3 ss \- another utility to investigate sockets
6 .RI [ options ] " [ FILTER ]"
9 is used to dump socket statistics. It allows showing information similar
12 It can display more TCP and state informations than other tools.
15 When no option is used ss displays a list of
16 open non-listening sockets (e.g. TCP/UNIX/UDP) that have established connection.
19 Show summary of options.
22 Output version information.
28 Do not try to resolve service names.
31 Try to resolve numeric address/ports.
34 Display both listening and non-listening (for TCP this means established connections) sockets.
37 Display only listening sockets (these are omitted by default).
40 Show timer information. For tcp protocol, the output format is:
43 timer:(<timer_name>,<expire_time>,<retrans>)
47 the name of the timer, there are five kind of timer names:
50 .BR on ": means one of these timers: tcp retrans timer, tcp early retrans timer and tail loss probe timer"
52 .BR keepalive ": tcp keep alive timer"
54 .BR timewait ": timewait stage timer"
56 .BR persist ": zero window probe timer"
58 .BR unknown ": none of the above timers"
62 how long time the timer will expire
66 how many times the retran occurs
70 Show detailed socket information. The output format is:
73 uid:<uid_number> ino:<inode_number> sk:<cookie>
77 the user id the socket belongs to
81 the socket's inode number in VFS
89 Show socket memory usage. The output format is:
92 skmem:(r<rmem_alloc>,rb<rcv_buf>,t<wmem_alloc>,tb<snd_buf>,
96 f<fwd_alloc>,w<wmem_queued>,
102 o<opt_mem>,bl<back_log>)
108 the memory allocated for receiving packet
112 the total memory can be allocated for receiving packet
116 the memory used for sending packet (which has been sent to layer 3)
120 the total memory can be allocated for sending packet
124 the memory allocated by the socket as cache, but not used for receiving/sending packet yet. If need memory to send/receive packet, the memory in this cache will be used before allocate additional memory.
128 The memory allocated for sending packet (which has not been sent to layer 3)
132 The memory used for storing socket option, e.g., the key for TCP MD5 signature
136 The memory used for the sk backlog queue. On a process context, if the process is receiving packet, and a new packet is received, it will be put into the sk backlog queue, so it can be received by the process immediately
139 .B \-p, \-\-processes
140 Show process using socket.
143 Show internal TCP information. Below fields may appear:
148 show string "ts" if the timestamp option is set
152 show string "sack" if the sack option is set
156 show string "ecn" if the explicit congestion notification option is set
160 show string "ecnseen" if the saw ecn flag is found in received packets
164 show string "fastopen" if the fastopen option is set
168 the congestion algorithm name, the default congestion algorithm is "cubic"
171 .B wscale:<snd_wscale>:<rcv_wscale>
172 if window scale option is used, this field shows the send scale factor and receive scale factor
176 tcp re-transmission timeout value, the unit is millisecond
179 .B backoff:<icsk_backoff>
180 used for exponential backoff re-transmission, the actual re-transmission timeout value is icsk_rto << icsk_backoff
183 .B rtt:<rtt>/<rttvar>
184 rtt is the average round trip time, rttvar is the mean deviation of rtt, their units are millisecond
188 ack timeout, unit is millisecond, used for delay ack mode
196 congestion window size
203 .B ssthresh:<ssthresh>
204 tcp congestion window slow start threshold
207 .B bytes_acked:<bytes_acked>
211 .B bytes_received:<bytes_received>
215 .B segs_out:<segs_out>
223 .B send <send_bps>bps
228 how long time since the last packet sent, the unit is millisecond
232 how long time since the last packet received, the unit is millisecond
236 how long time since the last ack received, the unit is millisecond
239 .B pacing_rate <pacing_rate>bps/<max_pacing_rate>bps
240 the pacing rate and max pacing rate
243 .B rcv_space:<rcv_space>
244 a helper variable for TCP internal auto tuning socket receive buffer
248 Attempts to forcibly close sockets. This option displays sockets that are
249 successfully closed and silently skips sockets that the kernel does not support
250 closing. It supports IPv4 and IPv6 sockets only.
253 Print summary statistics. This option does not parse socket lists obtaining
254 summary from various sources. It is useful when amount of sockets is so huge
255 that parsing /proc/net/tcp is painful.
258 Continually display sockets as they are destroyed
263 option but also shows process security context.
267 sockets the initiating process context is displayed as follows:
271 If valid pid show the process context.
273 If destination is kernel (pid = 0) show kernel initial context.
275 If a unique identifier has been allocated by the kernel or netlink user,
276 show context as "unavailable". This will generally indicate that a
277 process has more than one netlink socket active.
284 option but also shows the socket context. The socket context is
285 taken from the associated inode and is not the actual socket
286 context held by the kernel. Sockets are typically labeled with the
287 context of the creating process, however the context shown will reflect
288 any policy role, type and/or range transition rules applied,
289 and is therefore a useful reference.
291 .B \-N NSNAME, \-\-net=NSNAME
292 Switch to the specified network namespace name.
295 Show socket BPF filters (only administrators are allowed to get these information).
298 Display only IP version 4 sockets (alias for -f inet).
301 Display only IP version 6 sockets (alias for -f inet6).
304 Display PACKET sockets (alias for -f link).
313 Display DCCP sockets.
319 Display Unix domain sockets (alias for -f unix).
322 Display SCTP sockets.
325 Display vsock sockets (alias for -f vsock).
327 .B \-f FAMILY, \-\-family=FAMILY
328 Display sockets of type FAMILY.
329 Currently the following families are supported: unix, inet, inet6, link, netlink, vsock.
331 .B \-A QUERY, \-\-query=QUERY, \-\-socket=QUERY
332 List of socket tables to dump, separated by commas. The following identifiers
333 are understood: all, inet, tcp, udp, raw, unix, packet, netlink, unix_dgram,
334 unix_stream, unix_seqpacket, packet_raw, packet_dgram, dccp, sctp,
335 vsock_stream, vsock_dgram. Any item in the list may optionally be prefixed by
338 to exclude that socket table from being dumped.
340 .B \-D FILE, \-\-diag=FILE
341 Do not display anything, just dump raw information about TCP sockets to FILE after applying filters. If FILE is - stdout is used.
343 .B \-F FILE, \-\-filter=FILE
344 Read filter information from FILE.
345 Each line of FILE is interpreted like single command line option. If FILE is - stdin is used.
347 .B FILTER := [ state STATE-FILTER ] [ EXPRESSION ]
348 Please take a look at the official documentation for details regarding filters.
353 allows to construct arbitrary set of states to match. Its syntax is sequence of keywords state and exclude followed by identifier of state.
355 Available identifiers are:
357 All standard TCP states:
358 .BR established ", " syn-sent ", " syn-recv ", " fin-wait-1 ", " fin-wait-2 ", " time-wait ", " closed ", " close-wait ", " last-ack ", "
359 .BR listening " and " closing.
365 - all the states except for
366 .BR listening " and " closed
375 - states, which are maintained as minisockets, i.e.
376 .BR time-wait " and " syn-recv
385 Display all TCP sockets.
388 Display all TCP sockets with process SELinux security contexts.
391 Display all UDP sockets.
393 .B ss -o state established '( dport = :ssh or sport = :ssh )'
394 Display all established ssh connections.
396 .B ss -x src /tmp/.X11-unix/*
397 Find all local processes connected to X server.
399 .B ss -o state fin-wait-1 '( sport = :http or sport = :https )' dst 193.233.7/24
400 List all the tcp sockets in state FIN-WAIT-1 for our apache to network 193.233.7/24 and look at their timers.
402 .B ss -a -A 'all,!tcp'
403 List sockets in all states from all socket tables but TCP.
408 - https://tools.ietf.org/rfc/rfc793.txt (TCP states)
412 was written by Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>.
414 This manual page was written by Michael Prokop <mika@grml.org>
415 for the Debian project (but may be used by others).