* gdb refuses to connect to localhost
@ 2020-12-25 22:36 Reinaldo Molina
2020-12-25 22:55 ` Simon Marchi
` (2 more replies)
0 siblings, 3 replies; 12+ messages in thread
From: Reinaldo Molina @ 2020-12-25 22:36 UTC (permalink / raw)
To: gdb
Hey guys!
Looking for some assistants here. I am trying to debug an application using `gdbserver`, but it seems my `lo` network device is messed up. `gdb` refuses to connect to `localhost` every time. Here is my flow:
Terminal 1: `gdbserver localhost:8888 build/luajit`
- Variants I've tried: `127.0.0.1:8888`
Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
Output from `gdb` on Terminal 2:
(gdb) target remote :8888
Remote debugging using :8888
Ignoring packet error, continuing...
warning: unrecognized item "timeout" in "qSupported" response
Ignoring packet error, continuing...
Remote replied unexpectedly to 'vMustReplyEmpty': timeout
Output from `ip addr show lo`:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
Content from `/etc/hosts`
# Static table lookup for hostnames.
# See hosts(5) for details.
127.0.0.1 localhost
::1 localhost
127.0.1.1 myhostname.localdomain myhostname
I'm using the command to monitor the ports: `netstat -tulanp`. Here is the output right after running just `gdbserver`:
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
tcp 0 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
Output just after telling `gdb` to connect:
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
tcp 1 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
tcp 0 0 127.0.0.1:50720 127.0.0.1:8888 ESTABLISHED 195502/gdb
tcp 478 0 127.0.0.1:8888 127.0.0.1:50720 ESTABLISHED -
Looks promising but then:
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
tcp 1 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
tcp 0 0 127.0.0.1:50720 127.0.0.1:8888 FIN_WAIT2 -
tcp 722 0 127.0.0.1:8888 127.0.0.1:50720 CLOSE_WAIT -
I also don't have any firewalls: `iptables -L`
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
gdb version:
GNU gdb (GDB) 10.1
Copyright (C) 2020 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
System info: `uname -all`, it's Arch Linux BTW :D
Linux helios 5.9.14-arch1-1 #1 SMP PREEMPT Sat, 12 Dec 2020 14:37:12 +0000 x86_64 GNU/Linux
Just baffled by this behavior.
Thanks,
Reinaldo Molina
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-25 22:36 gdb refuses to connect to localhost Reinaldo Molina
@ 2020-12-25 22:55 ` Simon Marchi
2020-12-25 23:45 ` Reinaldo Molina
2020-12-25 23:04 ` Andreas Schwab
2020-12-29 15:48 ` Martin Simmons
2 siblings, 1 reply; 12+ messages in thread
From: Simon Marchi @ 2020-12-25 22:55 UTC (permalink / raw)
To: Reinaldo Molina, gdb
On 2020-12-25 5:36 p.m., Reinaldo Molina via Gdb wrote:
> Hey guys!
>
> Looking for some assistants here. I am trying to debug an application using `gdbserver`, but it seems my `lo` network device is messed up. `gdb` refuses to connect to `localhost` every time. Here is my flow:
>
> Terminal 1: `gdbserver localhost:8888 build/luajit`
> - Variants I've tried: `127.0.0.1:8888`
>
> Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
>
> Output from `gdb` on Terminal 2:
>
> (gdb) target remote :8888
> Remote debugging using :8888
> Ignoring packet error, continuing...
> warning: unrecognized item "timeout" in "qSupported" response
> Ignoring packet error, continuing...
> Remote replied unexpectedly to 'vMustReplyEmpty': timeout
That sounds like you are really connecting to something else than gdbserver.
>
> Output from `ip addr show lo`:
>
> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
> link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
> inet 127.0.0.1/8 scope host lo
> valid_lft forever preferred_lft forever
> inet6 ::1/128 scope host
> valid_lft forever preferred_lft forever
>
> Content from `/etc/hosts`
>
> # Static table lookup for hostnames.
> # See hosts(5) for details.
> 127.0.0.1 localhost
> ::1 localhost
> 127.0.1.1 myhostname.localdomain myhostname
>
> I'm using the command to monitor the ports: `netstat -tulanp`. Here is the output right after running just `gdbserver`:
>
> (Not all processes could be identified, non-owned process info
> will not be shown, you would have to be root to see it all.)
> tcp 0 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
>
> Output just after telling `gdb` to connect:
>
> (Not all processes could be identified, non-owned process info
> will not be shown, you would have to be root to see it all.)
> tcp 1 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
> tcp 0 0 127.0.0.1:50720 127.0.0.1:8888 ESTABLISHED 195502/gdb
> tcp 478 0 127.0.0.1:8888 127.0.0.1:50720 ESTABLISHED -
>
> Looks promising but then:
>
> (Not all processes could be identified, non-owned process info
> will not be shown, you would have to be root to see it all.)
> tcp 1 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
> tcp 0 0 127.0.0.1:50720 127.0.0.1:8888 FIN_WAIT2 -
> tcp 722 0 127.0.0.1:8888 127.0.0.1:50720 CLOSE_WAIT -
I have no clue. Try "set debug remote 1" in GDB before connecting,
see what data GDB receives.
You can also start GDBserver with --remote-debug to see if there
is some chit chat when GDB connects to it. If you don't see anything
here, it's probably because GDB ended up connecting to some other
program.
Simon
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-25 22:36 gdb refuses to connect to localhost Reinaldo Molina
2020-12-25 22:55 ` Simon Marchi
@ 2020-12-25 23:04 ` Andreas Schwab
2020-12-26 0:00 ` Reinaldo Molina
2020-12-29 15:48 ` Martin Simmons
2 siblings, 1 reply; 12+ messages in thread
From: Andreas Schwab @ 2020-12-25 23:04 UTC (permalink / raw)
To: Reinaldo Molina via Gdb; +Cc: Reinaldo Molina
On Dez 25 2020, Reinaldo Molina via Gdb wrote:
> Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
>
> Output from `gdb` on Terminal 2:
>
> (gdb) target remote :8888
Are you trying to run two instances of gdb simulanously on the same
gdbserver connection? That won't work.
Andreas.
--
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510 2552 DF73 E780 A9DA AEC1
"And now for something completely different."
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-25 22:55 ` Simon Marchi
@ 2020-12-25 23:45 ` Reinaldo Molina
2020-12-26 0:00 ` Simon Marchi
0 siblings, 1 reply; 12+ messages in thread
From: Reinaldo Molina @ 2020-12-25 23:45 UTC (permalink / raw)
To: Simon Marchi; +Cc: gdb
Thanks for the quick reply.
Trying your suggestion:
Terminal 1:
gdbserver 127.0.01:8889 build/luajit --remote-debug
Terminal 2:
> gdb build/luajit
GNU gdb (GDB) 10.1
Copyright (C) 2020 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-pc-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from build/luajit...
(gdb) set debug remote 1
(gdb) target remote localhost:8889
Remote debugging using localhost:8889
Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
Timed out.
Timed out.
Ignoring packet error, continuing...
Packet qSupported (supported-packets) is supported
warning: unrecognized item "timeout" in "qSupported" response
Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Timed out.
Timed out.
Timed out.
Ignoring packet error, continuing...
Remote replied unexpectedly to 'vMustReplyEmpty': timeout
(gdb) target remote 0.0.0.0:8889
Remote debugging using 0.0.0.0:8889
Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
Timed out.
Timed out.
Ignoring packet error, continuing...
Packet qSupported (supported-packets) is supported
warning: unrecognized item "timeout" in "qSupported" response
Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Timed out.
Timed out.
Timed out.
Ignoring packet error, continuing...
Remote replied unexpectedly to 'vMustReplyEmpty': timeout
(gdb) target remote 127.0.0.1:8889
127.0.0.1:8889: Connection timed out.
Here is `netstat` again:
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
tcp 2 0 0.0.0.0:8889 0.0.0.0:* LISTEN 356666/gdbserver
tcp 722 0 127.0.0.1:8889 127.0.0.1:35344 CLOSE_WAIT -
tcp 722 0 127.0.0.1:8889 127.0.0.1:35402 CLOSE_WAIT -
tcp 0 0 127.0.0.1:35402 127.0.0.1:8889 FIN_WAIT2 -
Thanks,
Reinaldo Molina
On 12-25-20 17:55:19, Simon Marchi wrote:
>
>
> On 2020-12-25 5:36 p.m., Reinaldo Molina via Gdb wrote:
> > Hey guys!
> >
> > Looking for some assistants here. I am trying to debug an application using `gdbserver`, but it seems my `lo` network device is messed up. `gdb` refuses to connect to `localhost` every time. Here is my flow:
> >
> > Terminal 1: `gdbserver localhost:8888 build/luajit`
> > - Variants I've tried: `127.0.0.1:8888`
> >
> > Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
> >
> > Output from `gdb` on Terminal 2:
> >
> > (gdb) target remote :8888
> > Remote debugging using :8888
> > Ignoring packet error, continuing...
> > warning: unrecognized item "timeout" in "qSupported" response
> > Ignoring packet error, continuing...
> > Remote replied unexpectedly to 'vMustReplyEmpty': timeout
>
> That sounds like you are really connecting to something else than gdbserver.
>
> >
> > Output from `ip addr show lo`:
> >
> > 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
> > link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
> > inet 127.0.0.1/8 scope host lo
> > valid_lft forever preferred_lft forever
> > inet6 ::1/128 scope host
> > valid_lft forever preferred_lft forever
> >
> > Content from `/etc/hosts`
> >
> > # Static table lookup for hostnames.
> > # See hosts(5) for details.
> > 127.0.0.1 localhost
> > ::1 localhost
> > 127.0.1.1 myhostname.localdomain myhostname
> >
> > I'm using the command to monitor the ports: `netstat -tulanp`. Here is the output right after running just `gdbserver`:
> >
> > (Not all processes could be identified, non-owned process info
> > will not be shown, you would have to be root to see it all.)
> > tcp 0 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
> >
> > Output just after telling `gdb` to connect:
> >
> > (Not all processes could be identified, non-owned process info
> > will not be shown, you would have to be root to see it all.)
> > tcp 1 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
> > tcp 0 0 127.0.0.1:50720 127.0.0.1:8888 ESTABLISHED 195502/gdb
> > tcp 478 0 127.0.0.1:8888 127.0.0.1:50720 ESTABLISHED -
> >
> > Looks promising but then:
> >
> > (Not all processes could be identified, non-owned process info
> > will not be shown, you would have to be root to see it all.)
> > tcp 1 0 0.0.0.0:8888 0.0.0.0:* LISTEN 193337/gdbserver
> > tcp 0 0 127.0.0.1:50720 127.0.0.1:8888 FIN_WAIT2 -
> > tcp 722 0 127.0.0.1:8888 127.0.0.1:50720 CLOSE_WAIT -
>
> I have no clue. Try "set debug remote 1" in GDB before connecting,
> see what data GDB receives.
>
> You can also start GDBserver with --remote-debug to see if there
> is some chit chat when GDB connects to it. If you don't see anything
> here, it's probably because GDB ended up connecting to some other
> program.
>
> Simon
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-25 23:45 ` Reinaldo Molina
@ 2020-12-26 0:00 ` Simon Marchi
2020-12-28 15:56 ` Reinaldo Molina
0 siblings, 1 reply; 12+ messages in thread
From: Simon Marchi @ 2020-12-26 0:00 UTC (permalink / raw)
To: Reinaldo Molina; +Cc: gdb
On 2020-12-25 6:45 p.m., Reinaldo Molina wrote:
> Thanks for the quick reply.
>
> Trying your suggestion:
>
> Terminal 1:
>
> gdbserver 127.0.01:8889 build/luajit --remote-debug
>
> Terminal 2:
>
> > gdb build/luajit
> GNU gdb (GDB) 10.1
> Copyright (C) 2020 Free Software Foundation, Inc.
> License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
> This is free software: you are free to change and redistribute it.
> There is NO WARRANTY, to the extent permitted by law.
> Type "show copying" and "show warranty" for details.
> This GDB was configured as "x86_64-pc-linux-gnu".
> Type "show configuration" for configuration details.
> For bug reporting instructions, please see:
> <https://www.gnu.org/software/gdb/bugs/>.
> Find the GDB manual and other documentation resources online at:
> <http://www.gnu.org/software/gdb/documentation/>.
>
> For help, type "help".
> Type "apropos word" to search for commands related to "word"...
> Reading symbols from build/luajit...
> (gdb) set debug remote 1
> (gdb) target remote localhost:8889
> Remote debugging using localhost:8889
> Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
> Timed out.
> Timed out.
> Ignoring packet error, continuing...
> Packet qSupported (supported-packets) is supported
> warning: unrecognized item "timeout" in "qSupported" response
> Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Timed out.
> Timed out.
> Timed out.
> Ignoring packet error, continuing...
> Remote replied unexpectedly to 'vMustReplyEmpty': timeout
> (gdb) target remote 0.0.0.0:8889
> Remote debugging using 0.0.0.0:8889
> Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
> Timed out.
> Timed out.
> Ignoring packet error, continuing...
> Packet qSupported (supported-packets) is supported
> warning: unrecognized item "timeout" in "qSupported" response
> Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Timed out.
> Timed out.
> Timed out.
> Ignoring packet error, continuing...
> Remote replied unexpectedly to 'vMustReplyEmpty': timeout
> (gdb) target remote 127.0.0.1:8889
> 127.0.0.1:8889: Connection timed out.
Ok, I don't really know. I'd probably try to strace gdbserver to see
if it at least accepts the incoming connection, and if so what happens
after that.
Simon
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-25 23:04 ` Andreas Schwab
@ 2020-12-26 0:00 ` Reinaldo Molina
0 siblings, 0 replies; 12+ messages in thread
From: Reinaldo Molina @ 2020-12-26 0:00 UTC (permalink / raw)
To: Andreas Schwab; +Cc: Reinaldo Molina via Gdb
> Are you trying to run two instances of gdb simulanously on the same
> gdbserver connection? That won't work.
I only run `gdb` on the second terminal one time.
Thanks for the quick reply,
Reinaldo Molina
On 12-26-20 00:04:12, Andreas Schwab wrote:
> On Dez 25 2020, Reinaldo Molina via Gdb wrote:
>
> > Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
> >
> > Output from `gdb` on Terminal 2:
> >
> > (gdb) target remote :8888
>
> Are you trying to run two instances of gdb simulanously on the same
> gdbserver connection? That won't work.
>
> Andreas.
>
> --
> Andreas Schwab, schwab@linux-m68k.org
> GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510 2552 DF73 E780 A9DA AEC1
> "And now for something completely different."
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-26 0:00 ` Simon Marchi
@ 2020-12-28 15:56 ` Reinaldo Molina
2020-12-28 22:29 ` Simon Marchi
0 siblings, 1 reply; 12+ messages in thread
From: Reinaldo Molina @ 2020-12-28 15:56 UTC (permalink / raw)
To: Simon Marchi; +Cc: gdb
[-- Attachment #1: Type: text/plain, Size: 5851 bytes --]
Hello again!
I captured with wireshark the communication. They do seem to communicate
is just it seems gdbserver is sending this weird stuff that I don't
know. I guess you guys neither if it does not look familiar:
> > Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
I have attached the raw wireshark capture of the communication. I am not
too versed in networking so I don't see anything out of line other than
gdbserver sending the above weird stuff.
I have tried multiple things. Just debugging a simple hello world, I
checked pacman to see if any of the default installed files have been
altered and they have not, I removed `.gdbinit`. The `gdb` installation
is the default one from `pacman`:
https://archlinux.org/packages/extra/x86_64/gdb/
Just really strange behavior. I have a desktop and a laptop and I can
reproduce the same behavior in both. They are both very similar in linux
setup, packages, etc.
Just really scratching my head here.
Thanks,
Reinaldo Molina
On 12-25-20 19:00:41, Simon Marchi wrote:
>
>
> On 2020-12-25 6:45 p.m., Reinaldo Molina wrote:
> > Thanks for the quick reply.
> >
> > Trying your suggestion:
> >
> > Terminal 1:
> >
> > gdbserver 127.0.01:8889 build/luajit --remote-debug
> >
> > Terminal 2:
> >
> > > gdb build/luajit
> > GNU gdb (GDB) 10.1
> > Copyright (C) 2020 Free Software Foundation, Inc.
> > License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
> > This is free software: you are free to change and redistribute it.
> > There is NO WARRANTY, to the extent permitted by law.
> > Type "show copying" and "show warranty" for details.
> > This GDB was configured as "x86_64-pc-linux-gnu".
> > Type "show configuration" for configuration details.
> > For bug reporting instructions, please see:
> > <https://www.gnu.org/software/gdb/bugs/>.
> > Find the GDB manual and other documentation resources online at:
> > <http://www.gnu.org/software/gdb/documentation/>.
> >
> > For help, type "help".
> > Type "apropos word" to search for commands related to "word"...
> > Reading symbols from build/luajit...
> > (gdb) set debug remote 1
> > (gdb) target remote localhost:8889
> > Remote debugging using localhost:8889
> > Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
> > Timed out.
> > Timed out.
> > Ignoring packet error, continuing...
> > Packet qSupported (supported-packets) is supported
> > warning: unrecognized item "timeout" in "qSupported" response
> > Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Timed out.
> > Timed out.
> > Timed out.
> > Ignoring packet error, continuing...
> > Remote replied unexpectedly to 'vMustReplyEmpty': timeout
> > (gdb) target remote 0.0.0.0:8889
> > Remote debugging using 0.0.0.0:8889
> > Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Sending packet: $qSupported:multiprocess+;swbreak+;hwbreak+;qRelocInsn+;fork-events+;vfork-events+;exec-events+;vContSupported+;QThreadEvents+;no-resumed+;xmlRegisters=i386#6a...Timed out.
> > Timed out.
> > Timed out.
> > Ignoring packet error, continuing...
> > Packet qSupported (supported-packets) is supported
> > warning: unrecognized item "timeout" in "qSupported" response
> > Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Sending packet: $vMustReplyEmpty#3a...Timed out.
> > Timed out.
> > Timed out.
> > Ignoring packet error, continuing...
> > Remote replied unexpectedly to 'vMustReplyEmpty': timeout
> > (gdb) target remote 127.0.0.1:8889
> > 127.0.0.1:8889: Connection timed out.
>
> Ok, I don't really know. I'd probably try to strace gdbserver to see
> if it at least accepts the incoming connection, and if so what happens
> after that.
>
> Simon
[-- Attachment #2: gdb.txt --]
[-- Type: text/plain, Size: 85186 bytes --]
No. Time Source Destination Protocol Length Info
73 380.764783525 127.0.0.1 127.0.0.1 TCP 74 34436 → 8888 [SYN] Seq=0 Win=65495 Len=0 MSS=65495 SACK_PERM=1 TSval=3668276571 TSecr=0 WS=128
Frame 73: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 60
Identification: 0xab7d (43901)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x913c [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 0, Len: 0
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 0 (relative sequence number)
Sequence Number (raw): 4072352413
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 0
Acknowledgment number (raw): 0
1010 .... = Header Length: 40 bytes (10)
Flags: 0x002 (SYN)
Window: 65495
[Calculated window size: 65495]
Checksum: 0xfe30 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
TCP Option - Maximum segment size: 65495 bytes
TCP Option - SACK permitted
TCP Option - Timestamps: TSval 3668276571, TSecr 0
TCP Option - No-Operation (NOP)
TCP Option - Window scale: 7 (multiply by 128)
[Timestamps]
[Time since first frame in this TCP stream: 0.000000000 seconds]
[Time since previous frame in this TCP stream: 0.000000000 seconds]
No. Time Source Destination Protocol Length Info
74 380.764824975 127.0.0.1 127.0.0.1 TCP 74 8888 → 34436 [SYN, ACK] Seq=0 Ack=1 Win=65483 Len=0 MSS=65495 SACK_PERM=1 TSval=3668276571 TSecr=3668276571 WS=128
Frame 74: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 60
Identification: 0x0000 (0)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x3cba [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 0, Ack: 1, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 0 (relative sequence number)
Sequence Number (raw): 3967578588
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 4072352414
1010 .... = Header Length: 40 bytes (10)
Flags: 0x012 (SYN, ACK)
Window: 65483
[Calculated window size: 65483]
Checksum: 0xfe30 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
TCP Option - Maximum segment size: 65495 bytes
TCP Option - SACK permitted
TCP Option - Timestamps: TSval 3668276571, TSecr 3668276571
TCP Option - No-Operation (NOP)
TCP Option - Window scale: 7 (multiply by 128)
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 0.000041450 seconds]
[Time since previous frame in this TCP stream: 0.000041450 seconds]
No. Time Source Destination Protocol Length Info
75 380.764849902 127.0.0.1 127.0.0.1 TCP 66 34436 → 8888 [ACK] Seq=1 Ack=1 Win=65536 Len=0 TSval=3668276571 TSecr=3668276571
Frame 75: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xab7e (43902)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9143 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 1, Ack: 1, Len: 0
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 4072352414
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668276571, TSecr 3668276571
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 0.000066377 seconds]
[Time since previous frame in this TCP stream: 0.000024927 seconds]
No. Time Source Destination Protocol Length Info
76 380.764953824 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=1 Ack=1 Win=65536 Len=1 TSval=3668276572 TSecr=3668276571
Frame 76: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab7f (43903)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9141 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 1, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 4072352414
[Next Sequence Number: 2 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668276572, TSecr 3668276571
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 0.000170299 seconds]
[Time since previous frame in this TCP stream: 0.000103922 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2b +
No. Time Source Destination Protocol Length Info
77 380.764963932 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=2 Win=65536 Len=0 TSval=3668276572 TSecr=3668276572
Frame 77: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe166 (57702)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b5b [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 2, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 2 (relative ack number)
Acknowledgment number (raw): 4072352415
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668276572, TSecr 3668276572
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 0.000180407 seconds]
[Time since previous frame in this TCP stream: 0.000010108 seconds]
No. Time Source Destination Protocol Length Info
78 380.765005066 127.0.0.1 127.0.0.1 TCP 225 34436 → 8888 [PSH, ACK] Seq=2 Ack=1 Win=65536 Len=159 TSval=3668276572 TSecr=3668276572
Frame 78: 225 bytes on wire (1800 bits), 225 bytes captured (1800 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 211
Identification: 0xab80 (43904)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x90a2 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 2, Ack: 1, Len: 159
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 159]
Sequence Number: 2 (relative sequence number)
Sequence Number (raw): 4072352415
[Next Sequence Number: 161 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfec7 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668276572, TSecr 3668276572
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 0.000221541 seconds]
[Time since previous frame in this TCP stream: 0.000041134 seconds]
TCP payload (159 bytes)
Data (159 bytes)
0000 24 71 53 75 70 70 6f 72 74 65 64 3a 6d 75 6c 74 $qSupported:mult
0010 69 70 72 6f 63 65 73 73 2b 3b 73 77 62 72 65 61 iprocess+;swbrea
0020 6b 2b 3b 68 77 62 72 65 61 6b 2b 3b 71 52 65 6c k+;hwbreak+;qRel
0030 6f 63 49 6e 73 6e 2b 3b 66 6f 72 6b 2d 65 76 65 ocInsn+;fork-eve
0040 6e 74 73 2b 3b 76 66 6f 72 6b 2d 65 76 65 6e 74 nts+;vfork-event
0050 73 2b 3b 65 78 65 63 2d 65 76 65 6e 74 73 2b 3b s+;exec-events+;
0060 76 43 6f 6e 74 53 75 70 70 6f 72 74 65 64 2b 3b vContSupported+;
0070 51 54 68 72 65 61 64 45 76 65 6e 74 73 2b 3b 6e QThreadEvents+;n
0080 6f 2d 72 65 73 75 6d 65 64 2b 3b 78 6d 6c 52 65 o-resumed+;xmlRe
0090 67 69 73 74 65 72 73 3d 69 33 38 36 23 36 61 gisters=i386#6a
No. Time Source Destination Protocol Length Info
79 380.765017675 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=161 Win=65408 Len=0 TSval=3668276572 TSecr=3668276572
Frame 79: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe167 (57703)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b5a [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 161, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 161 (relative ack number)
Acknowledgment number (raw): 4072352574
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 511
[Calculated window size: 65408]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668276572, TSecr 3668276572
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 0.000234150 seconds]
[Time since previous frame in this TCP stream: 0.000012609 seconds]
No. Time Source Destination Protocol Length Info
80 382.767692911 127.0.0.1 127.0.0.1 TCP 225 34436 → 8888 [PSH, ACK] Seq=161 Ack=1 Win=65536 Len=159 TSval=3668278574 TSecr=3668276572
Frame 80: 225 bytes on wire (1800 bits), 225 bytes captured (1800 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 211
Identification: 0xab81 (43905)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x90a1 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 161, Ack: 1, Len: 159
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 159]
Sequence Number: 161 (relative sequence number)
Sequence Number (raw): 4072352574
[Next Sequence Number: 320 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfec7 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668278574, TSecr 3668276572
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 2.002909386 seconds]
[Time since previous frame in this TCP stream: 2.002675236 seconds]
TCP payload (159 bytes)
Data (159 bytes)
0000 24 71 53 75 70 70 6f 72 74 65 64 3a 6d 75 6c 74 $qSupported:mult
0010 69 70 72 6f 63 65 73 73 2b 3b 73 77 62 72 65 61 iprocess+;swbrea
0020 6b 2b 3b 68 77 62 72 65 61 6b 2b 3b 71 52 65 6c k+;hwbreak+;qRel
0030 6f 63 49 6e 73 6e 2b 3b 66 6f 72 6b 2d 65 76 65 ocInsn+;fork-eve
0040 6e 74 73 2b 3b 76 66 6f 72 6b 2d 65 76 65 6e 74 nts+;vfork-event
0050 73 2b 3b 65 78 65 63 2d 65 76 65 6e 74 73 2b 3b s+;exec-events+;
0060 76 43 6f 6e 74 53 75 70 70 6f 72 74 65 64 2b 3b vContSupported+;
0070 51 54 68 72 65 61 64 45 76 65 6e 74 73 2b 3b 6e QThreadEvents+;n
0080 6f 2d 72 65 73 75 6d 65 64 2b 3b 78 6d 6c 52 65 o-resumed+;xmlRe
0090 67 69 73 74 65 72 73 3d 69 33 38 36 23 36 61 gisters=i386#6a
No. Time Source Destination Protocol Length Info
81 382.767714640 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=320 Win=65280 Len=0 TSval=3668278574 TSecr=3668278574
Frame 81: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe168 (57704)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b59 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 320, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 320 (relative ack number)
Acknowledgment number (raw): 4072352733
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 510
[Calculated window size: 65280]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668278574, TSecr 3668278574
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 2.002931115 seconds]
[Time since previous frame in this TCP stream: 0.000021729 seconds]
No. Time Source Destination Protocol Length Info
82 384.769213691 127.0.0.1 127.0.0.1 TCP 225 34436 → 8888 [PSH, ACK] Seq=320 Ack=1 Win=65536 Len=159 TSval=3668280576 TSecr=3668278574
Frame 82: 225 bytes on wire (1800 bits), 225 bytes captured (1800 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 211
Identification: 0xab82 (43906)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x90a0 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 320, Ack: 1, Len: 159
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 159]
Sequence Number: 320 (relative sequence number)
Sequence Number (raw): 4072352733
[Next Sequence Number: 479 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfec7 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668280576, TSecr 3668278574
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 4.004430166 seconds]
[Time since previous frame in this TCP stream: 2.001499051 seconds]
TCP payload (159 bytes)
Data (159 bytes)
0000 24 71 53 75 70 70 6f 72 74 65 64 3a 6d 75 6c 74 $qSupported:mult
0010 69 70 72 6f 63 65 73 73 2b 3b 73 77 62 72 65 61 iprocess+;swbrea
0020 6b 2b 3b 68 77 62 72 65 61 6b 2b 3b 71 52 65 6c k+;hwbreak+;qRel
0030 6f 63 49 6e 73 6e 2b 3b 66 6f 72 6b 2d 65 76 65 ocInsn+;fork-eve
0040 6e 74 73 2b 3b 76 66 6f 72 6b 2d 65 76 65 6e 74 nts+;vfork-event
0050 73 2b 3b 65 78 65 63 2d 65 76 65 6e 74 73 2b 3b s+;exec-events+;
0060 76 43 6f 6e 74 53 75 70 70 6f 72 74 65 64 2b 3b vContSupported+;
0070 51 54 68 72 65 61 64 45 76 65 6e 74 73 2b 3b 6e QThreadEvents+;n
0080 6f 2d 72 65 73 75 6d 65 64 2b 3b 78 6d 6c 52 65 o-resumed+;xmlRe
0090 67 69 73 74 65 72 73 3d 69 33 38 36 23 36 61 gisters=i386#6a
No. Time Source Destination Protocol Length Info
83 384.769229974 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=479 Win=65152 Len=0 TSval=3668280576 TSecr=3668280576
Frame 83: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe169 (57705)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b58 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 479, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 479 (relative ack number)
Acknowledgment number (raw): 4072352892
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 509
[Calculated window size: 65152]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668280576, TSecr 3668280576
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 4.004446449 seconds]
[Time since previous frame in this TCP stream: 0.000016283 seconds]
No. Time Source Destination Protocol Length Info
84 386.771585099 127.0.0.1 127.0.0.1 TCP 225 34436 → 8888 [PSH, ACK] Seq=479 Ack=1 Win=65536 Len=159 TSval=3668282578 TSecr=3668280576
Frame 84: 225 bytes on wire (1800 bits), 225 bytes captured (1800 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 211
Identification: 0xab83 (43907)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x909f [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 479, Ack: 1, Len: 159
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 159]
Sequence Number: 479 (relative sequence number)
Sequence Number (raw): 4072352892
[Next Sequence Number: 638 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfec7 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668282578, TSecr 3668280576
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 6.006801574 seconds]
[Time since previous frame in this TCP stream: 2.002355125 seconds]
TCP payload (159 bytes)
Data (159 bytes)
0000 24 71 53 75 70 70 6f 72 74 65 64 3a 6d 75 6c 74 $qSupported:mult
0010 69 70 72 6f 63 65 73 73 2b 3b 73 77 62 72 65 61 iprocess+;swbrea
0020 6b 2b 3b 68 77 62 72 65 61 6b 2b 3b 71 52 65 6c k+;hwbreak+;qRel
0030 6f 63 49 6e 73 6e 2b 3b 66 6f 72 6b 2d 65 76 65 ocInsn+;fork-eve
0040 6e 74 73 2b 3b 76 66 6f 72 6b 2d 65 76 65 6e 74 nts+;vfork-event
0050 73 2b 3b 65 78 65 63 2d 65 76 65 6e 74 73 2b 3b s+;exec-events+;
0060 76 43 6f 6e 74 53 75 70 70 6f 72 74 65 64 2b 3b vContSupported+;
0070 51 54 68 72 65 61 64 45 76 65 6e 74 73 2b 3b 6e QThreadEvents+;n
0080 6f 2d 72 65 73 75 6d 65 64 2b 3b 78 6d 6c 52 65 o-resumed+;xmlRe
0090 67 69 73 74 65 72 73 3d 69 33 38 36 23 36 61 gisters=i386#6a
No. Time Source Destination Protocol Length Info
85 386.771603383 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=638 Win=65024 Len=0 TSval=3668282578 TSecr=3668282578
Frame 85: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe16a (57706)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b57 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 638, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 638 (relative ack number)
Acknowledgment number (raw): 4072353051
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668282578, TSecr 3668282578
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 6.006819858 seconds]
[Time since previous frame in this TCP stream: 0.000018284 seconds]
No. Time Source Destination Protocol Length Info
86 390.776278020 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=638 Ack=1 Win=65536 Len=1 TSval=3668286583 TSecr=3668282578
Frame 86: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab84 (43908)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x913c [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 638, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 638 (relative sequence number)
Sequence Number (raw): 4072353051
[Next Sequence Number: 639 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668286583, TSecr 3668282578
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 10.011494495 seconds]
[Time since previous frame in this TCP stream: 4.004674637 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2d -
No. Time Source Destination Protocol Length Info
87 390.776294913 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=639 Win=65024 Len=0 TSval=3668286583 TSecr=3668286583
Frame 87: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe16b (57707)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b56 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 639, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 639 (relative ack number)
Acknowledgment number (raw): 4072353052
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668286583, TSecr 3668286583
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 10.011511388 seconds]
[Time since previous frame in this TCP stream: 0.000016893 seconds]
No. Time Source Destination Protocol Length Info
88 392.778818422 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=639 Ack=1 Win=65536 Len=1 TSval=3668288585 TSecr=3668286583
Frame 88: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab85 (43909)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x913b [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 639, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 639 (relative sequence number)
Sequence Number (raw): 4072353052
[Next Sequence Number: 640 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668288585, TSecr 3668286583
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 12.014034897 seconds]
[Time since previous frame in this TCP stream: 2.002523509 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2d -
No. Time Source Destination Protocol Length Info
89 392.778837165 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=640 Win=65024 Len=0 TSval=3668288585 TSecr=3668288585
Frame 89: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe16c (57708)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b55 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 640, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 640 (relative ack number)
Acknowledgment number (raw): 4072353053
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668288585, TSecr 3668288585
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 12.014053640 seconds]
[Time since previous frame in this TCP stream: 0.000018743 seconds]
No. Time Source Destination Protocol Length Info
90 394.781010922 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=640 Ack=1 Win=65536 Len=1 TSval=3668290588 TSecr=3668288585
Frame 90: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab86 (43910)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x913a [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 640, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 640 (relative sequence number)
Sequence Number (raw): 4072353053
[Next Sequence Number: 641 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668290588, TSecr 3668288585
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 14.016227397 seconds]
[Time since previous frame in this TCP stream: 2.002173757 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2d -
No. Time Source Destination Protocol Length Info
91 394.781020477 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=641 Win=65024 Len=0 TSval=3668290588 TSecr=3668290588
Frame 91: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe16d (57709)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b54 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 641, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 641 (relative ack number)
Acknowledgment number (raw): 4072353054
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668290588, TSecr 3668290588
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 14.016236952 seconds]
[Time since previous frame in this TCP stream: 0.000009555 seconds]
No. Time Source Destination Protocol Length Info
92 394.781050991 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=641 Ack=1 Win=65536 Len=1 TSval=3668290588 TSecr=3668290588
Frame 92: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab87 (43911)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9139 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 641, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 641 (relative sequence number)
Sequence Number (raw): 4072353054
[Next Sequence Number: 642 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668290588, TSecr 3668290588
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 14.016267466 seconds]
[Time since previous frame in this TCP stream: 0.000030514 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2b +
No. Time Source Destination Protocol Length Info
93 394.781053812 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=642 Win=65024 Len=0 TSval=3668290588 TSecr=3668290588
Frame 93: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe16e (57710)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b53 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 642, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 642 (relative ack number)
Acknowledgment number (raw): 4072353055
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668290588, TSecr 3668290588
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 14.016270287 seconds]
[Time since previous frame in this TCP stream: 0.000002821 seconds]
No. Time Source Destination Protocol Length Info
94 394.781076492 127.0.0.1 127.0.0.1 TCP 85 34436 → 8888 [PSH, ACK] Seq=642 Ack=1 Win=65536 Len=19 TSval=3668290588 TSecr=3668290588
Frame 94: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 71
Identification: 0xab88 (43912)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9126 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 642, Ack: 1, Len: 19
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 19]
Sequence Number: 642 (relative sequence number)
Sequence Number (raw): 4072353055
[Next Sequence Number: 661 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe3b [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668290588, TSecr 3668290588
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 14.016292967 seconds]
[Time since previous frame in this TCP stream: 0.000022680 seconds]
TCP payload (19 bytes)
Data (19 bytes)
0000 24 76 4d 75 73 74 52 65 70 6c 79 45 6d 70 74 79 $vMustReplyEmpty
0010 23 33 61 #3a
No. Time Source Destination Protocol Length Info
95 394.781078858 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=661 Win=65024 Len=0 TSval=3668290588 TSecr=3668290588
Frame 95: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe16f (57711)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b52 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 661, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 661 (relative ack number)
Acknowledgment number (raw): 4072353074
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668290588, TSecr 3668290588
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 14.016295333 seconds]
[Time since previous frame in this TCP stream: 0.000002366 seconds]
No. Time Source Destination Protocol Length Info
96 396.782938543 127.0.0.1 127.0.0.1 TCP 85 34436 → 8888 [PSH, ACK] Seq=661 Ack=1 Win=65536 Len=19 TSval=3668292590 TSecr=3668290588
Frame 96: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 71
Identification: 0xab89 (43913)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9125 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 661, Ack: 1, Len: 19
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 19]
Sequence Number: 661 (relative sequence number)
Sequence Number (raw): 4072353074
[Next Sequence Number: 680 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe3b [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668292590, TSecr 3668290588
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 16.018155018 seconds]
[Time since previous frame in this TCP stream: 2.001859685 seconds]
TCP payload (19 bytes)
Data (19 bytes)
0000 24 76 4d 75 73 74 52 65 70 6c 79 45 6d 70 74 79 $vMustReplyEmpty
0010 23 33 61 #3a
No. Time Source Destination Protocol Length Info
97 396.782957727 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=680 Win=65024 Len=0 TSval=3668292590 TSecr=3668292590
Frame 97: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe170 (57712)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b51 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 680, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 680 (relative ack number)
Acknowledgment number (raw): 4072353093
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668292590, TSecr 3668292590
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 16.018174202 seconds]
[Time since previous frame in this TCP stream: 0.000019184 seconds]
No. Time Source Destination Protocol Length Info
98 398.784816173 127.0.0.1 127.0.0.1 TCP 85 34436 → 8888 [PSH, ACK] Seq=680 Ack=1 Win=65536 Len=19 TSval=3668294591 TSecr=3668292590
Frame 98: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 71
Identification: 0xab8a (43914)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9124 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 680, Ack: 1, Len: 19
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 19]
Sequence Number: 680 (relative sequence number)
Sequence Number (raw): 4072353093
[Next Sequence Number: 699 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe3b [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668294591, TSecr 3668292590
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 18.020032648 seconds]
[Time since previous frame in this TCP stream: 2.001858446 seconds]
TCP payload (19 bytes)
Data (19 bytes)
0000 24 76 4d 75 73 74 52 65 70 6c 79 45 6d 70 74 79 $vMustReplyEmpty
0010 23 33 61 #3a
No. Time Source Destination Protocol Length Info
99 398.784841986 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=699 Win=65024 Len=0 TSval=3668294591 TSecr=3668294591
Frame 99: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe171 (57713)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b50 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 699, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 699 (relative ack number)
Acknowledgment number (raw): 4072353112
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668294591, TSecr 3668294591
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 18.020058461 seconds]
[Time since previous frame in this TCP stream: 0.000025813 seconds]
No. Time Source Destination Protocol Length Info
100 400.787244654 127.0.0.1 127.0.0.1 TCP 85 34436 → 8888 [PSH, ACK] Seq=699 Ack=1 Win=65536 Len=19 TSval=3668296594 TSecr=3668294591
Frame 100: 85 bytes on wire (680 bits), 85 bytes captured (680 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 71
Identification: 0xab8b (43915)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9123 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 699, Ack: 1, Len: 19
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 19]
Sequence Number: 699 (relative sequence number)
Sequence Number (raw): 4072353112
[Next Sequence Number: 718 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe3b [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668296594, TSecr 3668294591
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 20.022461129 seconds]
[Time since previous frame in this TCP stream: 2.002402668 seconds]
TCP payload (19 bytes)
Data (19 bytes)
0000 24 76 4d 75 73 74 52 65 70 6c 79 45 6d 70 74 79 $vMustReplyEmpty
0010 23 33 61 #3a
No. Time Source Destination Protocol Length Info
101 400.787263368 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=718 Win=65024 Len=0 TSval=3668296594 TSecr=3668296594
Frame 101: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe172 (57714)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b4f [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 718, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 718 (relative ack number)
Acknowledgment number (raw): 4072353131
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668296594, TSecr 3668296594
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 20.022479843 seconds]
[Time since previous frame in this TCP stream: 0.000018714 seconds]
No. Time Source Destination Protocol Length Info
102 404.791973068 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=718 Ack=1 Win=65536 Len=1 TSval=3668300599 TSecr=3668296594
Frame 102: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab8c (43916)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9134 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 718, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 718 (relative sequence number)
Sequence Number (raw): 4072353131
[Next Sequence Number: 719 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668300599, TSecr 3668296594
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 24.027189543 seconds]
[Time since previous frame in this TCP stream: 4.004709700 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2d -
No. Time Source Destination Protocol Length Info
103 404.791980690 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=719 Win=65024 Len=0 TSval=3668300599 TSecr=3668300599
Frame 103: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe173 (57715)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b4e [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 719, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 719 (relative ack number)
Acknowledgment number (raw): 4072353132
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668300599, TSecr 3668300599
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 24.027197165 seconds]
[Time since previous frame in this TCP stream: 0.000007622 seconds]
No. Time Source Destination Protocol Length Info
104 406.794341078 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=719 Ack=1 Win=65536 Len=1 TSval=3668302601 TSecr=3668300599
Frame 104: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab8d (43917)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9133 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 719, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 719 (relative sequence number)
Sequence Number (raw): 4072353132
[Next Sequence Number: 720 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668302601, TSecr 3668300599
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 26.029557553 seconds]
[Time since previous frame in this TCP stream: 2.002360388 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2d -
No. Time Source Destination Protocol Length Info
105 406.794358355 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=720 Win=65024 Len=0 TSval=3668302601 TSecr=3668302601
Frame 105: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe174 (57716)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b4d [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 720, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 720 (relative ack number)
Acknowledgment number (raw): 4072353133
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668302601, TSecr 3668302601
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 26.029574830 seconds]
[Time since previous frame in this TCP stream: 0.000017277 seconds]
No. Time Source Destination Protocol Length Info
106 408.796906512 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=720 Ack=1 Win=65536 Len=1 TSval=3668304604 TSecr=3668302601
Frame 106: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab8e (43918)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9132 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 720, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 720 (relative sequence number)
Sequence Number (raw): 4072353133
[Next Sequence Number: 721 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668304604, TSecr 3668302601
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 28.032122987 seconds]
[Time since previous frame in this TCP stream: 2.002548157 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2d -
No. Time Source Destination Protocol Length Info
107 408.796923382 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=721 Win=65024 Len=0 TSval=3668304604 TSecr=3668304604
Frame 107: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe175 (57717)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b4c [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 721, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 721 (relative ack number)
Acknowledgment number (raw): 4072353134
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668304604, TSecr 3668304604
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 28.032139857 seconds]
[Time since previous frame in this TCP stream: 0.000016870 seconds]
No. Time Source Destination Protocol Length Info
108 408.796996393 127.0.0.1 127.0.0.1 TCP 67 34436 → 8888 [PSH, ACK] Seq=721 Ack=1 Win=65536 Len=1 TSval=3668304604 TSecr=3668304604
Frame 108: 67 bytes on wire (536 bits), 67 bytes captured (536 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 53
Identification: 0xab8f (43919)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9131 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 721, Ack: 1, Len: 1
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 1]
Sequence Number: 721 (relative sequence number)
Sequence Number (raw): 4072353134
[Next Sequence Number: 722 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe29 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668304604, TSecr 3668304604
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 28.032212868 seconds]
[Time since previous frame in this TCP stream: 0.000073011 seconds]
TCP payload (1 byte)
Data (1 byte)
0000 2b +
No. Time Source Destination Protocol Length Info
109 408.797003079 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=722 Win=65024 Len=0 TSval=3668304604 TSecr=3668304604
Frame 109: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe176 (57718)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b4b [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 722, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 722 (relative ack number)
Acknowledgment number (raw): 4072353135
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668304604, TSecr 3668304604
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 28.032219554 seconds]
[Time since previous frame in this TCP stream: 0.000006686 seconds]
No. Time Source Destination Protocol Length Info
110 408.797097557 127.0.0.1 127.0.0.1 TCP 66 34436 → 8888 [FIN, ACK] Seq=722 Ack=1 Win=65536 Len=0 TSval=3668304604 TSecr=3668304604
Frame 110: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xab90 (43920)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x9131 [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 34436, Dst Port: 8888, Seq: 722, Ack: 1, Len: 0
Source Port: 34436
Destination Port: 8888
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 722 (relative sequence number)
Sequence Number (raw): 4072353135
[Next Sequence Number: 723 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3967578589
1000 .... = Header Length: 32 bytes (8)
Flags: 0x011 (FIN, ACK)
Window: 512
[Calculated window size: 65536]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668304604, TSecr 3668304604
[Timestamps]
[Time since first frame in this TCP stream: 28.032314032 seconds]
[Time since previous frame in this TCP stream: 0.000094478 seconds]
No. Time Source Destination Protocol Length Info
111 408.838243089 127.0.0.1 127.0.0.1 TCP 66 8888 → 34436 [ACK] Seq=1 Ack=723 Win=65024 Len=0 TSval=3668304645 TSecr=3668304604
Frame 111: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface lo, id 0
Ethernet II, Src: 00:00:00_00:00:00 (00:00:00:00:00:00), Dst: 00:00:00_00:00:00 (00:00:00:00:00:00)
Internet Protocol Version 4, Src: 127.0.0.1, Dst: 127.0.0.1
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Total Length: 52
Identification: 0xe177 (57719)
Flags: 0x40, Don't fragment
Fragment Offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x5b4a [validation disabled]
[Header checksum status: Unverified]
Source Address: 127.0.0.1
Destination Address: 127.0.0.1
Transmission Control Protocol, Src Port: 8888, Dst Port: 34436, Seq: 1, Ack: 723, Len: 0
Source Port: 8888
Destination Port: 34436
[Stream index: 17]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3967578589
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 723 (relative ack number)
Acknowledgment number (raw): 4072353136
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 508
[Calculated window size: 65024]
[Window size scaling factor: 128]
Checksum: 0xfe28 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
TCP Option - No-Operation (NOP)
TCP Option - No-Operation (NOP)
TCP Option - Timestamps: TSval 3668304645, TSecr 3668304604
[SEQ/ACK analysis]
[Timestamps]
[Time since first frame in this TCP stream: 28.073459564 seconds]
[Time since previous frame in this TCP stream: 0.041145532 seconds]
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-28 15:56 ` Reinaldo Molina
@ 2020-12-28 22:29 ` Simon Marchi
0 siblings, 0 replies; 12+ messages in thread
From: Simon Marchi @ 2020-12-28 22:29 UTC (permalink / raw)
To: Reinaldo Molina; +Cc: gdb
On 2020-12-28 10:56 a.m., Reinaldo Molina wrote:
> I have attached the raw wireshark capture of the communication.
Can you attach the pcap instead of a text dump?
In you previous email, the PIDs, seemed to indicate that you are running this
in a container, is that the case?
Simon
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-25 22:36 gdb refuses to connect to localhost Reinaldo Molina
2020-12-25 22:55 ` Simon Marchi
2020-12-25 23:04 ` Andreas Schwab
@ 2020-12-29 15:48 ` Martin Simmons
2020-12-29 15:58 ` Reinaldo Molina
2 siblings, 1 reply; 12+ messages in thread
From: Martin Simmons @ 2020-12-29 15:48 UTC (permalink / raw)
To: Reinaldo Molina; +Cc: gdb
>>>>> On Fri, 25 Dec 2020 17:36:22 -0500, Reinaldo Molina via Gdb said:
>
> Hey guys!
>
> Looking for some assistants here. I am trying to debug an application using `gdbserver`, but it seems my `lo` network device is messed up. `gdb` refuses to connect to `localhost` every time. Here is my flow:
>
> Terminal 1: `gdbserver localhost:8888 build/luajit`
> - Variants I've tried: `127.0.0.1:8888`
>
> Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
>
> Output from `gdb` on Terminal 2:
>
> (gdb) target remote :8888
> Remote debugging using :8888
> Ignoring packet error, continuing...
> warning: unrecognized item "timeout" in "qSupported" response
> Ignoring packet error, continuing...
> Remote replied unexpectedly to 'vMustReplyEmpty': timeout
Try running gdbserver with the --no-startup-with-shell argument:
gdbserver --no-startup-with-shell localhost:8888 build/luajit
That seems to be necessary if your shell is tcsh.
__Martin
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-29 15:48 ` Martin Simmons
@ 2020-12-29 15:58 ` Reinaldo Molina
2020-12-29 21:18 ` Simon Marchi
0 siblings, 1 reply; 12+ messages in thread
From: Reinaldo Molina @ 2020-12-29 15:58 UTC (permalink / raw)
To: Martin Simmons; +Cc: gdb
> gdbserver --no-startup-with-shell localhost:8888 build/luajit
That did it!!!
My shell is `zsh` by the way.
> zsh --version
zsh 5.8 (x86_64-pc-linux-gnu)
Thank you guys! Happy New Year!
Reinaldo Molina
On 12-29-20 15:48:39, Martin Simmons wrote:
> >>>>> On Fri, 25 Dec 2020 17:36:22 -0500, Reinaldo Molina via Gdb said:
> >
> > Hey guys!
> >
> > Looking for some assistants here. I am trying to debug an application using `gdbserver`, but it seems my `lo` network device is messed up. `gdb` refuses to connect to `localhost` every time. Here is my flow:
> >
> > Terminal 1: `gdbserver localhost:8888 build/luajit`
> > - Variants I've tried: `127.0.0.1:8888`
> >
> > Terminal 2: `gdb build/luajit -ex 'target remote localhost:8888'`
> >
> > Output from `gdb` on Terminal 2:
> >
> > (gdb) target remote :8888
> > Remote debugging using :8888
> > Ignoring packet error, continuing...
> > warning: unrecognized item "timeout" in "qSupported" response
> > Ignoring packet error, continuing...
> > Remote replied unexpectedly to 'vMustReplyEmpty': timeout
>
> Try running gdbserver with the --no-startup-with-shell argument:
>
> gdbserver --no-startup-with-shell localhost:8888 build/luajit
>
> That seems to be necessary if your shell is tcsh.
>
> __Martin
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-29 15:58 ` Reinaldo Molina
@ 2020-12-29 21:18 ` Simon Marchi
2020-12-30 1:20 ` Reinaldo Molina
0 siblings, 1 reply; 12+ messages in thread
From: Simon Marchi @ 2020-12-29 21:18 UTC (permalink / raw)
To: Reinaldo Molina, Martin Simmons; +Cc: gdb
On 2020-12-29 10:58 a.m., Reinaldo Molina via Gdb wrote:
> That did it!!!
>
> My shell is `zsh` by the way.
>
> > zsh --version
> zsh 5.8 (x86_64-pc-linux-gnu)
>
> Thank you guys! Happy New Year!
>
> Reinaldo Molina
Wow, good job at spotting this Martin.
Is it maybe an instance of this bug?
https://sourceware.org/bugzilla/show_bug.cgi?id=26116
Simon
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: gdb refuses to connect to localhost
2020-12-29 21:18 ` Simon Marchi
@ 2020-12-30 1:20 ` Reinaldo Molina
0 siblings, 0 replies; 12+ messages in thread
From: Reinaldo Molina @ 2020-12-30 1:20 UTC (permalink / raw)
To: Simon Marchi; +Cc: Martin Simmons, gdb
> Is it maybe an instance of this bug?
>
> https://sourceware.org/bugzilla/show_bug.cgi?id=26116
Initially I thought so. I have a fancy prompt. But then I was able to
reproduce it even in bash. I went for the prompts then, but still could
reproduce. Then I went for something I should have done a while back,
but didn't occur to me:
env -i gdbserver localhost:8888 build/bin/nvim
And it functions properly that way.
So that seems to indicate that is related to my environment variables. I
have only a few in my `bashrc` and I can still reproduce, so tomorrow
I'll debug it. See what I can find.
Thanks,
Reinaldo Molina
On 12-29-20 16:18:21, Simon Marchi wrote:
>
>
> On 2020-12-29 10:58 a.m., Reinaldo Molina via Gdb wrote:
> > That did it!!!
> >
> > My shell is `zsh` by the way.
> >
> > > zsh --version
> > zsh 5.8 (x86_64-pc-linux-gnu)
> >
> > Thank you guys! Happy New Year!
> >
> > Reinaldo Molina
>
> Wow, good job at spotting this Martin.
>
> Is it maybe an instance of this bug?
>
> https://sourceware.org/bugzilla/show_bug.cgi?id=26116
>
> Simon
^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2020-12-30 1:20 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-12-25 22:36 gdb refuses to connect to localhost Reinaldo Molina
2020-12-25 22:55 ` Simon Marchi
2020-12-25 23:45 ` Reinaldo Molina
2020-12-26 0:00 ` Simon Marchi
2020-12-28 15:56 ` Reinaldo Molina
2020-12-28 22:29 ` Simon Marchi
2020-12-25 23:04 ` Andreas Schwab
2020-12-26 0:00 ` Reinaldo Molina
2020-12-29 15:48 ` Martin Simmons
2020-12-29 15:58 ` Reinaldo Molina
2020-12-29 21:18 ` Simon Marchi
2020-12-30 1:20 ` Reinaldo Molina
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).