High performance ping tool [Fork of github.com/schweikert/fping]
You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
Dirk Meyer 31f76f6071 - fix regression introduced in fping 4.3
bind to source only when option was set.
this allows to work in jails and lxc with custom IPs.
this allows IPv4 only and IPv6 only hosts
4 years ago
ci move coverity scan to a script, so that it doesn't run for every job 4 years ago
contrib change license field in fping.spec to something that seems better matching, fixes #192 4 years ago
doc Add SIGQUIT summary support similar to ping 5 years ago
src - fix regression introduced in fping 4.3 4 years ago
.gitignore reformat 8 years ago
.travis.yml travis-ci: fix deploy stage 4 years ago
CHANGELOG.md small fixes to changelog 4 years ago
COPYING Clarify COPYING 11 years ago
INSTALL Improve README and INSTALL 13 years ago
Makefile.am avoid including ci/build in dist tarball 5 years ago
README.md update coverage badge link 4 years ago
autoclean.sh more tests 11 years ago
autogen.sh remove generated files 13 years ago
azure-pipelines.yml Add Azure Pipline jobs 5 years ago
configure.ac prepare 5.0 release 4 years ago

README.md

Build Status Coverage Status Coverity Scan Build Status

fping

fping is a program to send ICMP echo probes to network hosts, similar to ping, but much better performing when pinging multiple hosts. fping has a long long story: Roland Schemers did publish a first version of it in 1992 and it has established itself since then as a standard tool.

Current maintainer:
David Schweikert <david@schweikert.ch>

Website:
https://fping.org/

Mailing-list:
https://groups.google.com/group/fping-users

Installation

If you want to install fping from source, proceed as follows:

  1. Run ./autogen.sh (only if you got the source from Github).
  2. Run ./configure with the correct arguments. (see: ./configure --help)
  3. Run make; make install.
  4. Make fping either setuid, or, if under Linux: sudo setcap cap_net_raw+ep fping

If you can't run fping as root or can't use the cap_net_raw capability, you can also run fping in unprivileged mode. This works on MacOS and also on Linux, provided that your GID is included in the range defined in /proc/sys/net/ipv4/ping_group_range. This is particularly useful for running fping in rootless / unprivileged containers.

Usage

Have a look at the fping(8) manual page for usage help. (fping -h will also give a minimal help output.)

Credits