Display socket options
I had the same issue today; unfortunately, on my system, the -T
option of lsof
doesn't accept the f
flag, and I also didn't want to build the knetstat
kernel module.
Luckily, I was in the position of being able to strace
the application while it was setting up the socket, like this:
strace -e trace=setsockopt -f -o /tmp/log ./program arg1 arg2
This traces ./program arg1 arg2
, writing the trace to /tmp/log
. We only trace the setsockopt()
system call, which is used to set socket options. The option -f
makes strace
also trace any child processes created by the traced program.
If you are lucky, /tmp/log
will contain lines like this one:
18806 setsockopt(60, SOL_SOCKET, SO_KEEPALIVE, [1], 4) = 0
This indicates that process 18806
called setsockopt()
on FD 60
to set SO_KEEPALIVE
to 1
(enabling it), and that the system call succeeded with return code 0
.
It's also possible to attach to an existing process:
strace -e trace=setsockopt -f -o /tmp/log -p PID
You can detach from the process using CTRL-C
, and omit the -o
option and its argument to send the trace to stderr
.
On Linux, you can use the knetstat kernel module to inspect socket options, including SO_BROADCAST
.
You can use lsof(8)
. If PID
is the process ID and FD
is the file descriptor number of the socket you're interested in, you can do this:
lsof -a -p PID -d FD -T f
To list all IPv4 sockets of a process:
lsof -a -p PID -i 4 -T f
This will print out the socket options with a SO=
, among other information. Note that if no options are set, you'll get the empty string, so you'll see something like SO=PQLEN=0
etc. To test for SO_BROADCAST
, just grep for the string SO_BROADCAST
after the SO=
, e.g.
if lsof -a -p PID -d FD -T f | grep -q 'SO=[^=]*SO_BROADCAST'; then
# socket has SO_BROADCAST
else
# it doesn't
fi