290d944b56
In the function print_per_system_stats(), if packets have been lost, the number of sent packets is checked to be positive before dividing by it. If no packets have been lost, this is not checked. Either the existing check is not needed, or both code paths need the check. The function print_per_system_splits() is quite similar to print_per_system_stats(), and has the equivalent guards against a division by zero in both code paths, not just one of them. In the spirit of defensive coding, I think it is better to be safe and add the missing guard against a division by zero. |
9 months ago | |
---|---|---|
.github/workflows | 1 year ago | |
ci | 10 months ago | |
contrib | 10 months ago | |
doc | 9 months ago | |
src | 9 months ago | |
.dockerignore | 1 year ago | |
.gitignore | 8 years ago | |
.travis.yml | 4 years ago | |
CHANGELOG.md | 3 years ago | |
COPYING | 11 years ago | |
INSTALL | 13 years ago | |
Makefile.am | 4 years ago | |
README.md | 10 months ago | |
autoclean.sh | 3 years ago | |
autogen.sh | 13 years ago | |
azure-pipelines.yml | 4 years ago | |
configure.ac | 1 year ago |
README.md
fping
fping is a program to send ICMP echo probes to network hosts, similar to ping, but much better performing when pinging multiple hosts. fping has a long long story: Roland Schemers did publish a first version of it in 1992 and it has established itself since then as a standard tool.
Current maintainer:
David Schweikert <david@schweikert.ch>
Website:
https://fping.org/
Mailing-list:
https://groups.google.com/group/fping-users
Installation
If you want to install fping from source, proceed as follows:
- Run
./autogen.sh
(only if you got the source from Github). - Run
./configure
with the correct arguments. (see:./configure --help
) - Run
make; make install
. - Make fping either setuid, or, if under Linux:
sudo setcap cap_net_raw,cap_net_admin+ep fping
If you can't run fping as root or can't use the cap_net_raw capability, you can
also run fping in unprivileged mode. This works on MacOS and also on Linux,
provided that your GID is included in the range defined in
/proc/sys/net/ipv4/ping_group_range
. This is particularly useful for running
fping in rootless / unprivileged containers. The --fwmark option needs root or
cap_net_admin. setuid will not work for --fwmark.
Usage
Have a look at the fping(8) manual page for usage help.
(fping -h
will also give a minimal help output.)
Credits
- Original author: Roland Schemers (schemers@stanford.edu)
- Previous maintainer: RL "Bob" Morgan (morgan@stanford.edu)
- Initial IPv6 Support: Jeroen Massar (jeroen@unfix.org / jeroen@ipng.nl)
- Other contributors: see CHANGELOG.md