tests: eliminate a floating point exception by requiring -n option to ctdb_bench
[metze/ctdb/wip.git] / server / ctdb_takeover.c
index 6aaf41dd648df38f851f1c9d143c441f31b441c4..b18c030092147219dfe66f0f3c4177009c521a86 100644 (file)
 #define CTDB_ARP_INTERVAL 1
 #define CTDB_ARP_REPEAT   3
 
+struct ctdb_iface {
+       struct ctdb_iface *prev, *next;
+       const char *name;
+       bool link_up;
+       uint32_t references;
+};
+
+static const char *ctdb_vnn_iface_string(const struct ctdb_vnn *vnn)
+{
+       if (vnn->iface) {
+               return vnn->iface->name;
+       }
+
+       return "__none__";
+}
+
+static int ctdb_add_local_iface(struct ctdb_context *ctdb, const char *iface)
+{
+       struct ctdb_iface *i;
+
+       /* Verify that we dont have an entry for this ip yet */
+       for (i=ctdb->ifaces;i;i=i->next) {
+               if (strcmp(i->name, iface) == 0) {
+                       return 0;
+               }
+       }
+
+       /* create a new structure for this interface */
+       i = talloc_zero(ctdb, struct ctdb_iface);
+       CTDB_NO_MEMORY_FATAL(ctdb, i);
+       i->name = talloc_strdup(i, iface);
+       CTDB_NO_MEMORY(ctdb, i->name);
+       i->link_up = false;
+
+       DLIST_ADD(ctdb->ifaces, i);
+
+       return 0;
+}
+
+static struct ctdb_iface *ctdb_find_iface(struct ctdb_context *ctdb,
+                                         const char *iface)
+{
+       struct ctdb_iface *i;
+
+       /* Verify that we dont have an entry for this ip yet */
+       for (i=ctdb->ifaces;i;i=i->next) {
+               if (strcmp(i->name, iface) == 0) {
+                       return i;
+               }
+       }
+
+       return NULL;
+}
+
+static struct ctdb_iface *ctdb_vnn_best_iface(struct ctdb_context *ctdb,
+                                             struct ctdb_vnn *vnn)
+{
+       int i;
+       struct ctdb_iface *cur = NULL;
+       struct ctdb_iface *best = NULL;
+
+       for (i=0; vnn->ifaces[i]; i++) {
+
+               cur = ctdb_find_iface(ctdb, vnn->ifaces[i]);
+               if (cur == NULL) {
+                       continue;
+               }
+
+               if (!cur->link_up) {
+                       continue;
+               }
+
+               if (best == NULL) {
+                       best = cur;
+                       continue;
+               }
+
+               if (cur->references < best->references) {
+                       best = cur;
+                       continue;
+               }
+       }
+
+       return best;
+}
+
+static int32_t ctdb_vnn_assign_iface(struct ctdb_context *ctdb,
+                                    struct ctdb_vnn *vnn)
+{
+       struct ctdb_iface *best = NULL;
+
+       if (vnn->iface) {
+               DEBUG(DEBUG_INFO, (__location__ " public address '%s' "
+                                  "still assigned to iface '%s'\n",
+                                  ctdb_addr_to_str(&vnn->public_address),
+                                  ctdb_vnn_iface_string(vnn)));
+               return 0;
+       }
+
+       best = ctdb_vnn_best_iface(ctdb, vnn);
+       if (best == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " public address '%s' "
+                                 "cannot assign to iface any iface\n",
+                                 ctdb_addr_to_str(&vnn->public_address)));
+               return -1;
+       }
+
+       vnn->iface = best;
+       best->references++;
+       vnn->pnn = ctdb->pnn;
+
+       DEBUG(DEBUG_INFO, (__location__ " public address '%s' "
+                          "now assigned to iface '%s' refs[%d]\n",
+                          ctdb_addr_to_str(&vnn->public_address),
+                          ctdb_vnn_iface_string(vnn),
+                          best->references));
+       return 0;
+}
+
+static void ctdb_vnn_unassign_iface(struct ctdb_context *ctdb,
+                                   struct ctdb_vnn *vnn)
+{
+       DEBUG(DEBUG_INFO, (__location__ " public address '%s' "
+                          "now unassigned (old iface '%s' refs[%d])\n",
+                          ctdb_addr_to_str(&vnn->public_address),
+                          ctdb_vnn_iface_string(vnn),
+                          vnn->iface?vnn->iface->references:0));
+       if (vnn->iface) {
+               vnn->iface->references--;
+       }
+       vnn->iface = NULL;
+       if (vnn->pnn == ctdb->pnn) {
+               vnn->pnn = -1;
+       }
+}
+
+static bool ctdb_vnn_available(struct ctdb_context *ctdb,
+                              struct ctdb_vnn *vnn)
+{
+       int i;
+
+       if (vnn->iface && vnn->iface->link_up) {
+               return true;
+       }
+
+       for (i=0; vnn->ifaces[i]; i++) {
+               struct ctdb_iface *cur;
+
+               cur = ctdb_find_iface(ctdb, vnn->ifaces[i]);
+               if (cur == NULL) {
+                       continue;
+               }
+
+               if (cur->link_up) {
+                       return true;
+               }
+       }
+
+       return false;
+}
+
 struct ctdb_takeover_arp {
        struct ctdb_context *ctdb;
        uint32_t count;
-       struct sockaddr_in sin;
+       ctdb_sock_addr addr;
        struct ctdb_tcp_array *tcparray;
        struct ctdb_vnn *vnn;
 };
@@ -56,7 +217,7 @@ struct ctdb_tcp_list {
 struct ctdb_client_ip {
        struct ctdb_client_ip *prev, *next;
        struct ctdb_context *ctdb;
-       struct sockaddr_in ip;
+       ctdb_sock_addr addr;
        uint32_t client_id;
 };
 
@@ -69,38 +230,37 @@ static void ctdb_control_send_arp(struct event_context *ev, struct timed_event *
 {
        struct ctdb_takeover_arp *arp = talloc_get_type(private_data, 
                                                        struct ctdb_takeover_arp);
-       int i, s, ret;
+       int i, ret;
        struct ctdb_tcp_array *tcparray;
+       const char *iface = ctdb_vnn_iface_string(arp->vnn);
 
-
-       ret = ctdb_sys_send_arp(&arp->sin, arp->vnn->iface);
+       ret = ctdb_sys_send_arp(&arp->addr, iface);
        if (ret != 0) {
-               DEBUG(DEBUG_CRIT,(__location__ " sending of arp failed (%s)\n", strerror(errno)));
-       }
-
-       s = ctdb_sys_open_sending_socket();
-       if (s == -1) {
-               DEBUG(DEBUG_CRIT,(__location__ " failed to open raw socket for sending tickles\n"));
-               return;
+               DEBUG(DEBUG_CRIT,(__location__ " sending of arp failed on iface '%s' (%s)\n",
+                                 iface, strerror(errno)));
        }
 
        tcparray = arp->tcparray;
        if (tcparray) {
                for (i=0;i<tcparray->num;i++) {
+                       struct ctdb_tcp_connection *tcon;
+
+                       tcon = &tcparray->connections[i];
                        DEBUG(DEBUG_INFO,("sending tcp tickle ack for %u->%s:%u\n",
-                                (unsigned)ntohs(tcparray->connections[i].daddr.sin_port), 
-                                inet_ntoa(tcparray->connections[i].saddr.sin_addr),
-                                (unsigned)ntohs(tcparray->connections[i].saddr.sin_port)));
-                       ret = ctdb_sys_send_tcp(s, &tcparray->connections[i].saddr, 
-                                               &tcparray->connections[i].daddr, 0, 0, 0);
+                               (unsigned)ntohs(tcon->dst_addr.ip.sin_port), 
+                               ctdb_addr_to_str(&tcon->src_addr),
+                               (unsigned)ntohs(tcon->src_addr.ip.sin_port)));
+                       ret = ctdb_sys_send_tcp(
+                               &tcon->src_addr, 
+                               &tcon->dst_addr,
+                               0, 0, 0);
                        if (ret != 0) {
                                DEBUG(DEBUG_CRIT,(__location__ " Failed to send tcp tickle ack for %s\n",
-                                        inet_ntoa(tcparray->connections[i].saddr.sin_addr)));
+                                       ctdb_addr_to_str(&tcon->src_addr)));
                        }
                }
        }
 
-       close(s);
        arp->count++;
 
        if (arp->count == CTDB_ARP_REPEAT) {
@@ -109,86 +269,274 @@ static void ctdb_control_send_arp(struct event_context *ev, struct timed_event *
        }
 
        event_add_timed(arp->ctdb->ev, arp->vnn->takeover_ctx, 
-                       timeval_current_ofs(CTDB_ARP_INTERVAL, 0), 
+                       timeval_current_ofs(CTDB_ARP_INTERVAL, 100000), 
                        ctdb_control_send_arp, arp);
 }
 
+static int32_t ctdb_announce_vnn_iface(struct ctdb_context *ctdb,
+                                      struct ctdb_vnn *vnn)
+{
+       struct ctdb_takeover_arp *arp;
+       struct ctdb_tcp_array *tcparray;
+
+       if (!vnn->takeover_ctx) {
+               vnn->takeover_ctx = talloc_new(vnn);
+               if (!vnn->takeover_ctx) {
+                       return -1;
+               }
+       }
+
+       arp = talloc_zero(vnn->takeover_ctx, struct ctdb_takeover_arp);
+       if (!arp) {
+               return -1;
+       }
+
+       arp->ctdb = ctdb;
+       arp->addr = vnn->public_address;
+       arp->vnn  = vnn;
+
+       tcparray = vnn->tcp_array;
+       if (tcparray) {
+               /* add all of the known tcp connections for this IP to the
+                  list of tcp connections to send tickle acks for */
+               arp->tcparray = talloc_steal(arp, tcparray);
+
+               vnn->tcp_array = NULL;
+               vnn->tcp_update_needed = true;
+       }
+
+       event_add_timed(arp->ctdb->ev, vnn->takeover_ctx,
+                       timeval_zero(), ctdb_control_send_arp, arp);
+
+       return 0;
+}
+
 struct takeover_callback_state {
        struct ctdb_req_control *c;
-       struct sockaddr_in *sin;
+       ctdb_sock_addr *addr;
+       struct ctdb_vnn *vnn;
+};
+
+struct ctdb_do_takeip_state {
+       struct ctdb_req_control *c;
        struct ctdb_vnn *vnn;
 };
 
 /*
   called when takeip event finishes
  */
-static void takeover_ip_callback(struct ctdb_context *ctdb, int status, 
-                                void *private_data)
+static void ctdb_do_takeip_callback(struct ctdb_context *ctdb, int status,
+                                   void *private_data)
 {
-       struct takeover_callback_state *state = 
-               talloc_get_type(private_data, struct takeover_callback_state);
-       struct ctdb_takeover_arp *arp;
-       char *ip = inet_ntoa(state->sin->sin_addr);
-       struct ctdb_tcp_array *tcparray;
-
-       ctdb_enable_monitoring(ctdb);
+       struct ctdb_do_takeip_state *state =
+               talloc_get_type(private_data, struct ctdb_do_takeip_state);
+       int32_t ret;
 
        if (status != 0) {
+               if (status == -ETIME) {
+                       ctdb_ban_self(ctdb);
+               }
                DEBUG(DEBUG_ERR,(__location__ " Failed to takeover IP %s on interface %s\n",
-                        ip, state->vnn->iface));
+                                ctdb_addr_to_str(&state->vnn->public_address),
+                                ctdb_vnn_iface_string(state->vnn)));
                ctdb_request_control_reply(ctdb, state->c, NULL, status, NULL);
                talloc_free(state);
                return;
        }
 
-       if (!state->vnn->takeover_ctx) {
-               state->vnn->takeover_ctx = talloc_new(ctdb);
-               if (!state->vnn->takeover_ctx) {
-                       goto failed;
-               }
+       ret = ctdb_announce_vnn_iface(ctdb, state->vnn);
+       if (ret != 0) {
+               ctdb_request_control_reply(ctdb, state->c, NULL, -1, NULL);
+               talloc_free(state);
+               return;
        }
 
-       arp = talloc_zero(state->vnn->takeover_ctx, struct ctdb_takeover_arp);
-       if (!arp) goto failed;
-       
-       arp->ctdb = ctdb;
-       arp->sin = *state->sin;
-       arp->vnn = state->vnn;
+       /* the control succeeded */
+       ctdb_request_control_reply(ctdb, state->c, NULL, 0, NULL);
+       talloc_free(state);
+       return;
+}
 
-       tcparray = state->vnn->tcp_array;
-       if (tcparray) {
-               /* add all of the known tcp connections for this IP to the
-                  list of tcp connections to send tickle acks for */
-               arp->tcparray = talloc_steal(arp, tcparray);
+/*
+  take over an ip address
+ */
+static int32_t ctdb_do_takeip(struct ctdb_context *ctdb,
+                             struct ctdb_req_control *c,
+                             struct ctdb_vnn *vnn)
+{
+       int ret;
+       struct ctdb_do_takeip_state *state;
 
-               state->vnn->tcp_array = NULL;
-               state->vnn->tcp_update_needed = true;
+       ret = ctdb_vnn_assign_iface(ctdb, vnn);
+       if (ret != 0) {
+               DEBUG(DEBUG_ERR,("Takeover of IP %s/%u failed to "
+                                "assin a usable interface\n",
+                                ctdb_addr_to_str(&vnn->public_address),
+                                vnn->public_netmask_bits));
+               return -1;
        }
 
-       event_add_timed(arp->ctdb->ev, state->vnn->takeover_ctx, 
-                       timeval_zero(), ctdb_control_send_arp, arp);
+       state = talloc(vnn, struct ctdb_do_takeip_state);
+       CTDB_NO_MEMORY(ctdb, state);
+
+       state->c = talloc_steal(ctdb, c);
+       state->vnn   = vnn;
+
+       DEBUG(DEBUG_NOTICE,("Takeover of IP %s/%u on interface %s\n",
+                           ctdb_addr_to_str(&vnn->public_address),
+                           vnn->public_netmask_bits,
+                           ctdb_vnn_iface_string(vnn)));
+
+       ret = ctdb_event_script_callback(ctdb,
+                                        state,
+                                        ctdb_do_takeip_callback,
+                                        state,
+                                        false,
+                                        CTDB_EVENT_TAKE_IP,
+                                        "%s %s %u",
+                                        ctdb_vnn_iface_string(vnn),
+                                        ctdb_addr_to_str(&vnn->public_address),
+                                        vnn->public_netmask_bits);
+
+       if (ret != 0) {
+               DEBUG(DEBUG_ERR,(__location__ " Failed to takeover IP %s on interface %s\n",
+                       ctdb_addr_to_str(&vnn->public_address),
+                       ctdb_vnn_iface_string(vnn)));
+               talloc_free(state);
+               return -1;
+       }
+
+       return 0;
+}
+
+struct ctdb_do_updateip_state {
+       struct ctdb_req_control *c;
+       struct ctdb_iface *old;
+       struct ctdb_vnn *vnn;
+};
+
+/*
+  called when updateip event finishes
+ */
+static void ctdb_do_updateip_callback(struct ctdb_context *ctdb, int status,
+                                     void *private_data)
+{
+       struct ctdb_do_updateip_state *state =
+               talloc_get_type(private_data, struct ctdb_do_updateip_state);
+       int32_t ret;
+
+       if (status != 0) {
+               if (status == -ETIME) {
+                       ctdb_ban_self(ctdb);
+               }
+               DEBUG(DEBUG_ERR,(__location__ " Failed to move IP %s from interface %s to %s\n",
+                       ctdb_addr_to_str(&state->vnn->public_address),
+                       state->old->name,
+                       ctdb_vnn_iface_string(state->vnn)));
+
+               /*
+                * All we can do is reset the old interface
+                * and let the next run fix it
+                */
+               ctdb_vnn_unassign_iface(ctdb, state->vnn);
+               state->vnn->iface = state->old;
+               state->vnn->iface->references++;
+
+               ctdb_request_control_reply(ctdb, state->c, NULL, status, NULL);
+               talloc_free(state);
+               return;
+       }
+
+       ret = ctdb_announce_vnn_iface(ctdb, state->vnn);
+       if (ret != 0) {
+               ctdb_request_control_reply(ctdb, state->c, NULL, -1, NULL);
+               talloc_free(state);
+               return;
+       }
 
        /* the control succeeded */
        ctdb_request_control_reply(ctdb, state->c, NULL, 0, NULL);
        talloc_free(state);
        return;
+}
 
-failed:
-       ctdb_request_control_reply(ctdb, state->c, NULL, -1, NULL);
-       talloc_free(state);
-       return;
+/*
+  update (move) an ip address
+ */
+static int32_t ctdb_do_updateip(struct ctdb_context *ctdb,
+                               struct ctdb_req_control *c,
+                               struct ctdb_vnn *vnn)
+{
+       int ret;
+       struct ctdb_do_updateip_state *state;
+       struct ctdb_iface *old = vnn->iface;
+
+       ctdb_vnn_unassign_iface(ctdb, vnn);
+       ret = ctdb_vnn_assign_iface(ctdb, vnn);
+       if (ret != 0) {
+               DEBUG(DEBUG_ERR,("update of IP %s/%u failed to "
+                                "assin a usable interface (old iface '%s')\n",
+                                ctdb_addr_to_str(&vnn->public_address),
+                                vnn->public_netmask_bits,
+                                old->name));
+               return -1;
+       }
+
+       if (vnn->iface == old) {
+               DEBUG(DEBUG_ERR,("update of IP %s/%u trying to "
+                                "assin a same interface '%s'\n",
+                                ctdb_addr_to_str(&vnn->public_address),
+                                vnn->public_netmask_bits,
+                                old->name));
+               return -1;
+       }
+
+       state = talloc(vnn, struct ctdb_do_updateip_state);
+       CTDB_NO_MEMORY(ctdb, state);
+
+       state->c = talloc_steal(ctdb, c);
+       state->old = old;
+       state->vnn = vnn;
+
+       DEBUG(DEBUG_NOTICE,("Update of IP %s/%u from "
+                           "interface %s to %s\n",
+                           ctdb_addr_to_str(&vnn->public_address),
+                           vnn->public_netmask_bits,
+                           old->name,
+                           ctdb_vnn_iface_string(vnn)));
+
+       ret = ctdb_event_script_callback(ctdb,
+                                        state,
+                                        ctdb_do_updateip_callback,
+                                        state,
+                                        false,
+                                        CTDB_EVENT_UPDATE_IP,
+                                        "%s %s %s %u",
+                                        state->old->name,
+                                        ctdb_vnn_iface_string(vnn),
+                                        ctdb_addr_to_str(&vnn->public_address),
+                                        vnn->public_netmask_bits);
+       if (ret != 0) {
+               DEBUG(DEBUG_ERR,(__location__ " Failed update IP %s from interface %s to %s\n",
+                                ctdb_addr_to_str(&vnn->public_address),
+                                old->name, ctdb_vnn_iface_string(vnn)));
+               talloc_free(state);
+               return -1;
+       }
+
+       return 0;
 }
 
 /*
   Find the vnn of the node that has a public ip address
   returns -1 if the address is not known as a public address
  */
-static struct ctdb_vnn *find_public_ip_vnn(struct ctdb_context *ctdb, struct sockaddr_in ip)
+static struct ctdb_vnn *find_public_ip_vnn(struct ctdb_context *ctdb, ctdb_sock_addr *addr)
 {
        struct ctdb_vnn *vnn;
 
        for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
-               if (ctdb_same_ip(&vnn->public_address, &ip)) {
+               if (ctdb_same_ip(&vnn->public_address, addr)) {
                        return vnn;
                }
        }
@@ -196,64 +544,108 @@ static struct ctdb_vnn *find_public_ip_vnn(struct ctdb_context *ctdb, struct soc
        return NULL;
 }
 
-
 /*
   take over an ip address
  */
-int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb, 
+int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb,
                                 struct ctdb_req_control *c,
-                                TDB_DATA indata, 
+                                TDB_DATA indata,
                                 bool *async_reply)
 {
        int ret;
-       struct takeover_callback_state *state;
        struct ctdb_public_ip *pip = (struct ctdb_public_ip *)indata.dptr;
        struct ctdb_vnn *vnn;
+       bool have_ip = false;
+       bool do_updateip = false;
+       bool do_takeip = false;
+       struct ctdb_iface *best_iface = NULL;
+
+       if (pip->pnn != ctdb->pnn) {
+               DEBUG(DEBUG_ERR,(__location__" takeoverip called for an ip '%s' "
+                                "with pnn %d, but we're node %d\n",
+                                ctdb_addr_to_str(&pip->addr),
+                                pip->pnn, ctdb->pnn));
+               return -1;
+       }
 
        /* update out vnn list */
-       vnn = find_public_ip_vnn(ctdb, pip->sin);
+       vnn = find_public_ip_vnn(ctdb, &pip->addr);
        if (vnn == NULL) {
-               DEBUG(DEBUG_ERR,("takeoverip called for an ip '%s' that is not a public address\n", 
-                        inet_ntoa(pip->sin.sin_addr)));
+               DEBUG(DEBUG_INFO,("takeoverip called for an ip '%s' that is not a public address\n",
+                       ctdb_addr_to_str(&pip->addr)));
                return 0;
        }
-       vnn->pnn = pip->pnn;
 
-       /* if our kernel already has this IP, do nothing */
-       if (ctdb_sys_have_ip(pip->sin)) {
-               return 0;
+       have_ip = ctdb_sys_have_ip(&pip->addr);
+       best_iface = ctdb_vnn_best_iface(ctdb, vnn);
+       if (best_iface == NULL) {
+               DEBUG(DEBUG_ERR,("takeoverip of IP %s/%u failed to find"
+                                "a usable interface (old %s, have_ip %d)\n",
+                                ctdb_addr_to_str(&vnn->public_address),
+                                vnn->public_netmask_bits,
+                                ctdb_vnn_iface_string(vnn),
+                                have_ip));
+               return -1;
        }
 
-       state = talloc(ctdb, struct takeover_callback_state);
-       CTDB_NO_MEMORY(ctdb, state);
-
-       state->c = talloc_steal(ctdb, c);
-       state->sin = talloc(ctdb, struct sockaddr_in);       
-       CTDB_NO_MEMORY(ctdb, state->sin);
-       *state->sin = pip->sin;
-
-       state->vnn = vnn;
+       if (vnn->iface == NULL && have_ip) {
+               DEBUG(DEBUG_CRIT,(__location__ " takeoverip of IP %s is known to the kernel, "
+                                 "but we have no interface assigned, has someone manually configured it?"
+                                 "banning ourself\n",
+                                ctdb_addr_to_str(&vnn->public_address)));
+               ctdb_ban_self(ctdb);
+               return -1;
+       }
 
-       DEBUG(DEBUG_NOTICE,("Takeover of IP %s/%u on interface %s\n", 
-                inet_ntoa(pip->sin.sin_addr), vnn->public_netmask_bits, 
-                vnn->iface));
+       if (vnn->pnn != ctdb->pnn && have_ip) {
+               DEBUG(DEBUG_CRIT,(__location__ " takeoverip of IP %s is known to the kernel, "
+                                 "and we have it on iface[%s], but it was assigned to node %d"
+                                 "and we are node %d, banning ourself\n",
+                                ctdb_addr_to_str(&vnn->public_address),
+                                ctdb_vnn_iface_string(vnn), vnn->pnn, ctdb->pnn));
+               ctdb_ban_self(ctdb);
+               return -1;
+       }
 
-       ctdb_disable_monitoring(ctdb);
+       if (vnn->iface) {
+               if (vnn->iface->link_up) {
+                       /* only move when the rebalance gains something */
+                       if (vnn->iface->references > (best_iface->references + 1)) {
+                               do_updateip = true;
+                       }
+               } else if (vnn->iface != best_iface) {
+                       do_updateip = true;
+               }
+       }
 
-       ret = ctdb_event_script_callback(ctdb, 
-                                        timeval_current_ofs(ctdb->tunable.script_timeout, 0),
-                                        state, takeover_ip_callback, state,
-                                        "takeip %s %s %u",
-                                        vnn->iface, 
-                                        inet_ntoa(pip->sin.sin_addr),
-                                        vnn->public_netmask_bits);
+       if (!have_ip) {
+               if (do_updateip) {
+                       ctdb_vnn_unassign_iface(ctdb, vnn);
+                       do_updateip = false;
+               }
+               do_takeip = true;
+       }
 
-       if (ret != 0) {
-               ctdb_enable_monitoring(ctdb);
-               DEBUG(DEBUG_ERR,(__location__ " Failed to takeover IP %s on interface %s\n",
-                        inet_ntoa(pip->sin.sin_addr), vnn->iface));
-               talloc_free(state);
-               return -1;
+       if (do_takeip) {
+               ret = ctdb_do_takeip(ctdb, c, vnn);
+               if (ret != 0) {
+                       return -1;
+               }
+       } else if (do_updateip) {
+               ret = ctdb_do_updateip(ctdb, c, vnn);
+               if (ret != 0) {
+                       return -1;
+               }
+       } else {
+               /*
+                * The interface is up and the kernel known the ip
+                * => do nothing
+                */
+               DEBUG(DEBUG_INFO,("Redundant takeover of IP %s/%u on interface %s (ip already held)\n",
+                       ctdb_addr_to_str(&pip->addr),
+                       vnn->public_netmask_bits,
+                       ctdb_vnn_iface_string(vnn)));
+               return 0;
        }
 
        /* tell ctdb_control.c that we will be replying asynchronously */
@@ -262,28 +654,56 @@ int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb,
        return 0;
 }
 
+/*
+  takeover an ip address old v4 style
+ */
+int32_t ctdb_control_takeover_ipv4(struct ctdb_context *ctdb, 
+                               struct ctdb_req_control *c,
+                               TDB_DATA indata, 
+                               bool *async_reply)
+{
+       TDB_DATA data;
+       
+       data.dsize = sizeof(struct ctdb_public_ip);
+       data.dptr  = (uint8_t *)talloc_zero(c, struct ctdb_public_ip);
+       CTDB_NO_MEMORY(ctdb, data.dptr);
+       
+       memcpy(data.dptr, indata.dptr, indata.dsize);
+       return ctdb_control_takeover_ip(ctdb, c, data, async_reply);
+}
+
 /*
   kill any clients that are registered with a IP that is being released
  */
-static void release_kill_clients(struct ctdb_context *ctdb, struct sockaddr_in in)
+static void release_kill_clients(struct ctdb_context *ctdb, ctdb_sock_addr *addr)
 {
        struct ctdb_client_ip *ip;
 
-       DEBUG(DEBUG_INFO,("release_kill_clients for ip %s\n", inet_ntoa(in.sin_addr)));
+       DEBUG(DEBUG_INFO,("release_kill_clients for ip %s\n",
+               ctdb_addr_to_str(addr)));
 
        for (ip=ctdb->client_ip_list; ip; ip=ip->next) {
+               ctdb_sock_addr tmp_addr;
+
+               tmp_addr = ip->addr;
                DEBUG(DEBUG_INFO,("checking for client %u with IP %s\n", 
-                        ip->client_id, inet_ntoa(ip->ip.sin_addr)));
-               if (ctdb_same_ip(&ip->ip, &in)) {
+                       ip->client_id,
+                       ctdb_addr_to_str(&ip->addr)));
+
+               if (ctdb_same_ip(&tmp_addr, addr)) {
                        struct ctdb_client *client = ctdb_reqid_find(ctdb, 
                                                                     ip->client_id, 
                                                                     struct ctdb_client);
                        DEBUG(DEBUG_INFO,("matched client %u with IP %s and pid %u\n", 
-                                ip->client_id, inet_ntoa(ip->ip.sin_addr), client->pid));
+                               ip->client_id,
+                               ctdb_addr_to_str(&ip->addr),
+                               client->pid));
+
                        if (client->pid != 0) {
                                DEBUG(DEBUG_INFO,(__location__ " Killing client pid %u for IP %s on client_id %u\n",
-                                        (unsigned)client->pid, inet_ntoa(in.sin_addr),
-                                        ip->client_id));
+                                       (unsigned)client->pid,
+                                       ctdb_addr_to_str(addr),
+                                       ip->client_id));
                                kill(client->pid, SIGKILL);
                        }
                }
@@ -298,22 +718,28 @@ static void release_ip_callback(struct ctdb_context *ctdb, int status,
 {
        struct takeover_callback_state *state = 
                talloc_get_type(private_data, struct takeover_callback_state);
-       char *ip = inet_ntoa(state->sin->sin_addr);
        TDB_DATA data;
 
-       ctdb_enable_monitoring(ctdb);
+       if (status == -ETIME) {
+               ctdb_ban_self(ctdb);
+       }
 
        /* send a message to all clients of this node telling them
           that the cluster has been reconfigured and they should
           release any sockets on this IP */
-       data.dptr = (uint8_t *)ip;
-       data.dsize = strlen(ip)+1;
+       data.dptr = (uint8_t *)talloc_strdup(state, ctdb_addr_to_str(state->addr));
+       CTDB_NO_MEMORY_VOID(ctdb, data.dptr);
+       data.dsize = strlen((char *)data.dptr)+1;
+
+       DEBUG(DEBUG_INFO,(__location__ " sending RELEASE_IP for '%s'\n", data.dptr));
 
        ctdb_daemon_send_message(ctdb, ctdb->pnn, CTDB_SRVID_RELEASE_IP, data);
 
        /* kill clients that have registered with this IP */
-       release_kill_clients(ctdb, *state->sin);
-       
+       release_kill_clients(ctdb, state->addr);
+
+       ctdb_vnn_unassign_iface(ctdb, state->vnn);
+
        /* the control succeeded */
        ctdb_request_control_reply(ctdb, state->c, NULL, 0, NULL);
        talloc_free(state);
@@ -333,10 +759,10 @@ int32_t ctdb_control_release_ip(struct ctdb_context *ctdb,
        struct ctdb_vnn *vnn;
 
        /* update our vnn list */
-       vnn = find_public_ip_vnn(ctdb, pip->sin);
+       vnn = find_public_ip_vnn(ctdb, &pip->addr);
        if (vnn == NULL) {
-               DEBUG(DEBUG_ERR,("releaseip called for an ip '%s' that is not a public address\n", 
-                        inet_ntoa(pip->sin.sin_addr)));
+               DEBUG(DEBUG_INFO,("releaseip called for an ip '%s' that is not a public address\n",
+                       ctdb_addr_to_str(&pip->addr)));
                return 0;
        }
        vnn->pnn = pip->pnn;
@@ -345,41 +771,51 @@ int32_t ctdb_control_release_ip(struct ctdb_context *ctdb,
        talloc_free(vnn->takeover_ctx);
        vnn->takeover_ctx = NULL;
 
-       if (!ctdb_sys_have_ip(pip->sin)) {
-               DEBUG(DEBUG_INFO,("Redundant release of IP %s/%u on interface %s (ip not held)\n", 
-                        inet_ntoa(pip->sin.sin_addr), vnn->public_netmask_bits, 
-                        vnn->iface));
+       if (!ctdb_sys_have_ip(&pip->addr)) {
+               DEBUG(DEBUG_DEBUG,("Redundant release of IP %s/%u on interface %s (ip not held)\n", 
+                       ctdb_addr_to_str(&pip->addr),
+                       vnn->public_netmask_bits, 
+                       ctdb_vnn_iface_string(vnn)));
+               ctdb_vnn_unassign_iface(ctdb, vnn);
                return 0;
        }
 
-       DEBUG(DEBUG_NOTICE,("Release of IP %s/%u on interface %s\n", 
-                inet_ntoa(pip->sin.sin_addr), vnn->public_netmask_bits, 
-                vnn->iface));
+       if (vnn->iface == NULL) {
+               DEBUG(DEBUG_CRIT,(__location__ " release_ip of IP %s is known to the kernel, "
+                                 "but we have no interface assigned, has someone manually configured it?"
+                                 "banning ourself\n",
+                                ctdb_addr_to_str(&vnn->public_address)));
+               ctdb_ban_self(ctdb);
+               return -1;
+       }
+
+       DEBUG(DEBUG_NOTICE,("Release of IP %s/%u on interface %s  node:%d\n",
+               ctdb_addr_to_str(&pip->addr),
+               vnn->public_netmask_bits, 
+               ctdb_vnn_iface_string(vnn),
+               pip->pnn));
 
        state = talloc(ctdb, struct takeover_callback_state);
        CTDB_NO_MEMORY(ctdb, state);
 
        state->c = talloc_steal(state, c);
-       state->sin = talloc(state, struct sockaddr_in);       
-       CTDB_NO_MEMORY(ctdb, state->sin);
-       *state->sin = pip->sin;
-
-       state->vnn = vnn;
-
-       ctdb_disable_monitoring(ctdb);
+       state->addr = talloc(state, ctdb_sock_addr);       
+       CTDB_NO_MEMORY(ctdb, state->addr);
+       *state->addr = pip->addr;
+       state->vnn   = vnn;
 
        ret = ctdb_event_script_callback(ctdb, 
-                                        timeval_current_ofs(ctdb->tunable.script_timeout, 0),
                                         state, release_ip_callback, state,
-                                        "releaseip %s %s %u",
-                                        vnn->iface, 
-                                        inet_ntoa(pip->sin.sin_addr),
+                                        false,
+                                        CTDB_EVENT_RELEASE_IP,
+                                        "%s %s %u",
+                                        ctdb_vnn_iface_string(vnn),
+                                        ctdb_addr_to_str(&pip->addr),
                                         vnn->public_netmask_bits);
        if (ret != 0) {
-               ctdb_enable_monitoring(ctdb);
-
                DEBUG(DEBUG_ERR,(__location__ " Failed to release IP %s on interface %s\n",
-                        inet_ntoa(pip->sin.sin_addr), vnn->iface));
+                       ctdb_addr_to_str(&pip->addr),
+                       ctdb_vnn_iface_string(vnn)));
                talloc_free(state);
                return -1;
        }
@@ -389,35 +825,80 @@ int32_t ctdb_control_release_ip(struct ctdb_context *ctdb,
        return 0;
 }
 
+/*
+  release an ip address old v4 style
+ */
+int32_t ctdb_control_release_ipv4(struct ctdb_context *ctdb, 
+                               struct ctdb_req_control *c,
+                               TDB_DATA indata, 
+                               bool *async_reply)
+{
+       TDB_DATA data;
+       
+       data.dsize = sizeof(struct ctdb_public_ip);
+       data.dptr  = (uint8_t *)talloc_zero(c, struct ctdb_public_ip);
+       CTDB_NO_MEMORY(ctdb, data.dptr);
+       
+       memcpy(data.dptr, indata.dptr, indata.dsize);
+       return ctdb_control_release_ip(ctdb, c, data, async_reply);
+}
 
 
-static int add_public_address(struct ctdb_context *ctdb, struct sockaddr_in addr, unsigned mask, const char *iface)
+static int ctdb_add_public_address(struct ctdb_context *ctdb,
+                                  ctdb_sock_addr *addr,
+                                  unsigned mask, const char *ifaces)
 {
        struct ctdb_vnn      *vnn;
+       uint32_t num = 0;
+       char *tmp;
+       const char *iface;
+       int i;
+       int ret;
 
        /* Verify that we dont have an entry for this ip yet */
        for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
-               if (ctdb_same_sockaddr(&addr, &vnn->public_address)) {
+               if (ctdb_same_sockaddr(addr, &vnn->public_address)) {
                        DEBUG(DEBUG_CRIT,("Same ip '%s' specified multiple times in the public address list \n", 
-                                inet_ntoa(addr.sin_addr)));
-                       exit(1);
+                               ctdb_addr_to_str(addr)));
+                       return -1;
                }               
        }
 
        /* create a new vnn structure for this ip address */
        vnn = talloc_zero(ctdb, struct ctdb_vnn);
        CTDB_NO_MEMORY_FATAL(ctdb, vnn);
-       vnn->iface = talloc_strdup(vnn, iface);
-       vnn->public_address      = addr;
+       vnn->ifaces = talloc_array(vnn, const char *, num + 2);
+       tmp = talloc_strdup(vnn, ifaces);
+       CTDB_NO_MEMORY_FATAL(ctdb, tmp);
+       for (iface = strtok(tmp, ","); iface; iface = strtok(NULL, ",")) {
+               vnn->ifaces = talloc_realloc(vnn, vnn->ifaces, const char *, num + 2);
+               CTDB_NO_MEMORY_FATAL(ctdb, vnn->ifaces);
+               vnn->ifaces[num] = talloc_strdup(vnn, iface);
+               CTDB_NO_MEMORY_FATAL(ctdb, vnn->ifaces[num]);
+               num++;
+       }
+       talloc_free(tmp);
+       vnn->ifaces[num] = NULL;
+       vnn->public_address      = *addr;
        vnn->public_netmask_bits = mask;
        vnn->pnn                 = -1;
-       
+
+       for (i=0; vnn->ifaces[i]; i++) {
+               ret = ctdb_add_local_iface(ctdb, vnn->ifaces[i]);
+               if (ret != 0) {
+                       DEBUG(DEBUG_CRIT, (__location__ " failed to add iface[%s] "
+                                          "for public_address[%s]\n",
+                                          vnn->ifaces[i], ctdb_addr_to_str(addr)));
+                       talloc_free(vnn);
+                       return -1;
+               }
+       }
+
        DLIST_ADD(ctdb->vnn, vnn);
 
        return 0;
 }
 
-
 /*
   setup the event script directory
 */
@@ -448,16 +929,23 @@ int ctdb_set_public_addresses(struct ctdb_context *ctdb, const char *alist)
 
        for (i=0;i<nlines;i++) {
                unsigned mask;
-               struct sockaddr_in addr;
-               const char *iface;
-               char *tok;
-
-               tok = strtok(lines[i], " \t");
-               if (!tok || !parse_ip_mask(tok, &addr, &mask)) {
-                       DEBUG(DEBUG_CRIT,("Badly formed line %u in public address list\n", i+1));
-                       talloc_free(lines);
-                       return -1;
+               ctdb_sock_addr addr;
+               const char *addrstr;
+               const char *ifaces;
+               char *tok, *line;
+
+               line = lines[i];
+               while ((*line == ' ') || (*line == '\t')) {
+                       line++;
+               }
+               if (*line == '#') {
+                       continue;
                }
+               if (strcmp(line, "") == 0) {
+                       continue;
+               }
+               tok = strtok(line, " \t");
+               addrstr = tok;
                tok = strtok(NULL, " \t");
                if (tok == NULL) {
                        if (NULL == ctdb->default_public_interface) {
@@ -466,12 +954,17 @@ int ctdb_set_public_addresses(struct ctdb_context *ctdb, const char *alist)
                                talloc_free(lines);
                                return -1;
                        }
-                       iface = ctdb->default_public_interface;
+                       ifaces = ctdb->default_public_interface;
                } else {
-                       iface = tok;
+                       ifaces = tok;
                }
 
-               if (add_public_address(ctdb, addr, mask, iface)) {
+               if (!addrstr || !parse_ip_mask(addrstr, ifaces, &addr, &mask)) {
+                       DEBUG(DEBUG_CRIT,("Badly formed line %u in public address list\n", i+1));
+                       talloc_free(lines);
+                       return -1;
+               }
+               if (ctdb_add_public_address(ctdb, &addr, mask, ifaces)) {
                        DEBUG(DEBUG_CRIT,("Failed to add line %u to the public address list\n", i+1));
                        talloc_free(lines);
                        return -1;
@@ -482,13 +975,53 @@ int ctdb_set_public_addresses(struct ctdb_context *ctdb, const char *alist)
        return 0;
 }
 
+int ctdb_set_single_public_ip(struct ctdb_context *ctdb,
+                             const char *iface,
+                             const char *ip)
+{
+       struct ctdb_vnn *svnn;
+       bool ok;
+       int ret;
+
+       svnn = talloc_zero(ctdb, struct ctdb_vnn);
+       CTDB_NO_MEMORY(ctdb, svnn);
 
+       svnn->ifaces = talloc_array(svnn, const char *, 2);
+       CTDB_NO_MEMORY(ctdb, svnn->ifaces);
+       svnn->ifaces[0] = talloc_strdup(svnn->ifaces, iface);
+       CTDB_NO_MEMORY(ctdb, svnn->ifaces[0]);
+       svnn->ifaces[1] = NULL;
 
+       ok = parse_ip(ip, iface, 0, &svnn->public_address);
+       if (!ok) {
+               talloc_free(svnn);
+               return -1;
+       }
+
+       ret = ctdb_add_local_iface(ctdb, svnn->ifaces[0]);
+       if (ret != 0) {
+               DEBUG(DEBUG_CRIT, (__location__ " failed to add iface[%s] "
+                                  "for single_ip[%s]\n",
+                                  svnn->ifaces[0],
+                                  ctdb_addr_to_str(&svnn->public_address)));
+               talloc_free(svnn);
+               return -1;
+       }
+
+       ret = ctdb_vnn_assign_iface(ctdb, svnn);
+       if (ret != 0) {
+               talloc_free(svnn);
+               return -1;
+       }
+
+       ctdb->single_ip_vnn = svnn;
+       return 0;
+}
 
 struct ctdb_public_ip_list {
        struct ctdb_public_ip_list *next;
        uint32_t pnn;
-       struct sockaddr_in sin;
+       ctdb_sock_addr addr;
 };
 
 
@@ -519,14 +1052,14 @@ static int can_node_serve_ip(struct ctdb_context *ctdb, int32_t pnn,
        struct ctdb_all_public_ips *public_ips;
        int i;
 
-       public_ips = ctdb->nodes[pnn]->public_ips;
+       public_ips = ctdb->nodes[pnn]->available_public_ips;
 
        if (public_ips == NULL) {
                return -1;
        }
 
        for (i=0;i<public_ips->num;i++) {
-               if (ip->sin.sin_addr.s_addr == public_ips->ips[i].sin.sin_addr.s_addr) {
+               if (ctdb_same_ip(&ip->addr, &public_ips->ips[i].addr)) {
                        /* yes, this node can serve this public ip */
                        return 0;
                }
@@ -576,7 +1109,9 @@ static int find_takeover_node(struct ctdb_context *ctdb,
                }
        }       
        if (pnn == -1) {
-               DEBUG(DEBUG_WARNING,(__location__ " Could not find node to take over public address '%s'\n", inet_ntoa(ip->sin.sin_addr)));
+               DEBUG(DEBUG_WARNING,(__location__ " Could not find node to take over public address '%s'\n",
+                       ctdb_addr_to_str(&ip->addr)));
+
                return -1;
        }
 
@@ -584,42 +1119,64 @@ static int find_takeover_node(struct ctdb_context *ctdb,
        return 0;
 }
 
-struct ctdb_public_ip_list *
-add_ip_to_merged_list(struct ctdb_context *ctdb,
-                       TALLOC_CTX *tmp_ctx, 
-                       struct ctdb_public_ip_list *ip_list, 
-                       struct ctdb_public_ip *ip)
+#define IP_KEYLEN      4
+static uint32_t *ip_key(ctdb_sock_addr *ip)
 {
-       struct ctdb_public_ip_list *tmp_ip; 
+       static uint32_t key[IP_KEYLEN];
 
-       /* do we already have this ip in our merged list ?*/
-       for (tmp_ip=ip_list;tmp_ip;tmp_ip=tmp_ip->next) {
+       bzero(key, sizeof(key));
 
-               /* we already  have this public ip in the list */
-               if (tmp_ip->sin.sin_addr.s_addr == ip->sin.sin_addr.s_addr) {
-                       return ip_list;
-               }
+       switch (ip->sa.sa_family) {
+       case AF_INET:
+               key[3]  = htonl(ip->ip.sin_addr.s_addr);
+               break;
+       case AF_INET6:
+               key[0]  = htonl(ip->ip6.sin6_addr.s6_addr32[0]);
+               key[1]  = htonl(ip->ip6.sin6_addr.s6_addr32[1]);
+               key[2]  = htonl(ip->ip6.sin6_addr.s6_addr32[2]);
+               key[3]  = htonl(ip->ip6.sin6_addr.s6_addr32[3]);
+               break;
+       default:
+               DEBUG(DEBUG_ERR, (__location__ " ERROR, unknown family passed :%u\n", ip->sa.sa_family));
+               return key;
        }
 
-       /* this is a new public ip, we must add it to the list */
-       tmp_ip = talloc_zero(tmp_ctx, struct ctdb_public_ip_list);
-       CTDB_NO_MEMORY_NULL(ctdb, tmp_ip);
-       tmp_ip->pnn  = ip->pnn;
-       tmp_ip->sin  = ip->sin;
-       tmp_ip->next = ip_list;
+       return key;
+}
+
+static void *add_ip_callback(void *parm, void *data)
+{
+       return parm;
+}
+
+void getips_count_callback(void *param, void *data)
+{
+       struct ctdb_public_ip_list **ip_list = (struct ctdb_public_ip_list **)param;
+       struct ctdb_public_ip_list *new_ip = (struct ctdb_public_ip_list *)data;
 
-       return tmp_ip;
+       new_ip->next = *ip_list;
+       *ip_list     = new_ip;
 }
 
-struct ctdb_public_ip_list *
-create_merged_ip_list(struct ctdb_context *ctdb, TALLOC_CTX *tmp_ctx)
+static struct ctdb_public_ip_list *
+create_merged_ip_list(struct ctdb_context *ctdb)
 {
        int i, j;
-       struct ctdb_public_ip_list *ip_list = NULL;
+       struct ctdb_public_ip_list *ip_list;
        struct ctdb_all_public_ips *public_ips;
 
+       if (ctdb->ip_tree != NULL) {
+               talloc_free(ctdb->ip_tree);
+               ctdb->ip_tree = NULL;
+       }
+       ctdb->ip_tree = trbt_create(ctdb, 0);
+
        for (i=0;i<ctdb->num_nodes;i++) {
-               public_ips = ctdb->nodes[i]->public_ips;
+               public_ips = ctdb->nodes[i]->known_public_ips;
+
+               if (ctdb->nodes[i]->flags & NODE_FLAGS_DELETED) {
+                       continue;
+               }
 
                /* there were no public ips for this node */
                if (public_ips == NULL) {
@@ -627,11 +1184,24 @@ create_merged_ip_list(struct ctdb_context *ctdb, TALLOC_CTX *tmp_ctx)
                }               
 
                for (j=0;j<public_ips->num;j++) {
-                       ip_list = add_ip_to_merged_list(ctdb, tmp_ctx,
-                                       ip_list, &public_ips->ips[j]);
+                       struct ctdb_public_ip_list *tmp_ip; 
+
+                       tmp_ip = talloc_zero(ctdb->ip_tree, struct ctdb_public_ip_list);
+                       CTDB_NO_MEMORY_NULL(ctdb, tmp_ip);
+                       tmp_ip->pnn  = public_ips->ips[j].pnn;
+                       tmp_ip->addr = public_ips->ips[j].addr;
+                       tmp_ip->next = NULL;
+
+                       trbt_insertarray32_callback(ctdb->ip_tree,
+                               IP_KEYLEN, ip_key(&public_ips->ips[j].addr),
+                               add_ip_callback,
+                               tmp_ip);
                }
        }
 
+       ip_list = NULL;
+       trbt_traversearray32(ctdb->ip_tree, IP_KEYLEN, getips_count_callback, &ip_list);
+
        return ip_list;
 }
 
@@ -642,6 +1212,7 @@ int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap)
 {
        int i, num_healthy, retries;
        struct ctdb_public_ip ip;
+       struct ctdb_public_ipv4 ipv4;
        uint32_t mask;
        struct ctdb_public_ip_list *all_ips, *tmp_ip;
        int maxnode, maxnum=0, minnode, minnum=0, num;
@@ -679,8 +1250,10 @@ int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap)
           a full list of all public addresses that exist in the cluster.
           Walk over all node structures and create a merged list of
           all public addresses that exist in the cluster.
+
+          keep the tree of ips around as ctdb->ip_tree
        */
-       all_ips = create_merged_ip_list(ctdb, tmp_ctx);
+       all_ips = create_merged_ip_list(ctdb);
 
        /* If we want deterministic ip allocations, i.e. that the ip addresses
           will always be allocated the same way for a specific set of
@@ -706,6 +1279,19 @@ int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap)
                }
        }
 
+       /* verify that the assigned nodes can serve that public ip
+          and set it to -1 if not
+       */
+       for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
+               if (tmp_ip->pnn == -1) {
+                       continue;
+               }
+               if (can_node_serve_ip(ctdb, tmp_ip->pnn, tmp_ip) != 0) {
+                       /* this node can not serve this ip. */
+                       tmp_ip->pnn = -1;
+               }
+       }
+
 
        /* now we must redistribute all public addresses with takeover node
           -1 among the nodes available
@@ -718,11 +1304,24 @@ try_again:
        for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
                if (tmp_ip->pnn == -1) {
                        if (find_takeover_node(ctdb, nodemap, mask, tmp_ip, all_ips)) {
-                               DEBUG(DEBUG_WARNING,("Failed to find node to cover ip %s\n", inet_ntoa(tmp_ip->sin.sin_addr)));
+                               DEBUG(DEBUG_WARNING,("Failed to find node to cover ip %s\n",
+                                       ctdb_addr_to_str(&tmp_ip->addr)));
                        }
                }
        }
 
+       /* If we dont want ips to fail back after a node becomes healthy
+          again, we wont even try to reallocat the ip addresses so that
+          they are evenly spread out.
+          This can NOT be used at the same time as DeterministicIPs !
+       */
+       if (1 == ctdb->tunable.no_ip_failback) {
+               if (1 == ctdb->tunable.deterministic_public_ips) {
+                       DEBUG(DEBUG_ERR, ("ERROR: You can not use 'DeterministicIPs' and 'NoIPFailback' at the same time\n"));
+               }
+               goto finished;
+       }
+
 
        /* now, try to make sure the ip adresses are evenly distributed
           across the node.
@@ -773,7 +1372,9 @@ try_again:
                        }
                }
                if (maxnode == -1) {
-                       DEBUG(DEBUG_WARNING,(__location__ " Could not find maxnode. May not be able to serve ip '%s'\n", inet_ntoa(tmp_ip->sin.sin_addr)));
+                       DEBUG(DEBUG_WARNING,(__location__ " Could not find maxnode. May not be able to serve ip '%s'\n",
+                               ctdb_addr_to_str(&tmp_ip->addr)));
+
                        continue;
                }
 
@@ -808,6 +1409,10 @@ try_again:
        }
 
 
+       /* finished distributing the public addresses, now just send the 
+          info out to the nodes
+       */
+finished:
 
        /* at this point ->pnn is the node which will own each IP
           or -1 if there is no node that can cover this ip
@@ -832,17 +1437,30 @@ try_again:
                                */
                                continue;
                        }
-                       ip.pnn = tmp_ip->pnn;
-                       ip.sin.sin_family = AF_INET;
-                       ip.sin.sin_addr   = tmp_ip->sin.sin_addr;
+                       if (tmp_ip->addr.sa.sa_family == AF_INET) {
+                               ipv4.pnn = tmp_ip->pnn;
+                               ipv4.sin = tmp_ip->addr.ip;
+
+                               timeout = TAKEOVER_TIMEOUT();
+                               data.dsize = sizeof(ipv4);
+                               data.dptr  = (uint8_t *)&ipv4;
+                               state = ctdb_control_send(ctdb, nodemap->nodes[i].pnn,
+                                               0, CTDB_CONTROL_RELEASE_IPv4, 0,
+                                               data, async_data,
+                                               &timeout, NULL);
+                       } else {
+                               ip.pnn  = tmp_ip->pnn;
+                               ip.addr = tmp_ip->addr;
+
+                               timeout = TAKEOVER_TIMEOUT();
+                               data.dsize = sizeof(ip);
+                               data.dptr  = (uint8_t *)&ip;
+                               state = ctdb_control_send(ctdb, nodemap->nodes[i].pnn,
+                                               0, CTDB_CONTROL_RELEASE_IP, 0,
+                                               data, async_data,
+                                               &timeout, NULL);
+                       }
 
-                       timeout = TAKEOVER_TIMEOUT();
-                       data.dsize = sizeof(ip);
-                       data.dptr  = (uint8_t *)&ip;
-                       state = ctdb_control_send(ctdb, nodemap->nodes[i].pnn,
-                                       0, CTDB_CONTROL_RELEASE_IP, 0,
-                                       data, async_data,
-                                       &timeout, NULL);
                        if (state == NULL) {
                                DEBUG(DEBUG_ERR,(__location__ " Failed to call async control CTDB_CONTROL_RELEASE_IP to node %u\n", nodemap->nodes[i].pnn));
                                talloc_free(tmp_ctx);
@@ -868,17 +1486,30 @@ try_again:
                        /* this IP won't be taken over */
                        continue;
                }
-               ip.pnn = tmp_ip->pnn;
-               ip.sin.sin_family = AF_INET;
-               ip.sin.sin_addr = tmp_ip->sin.sin_addr;
-
-               timeout = TAKEOVER_TIMEOUT();
-               data.dsize = sizeof(ip);
-               data.dptr  = (uint8_t *)&ip;
-               state = ctdb_control_send(ctdb, tmp_ip->pnn,
-                               0, CTDB_CONTROL_TAKEOVER_IP, 0,
-                               data, async_data,
-                               &timeout, NULL);
+
+               if (tmp_ip->addr.sa.sa_family == AF_INET) {
+                       ipv4.pnn = tmp_ip->pnn;
+                       ipv4.sin = tmp_ip->addr.ip;
+
+                       timeout = TAKEOVER_TIMEOUT();
+                       data.dsize = sizeof(ipv4);
+                       data.dptr  = (uint8_t *)&ipv4;
+                       state = ctdb_control_send(ctdb, tmp_ip->pnn,
+                                       0, CTDB_CONTROL_TAKEOVER_IPv4, 0,
+                                       data, async_data,
+                                       &timeout, NULL);
+               } else {
+                       ip.pnn  = tmp_ip->pnn;
+                       ip.addr = tmp_ip->addr;
+
+                       timeout = TAKEOVER_TIMEOUT();
+                       data.dsize = sizeof(ip);
+                       data.dptr  = (uint8_t *)&ip;
+                       state = ctdb_control_send(ctdb, tmp_ip->pnn,
+                                       0, CTDB_CONTROL_TAKEOVER_IP, 0,
+                                       data, async_data,
+                                       &timeout, NULL);
+               }
                if (state == NULL) {
                        DEBUG(DEBUG_ERR,(__location__ " Failed to call async control CTDB_CONTROL_TAKEOVER_IP to node %u\n", tmp_ip->pnn));
                        talloc_free(tmp_ctx);
@@ -904,7 +1535,10 @@ try_again:
 static int ctdb_client_ip_destructor(struct ctdb_client_ip *ip)
 {
        DEBUG(DEBUG_DEBUG,("destroying client tcp for %s:%u (client_id %u)\n",
-                inet_ntoa(ip->ip.sin_addr), ntohs(ip->ip.sin_port), ip->client_id));
+               ctdb_addr_to_str(&ip->addr),
+               ntohs(ip->addr.ip.sin_port),
+               ip->client_id));
+
        DLIST_REMOVE(ip->ctdb->client_ip_list, ip);
        return 0;
 }
@@ -912,32 +1546,76 @@ static int ctdb_client_ip_destructor(struct ctdb_client_ip *ip)
 /*
   called by a client to inform us of a TCP connection that it is managing
   that should tickled with an ACK when IP takeover is done
+  we handle both the old ipv4 style of packets as well as the new ipv4/6
+  pdus.
  */
 int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
                                TDB_DATA indata)
 {
        struct ctdb_client *client = ctdb_reqid_find(ctdb, client_id, struct ctdb_client);
-       struct ctdb_control_tcp *p = (struct ctdb_control_tcp *)indata.dptr;
+       struct ctdb_control_tcp *old_addr = NULL;
+       struct ctdb_control_tcp_addr new_addr;
+       struct ctdb_control_tcp_addr *tcp_sock = NULL;
        struct ctdb_tcp_list *tcp;
        struct ctdb_control_tcp_vnn t;
        int ret;
        TDB_DATA data;
        struct ctdb_client_ip *ip;
        struct ctdb_vnn *vnn;
+       ctdb_sock_addr addr;
+
+       switch (indata.dsize) {
+       case sizeof(struct ctdb_control_tcp):
+               old_addr = (struct ctdb_control_tcp *)indata.dptr;
+               ZERO_STRUCT(new_addr);
+               tcp_sock = &new_addr;
+               tcp_sock->src.ip  = old_addr->src;
+               tcp_sock->dest.ip = old_addr->dest;
+               break;
+       case sizeof(struct ctdb_control_tcp_addr):
+               tcp_sock = (struct ctdb_control_tcp_addr *)indata.dptr;
+               break;
+       default:
+               DEBUG(DEBUG_ERR,(__location__ " Invalid data structure passed "
+                                "to ctdb_control_tcp_client. size was %d but "
+                                "only allowed sizes are %lu and %lu\n",
+                                (int)indata.dsize,
+                                (long unsigned)sizeof(struct ctdb_control_tcp),
+                                (long unsigned)sizeof(struct ctdb_control_tcp_addr)));
+               return -1;
+       }
 
-       vnn = find_public_ip_vnn(ctdb, p->dest);
+       addr = tcp_sock->src;
+       ctdb_canonicalize_ip(&addr,  &tcp_sock->src);
+       addr = tcp_sock->dest;
+       ctdb_canonicalize_ip(&addr, &tcp_sock->dest);
+
+       ZERO_STRUCT(addr);
+       memcpy(&addr, &tcp_sock->dest, sizeof(addr));
+       vnn = find_public_ip_vnn(ctdb, &addr);
        if (vnn == NULL) {
-               if (ntohl(p->dest.sin_addr.s_addr) != INADDR_LOOPBACK) {
-                       DEBUG(DEBUG_ERR,("Could not add client IP %s. This is not a public address.\n", 
-                                inet_ntoa(p->dest.sin_addr))); 
+               switch (addr.sa.sa_family) {
+               case AF_INET:
+                       if (ntohl(addr.ip.sin_addr.s_addr) != INADDR_LOOPBACK) {
+                               DEBUG(DEBUG_ERR,("Could not add client IP %s. This is not a public address.\n", 
+                                       ctdb_addr_to_str(&addr)));
+                       }
+                       break;
+               case AF_INET6:
+                       DEBUG(DEBUG_ERR,("Could not add client IP %s. This is not a public ipv6 address.\n", 
+                               ctdb_addr_to_str(&addr)));
+                       break;
+               default:
+                       DEBUG(DEBUG_ERR,(__location__ " Unknown family type %d\n", addr.sa.sa_family));
                }
+
                return 0;
        }
 
        if (vnn->pnn != ctdb->pnn) {
                DEBUG(DEBUG_ERR,("Attempt to register tcp client for IP %s we don't hold - failing (client_id %u pid %u)\n",
-                        inet_ntoa(p->dest.sin_addr),
-                        client_id, client->pid));
+                       ctdb_addr_to_str(&addr),
+                       client_id, client->pid));
                /* failing this call will tell smbd to die */
                return -1;
        }
@@ -945,8 +1623,8 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
        ip = talloc(client, struct ctdb_client_ip);
        CTDB_NO_MEMORY(ctdb, ip);
 
-       ip->ctdb = ctdb;
-       ip->ip = p->dest;
+       ip->ctdb      = ctdb;
+       ip->addr      = addr;
        ip->client_id = client_id;
        talloc_set_destructor(ip, ctdb_client_ip_destructor);
        DLIST_ADD(ctdb->client_ip_list, ip);
@@ -954,21 +1632,34 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
        tcp = talloc(client, struct ctdb_tcp_list);
        CTDB_NO_MEMORY(ctdb, tcp);
 
-       tcp->connection.saddr = p->src;
-       tcp->connection.daddr = p->dest;
+       tcp->connection.src_addr = tcp_sock->src;
+       tcp->connection.dst_addr = tcp_sock->dest;
 
        DLIST_ADD(client->tcp_list, tcp);
 
-       t.src  = p->src;
-       t.dest = p->dest;
+       t.src  = tcp_sock->src;
+       t.dest = tcp_sock->dest;
 
        data.dptr = (uint8_t *)&t;
        data.dsize = sizeof(t);
 
-       DEBUG(DEBUG_INFO,("registered tcp client for %u->%s:%u (client_id %u pid %u)\n",
-                (unsigned)ntohs(p->dest.sin_port), 
-                inet_ntoa(p->src.sin_addr),
-                (unsigned)ntohs(p->src.sin_port), client_id, client->pid));
+       switch (addr.sa.sa_family) {
+       case AF_INET:
+               DEBUG(DEBUG_INFO,("registered tcp client for %u->%s:%u (client_id %u pid %u)\n",
+                       (unsigned)ntohs(tcp_sock->dest.ip.sin_port), 
+                       ctdb_addr_to_str(&tcp_sock->src),
+                       (unsigned)ntohs(tcp_sock->src.ip.sin_port), client_id, client->pid));
+               break;
+       case AF_INET6:
+               DEBUG(DEBUG_INFO,("registered tcp client for %u->%s:%u (client_id %u pid %u)\n",
+                       (unsigned)ntohs(tcp_sock->dest.ip6.sin6_port), 
+                       ctdb_addr_to_str(&tcp_sock->src),
+                       (unsigned)ntohs(tcp_sock->src.ip6.sin6_port), client_id, client->pid));
+               break;
+       default:
+               DEBUG(DEBUG_ERR,(__location__ " Unknown family %d\n", addr.sa.sa_family));
+       }
+
 
        /* tell all nodes about this tcp connection */
        ret = ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_CONNECTED, 0, 
@@ -982,16 +1673,6 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
        return 0;
 }
 
-/*
-  see if two sockaddr_in are the same
- */
-static bool same_sockaddr_in(struct sockaddr_in *in1, struct sockaddr_in *in2)
-{
-       return in1->sin_family == in2->sin_family &&
-               in1->sin_port == in2->sin_port &&
-               in1->sin_addr.s_addr == in2->sin_addr.s_addr;
-}
-
 /*
   find a tcp address on a list
  */
@@ -1005,8 +1686,8 @@ static struct ctdb_tcp_connection *ctdb_tcp_find(struct ctdb_tcp_array *array,
        }
 
        for (i=0;i<array->num;i++) {
-               if (same_sockaddr_in(&array->connections[i].saddr, &tcp->saddr) &&
-                   same_sockaddr_in(&array->connections[i].daddr, &tcp->daddr)) {
+               if (ctdb_same_sockaddr(&array->connections[i].src_addr, &tcp->src_addr) &&
+                   ctdb_same_sockaddr(&array->connections[i].dst_addr, &tcp->dst_addr)) {
                        return &array->connections[i];
                }
        }
@@ -1025,10 +1706,11 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata)
        struct ctdb_tcp_connection tcp;
        struct ctdb_vnn *vnn;
 
-       vnn = find_public_ip_vnn(ctdb, p->dest);
+       vnn = find_public_ip_vnn(ctdb, &p->dest);
        if (vnn == NULL) {
-               DEBUG(DEBUG_ERR,(__location__ " got TCP_ADD control for an address which is not a public address '%s'\n", 
-                        inet_ntoa(p->dest.sin_addr)));
+               DEBUG(DEBUG_INFO,(__location__ " got TCP_ADD control for an address which is not a public address '%s'\n",
+                       ctdb_addr_to_str(&p->dest)));
+
                return -1;
        }
 
@@ -1047,21 +1729,21 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata)
                tcparray->connections = talloc_size(tcparray, sizeof(struct ctdb_tcp_connection));
                CTDB_NO_MEMORY(ctdb, tcparray->connections);
 
-               tcparray->connections[tcparray->num].saddr = p->src;
-               tcparray->connections[tcparray->num].daddr = p->dest;
+               tcparray->connections[tcparray->num].src_addr = p->src;
+               tcparray->connections[tcparray->num].dst_addr = p->dest;
                tcparray->num++;
                return 0;
        }
 
 
        /* Do we already have this tickle ?*/
-       tcp.saddr = p->src;
-       tcp.daddr = p->dest;
+       tcp.src_addr = p->src;
+       tcp.dst_addr = p->dest;
        if (ctdb_tcp_find(vnn->tcp_array, &tcp) != NULL) {
                DEBUG(DEBUG_DEBUG,("Already had tickle info for %s:%u for vnn:%u\n",
-                        inet_ntoa(tcp.daddr.sin_addr),
-                        ntohs(tcp.daddr.sin_port),
-                        vnn->pnn));
+                       ctdb_addr_to_str(&tcp.dst_addr),
+                       ntohs(tcp.dst_addr.ip.sin_port),
+                       vnn->pnn));
                return 0;
        }
 
@@ -1072,14 +1754,14 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata)
        CTDB_NO_MEMORY(ctdb, tcparray->connections);
 
        vnn->tcp_array = tcparray;
-       tcparray->connections[tcparray->num].saddr = p->src;
-       tcparray->connections[tcparray->num].daddr = p->dest;
+       tcparray->connections[tcparray->num].src_addr = p->src;
+       tcparray->connections[tcparray->num].dst_addr = p->dest;
        tcparray->num++;
                                
        DEBUG(DEBUG_INFO,("Added tickle info for %s:%u from vnn %u\n",
-                inet_ntoa(tcp.daddr.sin_addr),
-                ntohs(tcp.daddr.sin_port),
-                vnn->pnn));
+               ctdb_addr_to_str(&tcp.dst_addr),
+               ntohs(tcp.dst_addr.ip.sin_port),
+               vnn->pnn));
 
        return 0;
 }
@@ -1093,10 +1775,11 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata)
 static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tcp_connection *conn)
 {
        struct ctdb_tcp_connection *tcpp;
-       struct ctdb_vnn *vnn = find_public_ip_vnn(ctdb, conn->daddr);
+       struct ctdb_vnn *vnn = find_public_ip_vnn(ctdb, &conn->dst_addr);
 
        if (vnn == NULL) {
-               DEBUG(DEBUG_ERR,(__location__ " unable to find public address %s\n", inet_ntoa(conn->daddr.sin_addr)));
+               DEBUG(DEBUG_ERR,(__location__ " unable to find public address %s\n",
+                       ctdb_addr_to_str(&conn->dst_addr)));
                return;
        }
 
@@ -1105,8 +1788,8 @@ static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tc
         */
        if (vnn->tcp_array == NULL) {
                DEBUG(DEBUG_INFO,("Trying to remove tickle that doesnt exist (array is empty) %s:%u\n",
-                        inet_ntoa(conn->daddr.sin_addr),
-                        ntohs(conn->daddr.sin_port)));
+                       ctdb_addr_to_str(&conn->dst_addr),
+                       ntohs(conn->dst_addr.ip.sin_port)));
                return;
        }
 
@@ -1117,8 +1800,8 @@ static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tc
        tcpp = ctdb_tcp_find(vnn->tcp_array, conn);
        if (tcpp == NULL) {
                DEBUG(DEBUG_INFO,("Trying to remove tickle that doesnt exist %s:%u\n",
-                        inet_ntoa(conn->daddr.sin_addr),
-                        ntohs(conn->daddr.sin_port)));
+                       ctdb_addr_to_str(&conn->dst_addr),
+                       ntohs(conn->dst_addr.ip.sin_port)));
                return;
        }
 
@@ -1142,8 +1825,8 @@ static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tc
        vnn->tcp_update_needed = true;
 
        DEBUG(DEBUG_INFO,("Removed tickle info for %s:%u\n",
-                inet_ntoa(conn->saddr.sin_addr),
-                ntohs(conn->saddr.sin_port)));
+               ctdb_addr_to_str(&conn->src_addr),
+               ntohs(conn->src_addr.ip.sin_port)));
 }
 
 
@@ -1180,14 +1863,19 @@ void ctdb_release_all_ips(struct ctdb_context *ctdb)
        struct ctdb_vnn *vnn;
 
        for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
-               if (!ctdb_sys_have_ip(vnn->public_address)) {
+               if (!ctdb_sys_have_ip(&vnn->public_address)) {
+                       ctdb_vnn_unassign_iface(ctdb, vnn);
+                       continue;
+               }
+               if (!vnn->iface) {
                        continue;
                }
-               ctdb_event_script(ctdb, "releaseip %s %s %u",
-                                 vnn->iface, 
-                                 inet_ntoa(vnn->public_address.sin_addr),
+               ctdb_event_script_args(ctdb, CTDB_EVENT_RELEASE_IP, "%s %s %u",
+                                 ctdb_vnn_iface_string(vnn),
+                                 ctdb_addr_to_str(&vnn->public_address),
                                  vnn->public_netmask_bits);
-               release_kill_clients(ctdb, vnn->public_address);
+               release_kill_clients(ctdb, &vnn->public_address);
+               ctdb_vnn_unassign_iface(ctdb, vnn);
        }
 }
 
@@ -1201,6 +1889,11 @@ int32_t ctdb_control_get_public_ips(struct ctdb_context *ctdb,
        int i, num, len;
        struct ctdb_all_public_ips *ips;
        struct ctdb_vnn *vnn;
+       bool only_available = false;
+
+       if (c->flags & CTDB_PUBLIC_IP_FLAGS_ONLY_AVAILABLE) {
+               only_available = true;
+       }
 
        /* count how many public ip structures we have */
        num = 0;
@@ -1213,20 +1906,228 @@ int32_t ctdb_control_get_public_ips(struct ctdb_context *ctdb,
        ips = talloc_zero_size(outdata, len);
        CTDB_NO_MEMORY(ctdb, ips);
 
+       i = 0;
+       for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
+               if (only_available && !ctdb_vnn_available(ctdb, vnn)) {
+                       continue;
+               }
+               ips->ips[i].pnn  = vnn->pnn;
+               ips->ips[i].addr = vnn->public_address;
+               i++;
+       }
+       ips->num = i;
+       len = offsetof(struct ctdb_all_public_ips, ips) +
+               i*sizeof(struct ctdb_public_ip);
+
+       outdata->dsize = len;
+       outdata->dptr  = (uint8_t *)ips;
+
+       return 0;
+}
+
+
+/*
+  get list of public IPs, old ipv4 style.  only returns ipv4 addresses
+ */
+int32_t ctdb_control_get_public_ipsv4(struct ctdb_context *ctdb, 
+                                   struct ctdb_req_control *c, TDB_DATA *outdata)
+{
+       int i, num, len;
+       struct ctdb_all_public_ipsv4 *ips;
+       struct ctdb_vnn *vnn;
+
+       /* count how many public ip structures we have */
+       num = 0;
+       for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
+               if (vnn->public_address.sa.sa_family != AF_INET) {
+                       continue;
+               }
+               num++;
+       }
+
+       len = offsetof(struct ctdb_all_public_ipsv4, ips) + 
+               num*sizeof(struct ctdb_public_ipv4);
+       ips = talloc_zero_size(outdata, len);
+       CTDB_NO_MEMORY(ctdb, ips);
+
        outdata->dsize = len;
        outdata->dptr  = (uint8_t *)ips;
 
        ips->num = num;
        i = 0;
        for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
+               if (vnn->public_address.sa.sa_family != AF_INET) {
+                       continue;
+               }
                ips->ips[i].pnn = vnn->pnn;
-               ips->ips[i].sin = vnn->public_address;
+               ips->ips[i].sin = vnn->public_address.ip;
+               i++;
+       }
+
+       return 0;
+}
+
+int32_t ctdb_control_get_public_ip_info(struct ctdb_context *ctdb,
+                                       struct ctdb_req_control *c,
+                                       TDB_DATA indata,
+                                       TDB_DATA *outdata)
+{
+       int i, num, len;
+       ctdb_sock_addr *addr;
+       struct ctdb_control_public_ip_info *info;
+       struct ctdb_vnn *vnn;
+
+       addr = (ctdb_sock_addr *)indata.dptr;
+
+       vnn = find_public_ip_vnn(ctdb, addr);
+       if (vnn == NULL) {
+               /* if it is not a public ip   it could be our 'single ip' */
+               if (ctdb->single_ip_vnn) {
+                       if (ctdb_same_ip(&ctdb->single_ip_vnn->public_address, addr)) {
+                               vnn = ctdb->single_ip_vnn;
+                       }
+               }
+       }
+       if (vnn == NULL) {
+               DEBUG(DEBUG_ERR,(__location__ " Could not get public ip info, "
+                                "'%s'not a public address\n",
+                                ctdb_addr_to_str(addr)));
+               return -1;
+       }
+
+       /* count how many public ip structures we have */
+       num = 0;
+       for (;vnn->ifaces[num];) {
+               num++;
+       }
+
+       len = offsetof(struct ctdb_control_public_ip_info, ifaces) +
+               num*sizeof(struct ctdb_control_iface_info);
+       info = talloc_zero_size(outdata, len);
+       CTDB_NO_MEMORY(ctdb, info);
+
+       info->ip.addr = vnn->public_address;
+       info->ip.pnn = vnn->pnn;
+       info->active_idx = 0xFFFFFFFF;
+
+       for (i=0; vnn->ifaces[i]; i++) {
+               struct ctdb_iface *cur;
+
+               cur = ctdb_find_iface(ctdb, vnn->ifaces[i]);
+               if (cur == NULL) {
+                       DEBUG(DEBUG_CRIT, (__location__ " internal error iface[%s] unknown\n",
+                                          vnn->ifaces[i]));
+                       return -1;
+               }
+               if (vnn->iface == cur) {
+                       info->active_idx = i;
+               }
+               strcpy(info->ifaces[i].name, cur->name);
+               info->ifaces[i].link_state = cur->link_up;
+               info->ifaces[i].references = cur->references;
+       }
+       info->num = i;
+       len = offsetof(struct ctdb_control_public_ip_info, ifaces) +
+               i*sizeof(struct ctdb_control_iface_info);
+
+       outdata->dsize = len;
+       outdata->dptr  = (uint8_t *)info;
+
+       return 0;
+}
+
+int32_t ctdb_control_get_ifaces(struct ctdb_context *ctdb,
+                               struct ctdb_req_control *c,
+                               TDB_DATA *outdata)
+{
+       int i, num, len;
+       struct ctdb_control_get_ifaces *ifaces;
+       struct ctdb_iface *cur;
+
+       /* count how many public ip structures we have */
+       num = 0;
+       for (cur=ctdb->ifaces;cur;cur=cur->next) {
+               num++;
+       }
+
+       len = offsetof(struct ctdb_control_get_ifaces, ifaces) +
+               num*sizeof(struct ctdb_control_iface_info);
+       ifaces = talloc_zero_size(outdata, len);
+       CTDB_NO_MEMORY(ctdb, ifaces);
+
+       i = 0;
+       for (cur=ctdb->ifaces;cur;cur=cur->next) {
+               strcpy(ifaces->ifaces[i].name, cur->name);
+               ifaces->ifaces[i].link_state = cur->link_up;
+               ifaces->ifaces[i].references = cur->references;
                i++;
        }
+       ifaces->num = i;
+       len = offsetof(struct ctdb_control_get_ifaces, ifaces) +
+               i*sizeof(struct ctdb_control_iface_info);
+
+       outdata->dsize = len;
+       outdata->dptr  = (uint8_t *)ifaces;
 
        return 0;
 }
 
+int32_t ctdb_control_set_iface_link(struct ctdb_context *ctdb,
+                                   struct ctdb_req_control *c,
+                                   TDB_DATA indata)
+{
+       struct ctdb_control_iface_info *info;
+       struct ctdb_iface *iface;
+       bool link_up = false;
+
+       info = (struct ctdb_control_iface_info *)indata.dptr;
+
+       if (info->name[CTDB_IFACE_SIZE] != '\0') {
+               int len = strnlen(info->name, CTDB_IFACE_SIZE);
+               DEBUG(DEBUG_ERR, (__location__ " name[%*.*s] not terminated\n",
+                                 len, len, info->name));
+               return -1;
+       }
+
+       switch (info->link_state) {
+       case 0:
+               link_up = false;
+               break;
+       case 1:
+               link_up = true;
+               break;
+       default:
+               DEBUG(DEBUG_ERR, (__location__ " link_state[%u] invalid\n",
+                                 (unsigned int)info->link_state));
+               return -1;
+       }
+
+       if (info->references != 0) {
+               DEBUG(DEBUG_ERR, (__location__ " references[%u] should be 0\n",
+                                 (unsigned int)info->references));
+               return -1;
+       }
+
+       iface = ctdb_find_iface(ctdb, info->name);
+       if (iface == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ "iface[%s] is unknown\n",
+                                 info->name));
+               return -1;
+       }
+
+       if (link_up == iface->link_up) {
+               return 0;
+       }
+
+       DEBUG(iface->link_up?DEBUG_ERR:DEBUG_NOTICE,
+             ("iface[%s] has changed it's link status %s => %s\n",
+              iface->name,
+              iface->link_up?"up":"down",
+              link_up?"up":"down"));
+
+       iface->link_up = link_up;
+       return 0;
+}
 
 
 /* 
@@ -1237,7 +2138,6 @@ struct ctdb_kill_tcp {
        struct ctdb_vnn *vnn;
        struct ctdb_context *ctdb;
        int capture_fd;
-       int sending_fd;
        struct fd_event *fde;
        trbt_tree_t *connections;
        void *private_data;
@@ -1247,8 +2147,8 @@ struct ctdb_kill_tcp {
   a tcp connection that is to be killed
  */
 struct ctdb_killtcp_con {
-       struct sockaddr_in src;
-       struct sockaddr_in dst;
+       ctdb_sock_addr src_addr;
+       ctdb_sock_addr dst_addr;
        int count;
        struct ctdb_kill_tcp *killtcp;
 };
@@ -1258,15 +2158,41 @@ struct ctdb_killtcp_con {
    this key is used to insert and lookup matching socketpairs that are
    to be tickled and RST
 */
-#define KILLTCP_KEYLEN 4
-static uint32_t *killtcp_key(struct sockaddr_in *src, struct sockaddr_in *dst)
+#define KILLTCP_KEYLEN 10
+static uint32_t *killtcp_key(ctdb_sock_addr *src, ctdb_sock_addr *dst)
 {
        static uint32_t key[KILLTCP_KEYLEN];
 
-       key[0]  = dst->sin_addr.s_addr;
-       key[1]  = src->sin_addr.s_addr;
-       key[2]  = dst->sin_port;
-       key[3]  = src->sin_port;
+       bzero(key, sizeof(key));
+
+       if (src->sa.sa_family != dst->sa.sa_family) {
+               DEBUG(DEBUG_ERR, (__location__ " ERROR, different families passed :%u vs %u\n", src->sa.sa_family, dst->sa.sa_family));
+               return key;
+       }
+       
+       switch (src->sa.sa_family) {
+       case AF_INET:
+               key[0]  = dst->ip.sin_addr.s_addr;
+               key[1]  = src->ip.sin_addr.s_addr;
+               key[2]  = dst->ip.sin_port;
+               key[3]  = src->ip.sin_port;
+               break;
+       case AF_INET6:
+               key[0]  = dst->ip6.sin6_addr.s6_addr32[3];
+               key[1]  = src->ip6.sin6_addr.s6_addr32[3];
+               key[2]  = dst->ip6.sin6_addr.s6_addr32[2];
+               key[3]  = src->ip6.sin6_addr.s6_addr32[2];
+               key[4]  = dst->ip6.sin6_addr.s6_addr32[1];
+               key[5]  = src->ip6.sin6_addr.s6_addr32[1];
+               key[6]  = dst->ip6.sin6_addr.s6_addr32[0];
+               key[7]  = src->ip6.sin6_addr.s6_addr32[0];
+               key[8]  = dst->ip6.sin6_port;
+               key[9]  = src->ip6.sin6_port;
+               break;
+       default:
+               DEBUG(DEBUG_ERR, (__location__ " ERROR, unknown family passed :%u\n", src->sa.sa_family));
+               return key;
+       }
 
        return key;
 }
@@ -1279,7 +2205,7 @@ static void capture_tcp_handler(struct event_context *ev, struct fd_event *fde,
 {
        struct ctdb_kill_tcp *killtcp = talloc_get_type(private_data, struct ctdb_kill_tcp);
        struct ctdb_killtcp_con *con;
-       struct sockaddr_in src, dst;
+       ctdb_sock_addr src, dst;
        uint32_t ack_seq, seq;
 
        if (!(flags & EVENT_FD_READ)) {
@@ -1307,10 +2233,12 @@ static void capture_tcp_handler(struct event_context *ev, struct fd_event *fde,
        /* This one has been tickled !
           now reset him and remove him from the list.
         */
-       DEBUG(DEBUG_INFO, ("sending a tcp reset to kill connection :%d -> %s:%d\n", ntohs(con->dst.sin_port), inet_ntoa(con->src.sin_addr), ntohs(con->src.sin_port)));
+       DEBUG(DEBUG_INFO, ("sending a tcp reset to kill connection :%d -> %s:%d\n",
+               ntohs(con->dst_addr.ip.sin_port),
+               ctdb_addr_to_str(&con->src_addr),
+               ntohs(con->src_addr.ip.sin_port)));
 
-       ctdb_sys_send_tcp(killtcp->sending_fd, &con->dst, 
-                         &con->src, ack_seq, seq, 1);
+       ctdb_sys_send_tcp(&con->dst_addr, &con->src_addr, ack_seq, seq, 1);
        talloc_free(con);
 }
 
@@ -1323,7 +2251,6 @@ static void capture_tcp_handler(struct event_context *ev, struct fd_event *fde,
 static void tickle_connection_traverse(void *param, void *data)
 {
        struct ctdb_killtcp_con *con = talloc_get_type(data, struct ctdb_killtcp_con);
-       struct ctdb_kill_tcp *killtcp = talloc_get_type(param, struct ctdb_kill_tcp);
 
        /* have tried too many times, just give up */
        if (con->count >= 5) {
@@ -1333,7 +2260,10 @@ static void tickle_connection_traverse(void *param, void *data)
 
        /* othervise, try tickling it again */
        con->count++;
-       ctdb_sys_send_tcp(killtcp->sending_fd, &con->dst, &con->src, 0, 0, 0);
+       ctdb_sys_send_tcp(
+               (ctdb_sock_addr *)&con->dst_addr,
+               (ctdb_sock_addr *)&con->src_addr,
+               0, 0, 0);
 }
 
 
@@ -1347,7 +2277,7 @@ static void ctdb_tickle_sentenced_connections(struct event_context *ev, struct t
 
 
        /* loop over all connections sending tickle ACKs */
-       trbt_traversearray32(killtcp->connections, KILLTCP_KEYLEN, tickle_connection_traverse, killtcp);
+       trbt_traversearray32(killtcp->connections, KILLTCP_KEYLEN, tickle_connection_traverse, NULL);
 
 
        /* If there are no more connections to kill we can remove the
@@ -1370,10 +2300,6 @@ static void ctdb_tickle_sentenced_connections(struct event_context *ev, struct t
  */
 static int ctdb_killtcp_destructor(struct ctdb_kill_tcp *killtcp)
 {
-       if (killtcp->sending_fd != -1) {
-               close(killtcp->sending_fd);
-               killtcp->sending_fd = -1;
-       }
        killtcp->vnn->killtcp = NULL;
        return 0;
 }
@@ -1395,20 +2321,25 @@ static void *add_killtcp_callback(void *parm, void *data)
   add a tcp socket to the list of connections we want to RST
  */
 static int ctdb_killtcp_add_connection(struct ctdb_context *ctdb, 
-                                      struct sockaddr_in *src, struct sockaddr_in *dst)
+                                      ctdb_sock_addr *s,
+                                      ctdb_sock_addr *d)
 {
+       ctdb_sock_addr src, dst;
        struct ctdb_kill_tcp *killtcp;
        struct ctdb_killtcp_con *con;
        struct ctdb_vnn *vnn;
 
-       vnn = find_public_ip_vnn(ctdb, *dst);
+       ctdb_canonicalize_ip(s, &src);
+       ctdb_canonicalize_ip(d, &dst);
+
+       vnn = find_public_ip_vnn(ctdb, &dst);
        if (vnn == NULL) {
-               vnn = find_public_ip_vnn(ctdb, *src);
+               vnn = find_public_ip_vnn(ctdb, &src);
        }
        if (vnn == NULL) {
                /* if it is not a public ip   it could be our 'single ip' */
                if (ctdb->single_ip_vnn) {
-                       if (ctdb_same_ip(&ctdb->single_ip_vnn->public_address, dst)) {
+                       if (ctdb_same_ip(&ctdb->single_ip_vnn->public_address, &dst)) {
                                vnn = ctdb->single_ip_vnn;
                        }
                }
@@ -1430,7 +2361,6 @@ static int ctdb_killtcp_add_connection(struct ctdb_context *ctdb,
                killtcp->vnn         = vnn;
                killtcp->ctdb        = ctdb;
                killtcp->capture_fd  = -1;
-               killtcp->sending_fd  = -1;
                killtcp->connections = trbt_create(killtcp, 0);
 
                vnn->killtcp         = killtcp;
@@ -1444,34 +2374,26 @@ static int ctdb_killtcp_add_connection(struct ctdb_context *ctdb,
        */
        con = talloc(killtcp, struct ctdb_killtcp_con);
        CTDB_NO_MEMORY(ctdb, con);
-       con->src     = *src;
-       con->dst     = *dst;
-       con->count   = 0;
-       con->killtcp = killtcp;
+       con->src_addr = src;
+       con->dst_addr = dst;
+       con->count    = 0;
+       con->killtcp  = killtcp;
 
 
        trbt_insertarray32_callback(killtcp->connections,
-                       KILLTCP_KEYLEN, killtcp_key(&con->dst, &con->src),
+                       KILLTCP_KEYLEN, killtcp_key(&con->dst_addr, &con->src_addr),
                        add_killtcp_callback, con);
 
-       /* 
-          If we dont have a socket to send from yet we must create it
-        */
-       if (killtcp->sending_fd == -1) {
-               killtcp->sending_fd = ctdb_sys_open_sending_socket();
-               if (killtcp->sending_fd == -1) {
-                       DEBUG(DEBUG_CRIT,(__location__ " Failed to open sending socket for killtcp\n"));
-                       goto failed;
-               }
-       }
-
        /* 
           If we dont have a socket to listen on yet we must create it
         */
        if (killtcp->capture_fd == -1) {
-               killtcp->capture_fd = ctdb_sys_open_capture_socket(vnn->iface, &killtcp->private_data);
+               const char *iface = ctdb_vnn_iface_string(vnn);
+               killtcp->capture_fd = ctdb_sys_open_capture_socket(iface, &killtcp->private_data);
                if (killtcp->capture_fd == -1) {
-                       DEBUG(DEBUG_CRIT,(__location__ " Failed to open capturing socket for killtcp\n"));
+                       DEBUG(DEBUG_CRIT,(__location__ " Failed to open capturing "
+                                         "socket on iface '%s' for killtcp (%s)\n",
+                                         iface, strerror(errno)));
                        goto failed;
                }
        }
@@ -1490,7 +2412,10 @@ static int ctdb_killtcp_add_connection(struct ctdb_context *ctdb,
        }
 
        /* tickle him once now */
-       ctdb_sys_send_tcp(killtcp->sending_fd, &con->dst, &con->src, 0, 0, 0);
+       ctdb_sys_send_tcp(
+               &con->dst_addr,
+               &con->src_addr,
+               0, 0, 0);
 
        return 0;
 
@@ -1507,7 +2432,7 @@ int32_t ctdb_control_kill_tcp(struct ctdb_context *ctdb, TDB_DATA indata)
 {
        struct ctdb_control_killtcp *killtcp = (struct ctdb_control_killtcp *)indata.dptr;
 
-       return ctdb_killtcp_add_connection(ctdb, &killtcp->src, &killtcp->dst);
+       return ctdb_killtcp_add_connection(ctdb, &killtcp->src_addr, &killtcp->dst_addr);
 }
 
 /*
@@ -1540,10 +2465,11 @@ int32_t ctdb_control_set_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
                return -1;
        }       
 
-       vnn = find_public_ip_vnn(ctdb, list->ip);
+       vnn = find_public_ip_vnn(ctdb, &list->addr);
        if (vnn == NULL) {
-               DEBUG(DEBUG_ERR,(__location__ " Could not set tcp tickle list, '%s' is not a public address\n", 
-                        inet_ntoa(list->ip.sin_addr))); 
+               DEBUG(DEBUG_INFO,(__location__ " Could not set tcp tickle list, '%s' is not a public address\n", 
+                       ctdb_addr_to_str(&list->addr)));
+
                return 1;
        }
 
@@ -1574,16 +2500,17 @@ int32_t ctdb_control_set_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
  */
 int32_t ctdb_control_get_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA indata, TDB_DATA *outdata)
 {
-       struct sockaddr_in *ip = (struct sockaddr_in *)indata.dptr;
+       ctdb_sock_addr *addr = (ctdb_sock_addr *)indata.dptr;
        struct ctdb_control_tcp_tickle_list *list;
        struct ctdb_tcp_array *tcparray;
        int num;
        struct ctdb_vnn *vnn;
 
-       vnn = find_public_ip_vnn(ctdb, *ip);
+       vnn = find_public_ip_vnn(ctdb, addr);
        if (vnn == NULL) {
                DEBUG(DEBUG_ERR,(__location__ " Could not get tcp tickle list, '%s' is not a public address\n", 
-                        inet_ntoa(ip->sin_addr))); 
+                       ctdb_addr_to_str(addr)));
+
                return 1;
        }
 
@@ -1602,7 +2529,7 @@ int32_t ctdb_control_get_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
        CTDB_NO_MEMORY(ctdb, outdata->dptr);
        list = (struct ctdb_control_tcp_tickle_list *)outdata->dptr;
 
-       list->ip = *ip;
+       list->addr = *addr;
        list->tickles.num = num;
        if (num) {
                memcpy(&list->tickles.connections[0], tcparray->connections, 
@@ -1618,7 +2545,7 @@ int32_t ctdb_control_get_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
  */
 static int ctdb_ctrl_set_tcp_tickles(struct ctdb_context *ctdb, 
                              struct timeval timeout, uint32_t destnode, 
-                             struct sockaddr_in *ip,
+                             ctdb_sock_addr *addr,
                              struct ctdb_tcp_array *tcparray)
 {
        int ret, num;
@@ -1638,7 +2565,7 @@ static int ctdb_ctrl_set_tcp_tickles(struct ctdb_context *ctdb,
        CTDB_NO_MEMORY(ctdb, data.dptr);
 
        list = (struct ctdb_control_tcp_tickle_list *)data.dptr;
-       list->ip = *ip;
+       list->addr = *addr;
        list->tickles.num = num;
        if (tcparray) {
                memcpy(&list->tickles.connections[0], tcparray->connections, sizeof(struct ctdb_tcp_connection) * num);
@@ -1686,8 +2613,8 @@ static void ctdb_update_tcp_tickles(struct event_context *ev,
                                &vnn->public_address,
                                vnn->tcp_array);
                if (ret != 0) {
-                       DEBUG(DEBUG_ERR,("Failed to send the tickle update for public address %s\n", 
-                                inet_ntoa(vnn->public_address.sin_addr)));
+                       DEBUG(DEBUG_ERR,("Failed to send the tickle update for public address %s\n",
+                               ctdb_addr_to_str(&vnn->public_address)));
                }
        }
 
@@ -1714,7 +2641,7 @@ void ctdb_start_tcp_tickle_update(struct ctdb_context *ctdb)
 
 struct control_gratious_arp {
        struct ctdb_context *ctdb;
-       struct sockaddr_in sin;
+       ctdb_sock_addr addr;
        const char *iface;
        int count;
 };
@@ -1729,9 +2656,10 @@ static void send_gratious_arp(struct event_context *ev, struct timed_event *te,
        struct control_gratious_arp *arp = talloc_get_type(private_data, 
                                                        struct control_gratious_arp);
 
-       ret = ctdb_sys_send_arp(&arp->sin, arp->iface);
+       ret = ctdb_sys_send_arp(&arp->addr, arp->iface);
        if (ret != 0) {
-               DEBUG(DEBUG_ERR,(__location__ " sending of gratious arp failed (%s)\n", strerror(errno)));
+               DEBUG(DEBUG_ERR,(__location__ " sending of gratious arp on iface '%s' failed (%s)\n",
+                                arp->iface, strerror(errno)));
        }
 
 
@@ -1755,10 +2683,11 @@ int32_t ctdb_control_send_gratious_arp(struct ctdb_context *ctdb, TDB_DATA indat
        struct ctdb_control_gratious_arp *gratious_arp = (struct ctdb_control_gratious_arp *)indata.dptr;
        struct control_gratious_arp *arp;
 
-
        /* verify the size of indata */
        if (indata.dsize < offsetof(struct ctdb_control_gratious_arp, iface)) {
-               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_gratious_arp structure\n"));
+               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_gratious_arp structure. Got %u require %u bytes\n", 
+                                (unsigned)indata.dsize, 
+                                (unsigned)offsetof(struct ctdb_control_gratious_arp, iface)));
                return -1;
        }
        if (indata.dsize != 
@@ -1777,7 +2706,7 @@ int32_t ctdb_control_send_gratious_arp(struct ctdb_context *ctdb, TDB_DATA indat
        CTDB_NO_MEMORY(ctdb, arp);
 
        arp->ctdb  = ctdb;
-       arp->sin   = gratious_arp->sin;
+       arp->addr   = gratious_arp->addr;
        arp->iface = talloc_strdup(arp, gratious_arp->iface);
        CTDB_NO_MEMORY(ctdb, arp->iface);
        arp->count = 0;
@@ -1788,3 +2717,156 @@ int32_t ctdb_control_send_gratious_arp(struct ctdb_context *ctdb, TDB_DATA indat
        return 0;
 }
 
+int32_t ctdb_control_add_public_address(struct ctdb_context *ctdb, TDB_DATA indata)
+{
+       struct ctdb_control_ip_iface *pub = (struct ctdb_control_ip_iface *)indata.dptr;
+       int ret;
+
+       /* verify the size of indata */
+       if (indata.dsize < offsetof(struct ctdb_control_ip_iface, iface)) {
+               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_ip_iface structure\n"));
+               return -1;
+       }
+       if (indata.dsize != 
+               ( offsetof(struct ctdb_control_ip_iface, iface)
+               + pub->len ) ){
+
+               DEBUG(DEBUG_ERR,(__location__ " Wrong size of indata. Was %u bytes "
+                       "but should be %u bytes\n", 
+                        (unsigned)indata.dsize, 
+                        (unsigned)(offsetof(struct ctdb_control_ip_iface, iface)+pub->len)));
+               return -1;
+       }
+
+       ret = ctdb_add_public_address(ctdb, &pub->addr, pub->mask, &pub->iface[0]);
+
+       if (ret != 0) {
+               DEBUG(DEBUG_ERR,(__location__ " Failed to add public address\n"));
+               return -1;
+       }
+
+       return 0;
+}
+
+/*
+  called when releaseip event finishes for del_public_address
+ */
+static void delete_ip_callback(struct ctdb_context *ctdb, int status, 
+                               void *private_data)
+{
+       talloc_free(private_data);
+}
+
+int32_t ctdb_control_del_public_address(struct ctdb_context *ctdb, TDB_DATA indata)
+{
+       struct ctdb_control_ip_iface *pub = (struct ctdb_control_ip_iface *)indata.dptr;
+       struct ctdb_vnn *vnn;
+       int ret;
+
+       /* verify the size of indata */
+       if (indata.dsize < offsetof(struct ctdb_control_ip_iface, iface)) {
+               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_ip_iface structure\n"));
+               return -1;
+       }
+       if (indata.dsize != 
+               ( offsetof(struct ctdb_control_ip_iface, iface)
+               + pub->len ) ){
+
+               DEBUG(DEBUG_ERR,(__location__ " Wrong size of indata. Was %u bytes "
+                       "but should be %u bytes\n", 
+                        (unsigned)indata.dsize, 
+                        (unsigned)(offsetof(struct ctdb_control_ip_iface, iface)+pub->len)));
+               return -1;
+       }
+
+       /* walk over all public addresses until we find a match */
+       for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
+               if (ctdb_same_ip(&vnn->public_address, &pub->addr)) {
+                       TALLOC_CTX *mem_ctx;
+
+                       DLIST_REMOVE(ctdb->vnn, vnn);
+                       if (vnn->iface == NULL) {
+                               talloc_free(vnn);
+                               return 0;
+                       }
+
+                       mem_ctx = talloc_new(ctdb);
+                       ret = ctdb_event_script_callback(ctdb, 
+                                        mem_ctx, delete_ip_callback, mem_ctx,
+                                        false,
+                                        CTDB_EVENT_RELEASE_IP,
+                                        "%s %s %u",
+                                        ctdb_vnn_iface_string(vnn),
+                                        ctdb_addr_to_str(&vnn->public_address),
+                                        vnn->public_netmask_bits);
+                       ctdb_vnn_unassign_iface(ctdb, vnn);
+                       talloc_free(vnn);
+                       if (ret != 0) {
+                               return -1;
+                       }
+                       return 0;
+               }
+       }
+
+       return -1;
+}
+
+/* This function is called from the recovery daemon to verify that a remote
+   node has the expected ip allocation.
+   This is verified against ctdb->ip_tree
+*/
+int verify_remote_ip_allocation(struct ctdb_context *ctdb, struct ctdb_all_public_ips *ips)
+{
+       struct ctdb_public_ip_list *tmp_ip; 
+       int i;
+
+       if (ctdb->ip_tree == NULL) {
+               /* dont know the expected allocation yet, assume remote node
+                  is correct. */
+               return 0;
+       }
+
+       if (ips == NULL) {
+               return 0;
+       }
+
+       for (i=0; i<ips->num; i++) {
+               tmp_ip = trbt_lookuparray32(ctdb->ip_tree, IP_KEYLEN, ip_key(&ips->ips[i].addr));
+               if (tmp_ip == NULL) {
+                       DEBUG(DEBUG_ERR,(__location__ " Could not find host for address %s, reassign ips\n", ctdb_addr_to_str(&ips->ips[i].addr)));
+                       return -1;
+               }
+
+               if (tmp_ip->pnn == -1 || ips->ips[i].pnn == -1) {
+                       continue;
+               }
+
+               if (tmp_ip->pnn != ips->ips[i].pnn) {
+                       DEBUG(DEBUG_ERR,("Inconsistent ip allocation. Trigger reallocation. Thinks %s is held by node %u while it is held by node %u\n", ctdb_addr_to_str(&ips->ips[i].addr), ips->ips[i].pnn, tmp_ip->pnn));
+                       return -1;
+               }
+       }
+
+       return 0;
+}
+
+int update_ip_assignment_tree(struct ctdb_context *ctdb, struct ctdb_public_ip *ip)
+{
+       struct ctdb_public_ip_list *tmp_ip; 
+
+       if (ctdb->ip_tree == NULL) {
+               DEBUG(DEBUG_ERR,("No ctdb->ip_tree yet. Failed to update ip assignment\n"));
+               return -1;
+       }
+
+       tmp_ip = trbt_lookuparray32(ctdb->ip_tree, IP_KEYLEN, ip_key(&ip->addr));
+       if (tmp_ip == NULL) {
+               DEBUG(DEBUG_ERR,(__location__ " Could not find record for address %s, update ip\n", ctdb_addr_to_str(&ip->addr)));
+               return -1;
+       }
+
+       DEBUG(DEBUG_NOTICE,("Updated ip assignment tree for ip : %s from node %u to node %u\n", ctdb_addr_to_str(&ip->addr), tmp_ip->pnn, ip->pnn));
+       tmp_ip->pnn = ip->pnn;
+
+       return 0;
+}