diff options
Diffstat (limited to 'tests/ipoib.out')
-rw-r--r-- | tests/ipoib.out | 60 |
1 files changed, 30 insertions, 30 deletions
diff --git a/tests/ipoib.out b/tests/ipoib.out index a5605bf..39681ed 100644 --- a/tests/ipoib.out +++ b/tests/ipoib.out @@ -1,30 +1,30 @@ - 1 16:32:32.697187 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 0, length 64 - 2 16:32:33.693114 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 1, length 64 - 3 16:32:34.693061 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 2, length 64 - 4 16:32:35.692995 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 3, length 64 - 5 16:32:36.692951 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 4, length 64 - 6 16:32:37.692854 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56 - 7 16:32:37.692874 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56 - 8 16:32:37.692912 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 5, length 64 - 9 16:32:45.050083 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [SEW], seq 798232822, win 32983, options [mss 65480,sackOK,TS val 62202209 ecr 0,nop,wscale 8], length 0 - 10 16:32:45.050250 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 3051049339, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 0 - 11 16:32:45.051868 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 0:26, ack 1, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 26: SSH: SSH-2.0-OpenSSH_7.5 FIPS - 12 16:32:45.062494 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 23, win 33232, options [nop,nop,TS val 62202210 ecr 81055], length 0 - 13 16:32:45.130591 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 26:1090, ack 23, win 33232, options [nop,nop,TS val 62202217 ecr 81055], length 1064 - 14 16:32:45.158656 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1087, win 33232, options [nop,nop,TS val 62202220 ecr 81064], length 0 - 15 16:32:45.163152 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1090:1170, ack 1087, win 33232, options [nop,nop,TS val 62202221 ecr 81064], length 80 - 16 16:32:45.232547 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1947, win 33232, options [nop,nop,TS val 62202228 ecr 81065], length 0 - 17 16:32:49.933691 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1170:1186, ack 1947, win 33232, options [nop,nop,TS val 62202698 ecr 81065], length 16 - 18 16:32:50.000156 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1186:1254, ack 1947, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 68 - 19 16:32:50.000371 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1254:1338, ack 2015, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 84 - 20 16:32:50.003141 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1338:1438, ack 2131, win 33232, options [nop,nop,TS val 62202705 ecr 81549], length 100 - 21 16:32:50.062351 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2215, win 33232, options [nop,nop,TS val 62202711 ecr 81549], length 0 - 22 16:32:51.426569 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [F.], seq 1438, ack 2215, win 33232, options [nop,nop,TS val 62202847 ecr 81549], length 0 - 23 16:32:51.429733 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2216, win 33232, options [nop,nop,TS val 62202847 ecr 81691], length 0 - 24 16:33:23.780806 IP 192.168.56.10.52289 > 192.168.56.24.8: Flags [SEW], seq 4205904195, win 32983, options [mss 65480,sackOK,TS val 62206082 ecr 0,nop,wscale 8], length 0 - 25 16:33:28.770678 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56 - 26 16:33:28.770705 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56 - 27 16:33:33.533155 IP 192.168.56.10.56684 > 192.168.56.24.8: Flags [SEW], seq 1401918527, win 32983, options [mss 65480,sackOK,TS val 62207058 ecr 0,nop,wscale 8], length 0 - 28 16:33:43.228322 IP 192.168.56.10.54877 > 192.168.56.24.13: Flags [SEW], seq 4116179817, win 32983, options [mss 65480,sackOK,TS val 62208027 ecr 0,nop,wscale 8], length 0 - 29 16:33:45.396161 IP 192.168.56.10.43822 > 192.168.56.24.12: Flags [SEW], seq 563261006, win 32983, options [mss 65480,sackOK,TS val 62208244 ecr 0,nop,wscale 8], length 0 - 30 16:33:49.323197 IP 192.168.56.10.51201 > 192.168.56.24.14: Flags [SEW], seq 1067180915, win 32983, options [mss 65480,sackOK,TS val 62208637 ecr 0,nop,wscale 8], length 0 + 1 2019-04-18 16:32:32.697187 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 0, length 64 + 2 2019-04-18 16:32:33.693114 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 1, length 64 + 3 2019-04-18 16:32:34.693061 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 2, length 64 + 4 2019-04-18 16:32:35.692995 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 3, length 64 + 5 2019-04-18 16:32:36.692951 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 4, length 64 + 6 2019-04-18 16:32:37.692854 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56 + 7 2019-04-18 16:32:37.692874 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56 + 8 2019-04-18 16:32:37.692912 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 5, length 64 + 9 2019-04-18 16:32:45.050083 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [SEW], seq 798232822, win 32983, options [mss 65480,sackOK,TS val 62202209 ecr 0,nop,wscale 8], length 0 + 10 2019-04-18 16:32:45.050250 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 3051049339, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 0 + 11 2019-04-18 16:32:45.051868 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 0:26, ack 1, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 26: SSH: SSH-2.0-OpenSSH_7.5 FIPS + 12 2019-04-18 16:32:45.062494 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 23, win 33232, options [nop,nop,TS val 62202210 ecr 81055], length 0 + 13 2019-04-18 16:32:45.130591 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 26:1090, ack 23, win 33232, options [nop,nop,TS val 62202217 ecr 81055], length 1064 + 14 2019-04-18 16:32:45.158656 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1087, win 33232, options [nop,nop,TS val 62202220 ecr 81064], length 0 + 15 2019-04-18 16:32:45.163152 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1090:1170, ack 1087, win 33232, options [nop,nop,TS val 62202221 ecr 81064], length 80 + 16 2019-04-18 16:32:45.232547 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1947, win 33232, options [nop,nop,TS val 62202228 ecr 81065], length 0 + 17 2019-04-18 16:32:49.933691 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1170:1186, ack 1947, win 33232, options [nop,nop,TS val 62202698 ecr 81065], length 16 + 18 2019-04-18 16:32:50.000156 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1186:1254, ack 1947, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 68 + 19 2019-04-18 16:32:50.000371 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1254:1338, ack 2015, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 84 + 20 2019-04-18 16:32:50.003141 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1338:1438, ack 2131, win 33232, options [nop,nop,TS val 62202705 ecr 81549], length 100 + 21 2019-04-18 16:32:50.062351 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2215, win 33232, options [nop,nop,TS val 62202711 ecr 81549], length 0 + 22 2019-04-18 16:32:51.426569 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [F.], seq 1438, ack 2215, win 33232, options [nop,nop,TS val 62202847 ecr 81549], length 0 + 23 2019-04-18 16:32:51.429733 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2216, win 33232, options [nop,nop,TS val 62202847 ecr 81691], length 0 + 24 2019-04-18 16:33:23.780806 IP 192.168.56.10.52289 > 192.168.56.24.8: Flags [SEW], seq 4205904195, win 32983, options [mss 65480,sackOK,TS val 62206082 ecr 0,nop,wscale 8], length 0 + 25 2019-04-18 16:33:28.770678 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56 + 26 2019-04-18 16:33:28.770705 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56 + 27 2019-04-18 16:33:33.533155 IP 192.168.56.10.56684 > 192.168.56.24.8: Flags [SEW], seq 1401918527, win 32983, options [mss 65480,sackOK,TS val 62207058 ecr 0,nop,wscale 8], length 0 + 28 2019-04-18 16:33:43.228322 IP 192.168.56.10.54877 > 192.168.56.24.13: Flags [SEW], seq 4116179817, win 32983, options [mss 65480,sackOK,TS val 62208027 ecr 0,nop,wscale 8], length 0 + 29 2019-04-18 16:33:45.396161 IP 192.168.56.10.43822 > 192.168.56.24.12: Flags [SEW], seq 563261006, win 32983, options [mss 65480,sackOK,TS val 62208244 ecr 0,nop,wscale 8], length 0 + 30 2019-04-18 16:33:49.323197 IP 192.168.56.10.51201 > 192.168.56.24.14: Flags [SEW], seq 1067180915, win 32983, options [mss 65480,sackOK,TS val 62208637 ecr 0,nop,wscale 8], length 0 |