1 .\" Copyright (c) 1983, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 4. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" @(#)trpt.8 8.2 (Berkeley) 12/11/93
36 .Nd transliterate protocol trace
42 .Op Fl p Ar hex-address
51 utility interrogates the buffer of
54 when a socket is marked for
58 and prints a readable description of these records.
59 When no options are supplied,
61 prints all the trace records found in the system
64 connection protocol control
68 The following options may be used to
70 .Bl -tag -width indent
72 In addition to the normal output,
73 print the values of the source and destination
74 addresses for each packet recorded.
76 Follow the trace as it occurs, waiting a short time for additional records
77 each time the end of the log is reached.
79 Just give a list of the protocol control block
80 addresses for which there are trace records.
82 Show only trace records associated with the protocol
83 control block at the given address
86 In addition to the normal output,
87 print a detailed description of the packet
88 sequencing information.
90 In addition to the normal output,
91 print the values for all timers at each
95 The recommended use of
98 Isolate the problem and enable debugging on the
99 socket(s) involved in the connection.
100 Find the address of the protocol control blocks
101 associated with the sockets using the
109 option, supplying the associated
110 protocol control block addresses.
113 option can be used to follow the trace log once the trace is located.
115 many sockets using the debugging option, the
117 option may be useful in checking to see if
118 any trace records are present for the socket in
121 If debugging is being performed on a system or
122 core file other than the default, the last two
123 arguments may be used to supplant the defaults.
125 .Bl -tag -width /boot/kernel/kernel -compact
126 .It Pa /boot/kernel/kernel
132 When the system image does not
133 contain the proper symbols to find the trace buffer;
134 others which should be self explanatory.
145 Should also print the data for each input or output,
146 but this is not saved in the trace record.
148 The output format is inscrutable and should be described