Searched refs:PING (Results 1 – 23 of 23) sorted by relevance
7 type ping${1} >/dev/null 2>&1 && PING="ping${1}" || PING="ping -${1}"8 $PING -q -c 1 -W 1 ${2%%/*} >/dev/null 2>&1
40 PING hell (195.4.7.3): 56 data bytes58 PING hell (195.4.7.3): 56 data bytes
189 PING=ping198 ping -w 1 -c 1 ::1 > /dev/null 2>&1 || PING="ping6"244 ip netns exec $NS_SRC $PING -q -c 1 $OL_NET$DST_NAT >/dev/null
292 local PING="$1"; readonly PING300 ip netns exec "${NS0}" "${PING}" -w 5 -c 1 "${IP}" > /dev/null 2>&1
32 PING hell (195.4.7.3): 56 data bytes51 PING hell (195.4.7.3): 56 data bytes
26 PING=ping
11 PING=${PING:=ping}1188 $PING $args $dip -c $PING_COUNT -i 0.1 \
176 $PING -I $oif $dip -c 10 -i 0.1 -w $PING_TIMEOUT -b 2>&1 \
42 PING = 0xF5, enumerator
111 crq->status = PING; in connection_broken()2550 if (crq->status == PING) in ibmvscsis_parse_command()
155 ${PING} -Q $dscp_10 ${sip:+-I $sip} $dip \
192 ${PING} -Q $dscp ${sip:+-I $sip} $dip \
72 config PING config81 - Parallax PING))) (ultrasonic)
41 #define PING 0x00 macro
88 PING COMMAND
918 SAP_MSG_HANDLER(PING, iwl_mei_handle_ping, 0); in iwl_mei_handle_sap_msg()
1043 ACKs are received from the peer (notably including PING RESPONSE ACKs1044 which we can elicit by sending PING ACKs to see if the call still exists
1039 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
2653 PING 10.0.4.2 (10.0.4.2) from 10.0.3.10 : 56(84) bytes of data.
15575 PARALLAX PING IIO SENSOR DRIVER