1 .\" $NetBSD: trpt.8,v 1.16 2007/08/30 18:53:54 jnemeth Exp $
3 .\" Copyright (c) 1983, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" @(#)trpt.8 8.2 (Berkeley) 12/11/93
37 .Nd transliterate protocol trace
43 .Op Fl p Ar hex-address
50 interrogates the buffer of
53 when a socket is marked for
57 and prints a readable description of these records.
58 When no options are supplied,
60 prints all the trace records found in the system
63 connection protocol control
66 The following options may be used to
70 In addition to the normal output,
71 print the values of the source and destination
72 addresses for each packet recorded.
74 Follow the trace as it occurs, waiting a short time for additional records
75 each time the end of the log is reached.
77 Just give a list of the protocol control block
78 addresses for which there are trace records.
80 Show only trace records associated with the protocol
81 control block at the given address
84 In addition to the normal output,
85 print a detailed description of the packet
86 sequencing information.
88 in addition to the normal output,
89 print the values for all timers at each
92 Extract values associated with the name list from
95 Extract the name list from
99 The recommended use of
102 Isolate the problem and enable debugging on the
103 socket(s) involved in the connection.
104 Find the address of the protocol control blocks
105 associated with the sockets using the
113 option, supplying the associated
114 protocol control block addresses.
117 option can be used to follow the trace log once the trace is located.
119 many sockets using the debugging option, the
121 option may be useful in checking to see if
122 any trace records are present for the socket in
125 The following sysctls are used by
129 kernel option must be enabled.
131 .Bl -tag -width "XnetXinetXtcpXdebugXX"
132 .It Li net.inet.tcp.debug
133 Structure containing TCP sockets information used by
135 .It Li net.inet.tcp.debx
136 Number of TCP debug messages.
141 When the image doesn't
142 contain the proper symbols to find the trace buffer;
143 others which should be self explanatory.
154 Should also print the data for each input or output,
155 but this is not saved in the trace record.
157 The output format is inscrutable and should be described