tcpdump/tests/ipoib.out
Francois-Xavier Le Bail 9939a0ff90 tests: Use -tttt option for most tests
This change adds:
year-month-day to the hours:minutes:secondes.{microseconds|nanoseconds}.

It allows to catch more issues with timestamps processing.

For some test using their own display time options, use 'SPECIAL_t' in
options.
2024-03-11 22:12:38 -07:00

31 lines
4.7 KiB
Plaintext

1 2019-04-18 16:32:32.697187 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 0, length 64
2 2019-04-18 16:32:33.693114 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 1, length 64
3 2019-04-18 16:32:34.693061 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 2, length 64
4 2019-04-18 16:32:35.692995 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 3, length 64
5 2019-04-18 16:32:36.692951 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 4, length 64
6 2019-04-18 16:32:37.692854 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56
7 2019-04-18 16:32:37.692874 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56
8 2019-04-18 16:32:37.692912 IP 192.168.56.10 > 192.168.56.24: ICMP echo request, id 6495, seq 5, length 64
9 2019-04-18 16:32:45.050083 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [SEW], seq 798232822, win 32983, options [mss 65480,sackOK,TS val 62202209 ecr 0,nop,wscale 8], length 0
10 2019-04-18 16:32:45.050250 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 3051049339, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 0
11 2019-04-18 16:32:45.051868 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 0:26, ack 1, win 33232, options [nop,nop,TS val 62202209 ecr 81054], length 26: SSH: SSH-2.0-OpenSSH_7.5 FIPS
12 2019-04-18 16:32:45.062494 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 23, win 33232, options [nop,nop,TS val 62202210 ecr 81055], length 0
13 2019-04-18 16:32:45.130591 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 26:1090, ack 23, win 33232, options [nop,nop,TS val 62202217 ecr 81055], length 1064
14 2019-04-18 16:32:45.158656 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1087, win 33232, options [nop,nop,TS val 62202220 ecr 81064], length 0
15 2019-04-18 16:32:45.163152 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1090:1170, ack 1087, win 33232, options [nop,nop,TS val 62202221 ecr 81064], length 80
16 2019-04-18 16:32:45.232547 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 1947, win 33232, options [nop,nop,TS val 62202228 ecr 81065], length 0
17 2019-04-18 16:32:49.933691 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1170:1186, ack 1947, win 33232, options [nop,nop,TS val 62202698 ecr 81065], length 16
18 2019-04-18 16:32:50.000156 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1186:1254, ack 1947, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 68
19 2019-04-18 16:32:50.000371 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1254:1338, ack 2015, win 33232, options [nop,nop,TS val 62202704 ecr 81549], length 84
20 2019-04-18 16:32:50.003141 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [P.], seq 1338:1438, ack 2131, win 33232, options [nop,nop,TS val 62202705 ecr 81549], length 100
21 2019-04-18 16:32:50.062351 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2215, win 33232, options [nop,nop,TS val 62202711 ecr 81549], length 0
22 2019-04-18 16:32:51.426569 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [F.], seq 1438, ack 2215, win 33232, options [nop,nop,TS val 62202847 ecr 81549], length 0
23 2019-04-18 16:32:51.429733 IP 192.168.56.10.34170 > 192.168.56.24.22: Flags [.], ack 2216, win 33232, options [nop,nop,TS val 62202847 ecr 81691], length 0
24 2019-04-18 16:33:23.780806 IP 192.168.56.10.52289 > 192.168.56.24.8: Flags [SEW], seq 4205904195, win 32983, options [mss 65480,sackOK,TS val 62206082 ecr 0,nop,wscale 8], length 0
25 2019-04-18 16:33:28.770678 ARP, Request who-has 192.168.56.24 (00:ff:ff:ff:ff:10:40:1b:00:00:00:00:00:00:00:00:ff:ff:ff:ff) tell 192.168.56.10, length 56
26 2019-04-18 16:33:28.770705 ARP, Reply 192.168.56.24 is-at 80:00:05:50:fe:80:00:00:00:00:00:00:00:10:e0:00:66:4a:b4:51, length 56
27 2019-04-18 16:33:33.533155 IP 192.168.56.10.56684 > 192.168.56.24.8: Flags [SEW], seq 1401918527, win 32983, options [mss 65480,sackOK,TS val 62207058 ecr 0,nop,wscale 8], length 0
28 2019-04-18 16:33:43.228322 IP 192.168.56.10.54877 > 192.168.56.24.13: Flags [SEW], seq 4116179817, win 32983, options [mss 65480,sackOK,TS val 62208027 ecr 0,nop,wscale 8], length 0
29 2019-04-18 16:33:45.396161 IP 192.168.56.10.43822 > 192.168.56.24.12: Flags [SEW], seq 563261006, win 32983, options [mss 65480,sackOK,TS val 62208244 ecr 0,nop,wscale 8], length 0
30 2019-04-18 16:33:49.323197 IP 192.168.56.10.51201 > 192.168.56.24.14: Flags [SEW], seq 1067180915, win 32983, options [mss 65480,sackOK,TS val 62208637 ecr 0,nop,wscale 8], length 0