/linux-master/tools/testing/selftests/net/ |
H A D | route_localnet.sh | 44 ping -c5 -I veth0 127.25.3.14 61 ping -c5 -I veth0 127.25.3.14
|
H A D | vrf_route_leaking.sh | 24 # The first test sends a ping with a ttl of 1 from h1 to h2 and parses the 30 # The third test sends a ping with a packet size of 1450 from h1 to h2 and 378 ip netns exec $h1 ping -c1 -w1 ${H2_N2_IP} >/dev/null 2>&1 458 log_section "IPv4 ($ttype route): VRF ICMP ttl error route lookup ping" 464 run_cmd_grep "Time to live exceeded" ip netns exec $h1 ping -t1 -c1 -W2 ${H2_N2_IP} 479 log_section "IPv4 ($ttype route): VRF ICMP fragmentation error route lookup ping" 485 run_cmd_grep "Frag needed" ip netns exec $h1 ping -s 1450 -Mdo -c1 -W2 ${H2_N2_IP} 500 log_section "IPv6 ($ttype route): VRF ICMP ttl error route lookup ping" 521 log_section "IPv6 ($ttype route): VRF ICMP fragmentation error route lookup ping" 556 command -v ping6 > /dev/null 2>&1 && ping6=$(command -v ping6) || ping6=$(command -v ping) [all...] |
H A D | fib_nexthop_nongw.sh | 112 run_cmd ip netns exec $h1 ping -c1 192.168.1.1 113 log_test $? 0 "nexthop: ping through nexthop without gw"
|
H A D | icmp.sh | 16 # And then tries to ping 172.16.1.1 from ns1. This results in a "net 56 # Run the test - a ping runs in the background, and we capture ICMP responses 57 # with tcpdump; -c 1 means it should exit on the first ping, but add a timeout 59 ip netns exec $NS1 ping -w 3 -i 0.5 $PINGADDR >/dev/null &
|
H A D | fib_nexthop_multiprefix.sh | 19 which ping6 > /dev/null 2>&1 && ping6=$(which ping6) || ping6=$(which ping) 174 run_cmd ip netns exec ${h0} ping -s ${ping_sz} -c5 -w5 ${dst} 243 run_cmd taskset -c ${c} ip netns exec ${h0} ping -c1 -w1 172.16.10${i}.1 244 [ $? -ne 0 ] && printf "\nERROR: ping to ${h[$i]} failed\n" && ret=1
|
H A D | l2tp.sh | 20 which ping6 > /dev/null 2>&1 && ping6=$(which ping6) || ping6=$(which ping) 319 run_cmd $host_1 ping -c1 -w1 172.16.1.2 322 run_cmd $host_1 ping -c1 -w1 -I 172.16.101.1 172.16.101.2 341 run_cmd $host_1 ping -c1 -w1 172.16.1.2 344 run_cmd $host_1 ping -c1 -w1 -I 172.16.101.1 172.16.101.2
|
H A D | ip6_gre_headroom.sh | 54 ping -I h1 192.0.2.2 -c 1 -w 2 &> /dev/null
|
/linux-master/tools/perf/tests/shell/ |
H A D | daemon.sh | 142 # wait for the session to ping 146 state=`perf daemon ping --config ${config} --session ${session} | awk '{ print $1 }'` 150 echo "FAILED: Timeout waiting for daemon to ping" 270 state=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'` 295 state=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'` 300 state=`perf daemon ping --config ${config} --session size | awk '{ print $1 }'` 318 state=`perf daemon ping --config ${config} --session size | awk '{ print $1 }'` 324 state=`perf daemon ping --config ${config} --session time | awk '{ print $1 }'` 451 echo "test daemon ping" 475 size=`perf daemon ping [all...] |
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_xdp_vlan.sh | 196 ip netns exec ${NS2} sh -c 'ping -W 1 -c 1 100.64.41.1 || echo "Success: First ping must fail"' 217 # Now the namespaces can reach each-other, test with ping: 218 ip netns exec ${NS2} ping -i 0.2 -W 2 -c 2 $IPADDR1 219 ip netns exec ${NS1} ping -i 0.2 -W 2 -c 2 $IPADDR2 231 # Now the namespaces should still be able reach each-other, test with ping: 232 ip netns exec ${NS2} ping -i 0.2 -W 2 -c 2 $IPADDR1 233 ip netns exec ${NS1} ping -i 0.2 -W 2 -c 2 $IPADDR2
|
H A D | test_tcp_check_syncookie.sh | 15 if ns1_exec ping -c 1 -W 1 "$1" >/dev/null 2>&1; then
|
/linux-master/samples/bpf/ |
H A D | tc_l2_redirect.sh | 111 $IP netns exec ns1 ping -c1 10.10.1.102 >& /dev/null 116 ping -c1 10.10.1.102 >& /dev/null 148 $IP netns exec ns1 ping -c1 10.10.1.102 >& /dev/null 149 $IP netns exec ns1 ping -6 -c1 2401:face::66 >& /dev/null 154 ping -c1 10.10.1.102 >& /dev/null 155 ping -6 -c1 2401:face::66 >& /dev/null
|
H A D | do_hbm_test.sh | 255 ( ping6 -i 0.2 -c $m $hn > ping.out 2>&1 ) & 337 delay=`grep "avg" ping.out | grep -o "= [0-9.]*/[0-9.]*" | grep -o "[0-9.]*$"` 358 delay=`grep "avg" ping.out | grep -o "= [0-9.]*/[0-9.]*" | grep -o "[0-9.]*$"` 396 delay=`grep "avg" ping.out | grep -o "= [0-9.]*/[0-9.]*" | grep -o "[0-9.]*$"`
|
/linux-master/tools/testing/selftests/net/netfilter/ |
H A D | nft_nat.sh | 171 # ping netns1, expect rewrite to netns2 172 if ! ip netns exec "$ns0" ping -q -c 1 dead:1::99 > /dev/null;then 212 test $lret -eq 0 && echo "PASS: ipv6 ping to $ns1 was $family NATted to $ns2" 246 # ping netns1, expect rewrite to netns2 247 if ! ip netns exec "$ns0" ping -q -c 1 10.0.1.99 > /dev/null;then 249 echo "ERROR: ping failed" 287 test $lret -eq 0 && echo "PASS: ping to $ns1 was $family NATted to $ns2" 292 if ! ip netns exec "$ns0" ping -q -c 1 10.0.1.99 > /dev/null;then 294 echo "ERROR: ping failed" 331 test $lret -eq 0 && echo "PASS: ping t [all...] |
H A D | nft_meta.sh | 116 ip netns exec "$ns0" ping -q -c 1 127.0.0.1 -m 42 > /dev/null 135 ip netns exec "$ns0" ping -q -c 1 127.0.0.1 > /dev/null
|
H A D | nft_synproxy.sh | 47 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then 52 if ! ip netns exec "$ns2" ping -c 1 -q 10.0.1.99 > /dev/null; then
|
H A D | nft_fib.sh | 139 if ! ip netns exec "$ns1" ping -c 1 -q "$daddr4" > /dev/null; then 145 if ! ip netns exec "$ns1" ping -c 1 -q "$daddr6" > /dev/null; then 189 # must not check return value, ping to 1.1.1.1 will 194 ip netns exec "$ns1" ping -W 0.5 -c 1 -q 1.1.1.1 > /dev/null 197 ip netns exec "$ns1" ping -W 0.5 -i 0.1 -c 3 -q 1c3::c01d > /dev/null
|
H A D | conntrack_icmp_related.sh | 10 # ping nsclient2 from nsclient1, checking that conntrack did set RELATED 192 if ! ip netns exec "$nsclient1" ping -c 1 -s 1000 -q -M "do" 192.168.2.2 >/dev/null; then 196 if ! ip netns exec "$nsclient1" ping -c 1 -s 1000 -q dead:2::2 >/dev/null; then 217 if ip netns exec "$nsclient1" ping -W 0.5 -q -c 1 -s 1300 -M "do" 192.168.2.2 > /dev/null; then 218 echo "ERROR: ping should have failed with PMTU too big error" 1>&2 259 ip netns exec "$nsclient1" ping -W 1 -q -i 0.5 -c 2 192.168.1.42 > /dev/null 266 ip netns exec "$nsclient1" ping -W 1 -c 1 dead:1::42 > /dev/null
|
H A D | nft_queue.sh | 135 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.99 > /dev/null; then 139 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::99 > /dev/null; then 147 if ! ip netns exec "$ns1" ping -c 1 -q 10.0.2.1 > /dev/null; then 151 if ! ip netns exec "$ns1" ping -c 1 -q dead:2::1 > /dev/null; then 170 ip netns exec "$ns1" ping -W 2 -c 1 -q 10.0.2.99 > /dev/null 173 ip netns exec "$ns1" ping -W 2 -c 1 -q dead:2::99 > /dev/null 361 ip netns exec "$ns1" ip vrf exec tvrf ping -c 1 10.0.2.99 > /dev/null 401 # we ping ${ns2} from ${ns1} via ${nsrouter} using ipv4 and ipv6, so:
|
/linux-master/drivers/watchdog/ |
H A D | arm_smc_wdt.c | 99 .ping = smcwd_ping, 106 .ping = smcwd_ping,
|
H A D | sp805_wdt.c | 153 static int wdt_config(struct watchdog_device *wdd, bool ping) argument 158 if (!ping) { 173 if (!ping) 226 .ping = wdt_ping,
|
H A D | da9055_wdt.c | 116 .ping = da9055_wdt_ping,
|
H A D | stpmic1_wdt.c | 78 .ping = pmic_wdt_ping,
|
H A D | sun4v_wdt.c | 80 .ping = sun4v_wdt_ping,
|
/linux-master/tools/testing/selftests/powerpc/tm/ |
H A D | tm-trap.c | 181 /* Got a USR1 signal from ping(), so just tell pong() to exit */ 185 void *ping(void *not_used) function 238 * Induce context switches on ping() thread 239 * until ping() finishes its job and signs 283 * Bind thread ping() and pong() both to CPU 0 so they ping-pong and 284 * speed up context switches on ping() thread, speeding up the load_fp 302 /* Launch ping() */ 303 rc = pthread_create(&t0_ping, &attr, ping, NULL);
|
/linux-master/include/linux/ |
H A D | watchdog.h | 30 * @ping: The routine that sends a keepalive ping to the watchdog device. 49 int (*ping)(struct watchdog_device *); member in struct:watchdog_ops 161 /* Use the following function to stop the wdog ping worker when suspending */
|