| /linux/drivers/platform/raspberrypi/vchiq-interface/ |
| H A D | TESTING | 59 vchi ping (size 0) -> 57.000000us 60 vchi ping (size 0, 0 async, 0 oneway) -> 122.000000us 63 vchi ping (size 0) -> 49.000000us 64 vchi ping (size 0, 0 async, 0 oneway) -> 70.000000us 67 vchi ping (size 0, 1 async, 0 oneway) -> 65.000000us 69 vchi ping (size 0, 2 async, 0 oneway) -> 74.000000us 71 vchi ping (size 0, 10 async, 0 oneway) -> 125.000000us 73 vchi ping (size 0, 0 async, 1 oneway) -> 70.000000us 74 vchi ping (size 0, 0 async, 2 oneway) -> 76.000000us 75 vchi ping (size 0, 0 async, 10 oneway) -> 105.000000us [all …]
|
| /linux/samples/bpf/ |
| H A D | test_lwt_bpf.sh | 146 ping -c 3 $IPVETH1 || { 162 ping -c 3 $IPVETH1 || { 178 ping -c 3 $IP_LOCAL || { 202 ping -c 3 $IPVETH1 || { 215 ping -c 3 $IP_LOCAL || { 233 ping -c 3 $IPVETH1 || { 249 ping -c 3 $IP_LOCAL || { 273 ping -c 3 $IPVETH1 && { 286 ping -c 3 $IP_LOCAL && { 299 ping -c 3 $IPVETH1 || { [all …]
|
| H A D | tc_l2_redirect.sh | 111 $IP netns exec ns1 ping -c1 10.10.1.102 >& /dev/null 116 ping -c1 10.10.1.102 >& /dev/null 148 $IP netns exec ns1 ping -c1 10.10.1.102 >& /dev/null 149 $IP netns exec ns1 ping -6 -c1 2401:face::66 >& /dev/null 154 ping -c1 10.10.1.102 >& /dev/null 155 ping -6 -c1 2401:face::66 >& /dev/null
|
| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | bridge_brouter.sh | 61 # ping net${ns1}, expected to not work (ip forwarding is off) 62 if ip netns exec "$ns1" ping -q -c 1 10.0.0.12 -W 0.5 > /dev/null 2>&1; then 63 echo "ERROR: ping works, should have failed" 1>&2 74 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then 75 echo "ERROR: ping did not work, but it should (broute+forward)" 1>&2 82 # ping net${ns1}, expected to work (frames are bridged) 83 if ! ip netns exec "$ns1" ping -q -c 1 10.0.0.12 > /dev/null; then 84 echo "ERROR: ping did not work, but it should (bridged)" 1>&2 90 # ping net${ns1}, expected to not work (DROP in bridge forward) 91 if ip netns exec "$ns1" ping [all...] |
| H A D | br_netfilter_queue.sh | 56 ip netns exec "$sender" ping -I sender -c1 192.168.1.1 || exit 1 57 ip netns exec "$sender" ping -I sender -c1 192.168.1.2 || exit 2 58 ip netns exec "$sender" ping -I sender -c1 192.168.1.3 || exit 3 74 ip netns exec "$sender" ping -I sender -f -c 50 -b 192.168.1.255
|
| H A D | nft_tproxy_tcp.sh | 92 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then 96 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::99 > /dev/null; then 100 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.3.99 > /dev/null; then 104 if ! ip netns exec "$ns1" ping -c 1 -q dead:3::99 > /dev/null; then 112 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then 116 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::1 > /dev/null; then
|
| H A D | nft_tproxy_udp.sh | 92 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then 96 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::99 > /dev/null; then 100 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.3.99 > /dev/null; then 104 if ! ip netns exec "$ns1" ping -c 1 -q dead:3::99 > /dev/null; then 112 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then 116 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::1 > /dev/null; then
|
| H A D | nft_nat.sh | 171 # ping netns1, expect rewrite to netns2 172 if ! ip netns exec "$ns0" ping -q -c 1 dead:1::99 > /dev/null;then 212 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2" 246 # ping netns1, expect rewrite to netns2 247 if ! ip netns exec "$ns0" ping -q -c 1 10.0.1.99 > /dev/null;then 249 echo "ERROR: ping failed" 287 test $lret -eq 0 && echo "PASS: ping to $ns1 was $family NATted to $ns2" 292 if ! ip netns exec "$ns0" ping -q -c 1 10.0.1.99 > /dev/null;then 294 echo "ERROR: ping failed" 331 test $lret -eq 0 && echo "PASS: ping t [all...] |
| H A D | conntrack_icmp_related.sh | 192 if ! ip netns exec "$nsclient1" ping -c 1 -s 1000 -q -M "do" 192.168.2.2 >/dev/null; then 196 if ! ip netns exec "$nsclient1" ping -c 1 -s 1000 -q dead:2::2 >/dev/null; then 217 if ip netns exec "$nsclient1" ping -W 0.5 -q -c 1 -s 1300 -M "do" 192.168.2.2 > /dev/null; then 259 ip netns exec "$nsclient1" ping -W 1 -q -i 0.5 -c 2 192.168.1.42 > /dev/null 266 ip netns exec "$nsclient1" ping -W 1 -c 1 dead:1::42 > /dev/null
|
| H A D | nft_queue.sh | 153 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then 157 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::99 > /dev/null; then 165 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then 169 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::1 > /dev/null; then 188 ip netns exec "$ns1" ping -W 2 -c 1 -q 10.0.2.99 > /dev/null 191 ip netns exec "$ns1" ping -W 2 -c 1 -q dead:2::99 > /dev/null 386 ip netns exec "$ns1" ip vrf exec tvrf ping -c 1 10.0.2.99 > /dev/null 606 ip netns exec "$ns1" ping -w 2 -f -c 10 127.0.0.1 -q >/dev/null 649 # we ping ${ns2} from ${ns1} via ${nsrouter} using ipv4 and ipv6, so:
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | test_tunnel.sh | |
| H A D | test_xdp_vlan.sh | |
| /linux/tools/testing/selftests/drivers/net/ |
| H A D | README.rst | 105 [/root] # ./ksft-net-drv/run_kselftest.sh -t drivers/net:ping.py 109 # selftests: drivers/net: ping.py 112 # ok 1 ping.test_v4 113 # ok 2 ping.test_v6 114 # ok 3 ping.test_tcp 116 ok 1 selftests: drivers/net: ping.py 130 [/root] # ./ksft-net-drv/drivers/net/ping.py 133 ok 1 ping.test_v4 134 ok 2 ping.test_v6 # SKIP Test requires IPv6 connectivity 135 ok 3 ping.test_tcp
|
| /linux/tools/testing/selftests/net/ |
| H A D | unicast_extensions.sh | 65 ip netns exec $foo_ns timeout 2 ping -c 1 $2 || return 1 66 ip netns exec $bar_ns timeout 2 ping -c 1 $1 || return 1 101 ip netns exec $foo_ns timeout 2 ping -c 1 $2 || return 1 102 ip netns exec $foo_ns timeout 2 ping -c 1 $4 || return 1 103 ip netns exec $bar_ns timeout 2 ping -c 1 $3 || return 1 104 ip netns exec $bar_ns timeout 2 ping -c 1 $1 || return 1
|
| H A D | pmtu.sh | 143 # created by exceeding link layer MTU with ping to other endpoint. Then 214 which ping6 > /dev/null 2>&1 && ping6=$(which ping6) || ping6=$(which ping) 1169 ping=ping 1173 ping=${ping6} 1190 run_cmd ${ns_a} ${ping} -q -M want -i 0.1 -w 1 -s 1800 ${dst1} 1191 run_cmd ${ns_a} ${ping} -q -M want -i 0.1 -w 1 -s 1800 ${dst2} 1223 run_cmd ${ns_a} ${ping} -q -M want -i 0.1 -w 1 -s 1400 ${dst2} 1240 run_cmd ${ns_a} ${ping} -q -M want -i 0.1 -w 1 -s 1400 ${dst2} 1280 run_cmd "${ns_a}" ping [all...] |
| H A D | vrf_route_leaking.sh | 378 ip netns exec $h1 ping -c1 -w1 ${H2_N2_IP} >/dev/null 2>&1 464 run_cmd_grep "Time to live exceeded" ip netns exec $h1 ping -t1 -c1 -W2 ${H2_N2_IP} 485 run_cmd_grep "Frag needed" ip netns exec $h1 ping -s 1450 -Mdo -c1 -W2 ${H2_N2_IP} 544 run_cmd ip netns exec $r1 ip vrf exec blue ping -c1 -w1 ${H2_N2_IP} 636 command -v ping6 > /dev/null 2>&1 && ping6=$(command -v ping6) || ping6=$(command -v ping) 676 ipv4_ping_ttl|ping) ipv4_ping_ttl;;& 677 ipv4_ping_ttl_asym|ping) ipv4_ping_ttl_asym;;& 680 ipv4_ping_frag|ping) ipv4_ping_frag;;& 681 ipv4_ping_local|ping) ipv4_ping_local;;& 685 ipv6_ping_ttl|ping) ipv6_ping_ttl;;& [all …]
|
| H A D | fcnal-test.sh | 86 which ping6 > /dev/null 2>&1 && ping6=$(which ping6) || ping6=$(which ping) 191 killall nettest ping ping6 >/dev/null 2>&1 192 slowwait 2 sh -c 'test -z "$(pgrep '"'^(nettest|ping|ping6)$'"')"' 594 run_cmd ping -c1 -w1 ${a} 595 log_test_addr ${a} $? 0 "ping out" 598 run_cmd ping -c1 -w1 -I ${NSA_DEV} ${a} 599 log_test_addr ${a} $? 0 "ping out, device bind" 602 run_cmd ping -c1 -w1 -I ${NSA_LO_IP} ${a} 603 log_test_addr ${a} $? 0 "ping out, address bind" 611 run_cmd ping [all...] |
| H A D | test_vxlan_under_vrf.sh | 93 ip netns exec $hv_1 ping -c 1 -W 1 172.16.0.2 &> /dev/null || (echo "[FAIL]"; false) 120 ip netns exec $vm_1 ping -c 1 -W 1 10.0.0.2 &> /dev/null || (echo "[FAIL]"; false) 132 ip netns exec $vm_1 ping -c 1 -W 1 10.0.0.2 &> /dev/null || (echo "[FAIL]"; false)
|
| /linux/Documentation/translations/zh_CN/core-api/irq/ |
| H A D | irq-affinity.rst | 39 [root@moon 44]# ping -f h 42 --- hell ping statistics --- 57 [root@moon 44]# ping -f h 60 --- hell ping statistics ---
|
| /linux/drivers/watchdog/ |
| H A D | max63xx_wdt.c | 54 void (*ping)(struct max63xx_wdt *wdt); member 122 wdt->ping(wdt); in max63xx_wdt_ping() 134 wdt->ping(wdt); in max63xx_wdt_start() 150 .ping = max63xx_wdt_ping, 194 wdt->ping = max63xx_mmap_ping; in max63xx_mmap_init()
|
| /linux/tools/perf/tests/shell/ |
| H A D | daemon.sh | 146 state=`perf daemon ping --config ${config} --session ${session} | awk '{ print $1 }'` 270 state=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'` 295 state=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'` 300 state=`perf daemon ping --config ${config} --session size | awk '{ print $1 }'` 318 state=`perf daemon ping --config ${config} --session size | awk '{ print $1 }'` 324 state=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'` 475 size=`perf daemon ping --config ${config} --session size | awk '{ print $1 }'` 476 type=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'`
|
| H A D | record+probe_libc_inet_pton.sh | 63 perf record -e $event_name/$eventattr/ -o $perf_data ping -6 -c 1 ::1 > /dev/null 2>&1 69 perf script -i $perf_data | tac | grep -m1 ^ping -B9 | tac > $perf_script
|
| /linux/tools/testing/selftests/ftrace/test.d/trigger/inter-event/ |
| H A D | trigger-onchange-action-hist.tc | 16 ping $LOCALHOST -c 3 17 nice -n 1 ping $LOCALHOST -c 3
|
| H A D | trigger-snapshot-action-hist.tc | 18 ping $LOCALHOST -c 3 19 nice -n 1 ping $LOCALHOST -c 3
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-daemon.txt | 18 'perf daemon ping' [<options>] 90 The ping command sends control ping to configured sessions. 93 Send ping to specific session. 172 # perf daemon ping
|