From: Mark Hobley on
How do I prevent the system trace tool from truncating data in the
output? I specifically need the full input and output from network
operations.

Currently the system trace truncates the messages as shown in the
following trace output:

recv(4, "354 go ahead\r\n", 8192, 0) = 14
send(4, "Content-Type: text/plain; charse"..., 3551, 0) = 3551
recv(4, ^
|
|
Damn! I really need the full output here.
How do I stop strace from truncating the output.

I tried the following, but the strace output is still truncated.

strace -f -e trace=network -e read -e write -o /dev/pts/3 reportbug

Mark.

--

/local/home/mark/.Signature

--- news://freenews.netfront.net/ - complaints: news(a)netfront.net ---
From: David W. Hodgins on
On Tue, 08 Jun 2010 19:49:33 -0400, Mark Hobley <markhobley(a)yahoo.donottypethisbit.co> wrote:

> How do I prevent the system trace tool from truncating data in the
> output? I specifically need the full input and output from network
> operations.

Add the -s option, followed by the maximum string size you want
to have in the output. Defaults to 32 bytes. I'm not sure what
the maximum possible value is.

Regards, Dave Hodgins

--
Change nomail.afraid.org to ody.ca to reply by email.
(nomail.afraid.org has been set up specifically for
use in usenet. Feel free to use it yourself.)
From: Tauno Voipio on
On 9.6.10 12:21 , Mark Hobley wrote:
> On Tue, 08 Jun 2010 21:04:47 -0400, David W. Hodgins wrote:
>> Add the -s option, followed by the maximum string size you want to have
>> in the output. Defaults to 32 bytes. I'm not sure what the maximum
>> possible value is.
>
> Ok. I just tried a value of 65535. That did not work. I got no output at
> all:
>
> send(4, ""..., 4637, 0) = 4637
>
> I'll keep halving the value to see if I can get some output.


A network sniffer (tcpdump / wireshark) might be a better
tool for analyzing this kind of traffic. It is better to
use a hammer for a nail instead of a bigger wrench.

--

Tauno Voipio
tauno voipio (at) iki fi