summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--contrib/traceroute/traceroute.83
-rw-r--r--share/man/man4/inet6.44
-rwxr-xr-xtests/sys/netinet/carp.sh2
-rwxr-xr-xtests/sys/netinet6/exthdr.sh2
-rwxr-xr-xtests/sys/netinet6/lpm6.sh8
-rwxr-xr-xtests/sys/netinet6/output6.sh10
-rw-r--r--tests/sys/netipsec/tunnel/utils.subr2
-rw-r--r--tests/sys/netpfil/common/pass_block.sh4
-rw-r--r--tests/sys/netpfil/pf/fragmentation.sh12
-rw-r--r--tests/sys/netpfil/pf/pass_block.sh20
-rw-r--r--tests/sys/netpfil/pf/table.sh2
-rw-r--r--usr.sbin/traceroute6/traceroute6.83
12 files changed, 35 insertions, 37 deletions
diff --git a/contrib/traceroute/traceroute.8 b/contrib/traceroute/traceroute.8
index 33b986938f74..a10848f564a8 100644
--- a/contrib/traceroute/traceroute.8
+++ b/contrib/traceroute/traceroute.8
@@ -16,7 +16,7 @@
.\" $Id: traceroute.8,v 1.19 2000/09/21 08:44:19 leres Exp $
.\" $FreeBSD$
.\"
-.Dd June 20, 2019
+.Dd November 25, 2020
.Dt TRACEROUTE 8
.Os
.Sh NAME
@@ -377,7 +377,6 @@ during normal operations or from automated scripts.
.Sh SEE ALSO
.Xr netstat 1 ,
.Xr ping 8 ,
-.Xr ping6 8 ,
.Xr traceroute6 8 .
.Sh AUTHORS
Implemented by Van Jacobson from a suggestion by Steve Deering. Debugged
diff --git a/share/man/man4/inet6.4 b/share/man/man4/inet6.4
index 40b5a175e0a2..29e26bfd2646 100644
--- a/share/man/man4/inet6.4
+++ b/share/man/man4/inet6.4
@@ -29,7 +29,7 @@
.\"
.\" $FreeBSD$
.\"
-.Dd August 14, 2018
+.Dd November 25, 2020
.Dt INET6 4
.Os
.Sh NAME
@@ -130,7 +130,7 @@ or
are able to use this notation.
With special programs
like
-.Xr ping6 8 ,
+.Xr ping 8 ,
you can specify the outgoing interface by an extra command line option
to disambiguate scoped addresses.
.Pp
diff --git a/tests/sys/netinet/carp.sh b/tests/sys/netinet/carp.sh
index 4c7dbaa022a8..30ae79c93c8d 100755
--- a/tests/sys/netinet/carp.sh
+++ b/tests/sys/netinet/carp.sh
@@ -137,7 +137,7 @@ basic_v6_body()
carp_basic_v6_three ${epair_two}b
atf_check -s exit:0 -o ignore jexec carp_basic_v6_one \
- ping6 -c 3 2001:db8::0:1
+ ping -6 -c 3 2001:db8::0:1
}
basic_v6_cleanup()
diff --git a/tests/sys/netinet6/exthdr.sh b/tests/sys/netinet6/exthdr.sh
index 1a12bb2ccd89..3912f1dc5d5a 100755
--- a/tests/sys/netinet6/exthdr.sh
+++ b/tests/sys/netinet6/exthdr.sh
@@ -74,7 +74,7 @@ exthdr_body() {
pyname=$(atf_get ident)
pyname=${pyname%*_[0-9]}
- atf_check -o ignore -s exit:0 ping6 -c 3 -q -o ${ip6b}
+ atf_check -o ignore -s exit:0 ping -6 -c 3 -q -o ${ip6b}
atf_check -s exit:0 $(atf_get_srcdir)/${pyname}.py \
--sendif ${epair}a --recvif ${epair}a \
diff --git a/tests/sys/netinet6/lpm6.sh b/tests/sys/netinet6/lpm6.sh
index 937fd83d167b..caba10c11d2b 100755
--- a/tests/sys/netinet6/lpm6.sh
+++ b/tests/sys/netinet6/lpm6.sh
@@ -100,7 +100,7 @@ lpm6_test1_success_body()
valid_message="${count} packets transmitted, ${count} packets received"
# Check that ${net_dst}:2:0 goes via epair0
- atf_check -o match:"${valid_message}" jexec ${jname}a ping6 -f -nc${count} ${net_dst}:2:0
+ atf_check -o match:"${valid_message}" jexec ${jname}a ping -6 -f -nc${count} ${net_dst}:2:0
pkt_0=`jexec ${jname}a netstat -Wf link -I ${epair0}a | head | awk '$1!~/^Name/{print$8}'`
pkt_1=`jexec ${jname}a netstat -Wf link -I ${epair1}a | head | awk '$1!~/^Name/{print$8}'`
if [ ${pkt_0} -le ${count} ]; then
@@ -109,7 +109,7 @@ lpm6_test1_success_body()
fi
# Check that ${net_dst}:2:1 goes via epair1
- atf_check -o match:"${valid_message}" jexec ${jname}a ping6 -f -nc${count} ${net_dst}:2:1
+ atf_check -o match:"${valid_message}" jexec ${jname}a ping -6 -f -nc${count} ${net_dst}:2:1
pkt_0=`jexec ${jname}a netstat -Wf link -I ${epair0}a | head | awk '$1!~/^Name/{print$8}'`
pkt_1=`jexec ${jname}a netstat -Wf link -I ${epair1}a | head | awk '$1!~/^Name/{print$8}'`
if [ ${pkt_1} -le ${count} ]; then
@@ -163,7 +163,7 @@ lpm6_test2_success_body()
valid_message="${count} packets transmitted, ${count} packets received"
# Check that ${net_dst}:2:0 goes via epair1
- atf_check -o match:"${valid_message}" jexec ${jname}a ping6 -f -nc${count} ${net_dst}:2:0
+ atf_check -o match:"${valid_message}" jexec ${jname}a ping -6 -f -nc${count} ${net_dst}:2:0
pkt_0=`jexec ${jname}a netstat -Wf link -I ${epair0}a | head | awk '$1!~/^Name/{print$8}'`
pkt_1=`jexec ${jname}a netstat -Wf link -I ${epair1}a | head | awk '$1!~/^Name/{print$8}'`
if [ ${pkt_1} -le ${count} ]; then
@@ -172,7 +172,7 @@ lpm6_test2_success_body()
fi
# Check that ${net_dst}:2:2 goes via epair0
- atf_check -o match:"${valid_message}" jexec ${jname}a ping6 -f -nc${count} ${net_dst}:2:2
+ atf_check -o match:"${valid_message}" jexec ${jname}a ping -6 -f -nc${count} ${net_dst}:2:2
pkt_0=`jexec ${jname}a netstat -Wf link -I ${epair0}a | head | awk '$1!~/^Name/{print$8}'`
pkt_1=`jexec ${jname}a netstat -Wf link -I ${epair1}a | head | awk '$1!~/^Name/{print$8}'`
if [ ${pkt_0} -le ${count} ]; then
diff --git a/tests/sys/netinet6/output6.sh b/tests/sys/netinet6/output6.sh
index 21219389d7ab..0e1a68366a34 100755
--- a/tests/sys/netinet6/output6.sh
+++ b/tests/sys/netinet6/output6.sh
@@ -227,7 +227,7 @@ output6_raw_success_body()
sleep 0.1
done
- atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping6 -nc1 ${ip_dst}
+ atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping -6 -nc1 ${ip_dst}
}
output6_raw_success_cleanup()
@@ -340,7 +340,7 @@ output6_tcp_flowid_mpath_success_body()
jexec ${jname}b route add -6 -net ${net_src}::/${plen} ${ll}%${epair1}b
# Base setup verification
- atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping6 -c1 ${ip_dst}
+ atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping -6 -c1 ${ip_dst}
# run listener
num_ports=`echo ${ports} | wc -w`
@@ -482,7 +482,7 @@ output6_udp_flowid_mpath_success_body()
jexec ${jname}b route add -6 -net ${net_src}::/${plen} ${ll}%${epair1}b
# Base setup verification
- atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping6 -c1 ${ip_dst}
+ atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping -6 -c1 ${ip_dst}
# run listener
num_ports=`echo ${ports} | wc -w`
@@ -621,13 +621,13 @@ output6_raw_flowid_mpath_success_body()
jexec ${jname}b route add -6 -net ${net_src}::/${plen} ${ll}%${epair1}b
# Base setup verification
- atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping6 -nc1 ${ip_dst}
+ atf_check -o match:'1 packets transmitted, 1 packets received' jexec ${jname}a ping -6 -nc1 ${ip_dst}
# run sender
valid_message='1 packets transmitted, 1 packets received'
for _ip in ${ips}; do
ip="${net_dst}:${_ip}"
- atf_check -o match:"${valid_message}" jexec ${jname}a ping6 -nc1 ${ip}
+ atf_check -o match:"${valid_message}" jexec ${jname}a ping -6 -nc1 ${ip}
done
pkt_0=`jexec ${jname}a netstat -Wf link -I ${epair0}a | head | awk '$1!~/^Name/{print$8}'`
diff --git a/tests/sys/netipsec/tunnel/utils.subr b/tests/sys/netipsec/tunnel/utils.subr
index 9063a2d394e4..9f467990b9e1 100644
--- a/tests/sys/netipsec/tunnel/utils.subr
+++ b/tests/sys/netipsec/tunnel/utils.subr
@@ -124,7 +124,7 @@ ist_test()
if [ $1 -eq 4 ]; then
atf_check -s exit:0 -o ignore jexec hostA ping -c 1 203.0.113.1
else
- atf_check -s exit:0 -o ignore jexec hostA ping6 -c 1 2001:db8:45::1
+ atf_check -s exit:0 -o ignore jexec hostA ping -6 -c 1 2001:db8:45::1
fi
}
ist_cleanup()
diff --git a/tests/sys/netpfil/common/pass_block.sh b/tests/sys/netpfil/common/pass_block.sh
index bc2cdd1b6de4..adba350fc0d3 100644
--- a/tests/sys/netpfil/common/pass_block.sh
+++ b/tests/sys/netpfil/common/pass_block.sh
@@ -99,7 +99,7 @@ v6_body()
"ipf" \
"block in all"
- atf_check -s exit:2 -o ignore ping6 -c 1 -W 1 fd7a:803f:cc4b::2
+ atf_check -s exit:2 -o ignore ping -6 -c 1 -W 1 fd7a:803f:cc4b::2
# Pass All
firewall_config "iron" ${firewall} \
@@ -110,7 +110,7 @@ v6_body()
"ipf" \
"pass in all"
- atf_check -s exit:0 -o ignore ping6 -c 1 -W 1 fd7a:803f:cc4b::2
+ atf_check -s exit:0 -o ignore ping -6 -c 1 -W 1 fd7a:803f:cc4b::2
}
v6_cleanup()
diff --git a/tests/sys/netpfil/pf/fragmentation.sh b/tests/sys/netpfil/pf/fragmentation.sh
index b464ccc37418..e697281b0826 100644
--- a/tests/sys/netpfil/pf/fragmentation.sh
+++ b/tests/sys/netpfil/pf/fragmentation.sh
@@ -112,23 +112,23 @@ v6_body()
# Host test
atf_check -s exit:0 -o ignore \
- ping6 -c 1 2001:db8:42::2
+ ping -6 -c 1 2001:db8:42::2
atf_check -s exit:0 -o ignore \
- ping6 -c 1 -s 4500 2001:db8:42::2
+ ping -6 -c 1 -s 4500 2001:db8:42::2
atf_check -s exit:0 -o ignore\
- ping6 -c 1 -b 70000 -s 65000 2001:db8:42::2
+ ping -6 -c 1 -b 70000 -s 65000 2001:db8:42::2
# Forwarding test
atf_check -s exit:0 -o ignore \
- ping6 -c 1 2001:db8:43::3
+ ping -6 -c 1 2001:db8:43::3
atf_check -s exit:0 -o ignore \
- ping6 -c 1 -s 4500 2001:db8:43::3
+ ping -6 -c 1 -s 4500 2001:db8:43::3
atf_check -s exit:0 -o ignore\
- ping6 -c 1 -b 70000 -s 65000 2001:db8:43::3
+ ping -6 -c 1 -b 70000 -s 65000 2001:db8:43::3
$(atf_get_srcdir)/CVE-2019-5597.py \
${epair_send}a \
diff --git a/tests/sys/netpfil/pf/pass_block.sh b/tests/sys/netpfil/pf/pass_block.sh
index 3282b0f3dcea..139adb43bddd 100644
--- a/tests/sys/netpfil/pf/pass_block.sh
+++ b/tests/sys/netpfil/pf/pass_block.sh
@@ -85,23 +85,23 @@ v6_body()
jexec alcatraz ifconfig ${epair}b inet6 2001:db8:42::2/64 up no_dad
# Trivial ping to the jail, without pf
- atf_check -s exit:0 -o ignore ping6 -c 1 -W 1 2001:db8:42::2
+ atf_check -s exit:0 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2
# pf without policy will let us ping
jexec alcatraz pfctl -e
- atf_check -s exit:0 -o ignore ping6 -c 1 -W 1 2001:db8:42::2
+ atf_check -s exit:0 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2
# Block everything
pft_set_rules alcatraz "block in"
- atf_check -s exit:2 -o ignore ping6 -c 1 -W 1 2001:db8:42::2
+ atf_check -s exit:2 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2
# Block everything but ICMP
pft_set_rules alcatraz "block in" "pass in proto icmp6"
- atf_check -s exit:0 -o ignore ping6 -c 1 -W 1 2001:db8:42::2
+ atf_check -s exit:0 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2
# Allowing ICMPv4 does not allow ICMPv6
pft_set_rules alcatraz "block in" "pass in proto icmp"
- atf_check -s exit:2 -o ignore ping6 -c 1 -W 1 2001:db8:42::2
+ atf_check -s exit:2 -o ignore ping -6 -c 1 -W 1 2001:db8:42::2
}
v6_cleanup()
@@ -132,21 +132,21 @@ noalias_body()
| cut -d % -f 1)
# Sanity check
- atf_check -s exit:0 -o ignore ping6 -c 3 -W 1 2001:db8:42::2
- atf_check -s exit:0 -o ignore ping6 -c 3 -W 1 ${linklocaladdr}%${epair}a
+ atf_check -s exit:0 -o ignore ping -6 -c 3 -W 1 2001:db8:42::2
+ atf_check -s exit:0 -o ignore ping -6 -c 3 -W 1 ${linklocaladdr}%${epair}a
jexec alcatraz pfctl -e
pft_set_rules alcatraz "block out inet6 from (${epair}b:0) to any"
- atf_check -s exit:2 -o ignore ping6 -c 3 -W 1 2001:db8:42::2
+ atf_check -s exit:2 -o ignore ping -6 -c 3 -W 1 2001:db8:42::2
# We should still be able to ping the link-local address
- atf_check -s exit:0 -o ignore ping6 -c 3 -W 1 ${linklocaladdr}%${epair}a
+ atf_check -s exit:0 -o ignore ping -6 -c 3 -W 1 ${linklocaladdr}%${epair}a
pft_set_rules alcatraz "block out inet6 from (${epair}b) to any"
# We cannot ping to the link-local address
- atf_check -s exit:2 -o ignore ping6 -c 3 -W 1 ${linklocaladdr}%${epair}a
+ atf_check -s exit:2 -o ignore ping -6 -c 3 -W 1 ${linklocaladdr}%${epair}a
}
noalias_cleanup()
diff --git a/tests/sys/netpfil/pf/table.sh b/tests/sys/netpfil/pf/table.sh
index 5597b45e1e6a..af2691067f52 100644
--- a/tests/sys/netpfil/pf/table.sh
+++ b/tests/sys/netpfil/pf/table.sh
@@ -93,7 +93,7 @@ v6_counters_body()
"pass in from <foo6> to any" \
"pass out from any to <foo6>"
- atf_check -s exit:0 -o ignore ping6 -c 3 2001:db8:42::2
+ atf_check -s exit:0 -o ignore ping -6 -c 3 2001:db8:42::2
atf_check -s exit:0 -e ignore \
-o match:'In/Block:.*'"$TABLE_STATS_ZERO_REGEXP" \
diff --git a/usr.sbin/traceroute6/traceroute6.8 b/usr.sbin/traceroute6/traceroute6.8
index ce6cc78df657..afa201d19c24 100644
--- a/usr.sbin/traceroute6/traceroute6.8
+++ b/usr.sbin/traceroute6/traceroute6.8
@@ -29,7 +29,7 @@
.\"
.\" $FreeBSD$
.\"
-.Dd September 13, 2020
+.Dd November 25, 2020
.Dt TRACEROUTE6 8
.Os
.\"
@@ -202,7 +202,6 @@ utility will exit with 0 on success, and non-zero on errors.
.\"
.Sh SEE ALSO
.Xr ping 8 ,
-.Xr ping6 8 ,
.Xr traceroute 8
.\"
.Sh HISTORY