]> git.ipfire.org Git - thirdparty/systemd.git/blob - man/systemd.socket.xml
test-execute: Add tests for new PassEnvironment= directive
[thirdparty/systemd.git] / man / systemd.socket.xml
1 <?xml version='1.0'?> <!--*- Mode: nxml; nxml-child-indent: 2; indent-tabs-mode: nil -*-->
2 <!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
3 "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
4
5 <!--
6 This file is part of systemd.
7
8 Copyright 2010 Lennart Poettering
9
10 systemd is free software; you can redistribute it and/or modify it
11 under the terms of the GNU Lesser General Public License as published by
12 the Free Software Foundation; either version 2.1 of the License, or
13 (at your option) any later version.
14
15 systemd is distributed in the hope that it will be useful, but
16 WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 Lesser General Public License for more details.
19
20 You should have received a copy of the GNU Lesser General Public License
21 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 -->
23
24 <refentry id="systemd.socket">
25 <refentryinfo>
26 <title>systemd.socket</title>
27 <productname>systemd</productname>
28
29 <authorgroup>
30 <author>
31 <contrib>Developer</contrib>
32 <firstname>Lennart</firstname>
33 <surname>Poettering</surname>
34 <email>lennart@poettering.net</email>
35 </author>
36 </authorgroup>
37 </refentryinfo>
38
39 <refmeta>
40 <refentrytitle>systemd.socket</refentrytitle>
41 <manvolnum>5</manvolnum>
42 </refmeta>
43
44 <refnamediv>
45 <refname>systemd.socket</refname>
46 <refpurpose>Socket unit configuration</refpurpose>
47 </refnamediv>
48
49 <refsynopsisdiv>
50 <para><filename><replaceable>socket</replaceable>.socket</filename></para>
51 </refsynopsisdiv>
52
53 <refsect1>
54 <title>Description</title>
55
56 <para>A unit configuration file whose name ends in
57 <literal>.socket</literal> encodes information about an IPC or
58 network socket or a file system FIFO controlled and supervised by
59 systemd, for socket-based activation.</para>
60
61 <para>This man page lists the configuration options specific to
62 this unit type. See
63 <citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry>
64 for the common options of all unit configuration files. The common
65 configuration items are configured in the generic [Unit] and
66 [Install] sections. The socket specific configuration options are
67 configured in the [Socket] section.</para>
68
69 <para>Additional options are listed in
70 <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
71 which define the execution environment the
72 <option>ExecStartPre=</option>, <option>ExecStartPost=</option>,
73 <option>ExecStopPre=</option> and <option>ExecStopPost=</option>
74 commands are executed in, and in
75 <citerefentry><refentrytitle>systemd.kill</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
76 which define the way the processes are terminated, and in
77 <citerefentry><refentrytitle>systemd.resource-control</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
78 which configure resource control settings for the processes of the
79 socket.</para>
80
81 <para>For each socket file, a matching service file must exist,
82 describing the service to start on incoming traffic on the socket
83 (see
84 <citerefentry><refentrytitle>systemd.service</refentrytitle><manvolnum>5</manvolnum></citerefentry>
85 for more information about .service files). The name of the
86 .service unit is by default the same as the name of the .socket
87 unit, but can be altered with the <option>Service=</option> option
88 described below. Depending on the setting of the
89 <option>Accept=</option> option described below, this .service
90 unit must either be named like the .socket unit, but with the
91 suffix replaced, unless overridden with <option>Service=</option>;
92 or it must be a template unit named the same way. Example: a
93 socket file <filename>foo.socket</filename> needs a matching
94 service <filename>foo.service</filename> if
95 <option>Accept=false</option> is set. If
96 <option>Accept=true</option> is set, a service template file
97 <filename>foo@.service</filename> must exist from which services
98 are instantiated for each incoming connection.</para>
99
100 <para>Unless <varname>DefaultDependencies=</varname> is set to
101 <option>false</option>, socket units will implicitly have
102 dependencies of type <varname>Requires=</varname> and
103 <varname>After=</varname> on <filename>sysinit.target</filename>
104 as well as dependencies of type <varname>Conflicts=</varname> and
105 <varname>Before=</varname> on
106 <filename>shutdown.target</filename>. These ensure that socket
107 units pull in basic system initialization, and are terminated
108 cleanly prior to system shutdown. Only sockets involved with early
109 boot or late system shutdown should disable this option.</para>
110
111 <para>Socket units will have a <varname>Before=</varname>
112 dependency on the service which they trigger added implicitly. No
113 implicit <varname>WantedBy=</varname> or
114 <varname>RequiredBy=</varname> dependency from the socket to the
115 service is added. This means that the service may be started
116 without the socket, in which case it must be able to open sockets
117 by itself. To prevent this, an explicit
118 <varname>Requires=</varname> dependency may be added.</para>
119
120 <para>Socket units may be used to implement on-demand starting of
121 services, as well as parallelized starting of services. See the
122 blog stories linked at the end for an introduction.</para>
123
124 <para>Note that the daemon software configured for socket
125 activation with socket units needs to be able to accept sockets
126 from systemd, either via systemd's native socket passing interface
127 (see
128 <citerefentry><refentrytitle>sd_listen_fds</refentrytitle><manvolnum>3</manvolnum></citerefentry>
129 for details) or via the traditional
130 <citerefentry project='freebsd'><refentrytitle>inetd</refentrytitle><manvolnum>8</manvolnum></citerefentry>-style
131 socket passing (i.e. sockets passed in via standard input and
132 output, using <varname>StandardInput=socket</varname> in the
133 service file).</para>
134 </refsect1>
135
136 <refsect1>
137 <title>Options</title>
138
139 <para>Socket files must include a [Socket] section, which carries
140 information about the socket or FIFO it supervises. A number of
141 options that may be used in this section are shared with other
142 unit types. These options are documented in
143 <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>
144 and
145 <citerefentry><refentrytitle>systemd.kill</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
146 The options specific to the [Socket] section of socket units are
147 the following:</para>
148
149 <variablelist class='unit-directives'>
150 <varlistentry>
151 <term><varname>ListenStream=</varname></term>
152 <term><varname>ListenDatagram=</varname></term>
153 <term><varname>ListenSequentialPacket=</varname></term>
154 <listitem><para>Specifies an address to listen on for a stream
155 (<constant>SOCK_STREAM</constant>), datagram
156 (<constant>SOCK_DGRAM</constant>), or sequential packet
157 (<constant>SOCK_SEQPACKET</constant>) socket, respectively.
158 The address can be written in various formats:</para>
159
160 <para>If the address starts with a slash
161 (<literal>/</literal>), it is read as file system socket in
162 the <constant>AF_UNIX</constant> socket family.</para>
163
164 <para>If the address starts with an at symbol
165 (<literal>@</literal>), it is read as abstract namespace
166 socket in the <constant>AF_UNIX</constant> family. The
167 <literal>@</literal> is replaced with a
168 <constant>NUL</constant> character before binding. For
169 details, see
170 <citerefentry project='man-pages'><refentrytitle>unix</refentrytitle><manvolnum>7</manvolnum></citerefentry>.</para>
171
172 <para>If the address string is a single number, it is read as
173 port number to listen on via IPv6. Depending on the value of
174 <varname>BindIPv6Only=</varname> (see below) this might result
175 in the service being available via both IPv6 and IPv4
176 (default) or just via IPv6.
177 </para>
178
179 <para>If the address string is a string in the format
180 v.w.x.y:z, it is read as IPv4 specifier for listening on an
181 address v.w.x.y on a port z.</para>
182
183 <para>If the address string is a string in the format [x]:y,
184 it is read as IPv6 address x on a port y. Note that this might
185 make the service available via IPv4, too, depending on the
186 <varname>BindIPv6Only=</varname> setting (see below).
187 </para>
188
189 <para>Note that <constant>SOCK_SEQPACKET</constant> (i.e.
190 <varname>ListenSequentialPacket=</varname>) is only available
191 for <constant>AF_UNIX</constant> sockets.
192 <constant>SOCK_STREAM</constant> (i.e.
193 <varname>ListenStream=</varname>) when used for IP sockets
194 refers to TCP sockets, <constant>SOCK_DGRAM</constant> (i.e.
195 <varname>ListenDatagram=</varname>) to UDP.</para>
196
197 <para>These options may be specified more than once, in which
198 case incoming traffic on any of the sockets will trigger
199 service activation, and all listed sockets will be passed to
200 the service, regardless of whether there is incoming traffic
201 on them or not. If the empty string is assigned to any of
202 these options, the list of addresses to listen on is reset,
203 all prior uses of any of these options will have no
204 effect.</para>
205
206 <para>It is also possible to have more than one socket unit
207 for the same service when using <varname>Service=</varname>,
208 and the service will receive all the sockets configured in all
209 the socket units. Sockets configured in one unit are passed in
210 the order of configuration, but no ordering between socket
211 units is specified.</para>
212
213 <para>If an IP address is used here, it is often desirable to
214 listen on it before the interface it is configured on is up
215 and running, and even regardless of whether it will be up and
216 running at any point. To deal with this, it is recommended to
217 set the <varname>FreeBind=</varname> option described
218 below.</para></listitem>
219 </varlistentry>
220
221 <varlistentry>
222 <term><varname>ListenFIFO=</varname></term>
223 <listitem><para>Specifies a file system FIFO to listen on.
224 This expects an absolute file system path as argument.
225 Behavior otherwise is very similar to the
226 <varname>ListenDatagram=</varname> directive
227 above.</para></listitem>
228 </varlistentry>
229
230 <varlistentry>
231 <term><varname>ListenSpecial=</varname></term>
232 <listitem><para>Specifies a special file in the file system to
233 listen on. This expects an absolute file system path as
234 argument. Behavior otherwise is very similar to the
235 <varname>ListenFIFO=</varname> directive above. Use this to
236 open character device nodes as well as special files in
237 <filename>/proc</filename> and
238 <filename>/sys</filename>.</para></listitem>
239 </varlistentry>
240
241 <varlistentry>
242 <term><varname>ListenNetlink=</varname></term>
243 <listitem><para>Specifies a Netlink family to create a socket
244 for to listen on. This expects a short string referring to the
245 <constant>AF_NETLINK</constant> family name (such as
246 <varname>audit</varname> or <varname>kobject-uevent</varname>)
247 as argument, optionally suffixed by a whitespace followed by a
248 multicast group integer. Behavior otherwise is very similar to
249 the <varname>ListenDatagram=</varname> directive
250 above.</para></listitem>
251 </varlistentry>
252
253 <varlistentry>
254 <term><varname>ListenMessageQueue=</varname></term>
255 <listitem><para>Specifies a POSIX message queue name to listen
256 on. This expects a valid message queue name (i.e. beginning
257 with /). Behavior otherwise is very similar to the
258 <varname>ListenFIFO=</varname> directive above. On Linux
259 message queue descriptors are actually file descriptors and
260 can be inherited between processes.</para></listitem>
261 </varlistentry>
262
263 <varlistentry>
264 <term><varname>ListenUSBFunction=</varname></term>
265 <listitem><para>Specifies a <ulink
266 url="https://www.kernel.org/doc/Documentation/usb/functionfs.txt">USB
267 FunctionFS</ulink> endpoint location to listen on, for
268 implementation of USB gadget functions. This expects an
269 absolute file system path as the argument. Behavior otherwise
270 is very similar to the <varname>ListenFIFO=</varname>
271 directive above. Use this to open the FunctionFS endpoint
272 <filename>ep0</filename>. When using this option, the
273 activated service has to have the
274 <varname>USBFunctionDescriptors=</varname> and
275 <varname>USBFunctionStrings=</varname> options set.
276 </para></listitem>
277 </varlistentry>
278
279 <varlistentry>
280 <term><varname>BindIPv6Only=</varname></term>
281 <listitem><para>Takes a one of <option>default</option>,
282 <option>both</option> or <option>ipv6-only</option>. Controls
283 the IPV6_V6ONLY socket option (see
284 <citerefentry project='die-net'><refentrytitle>ipv6</refentrytitle><manvolnum>7</manvolnum></citerefentry>
285 for details). If <option>both</option>, IPv6 sockets bound
286 will be accessible via both IPv4 and IPv6. If
287 <option>ipv6-only</option>, they will be accessible via IPv6
288 only. If <option>default</option> (which is the default,
289 surprise!), the system wide default setting is used, as
290 controlled by
291 <filename>/proc/sys/net/ipv6/bindv6only</filename>, which in
292 turn defaults to the equivalent of
293 <option>both</option>.</para>
294 </listitem>
295 </varlistentry>
296
297 <varlistentry>
298 <term><varname>Backlog=</varname></term>
299 <listitem><para>Takes an unsigned integer argument. Specifies
300 the number of connections to queue that have not been accepted
301 yet. This setting matters only for stream and sequential
302 packet sockets. See
303 <citerefentry><refentrytitle>listen</refentrytitle><manvolnum>2</manvolnum></citerefentry>
304 for details. Defaults to SOMAXCONN (128).</para></listitem>
305 </varlistentry>
306
307 <varlistentry>
308 <term><varname>BindToDevice=</varname></term>
309 <listitem><para>Specifies a network interface name to bind
310 this socket to. If set, traffic will only be accepted from the
311 specified network interfaces. This controls the
312 SO_BINDTODEVICE socket option (see
313 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
314 for details). If this option is used, an automatic dependency
315 from this socket unit on the network interface device unit
316 (<citerefentry><refentrytitle>systemd.device</refentrytitle><manvolnum>5</manvolnum></citerefentry>
317 is created.</para></listitem>
318 </varlistentry>
319
320 <varlistentry>
321 <term><varname>SocketUser=</varname></term>
322 <term><varname>SocketGroup=</varname></term>
323
324 <listitem><para>Takes a UNIX user/group name. When specified,
325 all AF_UNIX sockets and FIFO nodes in the file system are
326 owned by the specified user and group. If unset (the default),
327 the nodes are owned by the root user/group (if run in system
328 context) or the invoking user/group (if run in user context).
329 If only a user is specified but no group, then the group is
330 derived from the user's default group.</para></listitem>
331 </varlistentry>
332
333 <varlistentry>
334 <term><varname>SocketMode=</varname></term>
335 <listitem><para>If listening on a file system socket or FIFO,
336 this option specifies the file system access mode used when
337 creating the file node. Takes an access mode in octal
338 notation. Defaults to 0666.</para></listitem>
339 </varlistentry>
340
341 <varlistentry>
342 <term><varname>DirectoryMode=</varname></term>
343 <listitem><para>If listening on a file system socket or FIFO,
344 the parent directories are automatically created if needed.
345 This option specifies the file system access mode used when
346 creating these directories. Takes an access mode in octal
347 notation. Defaults to 0755.</para></listitem>
348 </varlistentry>
349
350 <varlistentry>
351 <term><varname>Accept=</varname></term>
352 <listitem><para>Takes a boolean argument. If true, a service
353 instance is spawned for each incoming connection and only the
354 connection socket is passed to it. If false, all listening
355 sockets themselves are passed to the started service unit, and
356 only one service unit is spawned for all connections (also see
357 above). This value is ignored for datagram sockets and FIFOs
358 where a single service unit unconditionally handles all
359 incoming traffic. Defaults to <option>false</option>. For
360 performance reasons, it is recommended to write new daemons
361 only in a way that is suitable for
362 <option>Accept=false</option>. A daemon listening on an
363 <constant>AF_UNIX</constant> socket may, but does not need to,
364 call
365 <citerefentry><refentrytitle>close</refentrytitle><manvolnum>2</manvolnum></citerefentry>
366 on the received socket before exiting. However, it must not
367 unlink the socket from a file system. It should not invoke
368 <citerefentry><refentrytitle>shutdown</refentrytitle><manvolnum>2</manvolnum></citerefentry>
369 on sockets it got with <varname>Accept=false</varname>, but it
370 may do so for sockets it got with
371 <varname>Accept=true</varname> set. Setting
372 <varname>Accept=true</varname> is mostly useful to allow
373 daemons designed for usage with
374 <citerefentry project='freebsd'><refentrytitle>inetd</refentrytitle><manvolnum>8</manvolnum></citerefentry>
375 to work unmodified with systemd socket
376 activation.</para>
377
378 <para>For IPv4 and IPv6 connections, the <varname>REMOTE_ADDR</varname>
379 environment variable will contain the remote IP address, and <varname>REMOTE_PORT</varname>
380 will contain the remote port. This is the same as the format used by CGI.
381 For SOCK_RAW, the port is the IP protocol.</para></listitem>
382 </varlistentry>
383
384 <varlistentry>
385 <term><varname>Writable=</varname></term>
386 <listitem><para>Takes a boolean argument. May only be used in
387 conjunction with <varname>ListenSpecial=</varname>. If true,
388 the specified special file is opened in read-write mode, if
389 false, in read-only mode. Defaults to false.</para></listitem>
390 </varlistentry>
391
392 <varlistentry>
393 <term><varname>MaxConnections=</varname></term>
394 <listitem><para>The maximum number of connections to
395 simultaneously run services instances for, when
396 <option>Accept=true</option> is set. If more concurrent
397 connections are coming in, they will be refused until at least
398 one existing connection is terminated. This setting has no
399 effect on sockets configured with
400 <option>Accept=false</option> or datagram sockets. Defaults to
401 64.</para></listitem>
402 </varlistentry>
403
404 <varlistentry>
405 <term><varname>KeepAlive=</varname></term>
406 <listitem><para>Takes a boolean argument. If true, the TCP/IP
407 stack will send a keep alive message after 2h (depending on
408 the configuration of
409 <filename>/proc/sys/net/ipv4/tcp_keepalive_time</filename>)
410 for all TCP streams accepted on this socket. This controls the
411 SO_KEEPALIVE socket option (see
412 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
413 and the <ulink
414 url="http://www.tldp.org/HOWTO/html_single/TCP-Keepalive-HOWTO/">TCP
415 Keepalive HOWTO</ulink> for details.) Defaults to
416 <option>false</option>.</para></listitem>
417 </varlistentry>
418
419 <varlistentry>
420 <term><varname>KeepAliveTimeSec=</varname></term>
421 <listitem><para>Takes time (in seconds) as argument. The connection needs to remain
422 idle before TCP starts sending keepalive probes. This controls the TCP_KEEPIDLE
423 socket option (see
424 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
425 and the <ulink
426 url="http://www.tldp.org/HOWTO/html_single/TCP-Keepalive-HOWTO/">TCP
427 Keepalive HOWTO</ulink> for details.)
428 Defaults value is 7200 seconds (2 hours).</para></listitem>
429 </varlistentry>
430
431 <varlistentry>
432 <term><varname>KeepAliveIntervalSec=</varname></term>
433 <listitem><para>Takes time (in seconds) as argument between
434 individual keepalive probes, if the socket option SO_KEEPALIVE
435 has been set on this socket. This controls
436 the TCP_KEEPINTVL socket option (see
437 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
438 and the <ulink
439 url="http://www.tldp.org/HOWTO/html_single/TCP-Keepalive-HOWTO/">TCP
440 Keepalive HOWTO</ulink> for details.) Defaults value is 75
441 seconds.</para></listitem>
442 </varlistentry>
443
444 <varlistentry>
445 <term><varname>KeepAliveProbes=</varname></term>
446 <listitem><para>Takes an integer as argument. It is the number of
447 unacknowledged probes to send before considering the
448 connection dead and notifying the application layer. This
449 controls the TCP_KEEPCNT socket option (see
450 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
451 and the <ulink
452 url="http://www.tldp.org/HOWTO/html_single/TCP-Keepalive-HOWTO/">TCP
453 Keepalive HOWTO</ulink> for details.) Defaults value is
454 9.</para></listitem>
455 </varlistentry>
456
457 <varlistentry>
458 <term><varname>NoDelay=</varname></term>
459 <listitem><para>Takes a boolean argument. TCP Nagle's
460 algorithm works by combining a number of small outgoing
461 messages, and sending them all at once. This controls the
462 TCP_NODELAY socket option (see
463 <citerefentry project='die-net'><refentrytitle>tcp</refentrytitle><manvolnum>7</manvolnum></citerefentry>
464 Defaults to <option>false</option>.</para></listitem>
465 </varlistentry>
466
467 <varlistentry>
468 <term><varname>Priority=</varname></term>
469 <listitem><para>Takes an integer argument controlling the
470 priority for all traffic sent from this socket. This controls
471 the SO_PRIORITY socket option (see
472 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
473 for details.).</para></listitem>
474 </varlistentry>
475
476 <varlistentry>
477 <term><varname>DeferAcceptSec=</varname></term>
478
479 <listitem><para>Takes time (in seconds) as argument. If set,
480 the listening process will be awakened only when data arrives
481 on the socket, and not immediately when connection is
482 established. When this option is set, the
483 <constant>TCP_DEFER_ACCEPT</constant> socket option will be
484 used (see
485 <citerefentry project='die-net'><refentrytitle>tcp</refentrytitle><manvolnum>7</manvolnum></citerefentry>),
486 and the kernel will ignore initial ACK packets without any
487 data. The argument specifies the approximate amount of time
488 the kernel should wait for incoming data before falling back
489 to the normal behavior of honouring empty ACK packets. This
490 option is beneficial for protocols where the client sends the
491 data first (e.g. HTTP, in contrast to SMTP), because the
492 server process will not be woken up unnecessarily before it
493 can take any action.
494 </para>
495
496 <para>If the client also uses the
497 <constant>TCP_DEFER_ACCEPT</constant> option, the latency of
498 the initial connection may be reduced, because the kernel will
499 send data in the final packet establishing the connection (the
500 third packet in the "three-way handshake").</para>
501
502 <para>Disabled by default.</para>
503 </listitem>
504 </varlistentry>
505
506 <varlistentry>
507 <term><varname>ReceiveBuffer=</varname></term>
508 <term><varname>SendBuffer=</varname></term>
509 <listitem><para>Takes an integer argument controlling the
510 receive or send buffer sizes of this socket, respectively.
511 This controls the SO_RCVBUF and SO_SNDBUF socket options (see
512 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
513 for details.). The usual suffixes K, M, G are supported and
514 are understood to the base of 1024.</para></listitem>
515 </varlistentry>
516
517 <varlistentry>
518 <term><varname>IPTOS=</varname></term>
519 <listitem><para>Takes an integer argument controlling the IP
520 Type-Of-Service field for packets generated from this socket.
521 This controls the IP_TOS socket option (see
522 <citerefentry project='die-net'><refentrytitle>ip</refentrytitle><manvolnum>7</manvolnum></citerefentry>
523 for details.). Either a numeric string or one of
524 <option>low-delay</option>, <option>throughput</option>,
525 <option>reliability</option> or <option>low-cost</option> may
526 be specified.</para></listitem>
527 </varlistentry>
528
529 <varlistentry>
530 <term><varname>IPTTL=</varname></term>
531 <listitem><para>Takes an integer argument controlling the IPv4
532 Time-To-Live/IPv6 Hop-Count field for packets generated from
533 this socket. This sets the IP_TTL/IPV6_UNICAST_HOPS socket
534 options (see
535 <citerefentry project='die-net'><refentrytitle>ip</refentrytitle><manvolnum>7</manvolnum></citerefentry>
536 and
537 <citerefentry project='die-net'><refentrytitle>ipv6</refentrytitle><manvolnum>7</manvolnum></citerefentry>
538 for details.)</para></listitem>
539 </varlistentry>
540
541 <varlistentry>
542 <term><varname>Mark=</varname></term>
543 <listitem><para>Takes an integer value. Controls the firewall
544 mark of packets generated by this socket. This can be used in
545 the firewall logic to filter packets from this socket. This
546 sets the SO_MARK socket option. See
547 <citerefentry project='die-net'><refentrytitle>iptables</refentrytitle><manvolnum>8</manvolnum></citerefentry>
548 for details.</para></listitem>
549 </varlistentry>
550
551 <varlistentry>
552 <term><varname>ReusePort=</varname></term>
553 <listitem><para>Takes a boolean value. If true, allows
554 multiple
555 <citerefentry><refentrytitle>bind</refentrytitle><manvolnum>2</manvolnum></citerefentry>s
556 to this TCP or UDP port. This controls the SO_REUSEPORT socket
557 option. See
558 <citerefentry project='man-pages'><refentrytitle>socket</refentrytitle><manvolnum>7</manvolnum></citerefentry>
559 for details.</para></listitem>
560 </varlistentry>
561
562 <varlistentry>
563 <term><varname>SmackLabel=</varname></term>
564 <term><varname>SmackLabelIPIn=</varname></term>
565 <term><varname>SmackLabelIPOut=</varname></term>
566 <listitem><para>Takes a string value. Controls the extended
567 attributes <literal>security.SMACK64</literal>,
568 <literal>security.SMACK64IPIN</literal> and
569 <literal>security.SMACK64IPOUT</literal>, respectively, i.e.
570 the security label of the FIFO, or the security label for the
571 incoming or outgoing connections of the socket, respectively.
572 See <ulink
573 url="https://www.kernel.org/doc/Documentation/security/Smack.txt">Smack.txt</ulink>
574 for details.</para></listitem>
575 </varlistentry>
576
577 <varlistentry>
578 <term><varname>SELinuxContextFromNet=</varname></term>
579 <listitem><para>Takes a boolean argument. When true, systemd
580 will attempt to figure out the SELinux label used for the
581 instantiated service from the information handed by the peer
582 over the network. Note that only the security level is used
583 from the information provided by the peer. Other parts of the
584 resulting SELinux context originate from either the target
585 binary that is effectively triggered by socket unit or from
586 the value of the <varname>SELinuxContext=</varname> option.
587 This configuration option only affects sockets with
588 <varname>Accept=</varname> mode set to
589 <literal>true</literal>. Also note that this option is useful
590 only when MLS/MCS SELinux policy is deployed. Defaults to
591 <literal>false</literal>. </para></listitem>
592 </varlistentry>
593
594 <varlistentry>
595 <term><varname>PipeSize=</varname></term>
596 <listitem><para>Takes a size in bytes. Controls the pipe
597 buffer size of FIFOs configured in this socket unit. See
598 <citerefentry><refentrytitle>fcntl</refentrytitle><manvolnum>2</manvolnum></citerefentry>
599 for details. The usual suffixes K, M, G are supported and are
600 understood to the base of 1024.</para></listitem>
601 </varlistentry>
602
603 <varlistentry>
604 <term><varname>MessageQueueMaxMessages=</varname>,
605 <varname>MessageQueueMessageSize=</varname></term>
606 <listitem><para>These two settings take integer values and
607 control the mq_maxmsg field or the mq_msgsize field,
608 respectively, when creating the message queue. Note that
609 either none or both of these variables need to be set. See
610 <citerefentry project='die-net'><refentrytitle>mq_setattr</refentrytitle><manvolnum>3</manvolnum></citerefentry>
611 for details.</para></listitem>
612 </varlistentry>
613
614 <varlistentry>
615 <term><varname>FreeBind=</varname></term>
616 <listitem><para>Takes a boolean value. Controls whether the
617 socket can be bound to non-local IP addresses. This is useful
618 to configure sockets listening on specific IP addresses before
619 those IP addresses are successfully configured on a network
620 interface. This sets the IP_FREEBIND socket option. For
621 robustness reasons it is recommended to use this option
622 whenever you bind a socket to a specific IP address. Defaults
623 to <option>false</option>.</para></listitem>
624 </varlistentry>
625
626 <varlistentry>
627 <term><varname>Transparent=</varname></term>
628 <listitem><para>Takes a boolean value. Controls the
629 IP_TRANSPARENT socket option. Defaults to
630 <option>false</option>.</para></listitem>
631 </varlistentry>
632
633 <varlistentry>
634 <term><varname>Broadcast=</varname></term>
635 <listitem><para>Takes a boolean value. This controls the
636 SO_BROADCAST socket option, which allows broadcast datagrams
637 to be sent from this socket. Defaults to
638 <option>false</option>.</para></listitem>
639 </varlistentry>
640
641 <varlistentry>
642 <term><varname>PassCredentials=</varname></term>
643 <listitem><para>Takes a boolean value. This controls the
644 SO_PASSCRED socket option, which allows
645 <constant>AF_UNIX</constant> sockets to receive the
646 credentials of the sending process in an ancillary message.
647 Defaults to <option>false</option>.</para></listitem>
648 </varlistentry>
649
650 <varlistentry>
651 <term><varname>PassSecurity=</varname></term>
652 <listitem><para>Takes a boolean value. This controls the
653 SO_PASSSEC socket option, which allows
654 <constant>AF_UNIX</constant> sockets to receive the security
655 context of the sending process in an ancillary message.
656 Defaults to <option>false</option>.</para></listitem>
657 </varlistentry>
658
659 <varlistentry>
660 <term><varname>TCPCongestion=</varname></term>
661 <listitem><para>Takes a string value. Controls the TCP
662 congestion algorithm used by this socket. Should be one of
663 "westwood", "veno", "cubic", "lp" or any other available
664 algorithm supported by the IP stack. This setting applies only
665 to stream sockets.</para></listitem>
666 </varlistentry>
667
668 <varlistentry>
669 <term><varname>ExecStartPre=</varname></term>
670 <term><varname>ExecStartPost=</varname></term>
671 <listitem><para>Takes one or more command lines, which are
672 executed before or after the listening sockets/FIFOs are
673 created and bound, respectively. The first token of the
674 command line must be an absolute filename, then followed by
675 arguments for the process. Multiple command lines may be
676 specified following the same scheme as used for
677 <varname>ExecStartPre=</varname> of service unit
678 files.</para></listitem>
679 </varlistentry>
680
681 <varlistentry>
682 <term><varname>ExecStopPre=</varname></term>
683 <term><varname>ExecStopPost=</varname></term>
684 <listitem><para>Additional commands that are executed before
685 or after the listening sockets/FIFOs are closed and removed,
686 respectively. Multiple command lines may be specified
687 following the same scheme as used for
688 <varname>ExecStartPre=</varname> of service unit
689 files.</para></listitem>
690 </varlistentry>
691
692 <varlistentry>
693 <term><varname>TimeoutSec=</varname></term>
694 <listitem><para>Configures the time to wait for the commands
695 specified in <varname>ExecStartPre=</varname>,
696 <varname>ExecStartPost=</varname>,
697 <varname>ExecStopPre=</varname> and
698 <varname>ExecStopPost=</varname> to finish. If a command does
699 not exit within the configured time, the socket will be
700 considered failed and be shut down again. All commands still
701 running will be terminated forcibly via
702 <constant>SIGTERM</constant>, and after another delay of this
703 time with <constant>SIGKILL</constant>. (See
704 <option>KillMode=</option> in
705 <citerefentry><refentrytitle>systemd.kill</refentrytitle><manvolnum>5</manvolnum></citerefentry>.)
706 Takes a unit-less value in seconds, or a time span value such
707 as "5min 20s". Pass <literal>0</literal> to disable the
708 timeout logic. Defaults to
709 <varname>DefaultTimeoutStartSec=</varname> from the manager
710 configuration file (see
711 <citerefentry><refentrytitle>systemd-system.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>).
712 </para></listitem>
713 </varlistentry>
714
715 <varlistentry>
716 <term><varname>Service=</varname></term>
717 <listitem><para>Specifies the service unit name to activate on
718 incoming traffic. This setting is only allowed for sockets
719 with <varname>Accept=no</varname>. It defaults to the service
720 that bears the same name as the socket (with the suffix
721 replaced). In most cases, it should not be necessary to use
722 this option.</para></listitem>
723 </varlistentry>
724
725 <varlistentry>
726 <term><varname>RemoveOnStop=</varname></term>
727 <listitem><para>Takes a boolean argument. If enabled, any file
728 nodes created by this socket unit are removed when it is
729 stopped. This applies to AF_UNIX sockets in the file system,
730 POSIX message queues, FIFOs, as well as any symlinks to them
731 configured with <varname>Symlinks=</varname>. Normally, it
732 should not be necessary to use this option, and is not
733 recommended as services might continue to run after the socket
734 unit has been terminated and it should still be possible to
735 communicate with them via their file system node. Defaults to
736 off.</para></listitem>
737 </varlistentry>
738
739 <varlistentry>
740 <term><varname>Symlinks=</varname></term>
741 <listitem><para>Takes a list of file system paths. The
742 specified paths will be created as symlinks to the AF_UNIX
743 socket path or FIFO path of this socket unit. If this setting
744 is used, only one AF_UNIX socket in the file system or one
745 FIFO may be configured for the socket unit. Use this option to
746 manage one or more symlinked alias names for a socket, binding
747 their lifecycle together. Defaults to the empty
748 list.</para></listitem>
749 </varlistentry>
750
751 <varlistentry>
752 <term><varname>FileDescriptorName=</varname></term>
753 <listitem><para>Assigns a name to all file descriptors this
754 socket unit encapsulates. This is useful to help activated
755 services identify specific file descriptors, if multiple fds
756 are passed. Services may use the
757 <citerefentry><refentrytitle>sd_listen_fds_with_names</refentrytitle><manvolnum>3</manvolnum></citerefentry>
758 call to acquire the names configured for the received file
759 descriptors. Names may contain any ASCII character, but must
760 exclude control characters and <literal>:</literal>, and must
761 be at most 255 characters in length. If this setting is not
762 used, the file descriptor name defaults to the name of the
763 socket unit, including its <filename>.socket</filename>
764 suffix.</para></listitem>
765 </varlistentry>
766
767 </variablelist>
768
769 <para>Check
770 <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>
771 and
772 <citerefentry><refentrytitle>systemd.kill</refentrytitle><manvolnum>5</manvolnum></citerefentry>
773 for more settings.</para>
774
775 </refsect1>
776
777 <refsect1>
778 <title>See Also</title>
779 <para>
780 <citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
781 <citerefentry><refentrytitle>systemctl</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
782 <citerefentry><refentrytitle>systemd.unit</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
783 <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
784 <citerefentry><refentrytitle>systemd.kill</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
785 <citerefentry><refentrytitle>systemd.resource-control</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
786 <citerefentry><refentrytitle>systemd.service</refentrytitle><manvolnum>5</manvolnum></citerefentry>,
787 <citerefentry><refentrytitle>systemd.directives</refentrytitle><manvolnum>7</manvolnum></citerefentry>,
788 <citerefentry><refentrytitle>sd_listen_fds</refentrytitle><manvolnum>3</manvolnum></citerefentry>,
789 <citerefentry><refentrytitle>sd_listen_fds_with_names</refentrytitle><manvolnum>3</manvolnum></citerefentry>
790 </para>
791 <para>
792 For more extensive descriptions see the "systemd for Developers" series:
793 <ulink url="http://0pointer.de/blog/projects/socket-activation.html">Socket Activation</ulink>,
794 <ulink url="http://0pointer.de/blog/projects/socket-activation2.html">Socket Activation, part II</ulink>,
795 <ulink url="http://0pointer.de/blog/projects/inetd.html">Converting inetd Services</ulink>,
796 <ulink url="http://0pointer.de/blog/projects/socket-activated-containers.html">Socket Activated Internet Services and OS Containers</ulink>.
797 </para>
798 </refsect1>
799
800 </refentry>