summaryrefslogtreecommitdiffstats
path: root/tests/ipoib.out
diff options
context:
space:
mode:
Diffstat (limited to 'tests/ipoib.out')
-rw-r--r--tests/ipoib.out60
1 files changed, 30 insertions, 30 deletions
diff --git a/tests/ipoib.out b/tests/ipoib.out
index a5605bf..39681ed 100644
--- a/tests/ipoib.out
+++ b/tests/ipoib.out
@@ -1,30 +1,30 @@
- 1 16:32:32.697187 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 0, length 64
- 2 16:32:33.693114 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 1, length 64
- 3 16:32:34.693061 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 2, length 64
- 4 16:32:35.692995 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 3, length 64
- 5 16:32:36.692951 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 4, length 64
- 6 16:32:37.692854 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56
- 7 16:32:37.692874 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56
- 8 16:32:37.692912 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 5, length 64
- 9 16:32:45.050083 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [SEW], seq 798232822, win 32983, options [mss 65480,sackOK,TS val 62202209 ecr 0,nop,wscale 8], length 0
- 10 16:32:45.050250 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 3051049339, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 0
- 11 16:32:45.051868 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 0:26, ack 1, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 26: SSH: SSH-2.0-OpenSSH_7.5 FIPS
- 12 16:32:45.062494 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 23, win 33232, options [nop,nop,TS val 62202210 ecr 81055], length 0
- 13 16:32:45.130591 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 26:1090, ack 23, win 33232, options [nop,nop,TS val 62202217 ecr 81055], length 1064
- 14 16:32:45.158656 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1087, win 33232, options [nop,nop,TS val 62202220 ecr 81064], length 0
- 15 16:32:45.163152 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1090:1170, ack 1087, win 33232, options [nop,nop,TS val 62202221 ecr 81064], length 80
- 16 16:32:45.232547 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1947, win 33232, options [nop,nop,TS val 62202228 ecr 81065], length 0
- 17 16:32:49.933691 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1170:1186, ack 1947, win 33232, options [nop,nop,TS val 62202698 ecr 81065], length 16
- 18 16:32:50.000156 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1186:1254, ack 1947, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 68
- 19 16:32:50.000371 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1254:1338, ack 2015, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 84
- 20 16:32:50.003141 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1338:1438, ack 2131, win 33232, options [nop,nop,TS val 62202705 ecr 81549], length 100
- 21 16:32:50.062351 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2215, win 33232, options [nop,nop,TS val 62202711 ecr 81549], length 0
- 22 16:32:51.426569 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [F.], seq 1438, ack 2215, win 33232, options [nop,nop,TS val 62202847 ecr 81549], length 0
- 23 16:32:51.429733 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2216, win 33232, options [nop,nop,TS val 62202847 ecr 81691], length 0
- 24 16:33:23.780806 IP 192.168.56.10.52289 > 192.168.56.24.8: Flags [SEW], seq 4205904195, win 32983, options [mss 65480,sackOK,TS val 62206082 ecr 0,nop,wscale 8], length 0
- 25 16:33:28.770678 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56
- 26 16:33:28.770705 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56
- 27 16:33:33.533155 IP 192.168.56.10.56684 > 192.168.56.24.8: Flags [SEW], seq 1401918527, win 32983, options [mss 65480,sackOK,TS val 62207058 ecr 0,nop,wscale 8], length 0
- 28 16:33:43.228322 IP 192.168.56.10.54877 > 192.168.56.24.13: Flags [SEW], seq 4116179817, win 32983, options [mss 65480,sackOK,TS val 62208027 ecr 0,nop,wscale 8], length 0
- 29 16:33:45.396161 IP 192.168.56.10.43822 > 192.168.56.24.12: Flags [SEW], seq 563261006, win 32983, options [mss 65480,sackOK,TS val 62208244 ecr 0,nop,wscale 8], length 0
- 30 16:33:49.323197 IP 192.168.56.10.51201 > 192.168.56.24.14: Flags [SEW], seq 1067180915, win 32983, options [mss 65480,sackOK,TS val 62208637 ecr 0,nop,wscale 8], length 0
+ 1 2019-04-18 16:32:32.697187 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 0, length 64
+ 2 2019-04-18 16:32:33.693114 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 1, length 64
+ 3 2019-04-18 16:32:34.693061 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 2, length 64
+ 4 2019-04-18 16:32:35.692995 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 3, length 64
+ 5 2019-04-18 16:32:36.692951 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 4, length 64
+ 6 2019-04-18 16:32:37.692854 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56
+ 7 2019-04-18 16:32:37.692874 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56
+ 8 2019-04-18 16:32:37.692912 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 5, length 64
+ 9 2019-04-18 16:32:45.050083 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [SEW], seq 798232822, win 32983, options [mss 65480,sackOK,TS val 62202209 ecr 0,nop,wscale 8], length 0
+ 10 2019-04-18 16:32:45.050250 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 3051049339, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 0
+ 11 2019-04-18 16:32:45.051868 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 0:26, ack 1, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 26: SSH: SSH-2.0-OpenSSH_7.5 FIPS
+ 12 2019-04-18 16:32:45.062494 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 23, win 33232, options [nop,nop,TS val 62202210 ecr 81055], length 0
+ 13 2019-04-18 16:32:45.130591 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 26:1090, ack 23, win 33232, options [nop,nop,TS val 62202217 ecr 81055], length 1064
+ 14 2019-04-18 16:32:45.158656 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1087, win 33232, options [nop,nop,TS val 62202220 ecr 81064], length 0
+ 15 2019-04-18 16:32:45.163152 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1090:1170, ack 1087, win 33232, options [nop,nop,TS val 62202221 ecr 81064], length 80
+ 16 2019-04-18 16:32:45.232547 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1947, win 33232, options [nop,nop,TS val 62202228 ecr 81065], length 0
+ 17 2019-04-18 16:32:49.933691 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1170:1186, ack 1947, win 33232, options [nop,nop,TS val 62202698 ecr 81065], length 16
+ 18 2019-04-18 16:32:50.000156 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1186:1254, ack 1947, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 68
+ 19 2019-04-18 16:32:50.000371 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1254:1338, ack 2015, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 84
+ 20 2019-04-18 16:32:50.003141 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1338:1438, ack 2131, win 33232, options [nop,nop,TS val 62202705 ecr 81549], length 100
+ 21 2019-04-18 16:32:50.062351 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2215, win 33232, options [nop,nop,TS val 62202711 ecr 81549], length 0
+ 22 2019-04-18 16:32:51.426569 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [F.], seq 1438, ack 2215, win 33232, options [nop,nop,TS val 62202847 ecr 81549], length 0
+ 23 2019-04-18 16:32:51.429733 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2216, win 33232, options [nop,nop,TS val 62202847 ecr 81691], length 0
+ 24 2019-04-18 16:33:23.780806 IP 192.168.56.10.52289 > 192.168.56.24.8: Flags [SEW], seq 4205904195, win 32983, options [mss 65480,sackOK,TS val 62206082 ecr 0,nop,wscale 8], length 0
+ 25 2019-04-18 16:33:28.770678 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56
+ 26 2019-04-18 16:33:28.770705 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56
+ 27 2019-04-18 16:33:33.533155 IP 192.168.56.10.56684 > 192.168.56.24.8: Flags [SEW], seq 1401918527, win 32983, options [mss 65480,sackOK,TS val 62207058 ecr 0,nop,wscale 8], length 0
+ 28 2019-04-18 16:33:43.228322 IP 192.168.56.10.54877 > 192.168.56.24.13: Flags [SEW], seq 4116179817, win 32983, options [mss 65480,sackOK,TS val 62208027 ecr 0,nop,wscale 8], length 0
+ 29 2019-04-18 16:33:45.396161 IP 192.168.56.10.43822 > 192.168.56.24.12: Flags [SEW], seq 563261006, win 32983, options [mss 65480,sackOK,TS val 62208244 ecr 0,nop,wscale 8], length 0
+ 30 2019-04-18 16:33:49.323197 IP 192.168.56.10.51201 > 192.168.56.24.14: Flags [SEW], seq 1067180915, win 32983, options [mss 65480,sackOK,TS val 62208637 ecr 0,nop,wscale 8], length 0