2 .\" Copyright (c) 1983, 1991 The Regents of the University of California.
3 .\" All rights reserved.
5 .\" %%%LICENSE_START(BSD_4_CLAUSE_UCB)
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. All advertising materials mentioning features or use of this software
15 .\" must display the following acknowledgement:
16 .\" This product includes software developed by the University of
17 .\" California, Berkeley and its contributors.
18 .\" 4. Neither the name of the University nor the names of its contributors
19 .\" may be used to endorse or promote products derived from this software
20 .\" without specific prior written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 .\" $Id: socket.2,v 1.4 1999/05/13 11:33:42 freitag Exp $
37 .\" Modified 1993-07-24 by Rik Faith <faith@cs.unc.edu>
38 .\" Modified 1996-10-22 by Eric S. Raymond <esr@thyrsus.com>
39 .\" Modified 1998, 1999 by Andi Kleen <ak@muc.de>
40 .\" Modified 2002-07-17 by Michael Kerrisk <mtk.manpages@gmail.com>
41 .\" Modified 2004-06-17 by Michael Kerrisk <mtk.manpages@gmail.com>
43 .TH SOCKET 2 2015-12-28 "Linux" "Linux Programmer's Manual"
45 socket \- create an endpoint for communication
47 .BR "#include <sys/types.h>" " /* See NOTES */"
49 .B #include <sys/socket.h>
51 .BI "int socket(int " domain ", int " type ", int " protocol );
54 creates an endpoint for communication and returns a file descriptor
55 that refers to that endpoint.
59 argument specifies a communication domain; this selects the protocol
60 family which will be used for communication.
61 These families are defined in
63 The currently understood formats include:
69 .BR AF_UNIX ", " AF_LOCAL
77 T}:IPv4 Internet protocols:T{
82 T}:IPv6 Internet protocols:T{
87 T}:IPX \- Novell protocols:
91 Kernel user interface device
97 T}:ITU-T X.25 / ISO-8208 protocol:T{
103 Amateur radio AX.25 protocol
107 T}:Access to raw ATM PVCs:
116 Low level packet interface
123 Interface to kernel crypto API
127 The socket has the indicated
129 which specifies the communication semantics.
130 Currently defined types
134 Provides sequenced, reliable, two-way, connection-based byte streams.
135 An out-of-band data transmission mechanism may be supported.
138 Supports datagrams (connectionless, unreliable messages of a fixed
142 Provides a sequenced, reliable, two-way connection-based data
143 transmission path for datagrams of fixed maximum length; a consumer is
144 required to read an entire packet with each input system call.
147 Provides raw network protocol access.
150 Provides a reliable datagram layer that does not guarantee ordering.
153 Obsolete and should not be used in new programs;
157 Some socket types may not be implemented by all protocol families.
159 Since Linux 2.6.27, the
161 argument serves a second purpose:
162 in addition to specifying a socket type,
163 it may include the bitwise OR of any of the following values,
164 to modify the behavior of
170 file status flag on the new open file description.
171 Using this flag saves extra calls to
173 to achieve the same result.
176 Set the close-on-exec
178 flag on the new file descriptor.
179 See the description of the
183 for reasons why this may be useful.
187 specifies a particular protocol to be used with the socket.
188 Normally only a single protocol exists to support a particular
189 socket type within a given protocol family, in which case
191 can be specified as 0.
192 However, it is possible that many protocols may exist, in
193 which case a particular protocol must be specified in this manner.
194 The protocol number to use is specific to the \*(lqcommunication domain\*(rq
195 in which communication is to take place; see
199 on how to map protocol name strings to protocol numbers.
203 are full-duplex byte streams.
206 A stream socket must be in
209 state before any data may be sent or received on it.
211 another socket is created with a
214 Once connected, data may be transferred using
218 calls or some variant of the
223 When a session has been completed a
226 Out-of-band data may also be transmitted as described in
228 and received as described in
231 The communications protocols which implement a
233 ensure that data is not lost or duplicated.
234 If a piece of data for which
235 the peer protocol has buffer space cannot be successfully transmitted
236 within a reasonable length of time, then the connection is considered
240 is enabled on the socket the protocol checks in a protocol-specific
241 manner if the other end is still alive.
244 signal is raised if a process sends or receives
245 on a broken stream; this causes naive processes,
246 which do not handle the signal, to exit.
248 sockets employ the same system calls as
251 The only difference is that
253 calls will return only the amount of data requested,
254 and any data remaining in the arriving packet will be discarded.
255 Also all message boundaries in incoming datagrams are preserved.
260 sockets allow sending of datagrams to correspondents named in
263 Datagrams are generally received with
265 which returns the next datagram along with the address of its sender.
268 is an obsolete socket type to receive raw packets directly from the
277 operation can be used to specify a process or process group to receive a
279 signal when the out-of-band data arrives or
283 connection breaks unexpectedly.
284 This operation may also be used to set the process or process group
285 that receives the I/O and asynchronous notification of I/O events via
297 When the network signals an error condition to the protocol module (e.g.,
298 using a ICMP message for IP) the pending error flag is set for the socket.
299 The next operation on this socket will return the error code of the pending
301 For some protocols it is possible to enable a per-socket error queue
302 to retrieve detailed information about the error; see
307 The operation of sockets is controlled by socket level
309 These options are defined in
315 are used to set and get options, respectively.
317 On success, a file descriptor for the new socket is returned.
318 On error, \-1 is returned, and
320 is set appropriately.
324 Permission to create a socket of the specified type and/or protocol
328 The implementation does not support the specified address family.
331 Unknown protocol, or protocol family not available.
334 .\" Since Linux 2.6.27
339 The per-process limit on the number of open file descriptors has been reached.
342 The system-wide limit on the total number of open files has been reached.
344 .BR ENOBUFS " or " ENOMEM
345 Insufficient memory is available.
347 created until sufficient resources are freed.
350 The protocol type or the specified protocol is not
351 supported within this domain.
353 Other errors may be generated by the underlying protocol modules.
355 POSIX.1-2001, POSIX.1-2008, 4.4BSD.
361 flags are Linux-specific.
365 It is generally portable to/from
366 non-BSD systems supporting clones of the BSD socket layer (including
369 POSIX.1 does not require the inclusion of
371 and this header file is not required on Linux.
372 However, some historical (BSD) implementations required this header
373 file, and portable applications are probably wise to include it.
375 The manifest constants used under 4.x BSD for protocol families
382 and so on are used for address
384 However, already the BSD man page promises: "The protocol
385 family generally is the same as the address family", and subsequent
386 standards use AF_* everywhere.
390 protocol type was added in Linux 2.6.38.
391 More information on this interface is provided with the kernel HTML
393 .IR https://www.kernel.org/doc/htmldocs/crypto-API/User.html .
395 An example of the use of
424 \(lqAn Introductory 4.3BSD Interprocess Communication Tutorial\(rq
426 \(lqBSD Interprocess Communication Tutorial\(rq,
428 .I UNIX Programmer's Supplementary Documents Volume 1.