1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 #include "alloc-util.h"
6 #include "conf-parser.h"
7 #include "firewall-util.h"
8 #include "memory-util.h"
9 #include "missing_network.h"
10 #include "netlink-util.h"
11 #include "networkd-address.h"
12 #include "networkd-manager.h"
13 #include "parse-util.h"
15 #include "socket-util.h"
16 #include "string-util.h"
20 #define ADDRESSES_PER_LINK_MAX 2048U
21 #define STATIC_ADDRESSES_PER_NETWORK_MAX 1024U
23 int address_new(Address
**ret
) {
24 _cleanup_(address_freep
) Address
*address
= NULL
;
26 address
= new(Address
, 1);
30 *address
= (Address
) {
32 .scope
= RT_SCOPE_UNIVERSE
,
33 .cinfo
.ifa_prefered
= CACHE_INFO_INFINITY_LIFE_TIME
,
34 .cinfo
.ifa_valid
= CACHE_INFO_INFINITY_LIFE_TIME
,
37 *ret
= TAKE_PTR(address
);
42 static int address_new_static(Network
*network
, const char *filename
, unsigned section_line
, Address
**ret
) {
43 _cleanup_(network_config_section_freep
) NetworkConfigSection
*n
= NULL
;
44 _cleanup_(address_freep
) Address
*address
= NULL
;
49 assert(!!filename
== (section_line
> 0));
52 r
= network_config_section_new(filename
, section_line
, &n
);
56 address
= hashmap_get(network
->addresses_by_section
, n
);
58 *ret
= TAKE_PTR(address
);
64 if (network
->n_static_addresses
>= STATIC_ADDRESSES_PER_NETWORK_MAX
)
67 r
= address_new(&address
);
71 address
->network
= network
;
72 LIST_APPEND(addresses
, network
->static_addresses
, address
);
73 network
->n_static_addresses
++;
76 address
->section
= TAKE_PTR(n
);
78 r
= hashmap_ensure_allocated(&network
->addresses_by_section
, &network_config_hash_ops
);
82 r
= hashmap_put(network
->addresses_by_section
, address
->section
, address
);
87 *ret
= TAKE_PTR(address
);
92 void address_free(Address
*address
) {
96 if (address
->network
) {
97 LIST_REMOVE(addresses
, address
->network
->static_addresses
, address
);
98 assert(address
->network
->n_static_addresses
> 0);
99 address
->network
->n_static_addresses
--;
101 if (address
->section
)
102 hashmap_remove(address
->network
->addresses_by_section
, address
->section
);
106 set_remove(address
->link
->addresses
, address
);
107 set_remove(address
->link
->addresses_foreign
, address
);
109 if (in_addr_equal(AF_INET6
, &address
->in_addr
, (const union in_addr_union
*) &address
->link
->ipv6ll_address
))
110 memzero(&address
->link
->ipv6ll_address
, sizeof(struct in6_addr
));
113 network_config_section_free(address
->section
);
114 free(address
->label
);
118 static void address_hash_func(const Address
*a
, struct siphash
*state
) {
121 siphash24_compress(&a
->family
, sizeof(a
->family
), state
);
125 siphash24_compress(&a
->prefixlen
, sizeof(a
->prefixlen
), state
);
128 if (a
->prefixlen
!= 0) {
131 if (a
->in_addr_peer
.in
.s_addr
!= 0)
132 prefix
= be32toh(a
->in_addr_peer
.in
.s_addr
) >> (32 - a
->prefixlen
);
134 prefix
= be32toh(a
->in_addr
.in
.s_addr
) >> (32 - a
->prefixlen
);
136 siphash24_compress(&prefix
, sizeof(prefix
), state
);
142 siphash24_compress(&a
->in_addr
, FAMILY_ADDRESS_SIZE(a
->family
), state
);
146 /* treat any other address family as AF_UNSPEC */
151 static int address_compare_func(const Address
*a1
, const Address
*a2
) {
154 r
= CMP(a1
->family
, a2
->family
);
158 switch (a1
->family
) {
159 /* use the same notion of equality as the kernel does */
161 r
= CMP(a1
->prefixlen
, a2
->prefixlen
);
165 /* compare the peer prefixes */
166 if (a1
->prefixlen
!= 0) {
167 /* make sure we don't try to shift by 32.
168 * See ISO/IEC 9899:TC3 ยง 6.5.7.3. */
171 if (a1
->in_addr_peer
.in
.s_addr
!= 0)
172 b1
= be32toh(a1
->in_addr_peer
.in
.s_addr
) >> (32 - a1
->prefixlen
);
174 b1
= be32toh(a1
->in_addr
.in
.s_addr
) >> (32 - a1
->prefixlen
);
176 if (a2
->in_addr_peer
.in
.s_addr
!= 0)
177 b2
= be32toh(a2
->in_addr_peer
.in
.s_addr
) >> (32 - a1
->prefixlen
);
179 b2
= be32toh(a2
->in_addr
.in
.s_addr
) >> (32 - a1
->prefixlen
);
188 return memcmp(&a1
->in_addr
, &a2
->in_addr
, FAMILY_ADDRESS_SIZE(a1
->family
));
190 /* treat any other address family as AF_UNSPEC */
195 DEFINE_PRIVATE_HASH_OPS(address_hash_ops
, Address
, address_hash_func
, address_compare_func
);
197 bool address_equal(Address
*a1
, Address
*a2
) {
204 return address_compare_func(a1
, a2
) == 0;
207 static int address_establish(Address
*address
, Link
*link
) {
214 masq
= link
->network
&&
215 link
->network
->ip_masquerade
&&
216 address
->family
== AF_INET
&&
217 address
->scope
< RT_SCOPE_LINK
;
219 /* Add firewall entry if this is requested */
220 if (address
->ip_masquerade_done
!= masq
) {
221 union in_addr_union masked
= address
->in_addr
;
222 in_addr_mask(address
->family
, &masked
, address
->prefixlen
);
224 r
= fw_add_masquerade(masq
, AF_INET
, 0, &masked
, address
->prefixlen
, NULL
, NULL
, 0);
228 address
->ip_masquerade_done
= masq
;
234 static int address_add_internal(Link
*link
, Set
**addresses
,
236 const union in_addr_union
*in_addr
,
237 unsigned char prefixlen
,
239 _cleanup_(address_freep
) Address
*address
= NULL
;
246 r
= address_new(&address
);
250 address
->family
= family
;
251 address
->in_addr
= *in_addr
;
252 address
->prefixlen
= prefixlen
;
253 /* Consider address tentative until we get the real flags from the kernel */
254 address
->flags
= IFA_F_TENTATIVE
;
256 r
= set_ensure_allocated(addresses
, &address_hash_ops
);
260 r
= set_put(*addresses
, address
);
264 address
->link
= link
;
274 int address_add_foreign(Link
*link
, int family
, const union in_addr_union
*in_addr
, unsigned char prefixlen
, Address
**ret
) {
275 return address_add_internal(link
, &link
->addresses_foreign
, family
, in_addr
, prefixlen
, ret
);
278 int address_add(Link
*link
, int family
, const union in_addr_union
*in_addr
, unsigned char prefixlen
, Address
**ret
) {
282 r
= address_get(link
, family
, in_addr
, prefixlen
, &address
);
284 /* Address does not exist, create a new one */
285 r
= address_add_internal(link
, &link
->addresses
, family
, in_addr
, prefixlen
, &address
);
289 /* Take over a foreign address */
290 r
= set_ensure_allocated(&link
->addresses
, &address_hash_ops
);
294 r
= set_put(link
->addresses
, address
);
298 set_remove(link
->addresses_foreign
, address
);
300 /* Already exists, do nothing */
311 static int address_release(Address
*address
) {
315 assert(address
->link
);
317 /* Remove masquerading firewall entry if it was added */
318 if (address
->ip_masquerade_done
) {
319 union in_addr_union masked
= address
->in_addr
;
320 in_addr_mask(address
->family
, &masked
, address
->prefixlen
);
322 r
= fw_add_masquerade(false, AF_INET
, 0, &masked
, address
->prefixlen
, NULL
, NULL
, 0);
326 address
->ip_masquerade_done
= false;
336 const struct ifa_cacheinfo
*cinfo
) {
343 assert_return(address
->link
, 1);
345 if (IN_SET(address
->link
->state
, LINK_STATE_FAILED
, LINK_STATE_LINGER
))
348 ready
= address_is_ready(address
);
350 address
->flags
= flags
;
351 address
->scope
= scope
;
352 address
->cinfo
= *cinfo
;
354 link_update_operstate(address
->link
, true);
355 link_check_ready(address
->link
);
358 address_is_ready(address
) &&
359 address
->family
== AF_INET6
&&
360 in_addr_is_link_local(AF_INET6
, &address
->in_addr
) > 0 &&
361 in_addr_is_null(AF_INET6
, (const union in_addr_union
*) &address
->link
->ipv6ll_address
) > 0) {
363 r
= link_ipv6ll_gained(address
->link
, &address
->in_addr
.in6
);
371 int address_drop(Address
*address
) {
378 ready
= address_is_ready(address
);
379 link
= address
->link
;
381 r
= address_release(address
);
383 log_link_warning_errno(link
, r
, "Failed to disable IP masquerading, ignoring: %m");
385 address_free(address
);
387 link_update_operstate(link
, true);
390 link_check_ready(link
);
395 int address_get(Link
*link
,
397 const union in_addr_union
*in_addr
,
398 unsigned char prefixlen
,
401 Address address
, *existing
;
406 address
= (Address
) {
409 .prefixlen
= prefixlen
,
412 existing
= set_get(link
->addresses
, &address
);
419 existing
= set_get(link
->addresses_foreign
, &address
);
429 static int address_remove_handler(sd_netlink
*rtnl
, sd_netlink_message
*m
, Link
*link
) {
434 assert(link
->ifname
);
436 if (IN_SET(link
->state
, LINK_STATE_FAILED
, LINK_STATE_LINGER
))
439 r
= sd_netlink_message_get_errno(m
);
440 if (r
< 0 && r
!= -EADDRNOTAVAIL
)
441 log_link_warning_errno(link
, r
, "Could not drop address: %m");
449 link_netlink_message_handler_t callback
) {
451 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
;
455 assert(IN_SET(address
->family
, AF_INET
, AF_INET6
));
457 assert(link
->ifindex
> 0);
458 assert(link
->manager
);
459 assert(link
->manager
->rtnl
);
462 _cleanup_free_
char *b
= NULL
;
464 (void) in_addr_to_string(address
->family
, &address
->in_addr
, &b
);
465 log_link_debug(link
, "Removing address %s", strna(b
));
468 r
= sd_rtnl_message_new_addr(link
->manager
->rtnl
, &req
, RTM_DELADDR
,
469 link
->ifindex
, address
->family
);
471 return log_link_error_errno(link
, r
, "Could not allocate RTM_DELADDR message: %m");
473 r
= sd_rtnl_message_addr_set_prefixlen(req
, address
->prefixlen
);
475 return log_link_error_errno(link
, r
, "Could not set prefixlen: %m");
477 r
= netlink_message_append_in_addr_union(req
, IFA_LOCAL
, address
->family
, &address
->in_addr
);
479 return log_link_error_errno(link
, r
, "Could not append IFA_LOCAL attribute: %m");
481 r
= netlink_call_async(link
->manager
->rtnl
, NULL
, req
,
482 callback
?: address_remove_handler
,
483 link_netlink_destroy_callback
, link
);
485 return log_link_error_errno(link
, r
, "Could not send rtnetlink message: %m");
492 static int address_acquire(Link
*link
, Address
*original
, Address
**ret
) {
493 union in_addr_union in_addr
= IN_ADDR_NULL
;
494 struct in_addr broadcast
= {};
495 _cleanup_(address_freep
) Address
*na
= NULL
;
502 /* Something useful was configured? just use it */
503 r
= in_addr_is_null(original
->family
, &original
->in_addr
);
507 /* The address is configured to be 0.0.0.0 or [::] by the user?
508 * Then let's acquire something more useful from the pool. */
509 r
= manager_address_pool_acquire(link
->manager
, original
->family
, original
->prefixlen
, &in_addr
);
515 if (original
->family
== AF_INET
) {
516 /* Pick first address in range for ourselves ... */
517 in_addr
.in
.s_addr
= in_addr
.in
.s_addr
| htobe32(1);
519 /* .. and use last as broadcast address */
520 if (original
->prefixlen
> 30)
521 broadcast
.s_addr
= 0;
523 broadcast
.s_addr
= in_addr
.in
.s_addr
| htobe32(0xFFFFFFFFUL
>> original
->prefixlen
);
524 } else if (original
->family
== AF_INET6
)
525 in_addr
.in6
.s6_addr
[15] |= 1;
527 r
= address_new(&na
);
531 na
->family
= original
->family
;
532 na
->prefixlen
= original
->prefixlen
;
533 na
->scope
= original
->scope
;
534 na
->cinfo
= original
->cinfo
;
536 if (original
->label
) {
537 na
->label
= strdup(original
->label
);
542 na
->broadcast
= broadcast
;
543 na
->in_addr
= in_addr
;
545 LIST_PREPEND(addresses
, link
->pool_addresses
, na
);
552 int address_configure(
555 link_netlink_message_handler_t callback
,
558 _cleanup_(sd_netlink_message_unrefp
) sd_netlink_message
*req
= NULL
;
562 assert(IN_SET(address
->family
, AF_INET
, AF_INET6
));
564 assert(link
->ifindex
> 0);
565 assert(link
->manager
);
566 assert(link
->manager
->rtnl
);
569 /* If this is a new address, then refuse adding more than the limit */
570 if (address_get(link
, address
->family
, &address
->in_addr
, address
->prefixlen
, NULL
) <= 0 &&
571 set_size(link
->addresses
) >= ADDRESSES_PER_LINK_MAX
)
572 return log_link_error_errno(link
, SYNTHETIC_ERRNO(E2BIG
),
573 "Too many addresses are configured, refusing: %m");
575 r
= address_acquire(link
, address
, &address
);
577 return log_link_error_errno(link
, r
, "Failed to acquire an address from pool: %m");
580 r
= sd_rtnl_message_new_addr_update(link
->manager
->rtnl
, &req
,
581 link
->ifindex
, address
->family
);
583 r
= sd_rtnl_message_new_addr(link
->manager
->rtnl
, &req
, RTM_NEWADDR
,
584 link
->ifindex
, address
->family
);
586 return log_link_error_errno(link
, r
, "Could not allocate RTM_NEWADDR message: %m");
588 r
= sd_rtnl_message_addr_set_prefixlen(req
, address
->prefixlen
);
590 return log_link_error_errno(link
, r
, "Could not set prefixlen: %m");
592 address
->flags
|= IFA_F_PERMANENT
;
594 if (address
->home_address
)
595 address
->flags
|= IFA_F_HOMEADDRESS
;
597 if (address
->duplicate_address_detection
)
598 address
->flags
|= IFA_F_NODAD
;
600 if (address
->manage_temporary_address
)
601 address
->flags
|= IFA_F_MANAGETEMPADDR
;
603 if (address
->prefix_route
)
604 address
->flags
|= IFA_F_NOPREFIXROUTE
;
606 if (address
->autojoin
)
607 address
->flags
|= IFA_F_MCAUTOJOIN
;
609 r
= sd_rtnl_message_addr_set_flags(req
, (address
->flags
& 0xff));
611 return log_link_error_errno(link
, r
, "Could not set flags: %m");
613 if (address
->flags
& ~0xff) {
614 r
= sd_netlink_message_append_u32(req
, IFA_FLAGS
, address
->flags
);
616 return log_link_error_errno(link
, r
, "Could not set extended flags: %m");
619 r
= sd_rtnl_message_addr_set_scope(req
, address
->scope
);
621 return log_link_error_errno(link
, r
, "Could not set scope: %m");
623 r
= netlink_message_append_in_addr_union(req
, IFA_LOCAL
, address
->family
, &address
->in_addr
);
625 return log_link_error_errno(link
, r
, "Could not append IFA_LOCAL attribute: %m");
627 if (in_addr_is_null(address
->family
, &address
->in_addr_peer
) == 0) {
628 r
= netlink_message_append_in_addr_union(req
, IFA_ADDRESS
, address
->family
, &address
->in_addr_peer
);
630 return log_link_error_errno(link
, r
, "Could not append IFA_ADDRESS attribute: %m");
631 } else if (address
->family
== AF_INET
&& address
->prefixlen
<= 30) {
632 r
= sd_netlink_message_append_in_addr(req
, IFA_BROADCAST
, &address
->broadcast
);
634 return log_link_error_errno(link
, r
, "Could not append IFA_BROADCAST attribute: %m");
637 if (address
->label
) {
638 r
= sd_netlink_message_append_string(req
, IFA_LABEL
, address
->label
);
640 return log_link_error_errno(link
, r
, "Could not append IFA_LABEL attribute: %m");
643 r
= sd_netlink_message_append_cache_info(req
, IFA_CACHEINFO
, &address
->cinfo
);
645 return log_link_error_errno(link
, r
, "Could not append IFA_CACHEINFO attribute: %m");
647 r
= address_establish(address
, link
);
649 log_link_warning_errno(link
, r
, "Could not enable IP masquerading, ignoring: %m");
651 r
= netlink_call_async(link
->manager
->rtnl
, NULL
, req
, callback
, link_netlink_destroy_callback
, link
);
653 address_release(address
);
654 return log_link_error_errno(link
, r
, "Could not send rtnetlink message: %m");
659 if (address
->family
== AF_INET6
&& !in_addr_is_null(address
->family
, &address
->in_addr_peer
))
660 r
= address_add(link
, address
->family
, &address
->in_addr_peer
, address
->prefixlen
, NULL
);
662 r
= address_add(link
, address
->family
, &address
->in_addr
, address
->prefixlen
, NULL
);
664 address_release(address
);
665 return log_link_error_errno(link
, r
, "Could not add address: %m");
671 int config_parse_broadcast(
673 const char *filename
,
676 unsigned section_line
,
683 Network
*network
= userdata
;
684 _cleanup_(address_free_or_set_invalidp
) Address
*n
= NULL
;
693 r
= address_new_static(network
, filename
, section_line
, &n
);
697 if (n
->family
== AF_INET6
) {
698 log_syntax(unit
, LOG_ERR
, filename
, line
, 0,
699 "Broadcast is not valid for IPv6 addresses, ignoring assignment: %s", rvalue
);
703 r
= in_addr_from_string(AF_INET
, rvalue
, (union in_addr_union
*) &n
->broadcast
);
705 log_syntax(unit
, LOG_ERR
, filename
, line
, r
,
706 "Broadcast is invalid, ignoring assignment: %s", rvalue
);
716 int config_parse_address(const char *unit
,
717 const char *filename
,
720 unsigned section_line
,
727 Network
*network
= userdata
;
728 _cleanup_(address_free_or_set_invalidp
) Address
*n
= NULL
;
729 union in_addr_union buffer
;
730 unsigned char prefixlen
;
739 if (streq(section
, "Network")) {
740 /* we are not in an Address section, so treat
741 * this as the special '0' section */
742 r
= address_new_static(network
, NULL
, 0, &n
);
744 r
= address_new_static(network
, filename
, section_line
, &n
);
749 /* Address=address/prefixlen */
750 r
= in_addr_prefix_from_string_auto_internal(rvalue
, PREFIXLEN_REFUSE
, &f
, &buffer
, &prefixlen
);
752 log_syntax(unit
, LOG_ERR
, filename
, line
, r
,
753 "An address '%s' is specified without prefix length. "
754 "The behavior of parsing addresses without prefix length will be changed in the future release. "
755 "Please specify prefix length explicitly.", rvalue
);
757 r
= in_addr_prefix_from_string_auto_internal(rvalue
, PREFIXLEN_LEGACY
, &f
, &buffer
, &prefixlen
);
760 log_syntax(unit
, LOG_ERR
, filename
, line
, r
, "Invalid address '%s', ignoring assignment: %m", rvalue
);
764 if (n
->family
!= AF_UNSPEC
&& f
!= n
->family
) {
765 log_syntax(unit
, LOG_ERR
, filename
, line
, 0, "Address is incompatible, ignoring assignment: %s", rvalue
);
769 if (in_addr_is_null(f
, &buffer
)) {
770 /* Will use address from address pool. Note that for ipv6 case, prefix of the address
771 * pool is 8, but 40 bit is used by the global ID and 16 bit by the subnet ID. So,
772 * let's limit the prefix length to 64 or larger. See RFC4193. */
773 if ((f
== AF_INET
&& prefixlen
< 8) ||
774 (f
== AF_INET6
&& prefixlen
< 64)) {
775 log_syntax(unit
, LOG_ERR
, filename
, line
, 0,
776 "Null address with invalid prefixlen='%u', ignoring assignment: %s",
783 n
->prefixlen
= prefixlen
;
785 if (streq(lvalue
, "Address"))
788 n
->in_addr_peer
= buffer
;
790 if (n
->family
== AF_INET
&& n
->broadcast
.s_addr
== 0 && n
->prefixlen
<= 30)
791 n
->broadcast
.s_addr
= n
->in_addr
.in
.s_addr
| htonl(0xfffffffflu
>> n
->prefixlen
);
798 int config_parse_label(
800 const char *filename
,
803 unsigned section_line
,
810 _cleanup_(address_free_or_set_invalidp
) Address
*n
= NULL
;
811 Network
*network
= userdata
;
820 r
= address_new_static(network
, filename
, section_line
, &n
);
824 if (!address_label_valid(rvalue
)) {
825 log_syntax(unit
, LOG_ERR
, filename
, line
, 0,
826 "Interface label is too long or invalid, ignoring assignment: %s", rvalue
);
830 r
= free_and_strdup(&n
->label
, rvalue
);
838 int config_parse_lifetime(const char *unit
,
839 const char *filename
,
842 unsigned section_line
,
848 Network
*network
= userdata
;
849 _cleanup_(address_free_or_set_invalidp
) Address
*n
= NULL
;
859 r
= address_new_static(network
, filename
, section_line
, &n
);
863 /* We accept only "forever", "infinity", or "0". */
864 if (STR_IN_SET(rvalue
, "forever", "infinity"))
865 k
= CACHE_INFO_INFINITY_LIFE_TIME
;
866 else if (streq(rvalue
, "0"))
869 log_syntax(unit
, LOG_ERR
, filename
, line
, 0,
870 "Invalid PreferredLifetime= value, ignoring: %s", rvalue
);
874 n
->cinfo
.ifa_prefered
= k
;
880 int config_parse_address_flags(const char *unit
,
881 const char *filename
,
884 unsigned section_line
,
890 Network
*network
= userdata
;
891 _cleanup_(address_free_or_set_invalidp
) Address
*n
= NULL
;
900 r
= address_new_static(network
, filename
, section_line
, &n
);
904 r
= parse_boolean(rvalue
);
906 log_syntax(unit
, LOG_ERR
, filename
, line
, r
,
907 "Failed to parse address flag, ignoring: %s", rvalue
);
911 if (streq(lvalue
, "HomeAddress"))
913 else if (streq(lvalue
, "DuplicateAddressDetection"))
914 n
->duplicate_address_detection
= r
;
915 else if (streq(lvalue
, "ManageTemporaryAddress"))
916 n
->manage_temporary_address
= r
;
917 else if (streq(lvalue
, "PrefixRoute"))
919 else if (streq(lvalue
, "AutoJoin"))
922 assert_not_reached("Invalid address flag type.");
928 int config_parse_address_scope(const char *unit
,
929 const char *filename
,
932 unsigned section_line
,
938 Network
*network
= userdata
;
939 _cleanup_(address_free_or_set_invalidp
) Address
*n
= NULL
;
948 r
= address_new_static(network
, filename
, section_line
, &n
);
952 if (streq(rvalue
, "host"))
953 n
->scope
= RT_SCOPE_HOST
;
954 else if (streq(rvalue
, "link"))
955 n
->scope
= RT_SCOPE_LINK
;
956 else if (streq(rvalue
, "global"))
957 n
->scope
= RT_SCOPE_UNIVERSE
;
959 r
= safe_atou8(rvalue
, &n
->scope
);
961 log_syntax(unit
, LOG_ERR
, filename
, line
, r
,
962 "Could not parse address scope \"%s\", ignoring assignment: %m", rvalue
);
971 bool address_is_ready(const Address
*a
) {
974 if (a
->family
== AF_INET6
)
975 return !(a
->flags
& IFA_F_TENTATIVE
);
977 return !(a
->flags
& (IFA_F_TENTATIVE
| IFA_F_DEPRECATED
));
980 int address_section_verify(Address
*address
) {
981 if (section_is_invalid(address
->section
))
984 if (address
->family
== AF_UNSPEC
) {
985 assert(address
->section
);
987 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL
),
988 "%s: Address section without Address= field configured. "
989 "Ignoring [Address] section from line %u.",
990 address
->section
->filename
, address
->section
->line
);