Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [00:03:16.370,000] <dbg> net_tcp._tcp_syn_rcvd: (0x0013c218): SYN received from 192.0.2.10 port 56390
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): [0x0013cc28] pkt 0x0014b0f0 src 4242 dst 56390
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): seq 0x37876338 (931619640) ack 0x0001 (1/0)
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): flags uAprSf
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): win 1280 chk 0x9f2d
- [00:03:16.370,000] <dbg> net_tcp.print_send_info: (0x0013c218): SYN_ACK sent to 192.0.2.10 port 56390
- [00:03:16.370,000] <dbg> net_ipv4.net_ipv4_input: (0x0013c218): IPv4 packet received from 192.0.2.10 to 192.0.2.1
- [00:03:16.370,000] <dbg> net_tcp._tcp_syn_rcvd: (0x0013c218): ACK received from 192.0.2.10 port 56390
- [00:03:16.370,000] <dbg> net_tcp._tcp_syn_rcvd: (0x0013c218): Cannot register accepted TCP handler (-2)
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_release: (0x0013c218): [0x0013d010] Disposed of TCP connection state
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): [0x0013cc28] pkt 0x0014b0f0 src 4242 dst 56390
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): seq 0x37876339 (931619641) ack 0x0001 (1/0)
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): flags uApRsf
- [00:03:16.370,000] <dbg> net_tcp.net_tcp_trace: (0x0013c218): win 0 chk 0xa42a
- [00:03:16.370,000] <dbg> net_tcp.print_send_info: (0x0013c218): RST sent to 192.0.2.10 port 56390
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement