]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-link-bus.c
resolve: rename Link.name -> Link.ifname
[thirdparty/systemd.git] / src / resolve / resolved-link-bus.c
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
3abaabda 2
6ff79f76
YW
3#include <net/if.h>
4
3abaabda 5#include "alloc-util.h"
04b764bf 6#include "bus-common-errors.h"
3abaabda
LP
7#include "bus-util.h"
8#include "parse-util.h"
9#include "resolve-util.h"
10#include "resolved-bus.h"
11#include "resolved-link-bus.h"
7207052d 12#include "resolved-resolv-conf.h"
3abaabda
LP
13#include "strv.h"
14
acd380c4
YW
15static BUS_DEFINE_PROPERTY_GET(property_get_dnssec_supported, "b", Link, link_dnssec_supported);
16static BUS_DEFINE_PROPERTY_GET2(property_get_dnssec_mode, "s", Link, link_get_dnssec_mode, dnssec_mode_to_string);
3abaabda 17
c9299be2 18static int property_get_dns_over_tls_mode(
d050561a
IT
19 sd_bus *bus,
20 const char *path,
21 const char *interface,
22 const char *property,
23 sd_bus_message *reply,
24 void *userdata,
25 sd_bus_error *error) {
26
27 Link *l = userdata;
28
29 assert(reply);
30 assert(l);
31
c9299be2 32 return sd_bus_message_append(reply, "s", dns_over_tls_mode_to_string(link_get_dns_over_tls_mode(l)));
d050561a
IT
33}
34
3abaabda
LP
35static int property_get_dns(
36 sd_bus *bus,
37 const char *path,
38 const char *interface,
39 const char *property,
40 sd_bus_message *reply,
41 void *userdata,
42 sd_bus_error *error) {
43
44 Link *l = userdata;
45 DnsServer *s;
46 int r;
47
48 assert(reply);
49 assert(l);
50
51 r = sd_bus_message_open_container(reply, 'a', "(iay)");
52 if (r < 0)
53 return r;
54
55 LIST_FOREACH(servers, s, l->dns_servers) {
56 r = bus_dns_server_append(reply, s, false);
57 if (r < 0)
58 return r;
59 }
60
61 return sd_bus_message_close_container(reply);
62}
63
b7ac92cd
YW
64static int property_get_current_dns_server(
65 sd_bus *bus,
66 const char *path,
67 const char *interface,
68 const char *property,
69 sd_bus_message *reply,
70 void *userdata,
71 sd_bus_error *error) {
72
73 DnsServer *s;
74
75 assert(reply);
76 assert(userdata);
77
78 s = *(DnsServer **) userdata;
79
80 return bus_dns_server_append(reply, s, false);
81}
82
3abaabda
LP
83static int property_get_domains(
84 sd_bus *bus,
85 const char *path,
86 const char *interface,
87 const char *property,
88 sd_bus_message *reply,
89 void *userdata,
90 sd_bus_error *error) {
91
92 Link *l = userdata;
93 DnsSearchDomain *d;
94 int r;
95
96 assert(reply);
97 assert(l);
98
ad44b56b 99 r = sd_bus_message_open_container(reply, 'a', "(sb)");
3abaabda
LP
100 if (r < 0)
101 return r;
102
103 LIST_FOREACH(domains, d, l->search_domains) {
ad44b56b 104 r = sd_bus_message_append(reply, "(sb)", d->name, d->route_only);
3abaabda
LP
105 if (r < 0)
106 return r;
107 }
108
109 return sd_bus_message_close_container(reply);
110}
111
77673795
LP
112static int property_get_default_route(
113 sd_bus *bus,
114 const char *path,
115 const char *interface,
116 const char *property,
117 sd_bus_message *reply,
118 void *userdata,
119 sd_bus_error *error) {
120
121 Link *l = userdata;
122
123 assert(reply);
124 assert(l);
125
126 /* Return what is configured, if there's something configured */
127 if (l->default_route >= 0)
128 return sd_bus_message_append(reply, "b", l->default_route);
129
130 /* Otherwise report what is in effect */
131 if (l->unicast_scope)
132 return sd_bus_message_append(reply, "b", dns_scope_is_default_route(l->unicast_scope));
133
134 return sd_bus_message_append(reply, "b", false);
135}
136
3abaabda
LP
137static int property_get_scopes_mask(
138 sd_bus *bus,
139 const char *path,
140 const char *interface,
141 const char *property,
142 sd_bus_message *reply,
143 void *userdata,
144 sd_bus_error *error) {
145
146 Link *l = userdata;
147 uint64_t mask;
148
149 assert(reply);
150 assert(l);
151
152 mask = (l->unicast_scope ? SD_RESOLVED_DNS : 0) |
153 (l->llmnr_ipv4_scope ? SD_RESOLVED_LLMNR_IPV4 : 0) |
154 (l->llmnr_ipv6_scope ? SD_RESOLVED_LLMNR_IPV6 : 0) |
155 (l->mdns_ipv4_scope ? SD_RESOLVED_MDNS_IPV4 : 0) |
156 (l->mdns_ipv6_scope ? SD_RESOLVED_MDNS_IPV6 : 0);
157
158 return sd_bus_message_append(reply, "t", mask);
159}
160
161static int property_get_ntas(
162 sd_bus *bus,
163 const char *path,
164 const char *interface,
165 const char *property,
166 sd_bus_message *reply,
167 void *userdata,
168 sd_bus_error *error) {
169
170 Link *l = userdata;
171 const char *name;
172 Iterator i;
173 int r;
174
175 assert(reply);
176 assert(l);
177
178 r = sd_bus_message_open_container(reply, 'a', "s");
179 if (r < 0)
180 return r;
181
182 SET_FOREACH(name, l->dnssec_negative_trust_anchors, i) {
183 r = sd_bus_message_append(reply, "s", name);
184 if (r < 0)
185 return r;
186 }
187
188 return sd_bus_message_close_container(reply);
189}
190
04b764bf
LP
191static int verify_unmanaged_link(Link *l, sd_bus_error *error) {
192 assert(l);
193
194 if (l->flags & IFF_LOOPBACK)
6ff79f76 195 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is loopback device.", l->ifname);
04b764bf 196 if (l->is_managed)
6ff79f76 197 return sd_bus_error_setf(error, BUS_ERROR_LINK_BUSY, "Link %s is managed.", l->ifname);
04b764bf
LP
198
199 return 0;
200}
201
d2ec6608
LP
202int bus_link_method_set_dns_servers(sd_bus_message *message, void *userdata, sd_bus_error *error) {
203 _cleanup_free_ struct in_addr_data *dns = NULL;
204 size_t allocated = 0, n = 0;
205 Link *l = userdata;
206 unsigned i;
207 int r;
208
209 assert(message);
210 assert(l);
211
04b764bf
LP
212 r = verify_unmanaged_link(l, error);
213 if (r < 0)
214 return r;
215
d2ec6608
LP
216 r = sd_bus_message_enter_container(message, 'a', "(iay)");
217 if (r < 0)
218 return r;
219
220 for (;;) {
221 int family;
222 size_t sz;
223 const void *d;
224
225 assert_cc(sizeof(int) == sizeof(int32_t));
226
227 r = sd_bus_message_enter_container(message, 'r', "iay");
228 if (r < 0)
229 return r;
230 if (r == 0)
231 break;
232
233 r = sd_bus_message_read(message, "i", &family);
234 if (r < 0)
235 return r;
236
237 if (!IN_SET(family, AF_INET, AF_INET6))
238 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Unknown address family %i", family);
239
240 r = sd_bus_message_read_array(message, 'y', &d, &sz);
241 if (r < 0)
242 return r;
243 if (sz != FAMILY_ADDRESS_SIZE(family))
244 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid address size");
245
b30bf55d
LP
246 if (!dns_server_address_valid(family, d))
247 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNS server address");
248
d2ec6608
LP
249 r = sd_bus_message_exit_container(message);
250 if (r < 0)
251 return r;
252
253 if (!GREEDY_REALLOC(dns, allocated, n+1))
254 return -ENOMEM;
255
256 dns[n].family = family;
257 memcpy(&dns[n].address, d, sz);
258 n++;
259 }
260
261 r = sd_bus_message_exit_container(message);
262 if (r < 0)
263 return r;
264
265 dns_server_mark_all(l->dns_servers);
266
267 for (i = 0; i < n; i++) {
268 DnsServer *s;
269
2817157b 270 s = dns_server_find(l->dns_servers, dns[i].family, &dns[i].address, 0);
d2ec6608
LP
271 if (s)
272 dns_server_move_back_and_unmark(s);
273 else {
2817157b 274 r = dns_server_new(l->manager, NULL, DNS_SERVER_LINK, l, dns[i].family, &dns[i].address, 0);
d2ec6608
LP
275 if (r < 0)
276 goto clear;
277 }
278
279 }
280
281 dns_server_unlink_marked(l->dns_servers);
282 link_allocate_scopes(l);
283
943ef07c 284 (void) link_save_user(l);
7207052d
LP
285 (void) manager_write_resolv_conf(l->manager);
286
d2ec6608
LP
287 return sd_bus_reply_method_return(message, NULL);
288
289clear:
290 dns_server_unlink_all(l->dns_servers);
291 return r;
292}
293
ee116b54 294int bus_link_method_set_domains(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d2ec6608 295 Link *l = userdata;
d2ec6608
LP
296 int r;
297
298 assert(message);
299 assert(l);
300
04b764bf
LP
301 r = verify_unmanaged_link(l, error);
302 if (r < 0)
303 return r;
304
ad44b56b 305 r = sd_bus_message_enter_container(message, 'a', "(sb)");
d2ec6608
LP
306 if (r < 0)
307 return r;
308
ad44b56b
LP
309 for (;;) {
310 const char *name;
311 int route_only;
d2ec6608 312
ad44b56b 313 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
d2ec6608
LP
314 if (r < 0)
315 return r;
316 if (r == 0)
ad44b56b
LP
317 break;
318
319 r = dns_name_is_valid(name);
320 if (r < 0)
321 return r;
322 if (r == 0)
323 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid search domain %s", name);
324 if (!route_only && dns_name_is_root(name))
d2ec6608
LP
325 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Root domain is not suitable as search domain");
326 }
327
328 dns_search_domain_mark_all(l->search_domains);
329
ad44b56b
LP
330 r = sd_bus_message_rewind(message, false);
331 if (r < 0)
332 return r;
333
334 for (;;) {
d2ec6608 335 DnsSearchDomain *d;
ad44b56b
LP
336 const char *name;
337 int route_only;
d2ec6608 338
ad44b56b
LP
339 r = sd_bus_message_read(message, "(sb)", &name, &route_only);
340 if (r < 0)
341 goto clear;
342 if (r == 0)
343 break;
344
345 r = dns_search_domain_find(l->search_domains, name, &d);
d2ec6608
LP
346 if (r < 0)
347 goto clear;
348
349 if (r > 0)
350 dns_search_domain_move_back_and_unmark(d);
351 else {
ad44b56b 352 r = dns_search_domain_new(l->manager, &d, DNS_SEARCH_DOMAIN_LINK, l, name);
d2ec6608
LP
353 if (r < 0)
354 goto clear;
355 }
ad44b56b
LP
356
357 d->route_only = route_only;
d2ec6608
LP
358 }
359
ad44b56b
LP
360 r = sd_bus_message_exit_container(message);
361 if (r < 0)
362 goto clear;
363
d2ec6608 364 dns_search_domain_unlink_marked(l->search_domains);
7207052d 365
943ef07c 366 (void) link_save_user(l);
7207052d
LP
367 (void) manager_write_resolv_conf(l->manager);
368
d2ec6608
LP
369 return sd_bus_reply_method_return(message, NULL);
370
371clear:
372 dns_search_domain_unlink_all(l->search_domains);
373 return r;
374}
375
77673795
LP
376int bus_link_method_set_default_route(sd_bus_message *message, void *userdata, sd_bus_error *error) {
377 Link *l = userdata;
378 int r, b;
379
380 assert(message);
381 assert(l);
382
383 r = verify_unmanaged_link(l, error);
384 if (r < 0)
385 return r;
386
387 r = sd_bus_message_read(message, "b", &b);
388 if (r < 0)
389 return r;
390
391 if (l->default_route != b) {
392 l->default_route = b;
393
394 (void) link_save_user(l);
395 (void) manager_write_resolv_conf(l->manager);
396 }
397
398 return sd_bus_reply_method_return(message, NULL);
399}
400
d2ec6608
LP
401int bus_link_method_set_llmnr(sd_bus_message *message, void *userdata, sd_bus_error *error) {
402 Link *l = userdata;
403 ResolveSupport mode;
404 const char *llmnr;
405 int r;
406
407 assert(message);
408 assert(l);
409
04b764bf
LP
410 r = verify_unmanaged_link(l, error);
411 if (r < 0)
412 return r;
413
d2ec6608
LP
414 r = sd_bus_message_read(message, "s", &llmnr);
415 if (r < 0)
416 return r;
417
418 if (isempty(llmnr))
419 mode = RESOLVE_SUPPORT_YES;
420 else {
421 mode = resolve_support_from_string(llmnr);
422 if (mode < 0)
423 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid LLMNR setting: %s", llmnr);
424 }
425
426 l->llmnr_support = mode;
427 link_allocate_scopes(l);
428 link_add_rrs(l, false);
429
943ef07c
LP
430 (void) link_save_user(l);
431
d2ec6608
LP
432 return sd_bus_reply_method_return(message, NULL);
433}
434
435int bus_link_method_set_mdns(sd_bus_message *message, void *userdata, sd_bus_error *error) {
436 Link *l = userdata;
437 ResolveSupport mode;
438 const char *mdns;
439 int r;
440
441 assert(message);
442 assert(l);
443
04b764bf
LP
444 r = verify_unmanaged_link(l, error);
445 if (r < 0)
446 return r;
447
d2ec6608
LP
448 r = sd_bus_message_read(message, "s", &mdns);
449 if (r < 0)
450 return r;
451
452 if (isempty(mdns))
453 mode = RESOLVE_SUPPORT_NO;
454 else {
455 mode = resolve_support_from_string(mdns);
456 if (mode < 0)
457 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid MulticastDNS setting: %s", mdns);
458 }
459
460 l->mdns_support = mode;
461 link_allocate_scopes(l);
462 link_add_rrs(l, false);
463
943ef07c
LP
464 (void) link_save_user(l);
465
d2ec6608
LP
466 return sd_bus_reply_method_return(message, NULL);
467}
468
c9299be2 469int bus_link_method_set_dns_over_tls(sd_bus_message *message, void *userdata, sd_bus_error *error) {
d050561a 470 Link *l = userdata;
c9299be2
IT
471 const char *dns_over_tls;
472 DnsOverTlsMode mode;
d050561a
IT
473 int r;
474
475 assert(message);
476 assert(l);
477
478 r = verify_unmanaged_link(l, error);
479 if (r < 0)
480 return r;
481
c9299be2 482 r = sd_bus_message_read(message, "s", &dns_over_tls);
d050561a
IT
483 if (r < 0)
484 return r;
485
c9299be2
IT
486 if (isempty(dns_over_tls))
487 mode = _DNS_OVER_TLS_MODE_INVALID;
d050561a 488 else {
c9299be2 489 mode = dns_over_tls_mode_from_string(dns_over_tls);
d050561a 490 if (mode < 0)
c9299be2 491 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSOverTLS setting: %s", dns_over_tls);
d050561a
IT
492 }
493
c9299be2 494 link_set_dns_over_tls_mode(l, mode);
d050561a
IT
495
496 (void) link_save_user(l);
497
498 return sd_bus_reply_method_return(message, NULL);
499}
500
d2ec6608
LP
501int bus_link_method_set_dnssec(sd_bus_message *message, void *userdata, sd_bus_error *error) {
502 Link *l = userdata;
503 const char *dnssec;
504 DnssecMode mode;
505 int r;
506
507 assert(message);
508 assert(l);
509
04b764bf
LP
510 r = verify_unmanaged_link(l, error);
511 if (r < 0)
512 return r;
513
d2ec6608
LP
514 r = sd_bus_message_read(message, "s", &dnssec);
515 if (r < 0)
516 return r;
517
518 if (isempty(dnssec))
519 mode = _DNSSEC_MODE_INVALID;
520 else {
521 mode = dnssec_mode_from_string(dnssec);
522 if (mode < 0)
523 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid DNSSEC setting: %s", dnssec);
524 }
525
526 link_set_dnssec_mode(l, mode);
527
943ef07c
LP
528 (void) link_save_user(l);
529
d2ec6608
LP
530 return sd_bus_reply_method_return(message, NULL);
531}
532
533int bus_link_method_set_dnssec_negative_trust_anchors(sd_bus_message *message, void *userdata, sd_bus_error *error) {
534 _cleanup_set_free_free_ Set *ns = NULL;
c6d92582 535 _cleanup_strv_free_ char **ntas = NULL;
d2ec6608
LP
536 Link *l = userdata;
537 int r;
538 char **i;
539
540 assert(message);
541 assert(l);
542
04b764bf
LP
543 r = verify_unmanaged_link(l, error);
544 if (r < 0)
545 return r;
546
d2ec6608
LP
547 r = sd_bus_message_read_strv(message, &ntas);
548 if (r < 0)
549 return r;
550
551 STRV_FOREACH(i, ntas) {
552 r = dns_name_is_valid(*i);
553 if (r < 0)
554 return r;
555 if (r == 0)
55abd6da 556 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid negative trust anchor domain: %s", *i);
d2ec6608
LP
557 }
558
559 ns = set_new(&dns_name_hash_ops);
560 if (!ns)
561 return -ENOMEM;
562
563 STRV_FOREACH(i, ntas) {
564 r = set_put_strdup(ns, *i);
565 if (r < 0)
566 return r;
567 }
568
569 set_free_free(l->dnssec_negative_trust_anchors);
ae2a15bc 570 l->dnssec_negative_trust_anchors = TAKE_PTR(ns);
d2ec6608 571
943ef07c
LP
572 (void) link_save_user(l);
573
d2ec6608
LP
574 return sd_bus_reply_method_return(message, NULL);
575}
576
577int bus_link_method_revert(sd_bus_message *message, void *userdata, sd_bus_error *error) {
578 Link *l = userdata;
04b764bf 579 int r;
d2ec6608
LP
580
581 assert(message);
582 assert(l);
583
04b764bf
LP
584 r = verify_unmanaged_link(l, error);
585 if (r < 0)
586 return r;
587
d2ec6608
LP
588 link_flush_settings(l);
589 link_allocate_scopes(l);
590 link_add_rrs(l, false);
591
943ef07c 592 (void) link_save_user(l);
7207052d
LP
593 (void) manager_write_resolv_conf(l->manager);
594
d2ec6608
LP
595 return sd_bus_reply_method_return(message, NULL);
596}
597
3abaabda
LP
598const sd_bus_vtable link_vtable[] = {
599 SD_BUS_VTABLE_START(0),
600
601 SD_BUS_PROPERTY("ScopesMask", "t", property_get_scopes_mask, 0, 0),
602 SD_BUS_PROPERTY("DNS", "a(iay)", property_get_dns, 0, 0),
b7ac92cd 603 SD_BUS_PROPERTY("CurrentDNSServer", "(iay)", property_get_current_dns_server, offsetof(Link, current_dns_server), 0),
ad44b56b 604 SD_BUS_PROPERTY("Domains", "a(sb)", property_get_domains, 0, 0),
77673795 605 SD_BUS_PROPERTY("DefaultRoute", "b", property_get_default_route, 0, 0),
bf4e5c4c
YW
606 SD_BUS_PROPERTY("LLMNR", "s", bus_property_get_resolve_support, offsetof(Link, llmnr_support), 0),
607 SD_BUS_PROPERTY("MulticastDNS", "s", bus_property_get_resolve_support, offsetof(Link, mdns_support), 0),
c9299be2 608 SD_BUS_PROPERTY("DNSOverTLS", "s", property_get_dns_over_tls_mode, 0, 0),
a3712979 609 SD_BUS_PROPERTY("DNSSEC", "s", property_get_dnssec_mode, 0, 0),
3abaabda 610 SD_BUS_PROPERTY("DNSSECNegativeTrustAnchors", "as", property_get_ntas, 0, 0),
c2cf6e0b 611 SD_BUS_PROPERTY("DNSSECSupported", "b", property_get_dnssec_supported, 0, 0),
3abaabda 612
d2ec6608 613 SD_BUS_METHOD("SetDNS", "a(iay)", NULL, bus_link_method_set_dns_servers, 0),
ee116b54 614 SD_BUS_METHOD("SetDomains", "a(sb)", NULL, bus_link_method_set_domains, 0),
77673795 615 SD_BUS_METHOD("SetDefaultRoute", "b", NULL, bus_link_method_set_default_route, 0),
d2ec6608
LP
616 SD_BUS_METHOD("SetLLMNR", "s", NULL, bus_link_method_set_llmnr, 0),
617 SD_BUS_METHOD("SetMulticastDNS", "s", NULL, bus_link_method_set_mdns, 0),
c9299be2 618 SD_BUS_METHOD("SetDNSOverTLS", "s", NULL, bus_link_method_set_dns_over_tls, 0),
d2ec6608
LP
619 SD_BUS_METHOD("SetDNSSEC", "s", NULL, bus_link_method_set_dnssec, 0),
620 SD_BUS_METHOD("SetDNSSECNegativeTrustAnchors", "as", NULL, bus_link_method_set_dnssec_negative_trust_anchors, 0),
621 SD_BUS_METHOD("Revert", NULL, NULL, bus_link_method_revert, 0),
622
3abaabda
LP
623 SD_BUS_VTABLE_END
624};
625
626int link_object_find(sd_bus *bus, const char *path, const char *interface, void *userdata, void **found, sd_bus_error *error) {
627 _cleanup_free_ char *e = NULL;
628 Manager *m = userdata;
629 int ifindex;
630 Link *link;
631 int r;
632
633 assert(bus);
634 assert(path);
635 assert(interface);
636 assert(found);
637 assert(m);
638
639 r = sd_bus_path_decode(path, "/org/freedesktop/resolve1/link", &e);
640 if (r <= 0)
641 return 0;
642
643 r = parse_ifindex(e, &ifindex);
644 if (r < 0)
645 return 0;
646
647 link = hashmap_get(m->links, INT_TO_PTR(ifindex));
648 if (!link)
649 return 0;
650
651 *found = link;
652 return 1;
653}
654
655char *link_bus_path(Link *link) {
656 _cleanup_free_ char *ifindex = NULL;
657 char *p;
658 int r;
659
660 assert(link);
661
662 if (asprintf(&ifindex, "%i", link->ifindex) < 0)
663 return NULL;
664
665 r = sd_bus_path_encode("/org/freedesktop/resolve1/link", ifindex, &p);
666 if (r < 0)
667 return NULL;
668
669 return p;
670}
671
672int link_node_enumerator(sd_bus *bus, const char *path, void *userdata, char ***nodes, sd_bus_error *error) {
673 _cleanup_strv_free_ char **l = NULL;
674 Manager *m = userdata;
675 Link *link;
676 Iterator i;
677 unsigned c = 0;
678
679 assert(bus);
680 assert(path);
681 assert(m);
682 assert(nodes);
683
684 l = new0(char*, hashmap_size(m->links) + 1);
685 if (!l)
686 return -ENOMEM;
687
688 HASHMAP_FOREACH(link, m->links, i) {
689 char *p;
690
691 p = link_bus_path(link);
692 if (!p)
693 return -ENOMEM;
694
695 l[c++] = p;
696 }
697
698 l[c] = NULL;
ae2a15bc 699 *nodes = TAKE_PTR(l);
3abaabda
LP
700
701 return 1;
702}