Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 4 Jan 2002 13:03:50 -0500 (EST)
From:      Adrian Filipi-Martin <adrian@ubergeeks.com>
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   misc/33544: removal of depricated sysctl flag use in /etc/rc* scripts
Message-ID:  <200201041803.g04I3oM01088@atf.intranet>

next in thread | raw e-mail | index | archive | help

>Number:         33544
>Category:       misc
>Synopsis:       removal of depricated sysctl flag use in /etc/rc* scripts
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jan 04 10:10:01 PST 2002
>Closed-Date:
>Last-Modified:
>Originator:     Adrian Filipi-Martin
>Release:        FreeBSD 4.4-RELEASE-p1 i386
>Organization:
Ubergeeks Consulting
>Environment:
System:
	FreeBSD atf.intranet 4.4-RELEASE-p1 FreeBSD 4.4-RELEASE-p1 #24: Fri Dec 7 09:06:10 EST 2001 root@atf.intranet:/home/obj/usr/src/sys/ATF i386


>Description:
	The -w flag to sysctl(8) is depricated, but still used in several rc
	scripts.
>How-To-Repeat:
	Read sysctl(8) and /etc/rc{,.network,.network6}.
>Fix:
	Apply this patch.

--- rc.orig	Fri Jan  4 12:55:47 2002
+++ rc	Fri Jan  4 12:55:56 2002
@@ -703,7 +703,7 @@
 [Yy][Ee][Ss])
 	if [ "${kern_securelevel}" -ge 0 ]; then
 		echo 'Raising kernel security level: '
-		sysctl -w kern.securelevel=${kern_securelevel}
+		sysctl kern.securelevel=${kern_securelevel}
 	fi
 	;;
 esac
--- rc.network.orig	Fri Jan  4 12:59:32 2002
+++ rc.network	Fri Jan  4 13:00:10 2002
@@ -309,7 +309,7 @@
 			case ${firewall_logging} in
 			[Yy][Ee][Ss] | '')
 				echo 'Firewall logging=YES'
-				sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
+				sysctl net.inet.ip.fw.verbose=1 >/dev/null
 				;;
 			*)
 				;;
@@ -352,77 +352,77 @@
 		;;
 	*)
 		echo -n ' tcp extensions=NO'
-		sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
+		sysctl net.inet.tcp.rfc1323=0 >/dev/null
 		;;
 	esac
 
 	case ${icmp_bmcastecho} in
 	[Yy][Ee][Ss])
 		echo -n ' broadcast ping responses=YES'
-		sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
+		sysctl net.inet.icmp.bmcastecho=1 >/dev/null
 		;;
 	esac
 
 	case ${icmp_drop_redirect} in
 	[Yy][Ee][Ss])
 		echo -n ' ignore ICMP redirect=YES'
-		sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
+		sysctl net.inet.icmp.drop_redirect=1 >/dev/null
 		;;
 	esac
 
 	case ${icmp_log_redirect} in
 	[Yy][Ee][Ss])
 		echo -n ' log ICMP redirect=YES'
-		sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
+		sysctl net.inet.icmp.log_redirect=1 >/dev/null
 		;;
 	esac
 
 	case ${gateway_enable} in
 	[Yy][Ee][Ss])
 		echo -n ' IP gateway=YES'
-		sysctl -w net.inet.ip.forwarding=1 >/dev/null
+		sysctl net.inet.ip.forwarding=1 >/dev/null
 		;;
 	esac
 
 	case ${forward_sourceroute} in
 	[Yy][Ee][Ss])
 		echo -n ' do source routing=YES'
-		sysctl -w net.inet.ip.sourceroute=1 >/dev/null
+		sysctl net.inet.ip.sourceroute=1 >/dev/null
 		;;
 	esac
 
 	case ${accept_sourceroute} in
 	[Yy][Ee][Ss])
 		echo -n ' accept source routing=YES'
-		sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
+		sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
 		;;
 	esac
 
 	case ${tcp_keepalive} in
 	[Yy][Ee][Ss])
 		echo -n ' TCP keepalive=YES'
-		sysctl -w net.inet.tcp.always_keepalive=1 >/dev/null
+		sysctl net.inet.tcp.always_keepalive=1 >/dev/null
 		;;
 	esac
 
 	case ${tcp_drop_synfin} in
 	[Yy][Ee][Ss])
 		echo -n ' drop SYN+FIN packets=YES'
-		sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
+		sysctl net.inet.tcp.drop_synfin=1 >/dev/null
 		;;
 	esac
 
 	case ${ipxgateway_enable} in
 	[Yy][Ee][Ss])
 		echo -n ' IPX gateway=YES'
-		sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
+		sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
 		;;
 	esac
 
 	case ${arpproxy_all} in
 	[Yy][Ee][Ss])
 		echo -n ' ARP proxyall=YES'
-		sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
+		sysctl net.link.ether.inet.proxyall=1 >/dev/null
 		;;
 	esac
 
@@ -431,7 +431,7 @@
 		;;
 	*)
 		echo -n " ip_portrange_first=$ip_portrange_first"
-		sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
+		sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
 		;;
 	esac
 
@@ -440,7 +440,7 @@
 		;;
 	*)
 		echo -n " ip_portrange_last=$ip_portrange_last"
-		sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
+		sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
 		;;
 	esac
 
@@ -602,14 +602,14 @@
 			case ${nfs_reserved_port_only} in
 			[Yy][Ee][Ss])
 				echo -n ' NFS on reserved port only=YES'
-				sysctl -w vfs.nfs.nfs_privport=1 >/dev/null
+				sysctl vfs.nfs.nfs_privport=1 >/dev/null
 				;;
 			esac
 
 			echo -n ' nfsd';	nfsd ${nfs_server_flags}
 
 			if [ -n "${nfs_bufpackets}" ]; then
-				sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} \
+				sysctl vfs.nfs.bufpackets=${nfs_bufpackets} \
 					> /dev/null
 			fi
 
@@ -650,7 +650,7 @@
 		echo -n ' nfsiod';	nfsiod ${nfs_client_flags}
 		if [ -n "${nfs_access_cache}" ]; then
 		echo -n " NFS access cache time=${nfs_access_cache}"
-		sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} \
+		sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} \
 			>/dev/null
 		fi
 		;;
@@ -764,8 +764,8 @@
 		;;
 	*)
 		echo -n ' log_in_vain=YES'
-		sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
-		sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
+		sysctl net.inet.tcp.log_in_vain=1 >/dev/null
+		sysctl net.inet.udp.log_in_vain=1 >/dev/null
 		;;
 	esac
 
--- rc.network6.orig	Fri Jan  4 12:59:37 2002
+++ rc.network6	Fri Jan  4 13:00:40 2002
@@ -78,7 +78,7 @@
 			case ${ipv6_firewall_logging} in
 			[Yy][Ee][Ss] | '')
 				echo 'IPv6 Firewall logging=YES'
-				sysctl -w net.inet6.ip6.fw.verbose=1 >/dev/null
+				sysctl net.inet6.ip6.fw.verbose=1 >/dev/null
 				;;
 			*)
 				;;
@@ -108,8 +108,8 @@
 	case ${ipv6_gateway_enable} in
 	[Yy][Ee][Ss])
 		# act as a router
-		sysctl -w net.inet6.ip6.forwarding=1
-		sysctl -w net.inet6.ip6.accept_rtadv=0
+		sysctl net.inet6.ip6.forwarding=1
+		sysctl net.inet6.ip6.accept_rtadv=0
 
 		# wait for DAD
 		for i in $ipv6_network_interfaces; do
@@ -120,8 +120,8 @@
 		;;
 	*)
 		# act as endhost - start with manual configuration
-		sysctl -w net.inet6.ip6.forwarding=0
-		sysctl -w net.inet6.ip6.accept_rtadv=0
+		sysctl net.inet6.ip6.forwarding=0
+		sysctl net.inet6.ip6.accept_rtadv=0
 		;;
 	esac
 
@@ -235,11 +235,11 @@
 	case ${ipv6_ipv4mapping} in
 	[Yy][Ee][Ss])
 		echo -n ' IPv4 mapped IPv6 address support=YES'
-		sysctl -w net.inet6.ip6.v6only=0 >/dev/null
+		sysctl net.inet6.ip6.v6only=0 >/dev/null
 		;;
 	'' | *)
 		echo -n ' IPv4 mapped IPv6 address support=NO'
-		sysctl -w net.inet6.ip6.v6only=1 >/dev/null
+		sysctl net.inet6.ip6.v6only=1 >/dev/null
 		;;
 	esac
 
@@ -318,7 +318,7 @@
 		# You can configure only single interface, as
 		# specification assumes that autoconfigured host has
 		# single interface only.
-		sysctl -w net.inet6.ip6.accept_rtadv=1
+		sysctl net.inet6.ip6.accept_rtadv=1
 		set ${rtsol_interfaces}
 		ifconfig $1 up
 		rtsol $1
@@ -397,7 +397,7 @@
 	[Nn][Oo] | '')
 		;;
 	*)
-		sysctl -w net.inet6.ip6.keepfaith=1
+		sysctl net.inet6.ip6.keepfaith=1
 		ifconfig faith0 up
 		for prefix in ${ipv6_faith_prefix}; do
 			prefixlen=`expr "${prefix}" : ".*/\(.*\)"`
>Release-Note:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201041803.g04I3oM01088>