]> git.ipfire.org Git - thirdparty/systemd.git/blame - docs/ENVIRONMENT.md
sd-device: use chase_symlinks() O_PATH fd
[thirdparty/systemd.git] / docs / ENVIRONMENT.md
CommitLineData
c3e270f4
FB
1---
2title: Known Environment Variables
4cdca0af 3category: Interfaces
b41a3f66 4layout: default
0aff7b75 5SPDX-License-Identifier: LGPL-2.1-or-later
c3e270f4
FB
6---
7
4549fcdb
LP
8# Known Environment Variables
9
10A number of systemd components take additional runtime parameters via
11environment variables. Many of these environment variables are not supported at
12the same level as command line switches and other interfaces are: we don't
13document them in the man pages and we make no stability guarantees for
14them. While they generally are unlikely to be dropped any time soon again, we
15do not want to guarantee that they stay around for good either.
16
17Below is an (incomprehensive) list of the environment variables understood by
18the various tools. Note that this list only covers environment variables not
19documented in the proper man pages.
20
21All tools:
22
e7b86e48
ZJS
23* `$SYSTEMD_OFFLINE=[0|1]` — if set to `1`, then `systemctl` will refrain from
24 talking to PID 1; this has the same effect as the historical detection of
25 `chroot()`. Setting this variable to `0` instead has a similar effect as
54dcf847
LP
26 `$SYSTEMD_IGNORE_CHROOT=1`; i.e. tools will try to communicate with PID 1
27 even if a `chroot()` environment is detected. You almost certainly want to
28 set this to `1` if you maintain a package build system or similar and are
29 trying to use a modern container system and not plain `chroot()`.
f38951a6 30
4549fcdb 31* `$SYSTEMD_IGNORE_CHROOT=1` — if set, don't check whether being invoked in a
f38951a6 32 `chroot()` environment. This is particularly relevant for systemctl, as it
e7b86e48 33 will not alter its behaviour for `chroot()` environments if set. Normally it
f38951a6
CW
34 refrains from talking to PID 1 in such a case; turning most operations such
35 as `start` into no-ops. If that's what's explicitly desired, you might
54dcf847 36 consider setting `$SYSTEMD_OFFLINE=1`.
4549fcdb
LP
37
38* `$SD_EVENT_PROFILE_DELAYS=1` — if set, the sd-event event loop implementation
39 will print latency information at runtime.
40
53aa0d02 41* `$SYSTEMD_PROC_CMDLINE` — if set, the contents are used as the kernel command
e7b86e48 42 line instead of the actual one in `/proc/cmdline`. This is useful for
53aa0d02
ZJS
43 debugging, in order to test generators and other code against specific kernel
44 command lines.
45
df78419d
ZJS
46* `$SYSTEMD_OS_RELEASE` — if set, use this path instead of `/etc/os-release` or
47 `/usr/lib/os-release`. When operating under some root (e.g. `systemctl
48 --root=…`), the path is taken relative to the outside root. Only useful for
49 debugging.
50
e7b86e48 51* `$SYSTEMD_FSTAB` — if set, use this path instead of `/etc/fstab`. Only useful
ed4ad488
ZJS
52 for debugging.
53
e7b86e48
ZJS
54* `$SYSTEMD_CRYPTTAB` — if set, use this path instead of `/etc/crypttab`. Only
55 useful for debugging. Currently only supported by
56 `systemd-cryptsetup-generator`.
a6c57e74 57
1f1a2243
TA
58* `$SYSTEMD_INTEGRITYTAB` — if set, use this path instead of
59 `/etc/integritytab`. Only useful for debugging. Currently only supported by
60 `systemd-integritysetup-generator`.
61
e7b86e48
ZJS
62* `$SYSTEMD_VERITYTAB` — if set, use this path instead of
63 `/etc/veritytab`. Only useful for debugging. Currently only supported by
64 `systemd-veritysetup-generator`.
08b04ec7 65
2536752d 66* `$SYSTEMD_EFI_OPTIONS` — if set, used instead of the string in the
e7b86e48 67 `SystemdOptions` EFI variable. Analogous to `$SYSTEMD_PROC_CMDLINE`.
2467cc55 68
05c6f341
ZJS
69* `$SYSTEMD_DEFAULT_HOSTNAME` — override the compiled-in fallback hostname
70 (relevant in particular for the system manager and `systemd-hostnamed`).
71 Must be a valid hostname (either a single label or a FQDN).
72
1f22621b
KS
73* `$SYSTEMD_IN_INITRD=[auto|lenient|0|1]` — if set, specifies initrd detection
74 method. Defaults to `auto`. Behavior is defined as follows:
75 `auto`: Checks if `/etc/initrd-release` exists, and a temporary fs is mounted
76 on `/`. If both conditions meet, then it's in initrd.
38f3e0a5 77 `lenient`: Similar to `auto`, but the rootfs check is skipped.
1f22621b
KS
78 `0|1`: Simply overrides initrd detection. This is useful for debugging and
79 testing initrd-only programs in the main system.
0307ea49 80
385b2eb2
YW
81* `$SYSTEMD_BUS_TIMEOUT=SECS` — specifies the maximum time to wait for method call
82 completion. If no time unit is specified, assumes seconds. The usual other units
83 are understood, too (us, ms, s, min, h, d, w, month, y). If it is not set or set
84 to 0, then the built-in default is used.
85
5f1b0cc6 86* `$SYSTEMD_MEMPOOL=0` — if set, the internal memory caching logic employed by
e7b86e48 87 hash tables is turned off, and libc `malloc()` is used for all allocations.
b4f60743 88
e7b86e48 89* `$SYSTEMD_EMOJI=0` — if set, tools such as `systemd-analyze security` will
5f1b0cc6
LP
90 not output graphical smiley emojis, but ASCII alternatives instead. Note that
91 this only controls use of Unicode emoji glyphs, and has no effect on other
92 Unicode glyphs.
93
3f5ac303 94* `$RUNTIME_DIRECTORY` — various tools use this variable to locate the
e7b86e48
ZJS
95 appropriate path under `/run/`. This variable is also set by the manager when
96 `RuntimeDirectory=` is used, see systemd.exec(5).
3f5ac303 97
42f3b2f9 98* `$SYSTEMD_CRYPT_PREFIX` — if set configures the hash method prefix to use for
e7b86e48
ZJS
99 UNIX `crypt()` when generating passwords. By default the system's "preferred
100 method" is used, but this can be overridden with this environment variable.
101 Takes a prefix such as `$6$` or `$y$`. (Note that this is only honoured on
102 systems built with libxcrypt and is ignored on systems using glibc's
103 original, internal `crypt()` implementation.)
42f3b2f9 104
54dcf847 105* `$SYSTEMD_SECCOMP=0` — if set, seccomp filters will not be enforced, even if
ce8f6d47
LP
106 support for it is compiled in and available in the kernel.
107
108* `$SYSTEMD_LOG_SECCOMP=1` — if set, system calls blocked by seccomp filtering,
e7b86e48
ZJS
109 for example in `systemd-nspawn`, will be logged to the audit log, if the
110 kernel supports this.
ce8f6d47 111
e7b86e48 112`systemctl`:
4549fcdb
LP
113
114* `$SYSTEMCTL_FORCE_BUS=1` — if set, do not connect to PID1's private D-Bus
115 listener, and instead always connect through the dbus-daemon D-bus broker.
116
117* `$SYSTEMCTL_INSTALL_CLIENT_SIDE=1` — if set, enable or disable unit files on
118 the client side, instead of asking PID 1 to do this.
119
e7b86e48 120* `$SYSTEMCTL_SKIP_SYSV=1` — if set, do not call SysV compatibility hooks.
4549fcdb 121
e7b86e48 122`systemd-nspawn`:
4549fcdb 123
e7b86e48
ZJS
124* `$SYSTEMD_NSPAWN_UNIFIED_HIERARCHY=1` — if set, force `systemd-nspawn` into
125 unified cgroup hierarchy mode.
4549fcdb 126
e7b86e48
ZJS
127* `$SYSTEMD_NSPAWN_API_VFS_WRITABLE=1` — if set, make `/sys/`, `/proc/sys/`,
128 and friends writable in the container. If set to "network", leave only
129 `/proc/sys/net/` writable.
4549fcdb
LP
130
131* `$SYSTEMD_NSPAWN_CONTAINER_SERVICE=…` — override the "service" name nspawn
132 uses to register with machined. If unset defaults to "nspawn", but with this
133 variable may be set to any other value.
134
135* `$SYSTEMD_NSPAWN_USE_CGNS=0` — if set, do not use cgroup namespacing, even if
136 it is available.
137
138* `$SYSTEMD_NSPAWN_LOCK=0` — if set, do not lock container images when running.
139
e7b86e48 140* `$SYSTEMD_NSPAWN_TMPFS_TMP=0` — if set, do not overmount `/tmp/` in the
1099ceeb
LP
141 container with a tmpfs, but leave the directory from the image in place.
142
4a4654e0
LP
143* `$SYSTEMD_SUPPRESS_SYNC=1` — if set, all disk synchronization syscalls are
144 blocked to the container payload (e.g. `sync()`, `fsync()`, `syncfs()`, …)
145 and the `O_SYNC`/`O_DSYNC` flags are made unavailable to `open()` and
146 friends. This is equivalent to passing `--suppress-sync=yes` on the
147 `systemd-nspawn` command line.
148
e7b86e48 149`systemd-logind`:
4549fcdb
LP
150
151* `$SYSTEMD_BYPASS_HIBERNATION_MEMORY_CHECK=1` — if set, report that
152 hibernation is available even if the swap devices do not provide enough room
153 for it.
94fa1497 154
e7b86e48
ZJS
155* `$SYSTEMD_REBOOT_TO_FIRMWARE_SETUP` — if set, overrides `systemd-logind`'s
156 built-in EFI logic of requesting a reboot into the firmware. Takes a boolean.
157 If set to false, the functionality is turned off entirely. If set to true,
158 instead of requesting a reboot into the firmware setup UI through EFI a file,
159 `/run/systemd/reboot-to-firmware-setup` is created whenever this is
e86c7a3a
LP
160 requested. This file may be checked for by services run during system
161 shutdown in order to request the appropriate operation from the firmware in
162 an alternative fashion.
163
164* `$SYSTEMD_REBOOT_TO_BOOT_LOADER_MENU` — similar to the above, allows
e7b86e48
ZJS
165 overriding of `systemd-logind`'s built-in EFI logic of requesting a reboot
166 into the boot loader menu. Takes a boolean. If set to false, the
167 functionality is turned off entirely. If set to true, instead of requesting a
168 reboot into the boot loader menu through EFI, the file
169 `/run/systemd/reboot-to-boot-loader-menu` is created whenever this is
170 requested. The file contains the requested boot loader menu timeout in µs,
171 formatted in ASCII decimals, or zero in case no timeout is requested. This
172 file may be checked for by services run during system shutdown in order to
173 request the appropriate operation from the boot loader in an alternative
174 fashion.
e86c7a3a
LP
175
176* `$SYSTEMD_REBOOT_TO_BOOT_LOADER_ENTRY` — similar to the above, allows
e7b86e48
ZJS
177 overriding of `systemd-logind`'s built-in EFI logic of requesting a reboot
178 into a specific boot loader entry. Takes a boolean. If set to false, the
179 functionality is turned off entirely. If set to true, instead of requesting a
180 reboot into a specific boot loader entry through EFI, the file
e86c7a3a
LP
181 `/run/systemd/reboot-to-boot-loader-entry` is created whenever this is
182 requested. The file contains the requested boot loader entry identifier. This
183 file may be checked for by services run during system shutdown in order to
184 request the appropriate operation from the boot loader in an alternative
185 fashion. Note that by default only boot loader entries which follow the [Boot
186 Loader Specification](https://systemd.io/BOOT_LOADER_SPECIFICATION) and are
187 placed in the ESP or the Extended Boot Loader partition may be selected this
188 way. However, if a directory `/run/boot-loader-entries/` exists, the entries
189 are loaded from there instead. The directory should contain the usual
190 directory hierarchy mandated by the Boot Loader Specification, i.e. the entry
191 drop-ins should be placed in
192 `/run/boot-loader-entries/loader/entries/*.conf`, and the files referenced by
193 the drop-ins (including the kernels and initrds) somewhere else below
194 `/run/boot-loader-entries/`. Note that all these files may be (and are
e7b86e48 195 supposed to be) symlinks. `systemd-logind` will load these files on-demand,
e86c7a3a
LP
196 these files can hence be updated (ideally atomically) whenever the boot
197 loader configuration changes. A foreign boot loader installer script should
198 hence synthesize drop-in snippets and symlinks for all boot entries at boot
e7b86e48
ZJS
199 or whenever they change if it wants to integrate with `systemd-logind`'s
200 APIs.
e86c7a3a 201
e7b86e48 202`systemd-udevd`:
679dab6a 203
54dcf847 204* `$NET_NAMING_SCHEME=` — if set, takes a network naming scheme (i.e. one of
679dab6a 205 "v238", "v239", "v240"…, or the special value "latest") as parameter. If
e7b86e48
ZJS
206 specified udev's `net_id` builtin will follow the specified naming scheme
207 when determining stable network interface names. This may be used to revert
208 to naming schemes of older udev versions, in order to provide more stable
209 naming across updates. This environment variable takes precedence over the
210 kernel command line option `net.naming-scheme=`, except if the value is
211 prefixed with `:` in which case the kernel command line option takes
212 precedence, if it is specified as well.
679dab6a 213
e7b86e48 214`nss-systemd`:
dba1bd43
LP
215
216* `$SYSTEMD_NSS_BYPASS_SYNTHETIC=1` — if set, `nss-systemd` won't synthesize
217 user/group records for the `root` and `nobody` users if they are missing from
218 `/etc/passwd`.
219
220* `$SYSTEMD_NSS_DYNAMIC_BYPASS=1` — if set, `nss-systemd` won't return
221 user/group records for dynamically registered service users (i.e. users
222 registered through `DynamicUser=1`).
223
e7b86e48 224`systemd-timedated`:
41d0da0f
YW
225
226* `$SYSTEMD_TIMEDATED_NTP_SERVICES=…` — colon-separated list of unit names of
227 NTP client services. If set, `timedatectl set-ntp on` enables and starts the
228 first existing unit listed in the environment variable, and
229 `timedatectl set-ntp off` disables and stops all listed units.
39922217 230
e7b86e48 231`systemd-sulogin-shell`:
33eb44fe
AH
232
233* `$SYSTEMD_SULOGIN_FORCE=1` — This skips asking for the root password if the
234 root password is not available (such as when the root account is locked).
235 See `sulogin(8)` for more details.
236
e7b86e48 237`bootctl` and other tools that access the EFI System Partition (ESP):
8cbb7d87
LP
238
239* `$SYSTEMD_RELAX_ESP_CHECKS=1` — if set, the ESP validation checks are
240 relaxed. Specifically, validation checks that ensure the specified ESP path
241 is a FAT file system are turned off, as are checks that the path is located
242 on a GPT partition with the correct type UUID.
243
cc7a0bfa
LP
244* `$SYSTEMD_ESP_PATH=…` — override the path to the EFI System Partition. This
245 may be used to override ESP path auto detection, and redirect any accesses to
e7b86e48
ZJS
246 the ESP to the specified directory. Note that unlike with `bootctl`'s
247 `--path=` switch only very superficial validation of the specified path is
248 done when this environment variable is used.
cc7a0bfa 249
e7b86e48 250`systemd` itself:
39922217
LP
251
252* `$SYSTEMD_ACTIVATION_UNIT` — set for all NSS and PAM module invocations that
253 are done by the service manager on behalf of a specific unit, in child
254 processes that are later (after execve()) going to become unit
255 processes. Contains the full unit name (e.g. "foobar.service"). NSS and PAM
256 modules can use this information to determine in which context and on whose
257 behalf they are being called, which may be useful to avoid deadlocks, for
258 example to bypass IPC calls to the very service that is about to be
259 started. Note that NSS and PAM modules should be careful to only rely on this
260 data when invoked privileged, or possibly only when getppid() returns 1, as
261 setting environment variables is of course possible in any even unprivileged
262 contexts.
263
264* `$SYSTEMD_ACTIVATION_SCOPE` — closely related to `$SYSTEMD_ACTIVATION_UNIT`,
265 it is either set to `system` or `user` depending on whether the NSS/PAM
266 module is called by systemd in `--system` or `--user` mode.
59f13dd6 267
e7b86e48 268`systemd-remount-fs`:
59f13dd6 269
d238709c 270* `$SYSTEMD_REMOUNT_ROOT_RW=1` — if set and no entry for the root directory
e7b86e48 271 exists in `/etc/fstab` (this file always takes precedence), then the root
59f13dd6 272 directory is remounted writable. This is primarily used by
e7b86e48 273 `systemd-gpt-auto-generator` to ensure the root partition is mounted writable
59f13dd6 274 in accordance to the GPT partition flags.
a7d9fccd 275
e7b86e48 276`systemd-firstboot` and `localectl`:
a7d9fccd 277
54dcf847 278* `$SYSTEMD_LIST_NON_UTF8_LOCALES=1` — if set, non-UTF-8 locales are listed among
a7d9fccd
LP
279 the installed ones. By default non-UTF-8 locales are suppressed from the
280 selection, since we are living in the 21st century.
7a87fb61 281
e7b86e48 282`systemd-sysext`:
7a87fb61 283
54dcf847 284* `$SYSTEMD_SYSEXT_HIERARCHIES` — this variable may be used to override which
e7b86e48
ZJS
285 hierarchies are managed by `systemd-sysext`. By default only `/usr/` and
286 `/opt/` are managed, and directories may be added or removed to that list by
287 setting this environment variable to a colon-separated list of absolute
288 paths. Only "real" file systems and directories that only contain "real" file
289 systems as submounts should be used. Do not specify API file systems such as
290 `/proc/` or `/sys/` here, or hierarchies that have them as submounts. In
291 particular, do not specify the root directory `/` here.
4368c60c 292
e7b86e48 293`systemd-tmpfiles`:
4368c60c 294
54dcf847 295* `$SYSTEMD_TMPFILES_FORCE_SUBVOL` — if unset, `v`/`q`/`Q` lines will create
e7b86e48
ZJS
296 subvolumes only if the OS itself is installed into a subvolume. If set to `1`
297 (or another value interpreted as true), these lines will always create
298 subvolumes if the backing filesystem supports them. If set to `0`, these
299 lines will always create directories.
07dc08c2
ZJS
300
301`systemd-sysv-generator`:
302
303* `$SYSTEMD_SYSVINIT_PATH` — Controls where `systemd-sysv-generator` looks for
304 SysV init scripts.
305
306* `$SYSTEMD_SYSVRCND_PATH` — Controls where `systemd-sysv-generator` looks for
307 SysV init script runlevel link farms.
48eb2af6 308
f0cb09bb
ZJS
309systemd tests:
310
311* `$SYSTEMD_TEST_DATA` — override the location of test data. This is useful if
312 a test executable is moved to an arbitrary location.
313
314* `$SYSTEMD_TEST_NSS_BUFSIZE` — size of scratch buffers for "reentrant"
315 functions exported by the nss modules.
316
48eb2af6
ZJS
317fuzzers:
318
319* `$SYSTEMD_FUZZ_OUTPUT` — A boolean that specifies whether to write output to
320 stdout. Setting to true is useful in manual invocations, since all output is
321 suppressed by default.
322
323* `$SYSTEMD_FUZZ_RUNS` — The number of times execution should be repeated in
324 manual invocations.
325
f223fd6a 326Note that it may be also useful to set `$SYSTEMD_LOG_LEVEL`, since all logging
48eb2af6 327is suppressed by default.
23851640 328
54dcf847 329`systemd-importd`:
23851640 330
54dcf847 331* `$SYSTEMD_IMPORT_BTRFS_SUBVOL` — takes a boolean, which controls whether to
23851640
LP
332 prefer creating btrfs subvolumes over plain directories for machine
333 images. Has no effect on non-btrfs file systems where subvolumes are not
334 available anyway. If not set, defaults to true.
335
54dcf847 336* `$SYSTEMD_IMPORT_BTRFS_QUOTA` — takes a boolean, which controls whether to set
23851640
LP
337 up quota automatically for created btrfs subvolumes for machine images. If
338 not set, defaults to true. Has no effect if machines are placed in regular
339 directories, because btrfs subvolumes are not supported or disabled. If
340 enabled, the quota group of the subvolume is automatically added to a
341 combined quota group for all such machine subvolumes.
342
54dcf847 343* `$SYSTEMD_IMPORT_SYNC` — takes a boolean, which controls whether to
23851640
LP
344 synchronize images to disk after installing them, before completing the
345 operation. If not set, defaults to true. If disabled installation of images
346 will be quicker, but not as safe.
54dcf847
LP
347
348`systemd-dissect`, `systemd-nspawn` and all other tools that may operate on
349disk images with `--image=` or similar:
350
351* `$SYSTEMD_DISSECT_VERITY_SIDECAR` — takes a boolean, which controls whether to
352 load "sidecar" Verity metadata files. If enabled (which is the default),
353 whenever a disk image is used, a set of files with the `.roothash`,
354 `.usrhash`, `.roothash.p7s`, `.usrhash.p7s`, `.verity` suffixes are searched
355 adjacent to disk image file, containing the Verity root hashes, their
356 signatures or the Verity data itself. If disabled this automatic discovery of
357 Verity metadata files is turned off.
358
359* `$SYSTEMD_DISSECT_VERITY_EMBEDDED` — takes a boolean, which controls whether
360 to load the embedded Verity signature data. If enabled (which is the
361 default), Verity root hash information and a suitable signature is
362 automatically acquired from a signature partition, following the
363 [Discoverable Partitions
364 Specification](https://systemd.io/DISCOVERABLE_PARTITIONS). If disabled any
365 such partition is ignored. Note that this only disables discovery of the root
366 hash and its signature, the Verity data partition itself is still searched in
367 the GPT image.
368
369* `$SYSTEMD_DISSECT_VERITY_SIGNATURE` — takes a boolean, which controls whether
370 to validate the signature of the Verity root hash if available. If enabled
371 (which is the default), the signature of suitable disk images is validated
372 against any of the certificates in `/etc/verity.d/*.crt` (and similar
ba669952 373 directories in `/usr/lib/`, `/run`, …) or passed to the kernel for validation
54dcf847 374 against its built-in certificates.
ccd25f41 375
e8c7c4d9
LP
376* `$SYSTEMD_LOOP_DIRECT_IO` – takes a boolean, which controls whether to enable
377 LO_FLAGS_DIRECT_IO (i.e. direct IO + asynchronous IO) on loopback block
378 devices when opening them. Defaults to on, set this to "0" to disable this
379 feature.
380
ccd25f41
LP
381`systemd-cryptsetup`:
382
383* `$SYSTEMD_CRYPTSETUP_USE_TOKEN_MODULE` – takes a boolean, which controls
384 whether to use the libcryptsetup "token" plugin module logic even when
385 activating via FIDO2, PKCS#11, TPM2, i.e. mechanisms natively supported by
386 `systemd-cryptsetup`. Defaults to enabled.
c04358ce
LP
387
388Various tools that read passwords from the TTY, such as `systemd-cryptenroll`
389and `homectl`:
390
391* `$PASSWORD` — takes a string: the literal password to use. If this
392 environment variable is set it is used as password instead of prompting the
393 user interactively. This exists primarily for debugging and testing
394 purposes. Do not use this for production code paths, since environment
395 variables are typically inherited down the process tree without restrictions
396 and should thus not be used for secrets.
397
398* `$NEWPASSWORD` — similar to `$PASSWORD` above, but is used when both a
399 current and a future password are required, for example if the password is to
400 be changed. In that case `$PASSWORD` shall carry the current (i.e. old)
401 password and `$NEWPASSWORD` the new.
67302b38
LP
402
403`systemd-homed`:
404
405* `$SYSTEMD_HOME_ROOT` – defines an absolute path where to look for home
406 directories/images. When unspecified defaults to `/home/`. This is useful for
407 debugging purposes in order to run a secondary `systemd-homed` instance that
408 operates on a different directory where home directories/images are placed.
409
410* `$SYSTEMD_HOME_RECORD_DIR` – defines an absolute path where to look for
411 fixated home records kept on the host. When unspecified defaults to
412 `/var/lib/systemd/home/`. Similar to `$SYSTEMD_HOME_ROOT` this is useful for
413 debugging purposes, in order to run a secondary `systemd-homed` instance that
414 operates on a record database entirely separate from the host's.
415
416* `$SYSTEMD_HOME_DEBUG_SUFFIX` – takes a short string that is suffixed to
417 `systemd-homed`'s D-Bus and Varlink service names/sockets. This is also
a6f44d61 418 understood by `homectl`. This too is useful for running an additional copy of
67302b38
LP
419 `systemd-homed` that doesn't interfere with the host's main one.
420
421* `$SYSTEMD_HOMEWORK_PATH` – configures the path to the `systemd-homework`
422 binary to invoke. If not specified defaults to
423 `/usr/lib/systemd/systemd-homework`.
424
425 Combining these four environment variables is pretty useful when
426 debugging/developing `systemd-homed`:
427```sh
428SYSTEMD_HOME_DEBUG_SUFFIX=foo \
429 SYSTEMD_HOMEWORK_PATH=/home/lennart/projects/systemd/build/systemd-homework \
430 SYSTEMD_HOME_ROOT=/home.foo/ \
431 SYSTEMD_HOME_RECORD_DIR=/var/lib/systemd/home.foo/ \
432 /home/lennart/projects/systemd/build/systemd-homed
433```
db42f011
LP
434
435* `$SYSTEMD_HOME_MOUNT_OPTIONS_BTRFS`, `$SYSTEMD_HOME_MOUNT_OPTIONS_EXT4`,
436 `$SYSTEMD_HOME_MOUNT_OPTIONS_XFS` – configure the default mount options to
437 use for LUKS home directories, overriding the built-in default mount
438 options. There's one variable for each of the supported file systems for the
439 LUKS home directory backend.