]> git.proxmox.com Git - systemd.git/blob - man/systemd.socket.5
Imported Upstream version 220
[systemd.git] / man / systemd.socket.5
1 '\" t
2 .TH "SYSTEMD\&.SOCKET" "5" "" "systemd 220" "systemd.socket"
3 .\" -----------------------------------------------------------------
4 .\" * Define some portability stuff
5 .\" -----------------------------------------------------------------
6 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
7 .\" http://bugs.debian.org/507673
8 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
9 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
10 .ie \n(.g .ds Aq \(aq
11 .el .ds Aq '
12 .\" -----------------------------------------------------------------
13 .\" * set default formatting
14 .\" -----------------------------------------------------------------
15 .\" disable hyphenation
16 .nh
17 .\" disable justification (adjust text to left margin only)
18 .ad l
19 .\" -----------------------------------------------------------------
20 .\" * MAIN CONTENT STARTS HERE *
21 .\" -----------------------------------------------------------------
22 .SH "NAME"
23 systemd.socket \- Socket unit configuration
24 .SH "SYNOPSIS"
25 .PP
26 \fIsocket\fR\&.socket
27 .SH "DESCRIPTION"
28 .PP
29 A unit configuration file whose name ends in
30 "\&.socket"
31 encodes information about an IPC or network socket or a file system FIFO controlled and supervised by systemd, for socket\-based activation\&.
32 .PP
33 This man page lists the configuration options specific to this unit type\&. See
34 \fBsystemd.unit\fR(5)
35 for the common options of all unit configuration files\&. The common configuration items are configured in the generic [Unit] and [Install] sections\&. The socket specific configuration options are configured in the [Socket] section\&.
36 .PP
37 Additional options are listed in
38 \fBsystemd.exec\fR(5), which define the execution environment the
39 \fBExecStartPre=\fR,
40 \fBExecStartPost=\fR,
41 \fBExecStopPre=\fR
42 and
43 \fBExecStopPost=\fR
44 commands are executed in, and in
45 \fBsystemd.kill\fR(5), which define the way the processes are terminated, and in
46 \fBsystemd.resource-control\fR(5), which configure resource control settings for the processes of the socket\&.
47 .PP
48 For each socket file, a matching service file must exist, describing the service to start on incoming traffic on the socket (see
49 \fBsystemd.service\fR(5)
50 for more information about \&.service files)\&. The name of the \&.service unit is by default the same as the name of the \&.socket unit, but can be altered with the
51 \fBService=\fR
52 option described below\&. Depending on the setting of the
53 \fBAccept=\fR
54 option described below, this \&.service unit must either be named like the \&.socket unit, but with the suffix replaced, unless overridden with
55 \fBService=\fR; or it must be a template unit named the same way\&. Example: a socket file
56 foo\&.socket
57 needs a matching service
58 foo\&.service
59 if
60 \fBAccept=false\fR
61 is set\&. If
62 \fBAccept=true\fR
63 is set, a service template file
64 foo@\&.service
65 must exist from which services are instantiated for each incoming connection\&.
66 .PP
67 Unless
68 \fIDefaultDependencies=\fR
69 is set to
70 \fBfalse\fR, socket units will implicitly have dependencies of type
71 \fIRequires=\fR
72 and
73 \fIAfter=\fR
74 on
75 sysinit\&.target
76 as well as dependencies of type
77 \fIConflicts=\fR
78 and
79 \fIBefore=\fR
80 on
81 shutdown\&.target\&. These ensure that socket units pull in basic system initialization, and are terminated cleanly prior to system shutdown\&. Only sockets involved with early boot or late system shutdown should disable this option\&.
82 .PP
83 Socket units will have a
84 \fIBefore=\fR
85 dependency on the service which they trigger added implicitly\&. No implicit
86 \fIWantedBy=\fR
87 or
88 \fIRequiredBy=\fR
89 dependency from the socket to the service is added\&. This means that the service may be started without the socket, in which case it must be able to open sockets by itself\&. To prevent this, an explicit
90 \fIRequires=\fR
91 dependency may be added\&.
92 .PP
93 Socket units may be used to implement on\-demand starting of services, as well as parallelized starting of services\&. See the blog stories linked at the end for an introduction\&.
94 .PP
95 Note that the daemon software configured for socket activation with socket units needs to be able to accept sockets from systemd, either via systemd\*(Aqs native socket passing interface (see
96 \fBsd_listen_fds\fR(3)
97 for details) or via the traditional
98 \fBinetd\fR(8)\-style socket passing (i\&.e\&. sockets passed in via standard input and output, using
99 \fIStandardInput=socket\fR
100 in the service file)\&.
101 .SH "OPTIONS"
102 .PP
103 Socket files must include a [Socket] section, which carries information about the socket or FIFO it supervises\&. A number of options that may be used in this section are shared with other unit types\&. These options are documented in
104 \fBsystemd.exec\fR(5)
105 and
106 \fBsystemd.kill\fR(5)\&. The options specific to the [Socket] section of socket units are the following:
107 .PP
108 \fIListenStream=\fR, \fIListenDatagram=\fR, \fIListenSequentialPacket=\fR
109 .RS 4
110 Specifies an address to listen on for a stream (\fBSOCK_STREAM\fR), datagram (\fBSOCK_DGRAM\fR), or sequential packet (\fBSOCK_SEQPACKET\fR) socket, respectively\&. The address can be written in various formats:
111 .sp
112 If the address starts with a slash ("/"), it is read as file system socket in the
113 \fBAF_UNIX\fR
114 socket family\&.
115 .sp
116 If the address starts with an at symbol ("@"), it is read as abstract namespace socket in the
117 \fBAF_UNIX\fR
118 family\&. The
119 "@"
120 is replaced with a
121 \fBNUL\fR
122 character before binding\&. For details, see
123 \fBunix\fR(7)\&.
124 .sp
125 If the address string is a single number, it is read as port number to listen on via IPv6\&. Depending on the value of
126 \fIBindIPv6Only=\fR
127 (see below) this might result in the service being available via both IPv6 and IPv4 (default) or just via IPv6\&.
128 .sp
129 If the address string is a string in the format v\&.w\&.x\&.y:z, it is read as IPv4 specifier for listening on an address v\&.w\&.x\&.y on a port z\&.
130 .sp
131 If the address string is a string in the format [x]:y, it is read as IPv6 address x on a port y\&. Note that this might make the service available via IPv4, too, depending on the
132 \fIBindIPv6Only=\fR
133 setting (see below)\&.
134 .sp
135 Note that
136 \fBSOCK_SEQPACKET\fR
137 (i\&.e\&.
138 \fIListenSequentialPacket=\fR) is only available for
139 \fBAF_UNIX\fR
140 sockets\&.
141 \fBSOCK_STREAM\fR
142 (i\&.e\&.
143 \fIListenStream=\fR) when used for IP sockets refers to TCP sockets,
144 \fBSOCK_DGRAM\fR
145 (i\&.e\&.
146 \fIListenDatagram=\fR) to UDP\&.
147 .sp
148 These options may be specified more than once in which case incoming traffic on any of the sockets will trigger service activation, and all listed sockets will be passed to the service, regardless of whether there is incoming traffic on them or not\&. If the empty string is assigned to any of these options, the list of addresses to listen on is reset, all prior uses of any of these options will have no effect\&.
149 .sp
150 It is also possible to have more than one socket unit for the same service when using
151 \fIService=\fR, and the service will receive all the sockets configured in all the socket units\&. Sockets configured in one unit are passed in the order of configuration, but no ordering between socket units is specified\&.
152 .sp
153 If an IP address is used here, it is often desirable to listen on it before the interface it is configured on is up and running, and even regardless of whether it will be up and running at any point\&. To deal with this, it is recommended to set the
154 \fIFreeBind=\fR
155 option described below\&.
156 .RE
157 .PP
158 \fIListenFIFO=\fR
159 .RS 4
160 Specifies a file system FIFO to listen on\&. This expects an absolute file system path as argument\&. Behavior otherwise is very similar to the
161 \fIListenDatagram=\fR
162 directive above\&.
163 .RE
164 .PP
165 \fIListenSpecial=\fR
166 .RS 4
167 Specifies a special file in the file system to listen on\&. This expects an absolute file system path as argument\&. Behavior otherwise is very similar to the
168 \fIListenFIFO=\fR
169 directive above\&. Use this to open character device nodes as well as special files in
170 /proc
171 and
172 /sys\&.
173 .RE
174 .PP
175 \fIListenNetlink=\fR
176 .RS 4
177 Specifies a Netlink family to create a socket for to listen on\&. This expects a short string referring to the
178 \fBAF_NETLINK\fR
179 family name (such as
180 \fIaudit\fR
181 or
182 \fIkobject\-uevent\fR) as argument, optionally suffixed by a whitespace followed by a multicast group integer\&. Behavior otherwise is very similar to the
183 \fIListenDatagram=\fR
184 directive above\&.
185 .RE
186 .PP
187 \fIListenMessageQueue=\fR
188 .RS 4
189 Specifies a POSIX message queue name to listen on\&. This expects a valid message queue name (i\&.e\&. beginning with /)\&. Behavior otherwise is very similar to the
190 \fIListenFIFO=\fR
191 directive above\&. On Linux message queue descriptors are actually file descriptors and can be inherited between processes\&.
192 .RE
193 .PP
194 \fIBindIPv6Only=\fR
195 .RS 4
196 Takes a one of
197 \fBdefault\fR,
198 \fBboth\fR
199 or
200 \fBipv6\-only\fR\&. Controls the IPV6_V6ONLY socket option (see
201 \fBipv6\fR(7)
202 for details)\&. If
203 \fBboth\fR, IPv6 sockets bound will be accessible via both IPv4 and IPv6\&. If
204 \fBipv6\-only\fR, they will be accessible via IPv6 only\&. If
205 \fBdefault\fR
206 (which is the default, surprise!), the system wide default setting is used, as controlled by
207 /proc/sys/net/ipv6/bindv6only, which in turn defaults to the equivalent of
208 \fBboth\fR\&.
209 .RE
210 .PP
211 \fIBacklog=\fR
212 .RS 4
213 Takes an unsigned integer argument\&. Specifies the number of connections to queue that have not been accepted yet\&. This setting matters only for stream and sequential packet sockets\&. See
214 \fBlisten\fR(2)
215 for details\&. Defaults to SOMAXCONN (128)\&.
216 .RE
217 .PP
218 \fIBindToDevice=\fR
219 .RS 4
220 Specifies a network interface name to bind this socket to\&. If set, traffic will only be accepted from the specified network interfaces\&. This controls the SO_BINDTODEVICE socket option (see
221 \fBsocket\fR(7)
222 for details)\&. If this option is used, an automatic dependency from this socket unit on the network interface device unit (\fBsystemd.device\fR(5)
223 is created\&.
224 .RE
225 .PP
226 \fISocketUser=\fR, \fISocketGroup=\fR
227 .RS 4
228 Takes a UNIX user/group name\&. When specified, all AF_UNIX sockets and FIFO nodes in the file system are owned by the specified user and group\&. If unset (the default), the nodes are owned by the root user/group (if run in system context) or the invoking user/group (if run in user context)\&. If only a user is specified but no group, then the group is derived from the user\*(Aqs default group\&.
229 .RE
230 .PP
231 \fISocketMode=\fR
232 .RS 4
233 If listening on a file system socket or FIFO, this option specifies the file system access mode used when creating the file node\&. Takes an access mode in octal notation\&. Defaults to 0666\&.
234 .RE
235 .PP
236 \fIDirectoryMode=\fR
237 .RS 4
238 If listening on a file system socket or FIFO, the parent directories are automatically created if needed\&. This option specifies the file system access mode used when creating these directories\&. Takes an access mode in octal notation\&. Defaults to 0755\&.
239 .RE
240 .PP
241 \fIAccept=\fR
242 .RS 4
243 Takes a boolean argument\&. If true, a service instance is spawned for each incoming connection and only the connection socket is passed to it\&. If false, all listening sockets themselves are passed to the started service unit, and only one service unit is spawned for all connections (also see above)\&. This value is ignored for datagram sockets and FIFOs where a single service unit unconditionally handles all incoming traffic\&. Defaults to
244 \fBfalse\fR\&. For performance reasons, it is recommended to write new daemons only in a way that is suitable for
245 \fBAccept=false\fR\&. A daemon listening on an
246 \fBAF_UNIX\fR
247 socket may, but does not need to, call
248 \fBclose\fR(2)
249 on the received socket before exiting\&. However, it must not unlink the socket from a file system\&. It should not invoke
250 \fBshutdown\fR(2)
251 on sockets it got with
252 \fIAccept=false\fR, but it may do so for sockets it got with
253 \fIAccept=true\fR
254 set\&. Setting
255 \fIAccept=true\fR
256 is mostly useful to allow daemons designed for usage with
257 \fBinetd\fR(8)
258 to work unmodified with systemd socket activation\&.
259 .sp
260 For IPv4 and IPv6 connections the
261 \fIREMOTE_ADDR\fR
262 environment variable will contain the remote IP, and
263 \fIREMOTE_PORT\fR
264 will contain the remote port\&. This is the same as the format used by CGI\&. For SOCK_RAW the port is the IP protocol\&.
265 .RE
266 .PP
267 \fIMaxConnections=\fR
268 .RS 4
269 The maximum number of connections to simultaneously run services instances for, when
270 \fBAccept=true\fR
271 is set\&. If more concurrent connections are coming in, they will be refused until at least one existing connection is terminated\&. This setting has no effect on sockets configured with
272 \fBAccept=false\fR
273 or datagram sockets\&. Defaults to 64\&.
274 .RE
275 .PP
276 \fIKeepAlive=\fR
277 .RS 4
278 Takes a boolean argument\&. If true, the TCP/IP stack will send a keep alive message after 2h (depending on the configuration of
279 /proc/sys/net/ipv4/tcp_keepalive_time) for all TCP streams accepted on this socket\&. This controls the SO_KEEPALIVE socket option (see
280 \fBsocket\fR(7)
281 and the
282 \m[blue]\fBTCP Keepalive HOWTO\fR\m[]\&\s-2\u[1]\d\s+2
283 for details\&.) Defaults to
284 \fBfalse\fR\&.
285 .RE
286 .PP
287 \fIKeepAliveTimeSec=\fR
288 .RS 4
289 Takes time (in seconds) as argument \&. The connection needs to remain idle before TCP starts sending keepalive probes\&. This controls the TCP_KEEPIDLE socket option (see
290 \fBsocket\fR(7)
291 and the
292 \m[blue]\fBTCP Keepalive HOWTO\fR\m[]\&\s-2\u[1]\d\s+2
293 for details\&.) Defaults value is 7200 seconds (2 hours)\&.
294 .RE
295 .PP
296 \fIKeepAliveIntervalSec=\fR
297 .RS 4
298 Takes time (in seconds) as argument between individual keepalive probes, if the socket option SO_KEEPALIVE has been set on this socket seconds as argument\&. This controls the TCP_KEEPINTVL socket option (see
299 \fBsocket\fR(7)
300 and the
301 \m[blue]\fBTCP Keepalive HOWTO\fR\m[]\&\s-2\u[1]\d\s+2
302 for details\&.) Defaults value is 75 seconds\&.
303 .RE
304 .PP
305 \fIKeepAliveProbes=\fR
306 .RS 4
307 Takes integer as argument\&. It\*(Aqs the number of unacknowledged probes to send before considering the connection dead and notifying the application layer\&. This controls the TCP_KEEPCNT socket option (see
308 \fBsocket\fR(7)
309 and the
310 \m[blue]\fBTCP Keepalive HOWTO\fR\m[]\&\s-2\u[1]\d\s+2
311 for details\&.) Defaults value is 9\&.
312 .RE
313 .PP
314 \fINoDelay=\fR
315 .RS 4
316 Takes a boolean argument\&. TCP Nagle\*(Aqs algorithm works by combining a number of small outgoing messages, and sending them all at once\&. This controls the TCP_NODELAY socket option (see
317 \fBtcp\fR(7)
318 Defaults to
319 \fBfalse\fR\&.
320 .RE
321 .PP
322 \fIPriority=\fR
323 .RS 4
324 Takes an integer argument controlling the priority for all traffic sent from this socket\&. This controls the SO_PRIORITY socket option (see
325 \fBsocket\fR(7)
326 for details\&.)\&.
327 .RE
328 .PP
329 \fIDeferAcceptSec=\fR
330 .RS 4
331 Takes time (in seconds) as argument\&. If set, the listening process will be awakened only when data arrives on the socket, and not immediately when connection is established\&. When this option is set, the
332 \fBTCP_DEFER_ACCEPT\fR
333 socket option will be used (see
334 \fBtcp\fR(7)), and the kernel will ignore initial ACK packets without any data\&. The argument specifies the approximate amount of time the kernel should wait for incoming data before falling back to the normal behaviour of honouring empty ACK packets\&. This option is beneficial for protocols where the client sends the data first (e\&.g\&. HTTP, in contrast to SMTP), because the server process will not be woken up unnecessarily before it can take any action\&.
335 .sp
336 If the client also uses the
337 \fBTCP_DEFER_ACCEPT\fR
338 option, the latency of the initial connection may be reduced, because the kernel will send data in the final packet establishing the connection (the third packet in the "three\-way handshake")\&.
339 .sp
340 Disabled by default\&.
341 .RE
342 .PP
343 \fIReceiveBuffer=\fR, \fISendBuffer=\fR
344 .RS 4
345 Takes an integer argument controlling the receive or send buffer sizes of this socket, respectively\&. This controls the SO_RCVBUF and SO_SNDBUF socket options (see
346 \fBsocket\fR(7)
347 for details\&.)\&. The usual suffixes K, M, G are supported and are understood to the base of 1024\&.
348 .RE
349 .PP
350 \fIIPTOS=\fR
351 .RS 4
352 Takes an integer argument controlling the IP Type\-Of\-Service field for packets generated from this socket\&. This controls the IP_TOS socket option (see
353 \fBip\fR(7)
354 for details\&.)\&. Either a numeric string or one of
355 \fBlow\-delay\fR,
356 \fBthroughput\fR,
357 \fBreliability\fR
358 or
359 \fBlow\-cost\fR
360 may be specified\&.
361 .RE
362 .PP
363 \fIIPTTL=\fR
364 .RS 4
365 Takes an integer argument controlling the IPv4 Time\-To\-Live/IPv6 Hop\-Count field for packets generated from this socket\&. This sets the IP_TTL/IPV6_UNICAST_HOPS socket options (see
366 \fBip\fR(7)
367 and
368 \fBipv6\fR(7)
369 for details\&.)
370 .RE
371 .PP
372 \fIMark=\fR
373 .RS 4
374 Takes an integer value\&. Controls the firewall mark of packets generated by this socket\&. This can be used in the firewall logic to filter packets from this socket\&. This sets the SO_MARK socket option\&. See
375 \fBiptables\fR(8)
376 for details\&.
377 .RE
378 .PP
379 \fIReusePort=\fR
380 .RS 4
381 Takes a boolean value\&. If true, allows multiple
382 \fBbind\fR(2)s to this TCP or UDP port\&. This controls the SO_REUSEPORT socket option\&. See
383 \fBsocket\fR(7)
384 for details\&.
385 .RE
386 .PP
387 \fISmackLabel=\fR, \fISmackLabelIPIn=\fR, \fISmackLabelIPOut=\fR
388 .RS 4
389 Takes a string value\&. Controls the extended attributes
390 "security\&.SMACK64",
391 "security\&.SMACK64IPIN"
392 and
393 "security\&.SMACK64IPOUT", respectively, i\&.e\&. the security label of the FIFO, or the security label for the incoming or outgoing connections of the socket, respectively\&. See
394 \m[blue]\fBSmack\&.txt\fR\m[]\&\s-2\u[2]\d\s+2
395 for details\&.
396 .RE
397 .PP
398 \fISELinuxContextFromNet=\fR
399 .RS 4
400 Takes a boolean argument\&. When true, systemd will attempt to figure out the SELinux label used for the instantiated service from the information handed by the peer over the network\&. Note that only the security level is used from the information provided by the peer\&. Other parts of the resulting SELinux context originate from either the target binary that is effectively triggered by socket unit or from the value of the
401 \fISELinuxContext=\fR
402 option\&. This configuration option only affects sockets with
403 \fIAccept=\fR
404 mode set to
405 "true"\&. Also note that this option is useful only when MLS/MCS SELinux policy is deployed\&. Defaults to
406 "false"\&.
407 .RE
408 .PP
409 \fIPipeSize=\fR
410 .RS 4
411 Takes a size in bytes\&. Controls the pipe buffer size of FIFOs configured in this socket unit\&. See
412 \fBfcntl\fR(2)
413 for details\&. The usual suffixes K, M, G are supported and are understood to the base of 1024\&.
414 .RE
415 .PP
416 \fIMessageQueueMaxMessages=\fR, \fIMessageQueueMessageSize=\fR
417 .RS 4
418 These two settings take integer values and control the mq_maxmsg field or the mq_msgsize field, respectively, when creating the message queue\&. Note that either none or both of these variables need to be set\&. See
419 \fBmq_setattr\fR(3)
420 for details\&.
421 .RE
422 .PP
423 \fIFreeBind=\fR
424 .RS 4
425 Takes a boolean value\&. Controls whether the socket can be bound to non\-local IP addresses\&. This is useful to configure sockets listening on specific IP addresses before those IP addresses are successfully configured on a network interface\&. This sets the IP_FREEBIND socket option\&. For robustness reasons it is recommended to use this option whenever you bind a socket to a specific IP address\&. Defaults to
426 \fBfalse\fR\&.
427 .RE
428 .PP
429 \fITransparent=\fR
430 .RS 4
431 Takes a boolean value\&. Controls the IP_TRANSPARENT socket option\&. Defaults to
432 \fBfalse\fR\&.
433 .RE
434 .PP
435 \fIBroadcast=\fR
436 .RS 4
437 Takes a boolean value\&. This controls the SO_BROADCAST socket option, which allows broadcast datagrams to be sent from this socket\&. Defaults to
438 \fBfalse\fR\&.
439 .RE
440 .PP
441 \fIPassCredentials=\fR
442 .RS 4
443 Takes a boolean value\&. This controls the SO_PASSCRED socket option, which allows
444 \fBAF_UNIX\fR
445 sockets to receive the credentials of the sending process in an ancillary message\&. Defaults to
446 \fBfalse\fR\&.
447 .RE
448 .PP
449 \fIPassSecurity=\fR
450 .RS 4
451 Takes a boolean value\&. This controls the SO_PASSSEC socket option, which allows
452 \fBAF_UNIX\fR
453 sockets to receive the security context of the sending process in an ancillary message\&. Defaults to
454 \fBfalse\fR\&.
455 .RE
456 .PP
457 \fITCPCongestion=\fR
458 .RS 4
459 Takes a string value\&. Controls the TCP congestion algorithm used by this socket\&. Should be one of "westwood", "veno", "cubic", "lp" or any other available algorithm supported by the IP stack\&. This setting applies only to stream sockets\&.
460 .RE
461 .PP
462 \fIExecStartPre=\fR, \fIExecStartPost=\fR
463 .RS 4
464 Takes one or more command lines, which are executed before or after the listening sockets/FIFOs are created and bound, respectively\&. The first token of the command line must be an absolute filename, then followed by arguments for the process\&. Multiple command lines may be specified following the same scheme as used for
465 \fIExecStartPre=\fR
466 of service unit files\&.
467 .RE
468 .PP
469 \fIExecStopPre=\fR, \fIExecStopPost=\fR
470 .RS 4
471 Additional commands that are executed before or after the listening sockets/FIFOs are closed and removed, respectively\&. Multiple command lines may be specified following the same scheme as used for
472 \fIExecStartPre=\fR
473 of service unit files\&.
474 .RE
475 .PP
476 \fITimeoutSec=\fR
477 .RS 4
478 Configures the time to wait for the commands specified in
479 \fIExecStartPre=\fR,
480 \fIExecStartPost=\fR,
481 \fIExecStopPre=\fR
482 and
483 \fIExecStopPost=\fR
484 to finish\&. If a command does not exit within the configured time, the socket will be considered failed and be shut down again\&. All commands still running will be terminated forcibly via
485 \fBSIGTERM\fR, and after another delay of this time with
486 \fBSIGKILL\fR\&. (See
487 \fBKillMode=\fR
488 in
489 \fBsystemd.kill\fR(5)\&.) Takes a unit\-less value in seconds, or a time span value such as "5min 20s"\&. Pass
490 "0"
491 to disable the timeout logic\&. Defaults to
492 \fIDefaultTimeoutStartSec=\fR
493 from the manager configuration file (see
494 \fBsystemd-system.conf\fR(5))\&.
495 .RE
496 .PP
497 \fIService=\fR
498 .RS 4
499 Specifies the service unit name to activate on incoming traffic\&. This setting is only allowed for sockets with
500 \fIAccept=no\fR\&. It defaults to the service that bears the same name as the socket (with the suffix replaced)\&. In most cases, it should not be necessary to use this option\&.
501 .RE
502 .PP
503 \fIRemoveOnStop=\fR
504 .RS 4
505 Takes a boolean argument\&. If enabled, any file nodes created by this socket unit are removed when it is stopped\&. This applies to AF_UNIX sockets in the file system, POSIX message queues, FIFOs, as well as any symlinks to them configured with
506 \fISymlinks=\fR\&. Normally, it should not be necessary to use this option, and is not recommended as services might continue to run after the socket unit has been terminated and it should still be possible to communicate with them via their file system node\&. Defaults to off\&.
507 .RE
508 .PP
509 \fISymlinks=\fR
510 .RS 4
511 Takes a list of file system paths\&. The specified paths will be created as symlinks to the AF_UNIX socket path or FIFO path of this socket unit\&. If this setting is used, only one AF_UNIX socket in the file system or one FIFO may be configured for the socket unit\&. Use this option to manage one or more symlinked alias names for a socket, binding their lifecycle together\&. Defaults to the empty list\&.
512 .RE
513 .PP
514 Check
515 \fBsystemd.exec\fR(5)
516 and
517 \fBsystemd.kill\fR(5)
518 for more settings\&.
519 .SH "SEE ALSO"
520 .PP
521 \fBsystemd\fR(1),
522 \fBsystemctl\fR(1),
523 \fBsystemd.unit\fR(5),
524 \fBsystemd.exec\fR(5),
525 \fBsystemd.kill\fR(5),
526 \fBsystemd.resource-control\fR(5),
527 \fBsystemd.service\fR(5),
528 \fBsystemd.directives\fR(7)
529 .PP
530 For more extensive descriptions see the "systemd for Developers" series:
531 \m[blue]\fBSocket Activation\fR\m[]\&\s-2\u[3]\d\s+2,
532 \m[blue]\fBSocket Activation, part II\fR\m[]\&\s-2\u[4]\d\s+2,
533 \m[blue]\fBConverting inetd Services\fR\m[]\&\s-2\u[5]\d\s+2,
534 \m[blue]\fBSocket Activated Internet Services and OS Containers\fR\m[]\&\s-2\u[6]\d\s+2\&.
535 .SH "NOTES"
536 .IP " 1." 4
537 TCP Keepalive HOWTO
538 .RS 4
539 \%http://www.tldp.org/HOWTO/html_single/TCP-Keepalive-HOWTO/
540 .RE
541 .IP " 2." 4
542 Smack.txt
543 .RS 4
544 \%https://www.kernel.org/doc/Documentation/security/Smack.txt
545 .RE
546 .IP " 3." 4
547 Socket Activation
548 .RS 4
549 \%http://0pointer.de/blog/projects/socket-activation.html
550 .RE
551 .IP " 4." 4
552 Socket Activation, part II
553 .RS 4
554 \%http://0pointer.de/blog/projects/socket-activation2.html
555 .RE
556 .IP " 5." 4
557 Converting inetd Services
558 .RS 4
559 \%http://0pointer.de/blog/projects/inetd.html
560 .RE
561 .IP " 6." 4
562 Socket Activated Internet Services and OS Containers
563 .RS 4
564 \%http://0pointer.de/blog/projects/socket-activated-containers.html
565 .RE