1SYSTEMD-SYSTEM.CONF(5) systemd-system.conf SYSTEMD-SYSTEM.CONF(5)
2
3
4
6 systemd-system.conf, system.conf.d, systemd-user.conf, user.conf.d -
7 System and session service manager configuration files
8
10 /etc/systemd/system.conf, /etc/systemd/system.conf.d/*.conf,
11 /run/systemd/system.conf.d/*.conf,
12 /usr/lib/systemd/system.conf.d/*.conf
13
14 ~/.config/systemd/user.conf, /etc/systemd/user.conf,
15 /etc/systemd/user.conf.d/*.conf, /run/systemd/user.conf.d/*.conf,
16 /usr/lib/systemd/user.conf.d/*.conf
17
19 When run as a system instance, systemd interprets the configuration
20 file system.conf and the files in system.conf.d directories; when run
21 as a user instance, it interprets the configuration file user.conf
22 (either in the home directory of the user, or if not found, under
23 /etc/systemd/) and the files in user.conf.d directories. These
24 configuration files contain a few settings controlling basic manager
25 operations.
26
27 See systemd.syntax(7) for a general description of the syntax.
28
30 The default configuration is set during compilation, so configuration
31 is only needed when it is necessary to deviate from those defaults.
32 Initially, the main configuration file in /etc/systemd/ contains
33 commented out entries showing the defaults as a guide to the
34 administrator. Local overrides can be created by editing this file or
35 by creating drop-ins, as described below. Using drop-ins for local
36 configuration is recommended over modifications to the main
37 configuration file.
38
39 In addition to the "main" configuration file, drop-in configuration
40 snippets are read from /usr/lib/systemd/*.conf.d/,
41 /usr/local/lib/systemd/*.conf.d/, and /etc/systemd/*.conf.d/. Those
42 drop-ins have higher precedence and override the main configuration
43 file. Files in the *.conf.d/ configuration subdirectories are sorted by
44 their filename in lexicographic order, regardless of in which of the
45 subdirectories they reside. When multiple files specify the same
46 option, for options which accept just a single value, the entry in the
47 file sorted last takes precedence, and for options which accept a list
48 of values, entries are collected as they occur in the sorted files.
49
50 When packages need to customize the configuration, they can install
51 drop-ins under /usr/. Files in /etc/ are reserved for the local
52 administrator, who may use this logic to override the configuration
53 files installed by vendor packages. Drop-ins have to be used to
54 override package drop-ins, since the main configuration file has lower
55 precedence. It is recommended to prefix all filenames in those
56 subdirectories with a two-digit number and a dash, to simplify the
57 ordering of the files.
58
59 To disable a configuration file supplied by the vendor, the recommended
60 way is to place a symlink to /dev/null in the configuration directory
61 in /etc/, with the same filename as the vendor configuration file.
62
64 All options are configured in the [Manager] section:
65
66 LogColor=, LogLevel=, LogLocation=, LogTarget=, LogTime=, DumpCore=yes,
67 CrashChangeVT=no, CrashShell=no, CrashReboot=no, ShowStatus=yes,
68 DefaultStandardOutput=journal, DefaultStandardError=inherit
69 Configures various parameters of basic manager operation. These
70 options may be overridden by the respective process and kernel
71 command line arguments. See systemd(1) for details.
72
73 CtrlAltDelBurstAction=
74 Defines what action will be performed if user presses
75 Ctrl-Alt-Delete more than 7 times in 2s. Can be set to
76 "reboot-force", "poweroff-force", "reboot-immediate",
77 "poweroff-immediate" or disabled with "none". Defaults to
78 "reboot-force".
79
80 CPUAffinity=
81 Configures the CPU affinity for the service manager as well as the
82 default CPU affinity for all forked off processes. Takes a list of
83 CPU indices or ranges separated by either whitespace or commas. CPU
84 ranges are specified by the lower and upper CPU indices separated
85 by a dash. This option may be specified more than once, in which
86 case the specified CPU affinity masks are merged. If the empty
87 string is assigned, the mask is reset, all assignments prior to
88 this will have no effect. Individual services may override the CPU
89 affinity for their processes with the CPUAffinity= setting in unit
90 files, see systemd.exec(5).
91
92 NUMAPolicy=
93 Configures the NUMA memory policy for the service manager and the
94 default NUMA memory policy for all forked off processes. Individual
95 services may override the default policy with the NUMAPolicy=
96 setting in unit files, see systemd.exec(5).
97
98 NUMAMask=
99 Configures the NUMA node mask that will be associated with the
100 selected NUMA policy. Note that default and local NUMA policies
101 don't require explicit NUMA node mask and value of the option can
102 be empty. Similarly to NUMAPolicy=, value can be overridden by
103 individual services in unit files, see systemd.exec(5).
104
105 RuntimeWatchdogSec=, RebootWatchdogSec=, KExecWatchdogSec=
106 Configure the hardware watchdog at runtime and at reboot. Takes a
107 timeout value in seconds (or in other time units if suffixed with
108 "ms", "min", "h", "d", "w"), or the special strings "off" or
109 "default". If set to "off" (alternatively: "0") the watchdog logic
110 is disabled: no watchdog device is opened, configured, or pinged.
111 If set to the special string "default" the watchdog is opened and
112 pinged in regular intervals, but the timeout is not changed from
113 the default. If set to any other time value the watchdog timeout is
114 configured to the specified value (or a value close to it,
115 depending on hardware capabilities).
116
117 If RuntimeWatchdogSec= is set to a non-zero value, the watchdog
118 hardware (/dev/watchdog0 or the path specified with WatchdogDevice=
119 or the kernel option systemd.watchdog-device=) will be programmed
120 to automatically reboot the system if it is not contacted within
121 the specified timeout interval. The system manager will ensure to
122 contact it at least once in half the specified timeout interval.
123 This feature requires a hardware watchdog device to be present, as
124 it is commonly the case in embedded and server systems. Not all
125 hardware watchdogs allow configuration of all possible reboot
126 timeout values, in which case the closest available timeout is
127 picked.
128
129 RebootWatchdogSec= may be used to configure the hardware watchdog
130 when the system is asked to reboot. It works as a safety net to
131 ensure that the reboot takes place even if a clean reboot attempt
132 times out. Note that the RebootWatchdogSec= timeout applies only to
133 the second phase of the reboot, i.e. after all regular services are
134 already terminated, and after the system and service manager
135 process (PID 1) got replaced by the systemd-shutdown binary, see
136 system bootup(7) for details. During the first phase of the
137 shutdown operation the system and service manager remains running
138 and hence RuntimeWatchdogSec= is still honoured. In order to define
139 a timeout on this first phase of system shutdown, configure
140 JobTimeoutSec= and JobTimeoutAction= in the [Unit] section of the
141 shutdown.target unit. By default RuntimeWatchdogSec= defaults to 0
142 (off), and RebootWatchdogSec= to 10min.
143
144 KExecWatchdogSec= may be used to additionally enable the watchdog
145 when kexec is being executed rather than when rebooting. Note that
146 if the kernel does not reset the watchdog on kexec (depending on
147 the specific hardware and/or driver), in this case the watchdog
148 might not get disabled after kexec succeeds and thus the system
149 might get rebooted, unless RuntimeWatchdogSec= is also enabled at
150 the same time. For this reason it is recommended to enable
151 KExecWatchdogSec= only if RuntimeWatchdogSec= is also enabled.
152
153 These settings have no effect if a hardware watchdog is not
154 available.
155
156 RuntimeWatchdogPreSec=
157 Configure the hardware watchdog device pre-timeout value. Takes a
158 timeout value in seconds (or in other time units similar to
159 RuntimeWatchdogSec=). A watchdog pre-timeout is a notification
160 generated by the watchdog before the watchdog reset might occur in
161 the event the watchdog has not been serviced. This notification is
162 handled by the kernel and can be configured to take an action (i.e.
163 generate a kernel panic) using RuntimeWatchdogPreGovernor=. Not all
164 watchdog hardware or drivers support generating a pre-timeout and
165 depending on the state of the system, the kernel may be unable to
166 take the configured action before the watchdog reboot. The watchdog
167 will be configured to generate the pre-timeout event at the amount
168 of time specified by RuntimeWatchdogPreSec= before the runtime
169 watchdog timeout (set by RuntimeWatchdogSec=). For example, if the
170 we have RuntimeWatchdogSec=30 and RuntimeWatchdogPreSec=10, then
171 the pre-timeout event will occur if the watchdog has not pinged for
172 20s (10s before the watchdog would fire). By default,
173 RuntimeWatchdogPreSec= defaults to 0 (off). The value set for
174 RuntimeWatchdogPreSec= must be smaller than the timeout value for
175 RuntimeWatchdogSec=. This setting has no effect if a hardware
176 watchdog is not available or the hardware watchdog does not support
177 a pre-timeout and will be ignored by the kernel if the setting is
178 greater than the actual watchdog timeout.
179
180 RuntimeWatchdogPreGovernor=
181 Configure the action taken by the hardware watchdog device when the
182 pre-timeout expires. The default action for the pre-timeout event
183 depends on the kernel configuration, but it is usually to log a
184 kernel message. For a list of valid actions available for a given
185 watchdog device, check the content of the
186 /sys/class/watchdog/watchdogX/pretimeout_available_governors file.
187 Typically, available governor types are noop and panic.
188 Availability, names and functionality might vary depending on the
189 specific device driver in use. If the
190 pretimeout_available_governors sysfs file is empty, the governor
191 might be built as a kernel module and might need to be manually
192 loaded (e.g. pretimeout_noop.ko), or the watchdog device might not
193 support pre-timeouts.
194
195 WatchdogDevice=
196 Configure the hardware watchdog device that the runtime and
197 shutdown watchdog timers will open and use. Defaults to
198 /dev/watchdog0. This setting has no effect if a hardware watchdog
199 is not available.
200
201 CapabilityBoundingSet=
202 Controls which capabilities to include in the capability bounding
203 set for PID 1 and its children. See capabilities(7) for details.
204 Takes a whitespace-separated list of capability names as read by
205 cap_from_name(3). Capabilities listed will be included in the
206 bounding set, all others are removed. If the list of capabilities
207 is prefixed with ~, all but the listed capabilities will be
208 included, the effect of the assignment inverted. Note that this
209 option also affects the respective capabilities in the effective,
210 permitted and inheritable capability sets. The capability bounding
211 set may also be individually configured for units using the
212 CapabilityBoundingSet= directive for units, but note that
213 capabilities dropped for PID 1 cannot be regained in individual
214 units, they are lost for good.
215
216 NoNewPrivileges=
217 Takes a boolean argument. If true, ensures that PID 1 and all its
218 children can never gain new privileges through execve(2) (e.g. via
219 setuid or setgid bits, or filesystem capabilities). Defaults to
220 false. General purpose distributions commonly rely on executables
221 with setuid or setgid bits and will thus not function properly with
222 this option enabled. Individual units cannot disable this option.
223 Also see No New Privileges Flag[1].
224
225 SystemCallArchitectures=
226 Takes a space-separated list of architecture identifiers. Selects
227 from which architectures system calls may be invoked on this
228 system. This may be used as an effective way to disable invocation
229 of non-native binaries system-wide, for example to prohibit
230 execution of 32-bit x86 binaries on 64-bit x86-64 systems. This
231 option operates system-wide, and acts similar to the
232 SystemCallArchitectures= setting of unit files, see systemd.exec(5)
233 for details. This setting defaults to the empty list, in which case
234 no filtering of system calls based on architecture is applied.
235 Known architecture identifiers are "x86", "x86-64", "x32", "arm"
236 and the special identifier "native". The latter implicitly maps to
237 the native architecture of the system (or more specifically, the
238 architecture the system manager was compiled for). Set this setting
239 to "native" to prohibit execution of any non-native binaries. When
240 a binary executes a system call of an architecture that is not
241 listed in this setting, it will be immediately terminated with the
242 SIGSYS signal.
243
244 TimerSlackNSec=
245 Sets the timer slack in nanoseconds for PID 1, which is inherited
246 by all executed processes, unless overridden individually, for
247 example with the TimerSlackNSec= setting in service units (for
248 details see systemd.exec(5)). The timer slack controls the accuracy
249 of wake-ups triggered by system timers. See prctl(2) for more
250 information. Note that in contrast to most other time span
251 definitions this parameter takes an integer value in nano-seconds
252 if no unit is specified. The usual time units are understood too.
253
254 StatusUnitFormat=
255 Takes name, description or combined as the value. If name, the
256 system manager will use unit names in status messages (e.g.
257 "systemd-journald.service"), instead of the longer and more
258 informative descriptions set with Description= (e.g. "Journal
259 Logging Service"). If combined, the system manager will use both
260 unit names and descriptions in status messages (e.g.
261 "systemd-journald.service - Journal Logging Service").
262
263 See systemd.unit(5) for details about unit names and Description=.
264
265 DefaultTimerAccuracySec=
266 Sets the default accuracy of timer units. This controls the global
267 default for the AccuracySec= setting of timer units, see
268 systemd.timer(5) for details. AccuracySec= set in individual units
269 override the global default for the specific unit. Defaults to
270 1min. Note that the accuracy of timer units is also affected by the
271 configured timer slack for PID 1, see TimerSlackNSec= above.
272
273 DefaultTimeoutStartSec=, DefaultTimeoutStopSec=,
274 DefaultTimeoutAbortSec=, DefaultRestartSec=
275 Configures the default timeouts for starting, stopping and aborting
276 of units, as well as the default time to sleep between automatic
277 restarts of units, as configured per-unit in TimeoutStartSec=,
278 TimeoutStopSec=, TimeoutAbortSec= and RestartSec= (for services,
279 see systemd.service(5) for details on the per-unit settings). For
280 non-service units, DefaultTimeoutStartSec= sets the default
281 TimeoutSec= value.
282
283 DefaultTimeoutStartSec= and DefaultTimeoutStopSec= default to 45 s
284 in the system manager and 45 s in the user manager.
285 DefaultTimeoutAbortSec= is not set by default so that all units
286 fall back to TimeoutStopSec=. DefaultRestartSec= defaults to 100
287 ms.
288
289 DefaultDeviceTimeoutSec=
290 Configures the default timeout for waiting for devices. It can be
291 changed per device via the x-systemd.device-timeout= option in
292 /etc/fstab and /etc/crypttab (see systemd.mount(5), crypttab(5)).
293 Defaults to 45 s in the system manager and 45 s in the user
294 manager.
295
296 DefaultStartLimitIntervalSec=, DefaultStartLimitBurst=
297 Configure the default unit start rate limiting, as configured
298 per-service by StartLimitIntervalSec= and StartLimitBurst=. See
299 systemd.service(5) for details on the per-service settings.
300 DefaultStartLimitIntervalSec= defaults to 10s.
301 DefaultStartLimitBurst= defaults to 5.
302
303 DefaultEnvironment=
304 Configures environment variables passed to all executed processes.
305 Takes a space-separated list of variable assignments. See
306 environ(7) for details about environment variables.
307
308 Simple "%"-specifier expansion is supported, see below for a list
309 of supported specifiers.
310
311 Example:
312
313 DefaultEnvironment="VAR1=word1 word2" VAR2=word3 "VAR3=word 5 6"
314
315 Sets three variables "VAR1", "VAR2", "VAR3".
316
317 ManagerEnvironment=
318 Takes the same arguments as DefaultEnvironment=, see above. Sets
319 environment variables just for the manager process itself. In
320 contrast to user managers, these variables are not inherited by
321 processes spawned by the system manager, use DefaultEnvironment=
322 for that. Note that these variables are merged into the existing
323 environment block. In particular, in case of the system manager,
324 this includes variables set by the kernel based on the kernel
325 command line.
326
327 Setting environment variables for the manager process may be useful
328 to modify its behaviour. See ENVIRONMENT[2] for a descriptions of
329 some variables understood by systemd.
330
331 Simple "%"-specifier expansion is supported, see below for a list
332 of supported specifiers.
333
334 DefaultCPUAccounting=, DefaultMemoryAccounting=,
335 DefaultTasksAccounting=, DefaultIOAccounting=, DefaultIPAccounting=
336 Configure the default resource accounting settings, as configured
337 per-unit by CPUAccounting=, MemoryAccounting=, TasksAccounting=,
338 IOAccounting= and IPAccounting=. See systemd.resource-control(5)
339 for details on the per-unit settings. DefaultTasksAccounting=
340 defaults to yes, DefaultMemoryAccounting= to yes.
341 DefaultCPUAccounting= defaults to yes, but really has no effect if
342 enabling CPU accounting doesn't require the cpu controller to be
343 enabled (Linux 4.15+ using the unified hierarchy for resource
344 control), otherwise it defaults to no. The other three settings
345 default to no.
346
347 DefaultTasksMax=
348 Configure the default value for the per-unit TasksMax= setting. See
349 systemd.resource-control(5) for details. This setting applies to
350 all unit types that support resource control settings, with the
351 exception of slice units. Defaults to 15% of the minimum of
352 kernel.pid_max=, kernel.threads-max= and root cgroup pids.max.
353 Kernel has a default value for kernel.pid_max= and an algorithm of
354 counting in case of more than 32 cores. For example, with the
355 default kernel.pid_max=, DefaultTasksMax= defaults to 4915, but
356 might be greater in other systems or smaller in OS containers.
357
358 DefaultLimitCPU=, DefaultLimitFSIZE=, DefaultLimitDATA=,
359 DefaultLimitSTACK=, DefaultLimitCORE=, DefaultLimitRSS=,
360 DefaultLimitNOFILE=, DefaultLimitAS=, DefaultLimitNPROC=,
361 DefaultLimitMEMLOCK=, DefaultLimitLOCKS=, DefaultLimitSIGPENDING=,
362 DefaultLimitMSGQUEUE=, DefaultLimitNICE=, DefaultLimitRTPRIO=,
363 DefaultLimitRTTIME=
364 These settings control various default resource limits for
365 processes executed by units. See setrlimit(2) for details. These
366 settings may be overridden in individual units using the
367 corresponding LimitXXX= directives and they accept the same
368 parameter syntax, see systemd.exec(5) for details. Note that these
369 resource limits are only defaults for units, they are not applied
370 to the service manager process (i.e. PID 1) itself.
371
372 Most of these settings are unset, which means the resource limits
373 are inherited from the kernel or, if invoked in a container, from
374 the container manager. However, the following have defaults:
375
376 • DefaultLimitNOFILE= defaults to 1024:524288.
377
378 • DefaultLimitMEMLOCK= defaults to 8M.
379
380 • DefaultLimitCORE= does not have a default but it is worth
381 mentioning that RLIMIT_CORE is set to "infinity" by PID 1 which
382 is inherited by its children.
383
384 Note that the service manager internally in PID 1 bumps
385 RLIMIT_NOFILE and RLIMIT_MEMLOCK to higher values, however the
386 limit is reverted to the mentioned defaults for all child processes
387 forked off.
388
389 DefaultOOMPolicy=
390 Configure the default policy for reacting to processes being killed
391 by the Linux Out-Of-Memory (OOM) killer or systemd-oomd. This may
392 be used to pick a global default for the per-unit OOMPolicy=
393 setting. See systemd.service(5) for details. Note that this default
394 is not used for services that have Delegate= turned on.
395
396 DefaultOOMScoreAdjust=
397 Configures the default OOM score adjustments of processes run by
398 the service manager. This defaults to unset (meaning the forked off
399 processes inherit the service manager's OOM score adjustment
400 value), except if the service manager is run for an unprivileged
401 user, in which case this defaults to the service manager's OOM
402 adjustment value plus 100 (this makes service processes slightly
403 more likely to be killed under memory pressure than the manager
404 itself). This may be used to pick a global default for the per-unit
405 OOMScoreAdjust= setting. See systemd.exec(5) for details. Note that
406 this setting has no effect on the OOM score adjustment value of the
407 service manager process itself, it retains the original value set
408 during its invocation.
409
410 DefaultSmackProcessLabel=
411 Takes a SMACK64 security label as the argument. The process
412 executed by a unit will be started under this label if
413 SmackProcessLabel= is not set in the unit. See systemd.exec(5) for
414 the details.
415
416 If the value is "/", only labels specified with SmackProcessLabel=
417 are assigned and the compile-time default is ignored.
418
419 ReloadLimitIntervalSec=, ReloadLimitBurst=
420 Rate limiting for daemon-reload requests. Default to unset, and any
421 number of daemon-reload operations can be requested at any time.
422 ReloadLimitIntervalSec= takes a value in seconds to configure the
423 rate limit window, and ReloadLimitBurst= takes a positive integer
424 to configure the maximum allowed number of reloads within the
425 configured time window.
426
428 Specifiers may be used in the DefaultEnvironment= and
429 ManagerEnvironment= settings. The following expansions are understood:
430
431 Table 1. Specifiers available
432 ┌──────────┬─────────────────────┬────────────────────────┐
433 │Specifier │ Meaning │ Details │
434 ├──────────┼─────────────────────┼────────────────────────┤
435 │"%a" │ Architecture │ A short string │
436 │ │ │ identifying the │
437 │ │ │ architecture of the │
438 │ │ │ local system. A │
439 │ │ │ string such as x86, │
440 │ │ │ x86-64 or arm64. │
441 │ │ │ See the │
442 │ │ │ architectures │
443 │ │ │ defined for │
444 │ │ │ ConditionArchitecture= │
445 │ │ │ in systemd.unit(5) │
446 │ │ │ for a full list. │
447 ├──────────┼─────────────────────┼────────────────────────┤
448 │"%A" │ Operating system │ The operating system │
449 │ │ image version │ image version │
450 │ │ │ identifier of the │
451 │ │ │ running system, as │
452 │ │ │ read from the │
453 │ │ │ IMAGE_VERSION= field │
454 │ │ │ of /etc/os-release. If │
455 │ │ │ not set, resolves to │
456 │ │ │ an empty string. See │
457 │ │ │ os-release(5) for more │
458 │ │ │ information. │
459 ├──────────┼─────────────────────┼────────────────────────┤
460 │"%b" │ Boot ID │ The boot ID of the │
461 │ │ │ running system, │
462 │ │ │ formatted as string. │
463 │ │ │ See random(4) for more │
464 │ │ │ information. │
465 ├──────────┼─────────────────────┼────────────────────────┤
466 │"%B" │ Operating system │ The operating system │
467 │ │ build ID │ build identifier of │
468 │ │ │ the running system, as │
469 │ │ │ read from the │
470 │ │ │ BUILD_ID= field of │
471 │ │ │ /etc/os-release. If │
472 │ │ │ not set, resolves to │
473 │ │ │ an empty string. See │
474 │ │ │ os-release(5) for more │
475 │ │ │ information. │
476 ├──────────┼─────────────────────┼────────────────────────┤
477 │"%H" │ Host name │ The hostname of the │
478 │ │ │ running system. │
479 ├──────────┼─────────────────────┼────────────────────────┤
480 │"%l" │ Short host name │ The hostname of the │
481 │ │ │ running system, │
482 │ │ │ truncated at the first │
483 │ │ │ dot to remove any │
484 │ │ │ domain component. │
485 ├──────────┼─────────────────────┼────────────────────────┤
486 │"%m" │ Machine ID │ The machine ID of the │
487 │ │ │ running system, │
488 │ │ │ formatted as string. │
489 │ │ │ See machine-id(5) for │
490 │ │ │ more information. │
491 ├──────────┼─────────────────────┼────────────────────────┤
492 │"%M" │ Operating system │ The operating system │
493 │ │ image identifier │ image identifier of │
494 │ │ │ the running system, as │
495 │ │ │ read from the │
496 │ │ │ IMAGE_ID= field of │
497 │ │ │ /etc/os-release. If │
498 │ │ │ not set, resolves to │
499 │ │ │ an empty string. See │
500 │ │ │ os-release(5) for more │
501 │ │ │ information. │
502 ├──────────┼─────────────────────┼────────────────────────┤
503 │"%o" │ Operating system ID │ The operating system │
504 │ │ │ identifier of the │
505 │ │ │ running system, as │
506 │ │ │ read from the ID= │
507 │ │ │ field of │
508 │ │ │ /etc/os-release. See │
509 │ │ │ os-release(5) for more │
510 │ │ │ information. │
511 ├──────────┼─────────────────────┼────────────────────────┤
512 │"%v" │ Kernel release │ Identical to uname -r │
513 │ │ │ output. │
514 ├──────────┼─────────────────────┼────────────────────────┤
515 │"%w" │ Operating system │ The operating system │
516 │ │ version ID │ version identifier of │
517 │ │ │ the running system, as │
518 │ │ │ read from the │
519 │ │ │ VERSION_ID= field of │
520 │ │ │ /etc/os-release. If │
521 │ │ │ not set, resolves to │
522 │ │ │ an empty string. See │
523 │ │ │ os-release(5) for more │
524 │ │ │ information. │
525 ├──────────┼─────────────────────┼────────────────────────┤
526 │"%W" │ Operating system │ The operating system │
527 │ │ variant ID │ variant identifier of │
528 │ │ │ the running system, as │
529 │ │ │ read from the │
530 │ │ │ VARIANT_ID= field of │
531 │ │ │ /etc/os-release. If │
532 │ │ │ not set, resolves to │
533 │ │ │ an empty string. See │
534 │ │ │ os-release(5) for more │
535 │ │ │ information. │
536 ├──────────┼─────────────────────┼────────────────────────┤
537 │"%T" │ Directory for │ This is either /tmp or │
538 │ │ temporary files │ the path "$TMPDIR", │
539 │ │ │ "$TEMP" or "$TMP" are │
540 │ │ │ set to. (Note that the │
541 │ │ │ directory may be │
542 │ │ │ specified without a │
543 │ │ │ trailing slash.) │
544 ├──────────┼─────────────────────┼────────────────────────┤
545 │"%V" │ Directory for │ This is either │
546 │ │ larger and │ /var/tmp or the path │
547 │ │ persistent │ "$TMPDIR", "$TEMP" or │
548 │ │ temporary files │ "$TMP" are set to. │
549 │ │ │ (Note that the │
550 │ │ │ directory may be │
551 │ │ │ specified without a │
552 │ │ │ trailing slash.) │
553 ├──────────┼─────────────────────┼────────────────────────┤
554 │"%%" │ Single percent sign │ Use "%%" in place of │
555 │ │ │ "%" to specify a │
556 │ │ │ single percent sign. │
557 └──────────┴─────────────────────┴────────────────────────┘
558
560 systemd 252
561 Option DefaultBlockIOAccounting= was deprecated. Please switch to
562 the unified cgroup hierarchy.
563
565 systemd(1), systemd.directives(7), systemd.exec(5), systemd.service(5),
566 environ(7), capabilities(7)
567
569 1. No New Privileges Flag
570 https://docs.kernel.org/userspace-api/no_new_privs.html
571
572 2. ENVIRONMENT
573 https://systemd.io/ENVIRONMENT
574
575
576
577systemd 253 SYSTEMD-SYSTEM.CONF(5)