From: Gert Doering Date: Wed, 11 Feb 2026 15:06:48 +0000 (+0100) Subject: rework all occurrences of 'M_ERR | M_ERRNO' X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=f349b0a61499d3d36e69e2aa4dbbb7692b7d1df8;p=thirdparty%2Fopenvpn.git rework all occurrences of 'M_ERR | M_ERRNO' M_ERR is defined as (M_FATAL | M_ERRNO), so 'msg(M_ERR | M_ERRNO, ...)' is just the same as 'msg(M_ERR, ...)'. The occurances in tun.c and dco_freebsd.c are really "if this happens, we can not go on" errors, so 'M_ERR' (= FATAL, plus log errno string) is the correct thing to do. The occurances in dns.c do come with error handling and cleanup after the msg() call, so the right thing is 'M_WARN | M_ERRNO' instead (warning, plus log errno string). Github: fixes OpenVPN/openvpn#939 Change-Id: I14395665f197349e374a81b56f28536ff88937a8 Signed-off-by: Gert Doering Acked-by: Arne Schwabe Gerrit URL: https://gerrit.openvpn.net/c/openvpn/+/1517 Message-Id: <20260211150648.113547-1-frank@lichtenheld.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg35594.html Signed-off-by: Gert Doering --- diff --git a/src/openvpn/dco_freebsd.c b/src/openvpn/dco_freebsd.c index d1ad09212..ee3a5d0c2 100644 --- a/src/openvpn/dco_freebsd.c +++ b/src/openvpn/dco_freebsd.c @@ -177,7 +177,7 @@ dco_new_peer(dco_context_t *dco, unsigned int peerid, int sd, struct sockaddr *l ret = ioctl(dco->fd, SIOCSDRVSPEC, &drv); if (ret) { - msg(M_ERR | M_ERRNO, "Failed to create new peer"); + msg(M_ERR, "Failed to create new peer"); } free(drv.ifd_data); @@ -317,7 +317,7 @@ remove_interface(struct tuntap *tt) ret = ioctl(tt->dco.fd, SIOCIFDESTROY, &ifr); if (ret) { - msg(M_ERR | M_ERRNO, "Failed to remove interface %s", ifr.ifr_name); + msg(M_ERR, "Failed to remove interface %s", ifr.ifr_name); } tt->dco.ifname[0] = 0; @@ -473,7 +473,7 @@ start_tun(dco_context_t *dco) ret = ioctl(dco->fd, SIOCSDRVSPEC, &drv); if (ret) { - msg(M_ERR | M_ERRNO, "Failed to start vpn"); + msg(M_ERR, "Failed to start vpn"); } return ret; @@ -511,7 +511,7 @@ dco_new_key(dco_context_t *dco, unsigned int peerid, int keyid, dco_key_slot_t s ret = ioctl(dco->fd, SIOCSDRVSPEC, &drv); if (ret) { - msg(M_ERR | M_ERRNO, "Failed to set key"); + msg(M_ERR, "Failed to set key"); } else { diff --git a/src/openvpn/dns.c b/src/openvpn/dns.c index c00d4b9cd..3d24050e3 100644 --- a/src/openvpn/dns.c +++ b/src/openvpn/dns.c @@ -611,13 +611,13 @@ run_updown_runner(bool up, struct options *o, const struct tuntap *tt, int ack_pipe_fd[2]; if (pipe(dns_pipe_fd) != 0 || pipe(ack_pipe_fd) != 0) { - msg(M_ERR | M_ERRNO, "run_dns_up_down: unable to create pipes"); + msg(M_WARN | M_ERRNO, "run_dns_up_down: unable to create pipes"); return false; } updown_runner->pid = fork(); if (updown_runner->pid == -1) { - msg(M_ERR | M_ERRNO, "run_dns_up_down: unable to fork"); + msg(M_WARN | M_ERRNO, "run_dns_up_down: unable to fork"); close(dns_pipe_fd[0]); close(dns_pipe_fd[1]); close(ack_pipe_fd[0]); @@ -747,7 +747,7 @@ run_up_down_command(bool up, struct options *o, const struct tuntap *tt, { continue; } - msg(M_ERR | M_ERRNO, "could not send dns vars filename"); + msg(M_WARN | M_ERRNO, "could not send dns vars filename"); } break; } @@ -762,7 +762,7 @@ run_up_down_command(bool up, struct options *o, const struct tuntap *tt, { continue; } - msg(M_ERR | M_ERRNO, "could not receive dns updown status"); + msg(M_WARN | M_ERRNO, "could not receive dns updown status"); } break; } diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c index e38df3ede..3f9ee5dcd 100644 --- a/src/openvpn/tun.c +++ b/src/openvpn/tun.c @@ -3011,7 +3011,7 @@ open_darwin_utun(const char *dev, const char *dev_type, const char *dev_node, st /* Retrieve the assigned interface name. */ if (getsockopt(fd, SYSPROTO_CONTROL, UTUN_OPT_IFNAME, utunname, &utunname_len)) { - msg(M_ERR | M_ERRNO, "Error retrieving utun interface name"); + msg(M_ERR, "Error retrieving utun interface name"); } tt->actual_name = string_alloc(utunname, NULL);