403Webshell
Server IP : 13.213.54.232  /  Your IP : 216.73.217.11
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux ip-172-31-17-110 6.8.0-1029-aws #31~22.04.1-Ubuntu SMP Thu Apr 24 21:16:18 UTC 2025 x86_64
User : www-data ( 33)
PHP Version : 7.1.33-67+ubuntu22.04.1+deb.sury.org+1
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/246939/root/lib/modules/6.8.0-1031-aws/build/tools/testing/selftests/net/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/246939/root/lib/modules/6.8.0-1031-aws/build/tools/testing/selftests/net/fin_ack_lat.sh
#!/bin/bash
# SPDX-License-Identifier: GPL-2.0
#
# Test latency spikes caused by FIN/ACK handling race.

set +x
set -e

tmpfile=$(mktemp /tmp/fin_ack_latency.XXXX.log)

cleanup() {
	kill $(pidof fin_ack_lat)
	rm -f $tmpfile
}

trap cleanup EXIT

do_test() {
	RUNTIME=$1

	./fin_ack_lat | tee $tmpfile &
	PID=$!

	sleep $RUNTIME
	NR_SPIKES=$(wc -l $tmpfile | awk '{print $1}')
	if [ $NR_SPIKES -gt 0 ]
	then
		echo "FAIL: $NR_SPIKES spikes detected"
		return 1
	fi
	return 0
}

do_test "30"
echo "test done"

Youez - 2016 - github.com/yon3zu
LinuXploit