From nobody Mon Apr 11 18:36:41 2022 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 7051911D8120 for ; Mon, 11 Apr 2022 18:36:41 +0000 (UTC) (envelope-from pstef@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4KccyK2mKhz56Fv for ; Mon, 11 Apr 2022 18:36:41 +0000 (UTC) (envelope-from pstef@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1649702201; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type; bh=e+zOUYkOeN/1VouVnchjF6/Gqxmnk38+ovwdWo7RQ+k=; b=wRsMMw1loaVciJ1/AMFhj9LQwRtJjph4+cmOJuf2PqqUSKNQtN+FLkYh4kngKxHVqmCc8o RvtPIGfGAfHtuuWg7vk2Or0KAPatyoLjgNyDwsLp7sin99WU8kMAryahFagGhHEX/fI4o7 CIqERP9AIdnQTOj5mhLQ/PJ83Ev+rmXFtxL8cyxLSvGUfQMHghTQiEjDE/mcmpiSRGtIBA b1gZYOQJ2wqcedzk+QZc8SHQ17CnIDvbSw404l4A5dgfRsPpw0Pmlhnph7r/dsoFYo1VdE wYid4XKYM4WWZTDrB3IQYqblpYUjlAXofOkAnJ/CiFdGh+AxBXmNrOKOgaTUSQ== Received: by freefall.freebsd.org (Postfix, from userid 1403) id 3E7D11EC2F; Mon, 11 Apr 2022 18:36:41 +0000 (UTC) Date: Mon, 11 Apr 2022 18:36:41 +0000 From: "Piotr P. Stefaniak" To: FreeBSD Hackers Subject: ping: split the visual part of -f into a new option -. Message-ID: List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1649702201; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type; bh=e+zOUYkOeN/1VouVnchjF6/Gqxmnk38+ovwdWo7RQ+k=; b=E+XEW5WWlUkeRH3FnPsxH6q1G+dC9XdV3OrmdLtcT3QFAlxnuIJAZOx1izmcMlvLfZ5WYc Pjg2IptDNs0GA8NIWdGgfYyAiVtxQRktygh4+mmtMNiNttFtN6oJzwfQ4AIcwVe5opoDQS NQuVotjvAl6wr6wQ5l+Jo6fXnh89KSWMeeU0YMNBG3nCUgdvZsMo/hx2BE6tUydGdObBu5 O0NJNFjcfjYPBHrbKRk1HWZp5IgCdsbdExOEiQolj5KIRNjjkYMeUsjoWFll7tU16KB59o kocrFbfd/07D6S/PvMmfVAk2I+j7yue+9nGDXYd+pnP7zUdxbF3o0Mtms6/9ZA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1649702201; a=rsa-sha256; cv=none; b=QaGu/SEKexQQavBhXX9nZoGVUMZxJEWTMPw79VLNCXancw3b6kcLHcRID8nGaASYZw+PBz 8ewk9UwQ1DX4gbAO5HCqGzIaIv5jXdow/GiWI4lxxrbihAWwIYgn8pBxN50cj/15jNFTyZ SaIof6i2e4Bm6EgtSTW4vOfRh/pe/l3u++5ZlxGx+1HQzNwQ3DN03YMcnpDteVivq3oANL zBdwonCouUiwy1rOQvnnn/J6kECG+Gtux3sH1MuFkvsr6h4vx/Ja/fTYc94a18bGRXr0Vs KSIRyKsvbN+mPrD3E3zVjV57jc6M1uXSYyZW1cRBCX4IpHaGOStEq0DtTwqOrA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N Hackers, In https://reviews.freebsd.org/D34882 I propose to split ping's option -f into two options: one for flooding with ICMP (-f, no change in behavior) and one for affecting the programs output (-., a new option). That way we would be able to ping a host and not spam the terminal, and no flooding would have to be involved. I've been doing this under Linux as ping -fi1 host. PS. In D32943, D32944, D32945 I implement the base64 command. Piotr