Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 154403 Details for
Bug 239558
Cannot get networking in virt-manager KVM sessions
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
tcpdump from host vibr0 interface
vibr0.out (text/plain), 4.35 KB, created by
Josh Boyer
on 2007-05-09 14:46:51 UTC
(
hide
)
Description:
tcpdump from host vibr0 interface
Filename:
MIME Type:
Creator:
Josh Boyer
Created:
2007-05-09 14:46:51 UTC
Size:
4.35 KB
patch
obsolete
>09:36:04.035016 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 4, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 ba21 3308 0004 9522 4246 3f66 .c...!3...."BF?f > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >09:36:05.042802 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 5, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 6e1f 3308 0005 9622 4246 8a67 .c..n.3...."BF.g > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >09:36:06.051457 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 6, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 a21f 3308 0006 9722 4246 5566 .c....3...."BFUf > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >09:36:07.064032 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 7, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 d120 3308 0007 9822 4246 2564 .c....3...."BF%d > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >09:36:08.079188 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 8, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 fd1f 3308 0008 9922 4246 f863 .c....3...."BF.c > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >09:36:09.096494 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 9, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 9120 3308 0009 9a22 4246 6362 .c....3...."BFcb > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >09:36:10.126693 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: ICMP (1), length: 84) 192.168.122.212 > 64.233.167.99: ICMP echo request, id 13064, seq 10, length 64 > 0x0000: ce44 5122 4e98 0016 3e7a b9d1 0800 4500 .DQ"N...>z....E. > 0x0010: 0054 0000 4000 4001 16e0 c0a8 7ad4 40e9 .T..@.@.....z.@. > 0x0020: a763 0800 8920 3308 000a 9b22 4246 6a61 .c....3...."BFja > 0x0030: 0900 0809 0a0b 0c0d 0e0f 1011 1213 1415 ................ > 0x0040: 1617 1819 1a1b 1c1d 1e1f 2021 2223 2425 ...........!"#$% > 0x0050: 2627 2829 2a2b 2c2d 2e2f 3031 3233 3435 &'()*+,-./012345 > 0x0060: 3637 67 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 239558
:
154400
|
154402
| 154403