 24typedef struct Manager Manager;
acbb0225 25
89998745
LP
26/* An externally visible state. We don't actually maintain this as state variable, but derive it from various fields
27 * when requested */
f755e3b7 28typedef enum ManagerState {
d81afec1 29 MANAGER_INITIALIZING,
f755e3b7 30 MANAGER_STARTING,
a16e1123 31 MANAGER_RUNNING,
f755e3b7
LP
32 MANAGER_DEGRADED,
33 MANAGER_MAINTENANCE,
34 MANAGER_STOPPING,
35 _MANAGER_STATE_MAX,
36 _MANAGER_STATE_INVALID = -1
37} ManagerState;
38
af41e508 39typedef enum ManagerObjective {
f755e3b7 40 MANAGER_OK,
a16e1123
LP
41 MANAGER_EXIT,
42 MANAGER_RELOAD,
43 MANAGER_REEXECUTE,
b9080b03
FF
44 MANAGER_REBOOT,
45 MANAGER_POWEROFF,
46 MANAGER_HALT,
47 MANAGER_KEXEC,
664f88a7 48 MANAGER_SWITCH_ROOT,
af41e508
LP
49 _MANAGER_OBJECTIVE_MAX,
50 _MANAGER_OBJECTIVE_INVALID = -1
51} ManagerObjective;
a16e1123 52
127d5fd1
ZJS
53typedef enum StatusType {
54 STATUS_TYPE_EPHEMERAL,
55 STATUS_TYPE_NORMAL,
ebc5788e 56 STATUS_TYPE_EMERGENCY,
127d5fd1
ZJS
57} StatusType;
58
7bc740f4
YW
59/* Notes:
60 * 1. TIMESTAMP_FIRMWARE, TIMESTAMP_LOADER, TIMESTAMP_KERNEL, TIMESTAMP_INITRD,
61 * TIMESTAMP_SECURITY_START, and TIMESTAMP_SECURITY_FINISH are set only when
62 * the manager is system and not running under container environment.
63 *
64 * 2. The monotonic timestamp of TIMESTAMP_KERNEL is always zero.
65 *
66 * 3. The realtime timestamp of TIMESTAMP_KERNEL will be unset if the system does not
67 * have RTC.
68 *
69 * 4. TIMESTAMP_FIRMWARE and TIMESTAMP_LOADER will be unset if the system does not
70 * have RTC, or systemd is built without EFI support.
71 *
72 * 5. The monotonic timestamps of TIMESTAMP_FIRMWARE and TIMESTAMP_LOADER are stored as
73 * negative of the actual value.
74 *
75 * 6. TIMESTAMP_USERSPACE is the timestamp of when the manager was started.
76 *
77 * 7. TIMESTAMP_INITRD_* are set only when the system is booted with an initrd.
78 */
79
9f9f0342
LP
80typedef enum ManagerTimestamp {
81 MANAGER_TIMESTAMP_FIRMWARE,
82 MANAGER_TIMESTAMP_LOADER,
83 MANAGER_TIMESTAMP_KERNEL,
84 MANAGER_TIMESTAMP_INITRD,
85 MANAGER_TIMESTAMP_USERSPACE,
86 MANAGER_TIMESTAMP_FINISH,
87
88 MANAGER_TIMESTAMP_SECURITY_START,
89 MANAGER_TIMESTAMP_SECURITY_FINISH,
90 MANAGER_TIMESTAMP_GENERATORS_START,
91 MANAGER_TIMESTAMP_GENERATORS_FINISH,
92 MANAGER_TIMESTAMP_UNITS_LOAD_START,
93 MANAGER_TIMESTAMP_UNITS_LOAD_FINISH,
d4ee7bd8
YW
94
95 MANAGER_TIMESTAMP_INITRD_SECURITY_START,
96 MANAGER_TIMESTAMP_INITRD_SECURITY_FINISH,
97 MANAGER_TIMESTAMP_INITRD_GENERATORS_START,
98 MANAGER_TIMESTAMP_INITRD_GENERATORS_FINISH,
99 MANAGER_TIMESTAMP_INITRD_UNITS_LOAD_START,
100 MANAGER_TIMESTAMP_INITRD_UNITS_LOAD_FINISH,
9f9f0342
LP
101 _MANAGER_TIMESTAMP_MAX,
102 _MANAGER_TIMESTAMP_INVALID = -1,
103} ManagerTimestamp;
104
400f1a33 105#include "execute.h"
60918275 106#include "job.h"
84e3543e 107#include "path-lookup.h"
4d7213b2 108#include "show-status.h"
400f1a33 109#include "unit-name.h"
60918275 110
638cece4
LP
111typedef enum ManagerTestRunFlags {
112 MANAGER_TEST_NORMAL = 0, /* run normally */
ed4ac965
LP
113 MANAGER_TEST_RUN_MINIMAL = 1 << 0, /* create basic data structures */
114 MANAGER_TEST_RUN_BASIC = 1 << 1, /* interact with the environment */
115 MANAGER_TEST_RUN_ENV_GENERATORS = 1 << 2, /* also run env generators */
116 MANAGER_TEST_RUN_GENERATORS = 1 << 3, /* also run unit generators */
e8112e67 117 MANAGER_TEST_FULL = MANAGER_TEST_RUN_BASIC | MANAGER_TEST_RUN_ENV_GENERATORS | MANAGER_TEST_RUN_GENERATORS,
638cece4
LP
118} ManagerTestRunFlags;
119
e0a3da1f
ZJS
120assert_cc((MANAGER_TEST_FULL & UINT8_MAX) == MANAGER_TEST_FULL);
121
60918275 122struct Manager {
87f0e418 123 /* Note that the set of units we know of is allowed to be
35b8ca3a 124 * inconsistent. However the subset of it that is loaded may
87d1515d
LP
125 * not, and the list of jobs may neither. */
126
87f0e418
LP
127 /* Active jobs and units */
128 Hashmap *units; /* name string => Unit object n:1 */
4b58153d 129 Hashmap *units_by_invocation_id;
60918275
LP
130 Hashmap *jobs; /* job id => Job object 1:1 */
131
ef734fd6
LP
132 /* To make it easy to iterate through the units of a specific
133 * type we maintain a per type linked list */
ac155bb8 134 LIST_HEAD(Unit, units_by_type[_UNIT_TYPE_MAX]);
ef734fd6 135
87f0e418 136 /* Units that need to be loaded */
ac155bb8 137 LIST_HEAD(Unit, load_queue); /* this is actually more a stack than a queue, but uh. */
60918275 138
034c6ed7
LP
139 /* Jobs that need to be run */
140 LIST_HEAD(Job, run_queue); /* more a stack than a queue, too */
141
c1e1601e
LP
142 /* Units and jobs that have not yet been announced via
143 * D-Bus. When something about a job changes it is added here
144 * if it is not in there yet. This allows easy coalescing of
145 * D-Bus change signals. */
ac155bb8 146 LIST_HEAD(Unit, dbus_unit_queue);
c1e1601e
LP
147 LIST_HEAD(Job, dbus_job_queue);
148
701cc384 149 /* Units to remove */
ac155bb8 150 LIST_HEAD(Unit, cleanup_queue);
23a177ef 151
c5a97ed1
LP
152 /* Units and jobs to check when doing GC */
153 LIST_HEAD(Unit, gc_unit_queue);
154 LIST_HEAD(Job, gc_job_queue);
701cc384 155
4ad49000 156 /* Units that should be realized */
91a6073e 157 LIST_HEAD(Unit, cgroup_realize_queue);
4ad49000 158
09e24654
LP
159 /* Units whose cgroup ran empty */
160 LIST_HEAD(Unit, cgroup_empty_queue);
161
19496554
MS
162 /* Target units whose default target dependencies haven't been set yet */
163 LIST_HEAD(Unit, target_deps_queue);
164
a3c1168a
LP
165 /* Units that might be subject to StopWhenUnneeded= clean-up */
166 LIST_HEAD(Unit, stop_when_unneeded_queue);
167
718db961
LP
168 sd_event *event;
169
62a76913
LP
170 /* This maps PIDs we care about to units that are interested in. We allow multiple units to he interested in
171 * the same PID and multiple PIDs to be relevant to the same unit. Since in most cases only a single unit will
172 * be interested in the same PID we use a somewhat special encoding here: the first unit interested in a PID is
173 * stored directly in the hashmap, keyed by the PID unmodified. If there are other units interested too they'll
174 * be stored in a NULL-terminated array, and keyed by the negative PID. This is safe as pid_t is signed and
175 * negative PIDs are not used for regular processes but process groups, which we don't care about in this
176 * context, but this allows us to use the negative range for our own purposes. */
177 Hashmap *watch_pids; /* pid => unit as well as -pid => array of units */
9152c765 178
95ae05c0
WC
179 /* A set contains all units which cgroup should be refreshed after startup */
180 Set *startup_units;
181
f755e3b7
LP
182 /* A set which contains all currently failed units */
183 Set *failed_units;
184
752b5905
LP
185 sd_event_source *run_queue_event_source;
186
c952c6ec 187 char *notify_socket;
718db961
LP
188 int notify_fd;
189 sd_event_source *notify_event_source;
190
d8fdc620
LP
191 int cgroups_agent_fd;
192 sd_event_source *cgroups_agent_event_source;
193
718db961
LP
194 int signal_fd;
195 sd_event_source *signal_event_source;
c952c6ec 196
575b300b
LP
197 sd_event_source *sigchld_event_source;
198
718db961
LP
199 int time_change_fd;
200 sd_event_source *time_change_event_source;
9d58f1db 201
bbf5fd8e
LP
202 sd_event_source *timezone_change_event_source;
203
718db961 204 sd_event_source *jobs_in_progress_event_source;
acbb0225 205
00d9ef85
LP
206 int user_lookup_fds[2];
207 sd_event_source *user_lookup_event_source;
208
5f109056
LP
209 sd_event_source *sync_bus_names_event_source;
210
463d0d15 211 UnitFileScope unit_file_scope;
84e3543e 212 LookupPaths lookup_paths;
fe51822e 213 Set *unit_path_cache;
036643a2 214
1ad6e8b3
LP
215 char **transient_environment; /* The environment, as determined from config files, kernel cmdline and environment generators */
216 char **client_environment; /* Environment variables created by clients through the bus API */
1137a57c 217
e96d6be7
LP
218 usec_t runtime_watchdog;
219 usec_t shutdown_watchdog;
220
9f9f0342 221 dual_timestamp timestamps[_MANAGER_TIMESTAMP_MAX];
8d567588 222
9670d583 223 /* Data specific to the device subsystem */
d0955f00 224 sd_device_monitor *device_monitor;
8fe914ec 225 Hashmap *devices_by_sysfs;
ef734fd6
LP
226
227 /* Data specific to the mount subsystem */
d379d442 228 struct libmnt_monitor *mount_monitor;
718db961 229 sd_event_source *mount_event_source;
89f9752e
N
230 sd_event_source *mount_timeout_source;
231 usec_t mount_last_read_usec;
232 usec_t mount_last_duration_usec;
ea430986 233
07b0b134
ML
234 /* Data specific to the swap filesystem */
235 FILE *proc_swaps;
718db961 236 sd_event_source *swap_event_source;
9670d583 237 Hashmap *swaps_by_devnode;
07b0b134 238
ea430986 239 /* Data specific to the D-Bus subsystem */
718db961
LP
240 sd_bus *api_bus, *system_bus;
241 Set *private_buses;
242 int private_listen_fd;
243 sd_event_source *private_listen_event_source;
8f8f05a9
LP
244
245 /* Contains all the clients that are subscribed to signals via
246 the API bus. Note that private bus connections are always
247 considered subscribes, since they last for very short only,
248 and it is much simpler that way. */
249 sd_bus_track *subscribed;
250 char **deserialized_subscribed;
5e8d1c9a 251
8f88ecf6
LP
252 /* This is used during reloading: before the reload we queue
253 * the reply message here, and afterwards we send it */
209de525 254 sd_bus_message *pending_reload_message;
8e274523 255
05e343b7 256 Hashmap *watch_bus; /* D-Bus names => Unit object n:1 */
05e343b7 257
71445ae7
LP
258 bool send_reloading_done;
259
7fab9d01 260 uint32_t current_job_id;
bacbccb7 261 uint32_t default_unit_job_id;
7fab9d01 262
9d58f1db
LP
263 /* Data specific to the Automount subsystem */
264 int dev_autofs_fd;
265
8e274523 266 /* Data specific to the cgroup subsystem */
4ad49000 267 Hashmap *cgroup_unit;
efdb0237 268 CGroupMask cgroup_supported;
9444b1f2 269 char *cgroup_root;
e537352b 270
09e24654 271 /* Notifications from cgroups, when the unified hierarchy is used is done via inotify. */
efdb0237
LP
272 int cgroup_inotify_fd;
273 sd_event_source *cgroup_inotify_event_source;
274 Hashmap *cgroup_inotify_wd_unit;
701cc384 275
09e24654
LP
276 /* A defer event for handling cgroup empty events and processing them after SIGCHLD in all cases. */
277 sd_event_source *cgroup_empty_event_source;
278
35b8ca3a 279 /* Make sure the user cannot accidentally unmount our cgroup
33be102a
LP
280 * file system */
281 int pin_cgroupfs_fd;
282
892a035c 283 unsigned gc_marker;
efdb0237 284
bbf5fd8e
LP
285 /* The stat() data the last time we saw /etc/localtime */
286 usec_t etc_localtime_mtime;
287 bool etc_localtime_accessible:1;
288
af41e508 289 ManagerObjective objective:5;
41447faf 290
af41e508 291 /* Flags */
9d58f1db 292 bool dispatching_load_queue:1;
9d58f1db 293
72bc8d00 294 bool taint_usr:1;
e0a3da1f 295
d8eb10d6 296 /* Have we already sent out the READY=1 notification? */
0c2826c6
ZJS
297 bool ready_sent:1;
298
d8eb10d6
ZJS
299 /* Have we already printed the taint line if necessary? */
300 bool taint_logged:1;
301
00b5974f
LP
302 /* Have we ever changed the "kernel.pid_max" sysctl? */
303 bool sysctl_pid_max_changed:1;
304
638cece4 305 ManagerTestRunFlags test_run_flags:8;
0d8c31ff 306
287419c1
AC
307 /* If non-zero, exit with the following value when the systemd
308 * process terminate. Useful for containers: systemd-nspawn could get
309 * the return value. */
310 uint8_t return_value;
311
d450b6f2 312 ShowStatus show_status;
7d5ceb64 313 char *confirm_spawn;
31a7eb86 314 bool no_console_output;
2a12e32e 315 bool service_watchdogs;
d3689161 316
0a494f1f
LP
317 ExecOutput default_std_output, default_std_error;
318
085afe36 319 usec_t default_restart_usec, default_timeout_start_usec, default_timeout_stop_usec;
1f19a534 320
3f41e1e5
LN
321 usec_t default_start_limit_interval;
322 unsigned default_start_limit_burst;
323
085afe36
LP
324 bool default_cpu_accounting;
325 bool default_memory_accounting;
13c31542 326 bool default_io_accounting;
085afe36 327 bool default_blockio_accounting;
03a7b521 328 bool default_tasks_accounting;
377bfd2d 329 bool default_ip_accounting;
085afe36 330
0af20ea2 331 uint64_t default_tasks_max;
bd8f585b
LP
332 usec_t default_timer_accuracy_usec;
333
a6ecbf83 334 int original_log_level;
bda7d78b 335 LogTarget original_log_target;
a6ecbf83 336 bool log_level_overridden:1;
bda7d78b 337 bool log_target_overridden:1;
a6ecbf83 338
517d56b1 339 struct rlimit *rlimit[_RLIMIT_MAX];
c93ff2e9 340
a7556052
LP
341 /* non-zero if we are reloading or reexecuting, */
342 int n_reloading;
e409f875
LP
343
344 unsigned n_installed_jobs;
76bf48b7 345 unsigned n_failed_jobs;
f2b68789 346
03b717a3 347 /* Jobs in progress watching */
637f8b8e 348 unsigned n_running_jobs;
7ed9f6cd 349 unsigned n_on_console;
03b717a3 350 unsigned jobs_in_progress_iteration;
637f8b8e 351
e46b13c8
ZJS
352 /* Do we have any outstanding password prompts? */
353 int have_ask_password;
354 int ask_password_inotify_fd;
355 sd_event_source *ask_password_event_source;
356
f2b68789 357 /* Type=idle pipes */
31a7eb86 358 int idle_pipe[4];
718db961 359 sd_event_source *idle_pipe_event_source;
664f88a7
LP
360
361 char *switch_root;
362 char *switch_root_init;
a57f7e2c
LP
363
364 /* This maps all possible path prefixes to the units needing
365 * them. It's a hashmap with a path string as key and a Set as
366 * value where Unit objects are contained. */
367 Hashmap *units_requiring_mounts_for;
e3dd987c 368
283868e1
SW
369 /* Used for processing polkit authorization responses */
370 Hashmap *polkit_registry;
2e5c94b9 371
29206d46
LP
372 /* Dynamic users/groups, indexed by their name */
373 Hashmap *dynamic_users;
374
00d9ef85
LP
375 /* Keep track of all UIDs and GIDs any of our services currently use. This is useful for the RemoveIPC= logic. */
376 Hashmap *uid_refs;
377 Hashmap *gid_refs;
378
e8a565cb
YW
379 /* ExecRuntime, indexed by their owner unit id */
380 Hashmap *exec_runtime_by_id;
381
24dd31c1 382 /* When the user hits C-A-D more than 7 times per 2s, do something immediately... */
2e5c94b9 383 RateLimit ctrl_alt_del_ratelimit;
ae8c7939 384 EmergencyAction cad_burst_action;
f2341e0a
LP
385
386 const char *unit_log_field;
387 const char *unit_log_format_string;
ae2a2c53 388
4b58153d
LP
389 const char *invocation_log_field;
390 const char *invocation_log_format_string;
391
463d0d15 392 int first_boot; /* tri-state */
3536f49e 393
62a76913 394 /* Prefixes of e.g. RuntimeDirectory= */
72fd1768 395 char *prefix[_EXEC_DIRECTORY_TYPE_MAX];
62a76913
LP
396
397 /* Used in the SIGCHLD and sd_notify() message invocation logic to avoid that we dispatch the same event
398 * multiple times on the same unit. */
399 unsigned sigchldgen;
400 unsigned notifygen;
60918275
LP
401};
402
463d0d15
LP
403#define MANAGER_IS_SYSTEM(m) ((m)->unit_file_scope == UNIT_FILE_SYSTEM)
404#define MANAGER_IS_USER(m) ((m)->unit_file_scope != UNIT_FILE_SYSTEM)
405
2c289ea8
LP
406#define MANAGER_IS_RELOADING(m) ((m)->n_reloading > 0)
407
49d5666c
LP
408#define MANAGER_IS_FINISHED(m) (dual_timestamp_is_set((m)->timestamps + MANAGER_TIMESTAMP_FINISH))
409
af41e508
LP
410/* The objective is set to OK as soon as we enter the main loop, and set otherwise as soon as we are done with it */
411#define MANAGER_IS_RUNNING(m) ((m)->objective == MANAGER_OK)
4259d202 412
638cece4
LP
413#define MANAGER_IS_TEST_RUN(m) ((m)->test_run_flags != 0)
414
415int manager_new(UnitFileScope scope, ManagerTestRunFlags test_run_flags, Manager **m);
06d8d842 416Manager* manager_free(Manager *m);
c70cac54 417DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_free);
60918275 418
a16e1123 419int manager_startup(Manager *m, FILE *serialization, FDSet *fds);
f50e0a01 420
60918275 421Job *manager_get_job(Manager *m, uint32_t id);
87f0e418 422Unit *manager_get_unit(Manager *m, const char *name);
60918275 423
86fbf370 424int manager_get_job_from_dbus_path(Manager *m, const char *s, Job **_j);
ea430986 425
718db961
LP
426int manager_load_unit_prepare(Manager *m, const char *name, const char *path, sd_bus_error *e, Unit **_ret);
427int manager_load_unit(Manager *m, const char *name, const char *path, sd_bus_error *e, Unit **_ret);
4109ede7 428int manager_load_startable_unit_or_warn(Manager *m, const char *name, const char *path, Unit **ret);
718db961 429int manager_load_unit_from_dbus_path(Manager *m, const char *s, sd_bus_error *e, Unit **_u);
28247076 430
4bd29fe5
LP
431int manager_add_job(Manager *m, JobType type, Unit *unit, JobMode mode, sd_bus_error *e, Job **_ret);
432int manager_add_job_by_name(Manager *m, JobType type, const char *name, JobMode mode, sd_bus_error *e, Job **_ret);
53f18416 433int manager_add_job_by_name_and_warn(Manager *m, JobType type, const char *name, JobMode mode, Job **ret);
15d167f8 434int manager_propagate_reload(Manager *m, Unit *unit, JobMode mode, sd_bus_error *e);
60918275 435
87f0e418 436void manager_dump_units(Manager *s, FILE *f, const char *prefix);
cea8e32e 437void manager_dump_jobs(Manager *s, FILE *f, const char *prefix);
ad75b9e7 438void manager_dump(Manager *s, FILE *f, const char *prefix);
713f6f90 439int manager_get_dump_string(Manager *m, char **ret);
a66d02c3 440
7fad411c
LP
441void manager_clear_jobs(Manager *m);
442
c1e1601e 443unsigned manager_dispatch_load_queue(Manager *m);
f50e0a01 444
79a224c4 445int manager_default_environment(Manager *m);
1ad6e8b3
LP
446int manager_transient_environment_add(Manager *m, char **plus);
447int manager_client_environment_modify(Manager *m, char **minus, char **plus);
448int manager_get_effective_environment(Manager *m, char ***ret);
449
c93ff2e9 450int manager_set_default_rlimits(Manager *m, struct rlimit **default_rlimit);
b2bb3dbe 451
9152c765 452int manager_loop(Manager *m);
83c60c9f 453
d8d5ab98 454int manager_open_serialization(Manager *m, FILE **_f);
a16e1123 455
b3680f49 456int manager_serialize(Manager *m, FILE *f, FDSet *fds, bool switching_root);
a16e1123
LP
457int manager_deserialize(Manager *m, FILE *f, FDSet *fds);
458
459int manager_reload(Manager *m);
460
fdf20a31 461void manager_reset_failed(Manager *m);
5632e374 462
4927fcae 463void manager_send_unit_audit(Manager *m, Unit *u, int type, bool success);
e983b760 464void manager_send_unit_plymouth(Manager *m, Unit *u);
4927fcae 465
31afa0a4 466bool manager_unit_inactive_or_pending(Manager *m, const char *name);
8f6df3fa 467
b0c918b9
LP
468void manager_check_finished(Manager *m);
469
8559b3b7 470void manager_recheck_dbus(Manager *m);
4cfa2c99 471void manager_recheck_journal(Manager *m);
f1dd0c3f 472
d450b6f2 473void manager_set_show_status(Manager *m, ShowStatus mode);
e2680723
LP
474void manager_set_first_boot(Manager *m, bool b);
475
127d5fd1 476void manager_status_printf(Manager *m, StatusType type, const char *status, const char *format, ...) _printf_(4,5);
cb8ccb22 477void manager_flip_auto_status(Manager *m, bool enable);
68b29a9f 478
a57f7e2c 479Set *manager_get_units_requiring_mounts_for(Manager *m, const char *path);
e66cf1a3 480
f755e3b7
LP
481ManagerState manager_state(Manager *m);
482
5269eb6b 483int manager_update_failed_units(Manager *m, Unit *u, bool failed);
03455c28 484
00d9ef85
LP
485void manager_unref_uid(Manager *m, uid_t uid, bool destroy_now);
486int manager_ref_uid(Manager *m, uid_t uid, bool clean_ipc);
487
488void manager_unref_gid(Manager *m, gid_t gid, bool destroy_now);
489int manager_ref_gid(Manager *m, gid_t gid, bool destroy_now);
490
491void manager_vacuum_uid_refs(Manager *m);
492void manager_vacuum_gid_refs(Manager *m);
493
494void manager_serialize_uid_refs(Manager *m, FILE *f);
495void manager_deserialize_uid_refs_one(Manager *m, const char *value);
496
497void manager_serialize_gid_refs(Manager *m, FILE *f);
498void manager_deserialize_gid_refs_one(Manager *m, const char *value);
499
af6b0ecc
LP
500char *manager_taint_string(Manager *m);
501
adefcf28
LP
502void manager_ref_console(Manager *m);
503void manager_unref_console(Manager *m);
504
a6ecbf83
FB
505void manager_override_log_level(Manager *m, int level);
506void manager_restore_original_log_level(Manager *m);
507
bda7d78b
FB
508void manager_override_log_target(Manager *m, LogTarget target);
509void manager_restore_original_log_target(Manager *m);
510
f755e3b7
LP
511const char *manager_state_to_string(ManagerState m) _const_;
512ManagerState manager_state_from_string(const char *s) _pure_;
7d5ceb64
FB
513
514const char *manager_get_confirm_spawn(Manager *m);
b0eb2944
FB
515bool manager_is_confirm_spawn_disabled(Manager *m);
516void manager_disable_confirm_spawn(void);
9f9f0342
LP
517
518const char *manager_timestamp_to_string(ManagerTimestamp m) _const_;
519ManagerTimestamp manager_timestamp_from_string(const char *s) _pure_;
d4ee7bd8 520ManagerTimestamp manager_timestamp_initrd_mangle(ManagerTimestamp s);