ctdb-ipalloc: Fix a memory leak
[obnox/samba/samba-obnox.git] / ctdb / server / ctdb_takeover.c
index 7c18542d0bed43fd04a48bcf73939d4511eb6d37..227bd162d441c8d89504e4c4e8b3ace3120c90d4 100644 (file)
    You should have received a copy of the GNU General Public License
    along with this program; if not, see <http://www.gnu.org/licenses/>.
 */
-#include "includes.h"
-#include "tdb.h"
-#include "lib/util/dlinklist.h"
+#include "replace.h"
 #include "system/network.h"
 #include "system/filesys.h"
+#include "system/time.h"
 #include "system/wait.h"
-#include "../include/ctdb_private.h"
-#include "../common/rb_tree.h"
+
+#include <talloc.h>
+#include <tevent.h>
+
+#include "lib/util/dlinklist.h"
+#include "lib/util/debug.h"
+#include "lib/util/samba_util.h"
+#include "lib/util/util_process.h"
+
+#include "ctdb_private.h"
+#include "ctdb_client.h"
+
+#include "common/rb_tree.h"
+#include "common/reqid.h"
+#include "common/system.h"
+#include "common/common.h"
+#include "common/logging.h"
 
 
 #define TAKEOVER_TIMEOUT() timeval_current_ofs(ctdb->tunable.takeover_timeout,0)
 #define CTDB_ARP_REPEAT   3
 
 /* Flags used in IP allocation algorithms. */
-struct ctdb_ipflags {
-       bool noiptakeover;
-       bool noiphost;
-       enum ctdb_runstate runstate;
+enum ipalloc_algorithm {
+       IPALLOC_DETERMINISTIC,
+       IPALLOC_NONDETERMINISTIC,
+       IPALLOC_LCP2,
 };
 
-struct ctdb_iface {
-       struct ctdb_iface *prev, *next;
+struct ipalloc_state {
+       uint32_t num;
+
+       /* Arrays with data for each node */
+       struct ctdb_public_ip_list_old **known_public_ips;
+       struct ctdb_public_ip_list_old **available_public_ips;
+       bool *noiptakeover;
+       bool *noiphost;
+
+       struct public_ip_list *all_ips;
+       enum ipalloc_algorithm algorithm;
+       uint32_t no_ip_failback;
+       uint32_t *force_rebalance_nodes;
+};
+
+struct ctdb_interface {
+       struct ctdb_interface *prev, *next;
        const char *name;
        bool link_up;
        uint32_t references;
@@ -58,9 +87,9 @@ static const char *ctdb_vnn_iface_string(const struct ctdb_vnn *vnn)
 
 static int ctdb_add_local_iface(struct ctdb_context *ctdb, const char *iface)
 {
-       struct ctdb_iface *i;
+       struct ctdb_interface *i;
 
-       /* Verify that we dont have an entry for this ip yet */
+       /* Verify that we don't have an entry for this ip yet */
        for (i=ctdb->ifaces;i;i=i->next) {
                if (strcmp(i->name, iface) == 0) {
                        return 0;
@@ -68,24 +97,12 @@ static int ctdb_add_local_iface(struct ctdb_context *ctdb, const char *iface)
        }
 
        /* create a new structure for this interface */
-       i = talloc_zero(ctdb, struct ctdb_iface);
+       i = talloc_zero(ctdb, struct ctdb_interface);
        CTDB_NO_MEMORY_FATAL(ctdb, i);
        i->name = talloc_strdup(i, iface);
        CTDB_NO_MEMORY(ctdb, i->name);
-       /*
-        * If link_up defaults to true then IPs can be allocated to a
-        * node during the first recovery.  However, then an interface
-        * could have its link marked down during the startup event,
-        * causing the IP to move almost immediately.  If link_up
-        * defaults to false then, during normal operation, IPs added
-        * to a new interface can't be assigned until a monitor cycle
-        * has occurred and marked the new interfaces up.  This makes
-        * IP allocation unpredictable.  The following is a neat
-        * compromise: early in startup link_up defaults to false, so
-        * IPs can't be assigned, and after startup IPs can be
-        * assigned immediately.
-        */
-       i->link_up = (ctdb->runstate == CTDB_RUNSTATE_RUNNING);
+
+       i->link_up = true;
 
        DLIST_ADD(ctdb->ifaces, i);
 
@@ -121,7 +138,7 @@ static bool vnn_has_interface_with_name(struct ctdb_vnn *vnn,
 static void ctdb_remove_orphaned_ifaces(struct ctdb_context *ctdb,
                                        struct ctdb_vnn *vnn)
 {
-       struct ctdb_iface *i, *next;
+       struct ctdb_interface *i, *next;
 
        /* For each interface, check if there's an IP using it. */
        for (i = ctdb->ifaces; i != NULL; i = next) {
@@ -159,10 +176,10 @@ static void ctdb_remove_orphaned_ifaces(struct ctdb_context *ctdb,
 }
 
 
-static struct ctdb_iface *ctdb_find_iface(struct ctdb_context *ctdb,
-                                         const char *iface)
+static struct ctdb_interface *ctdb_find_iface(struct ctdb_context *ctdb,
+                                             const char *iface)
 {
-       struct ctdb_iface *i;
+       struct ctdb_interface *i;
 
        for (i=ctdb->ifaces;i;i=i->next) {
                if (strcmp(i->name, iface) == 0) {
@@ -173,12 +190,12 @@ static struct ctdb_iface *ctdb_find_iface(struct ctdb_context *ctdb,
        return NULL;
 }
 
-static struct ctdb_iface *ctdb_vnn_best_iface(struct ctdb_context *ctdb,
-                                             struct ctdb_vnn *vnn)
+static struct ctdb_interface *ctdb_vnn_best_iface(struct ctdb_context *ctdb,
+                                                 struct ctdb_vnn *vnn)
 {
        int i;
-       struct ctdb_iface *cur = NULL;
-       struct ctdb_iface *best = NULL;
+       struct ctdb_interface *cur = NULL;
+       struct ctdb_interface *best = NULL;
 
        for (i=0; vnn->ifaces[i]; i++) {
 
@@ -208,7 +225,7 @@ static struct ctdb_iface *ctdb_vnn_best_iface(struct ctdb_context *ctdb,
 static int32_t ctdb_vnn_assign_iface(struct ctdb_context *ctdb,
                                     struct ctdb_vnn *vnn)
 {
-       struct ctdb_iface *best = NULL;
+       struct ctdb_interface *best = NULL;
 
        if (vnn->iface) {
                DEBUG(DEBUG_INFO, (__location__ " public address '%s' "
@@ -260,6 +277,11 @@ static bool ctdb_vnn_available(struct ctdb_context *ctdb,
 {
        int i;
 
+       /* Nodes that are not RUNNING can not host IPs */
+       if (ctdb->runstate != CTDB_RUNSTATE_RUNNING) {
+               return false;
+       }
+
        if (vnn->delete_pending) {
                return false;
        }
@@ -269,7 +291,7 @@ static bool ctdb_vnn_available(struct ctdb_context *ctdb,
        }
 
        for (i=0; vnn->ifaces[i]; i++) {
-               struct ctdb_iface *cur;
+               struct ctdb_interface *cur;
 
                cur = ctdb_find_iface(ctdb, vnn->ifaces[i]);
                if (cur == NULL) {
@@ -298,7 +320,7 @@ struct ctdb_takeover_arp {
  */
 struct ctdb_tcp_list {
        struct ctdb_tcp_list *prev, *next;
-       struct ctdb_tcp_connection connection;
+       struct ctdb_connection connection;
 };
 
 /*
@@ -315,7 +337,8 @@ struct ctdb_client_ip {
 /*
   send a gratuitous arp
  */
-static void ctdb_control_send_arp(struct event_context *ev, struct timed_event *te, 
+static void ctdb_control_send_arp(struct tevent_context *ev,
+                                 struct tevent_timer *te,
                                  struct timeval t, void *private_data)
 {
        struct ctdb_takeover_arp *arp = talloc_get_type(private_data, 
@@ -333,20 +356,20 @@ static void ctdb_control_send_arp(struct event_context *ev, struct timed_event *
        tcparray = arp->tcparray;
        if (tcparray) {
                for (i=0;i<tcparray->num;i++) {
-                       struct ctdb_tcp_connection *tcon;
+                       struct ctdb_connection *tcon;
 
                        tcon = &tcparray->connections[i];
                        DEBUG(DEBUG_INFO,("sending tcp tickle ack for %u->%s:%u\n",
-                               (unsigned)ntohs(tcon->dst_addr.ip.sin_port), 
-                               ctdb_addr_to_str(&tcon->src_addr),
-                               (unsigned)ntohs(tcon->src_addr.ip.sin_port)));
+                               (unsigned)ntohs(tcon->dst.ip.sin_port),
+                               ctdb_addr_to_str(&tcon->src),
+                               (unsigned)ntohs(tcon->src.ip.sin_port)));
                        ret = ctdb_sys_send_tcp(
-                               &tcon->src_addr, 
-                               &tcon->dst_addr,
+                               &tcon->src,
+                               &tcon->dst,
                                0, 0, 0);
                        if (ret != 0) {
                                DEBUG(DEBUG_CRIT,(__location__ " Failed to send tcp tickle ack for %s\n",
-                                       ctdb_addr_to_str(&tcon->src_addr)));
+                                       ctdb_addr_to_str(&tcon->src)));
                        }
                }
        }
@@ -358,9 +381,9 @@ static void ctdb_control_send_arp(struct event_context *ev, struct timed_event *
                return;
        }
 
-       event_add_timed(arp->ctdb->ev, arp->vnn->takeover_ctx, 
-                       timeval_current_ofs(CTDB_ARP_INTERVAL, 100000), 
-                       ctdb_control_send_arp, arp);
+       tevent_add_timer(arp->ctdb->ev, arp->vnn->takeover_ctx,
+                        timeval_current_ofs(CTDB_ARP_INTERVAL, 100000),
+                        ctdb_control_send_arp, arp);
 }
 
 static int32_t ctdb_announce_vnn_iface(struct ctdb_context *ctdb,
@@ -395,20 +418,20 @@ static int32_t ctdb_announce_vnn_iface(struct ctdb_context *ctdb,
                vnn->tcp_update_needed = true;
        }
 
-       event_add_timed(arp->ctdb->ev, vnn->takeover_ctx,
-                       timeval_zero(), ctdb_control_send_arp, arp);
+       tevent_add_timer(arp->ctdb->ev, vnn->takeover_ctx,
+                        timeval_zero(), ctdb_control_send_arp, arp);
 
        return 0;
 }
 
 struct takeover_callback_state {
-       struct ctdb_req_control *c;
+       struct ctdb_req_control_old *c;
        ctdb_sock_addr *addr;
        struct ctdb_vnn *vnn;
 };
 
 struct ctdb_do_takeip_state {
-       struct ctdb_req_control *c;
+       struct ctdb_req_control_old *c;
        struct ctdb_vnn *vnn;
 };
 
@@ -473,7 +496,7 @@ static int ctdb_takeip_destructor(struct ctdb_do_takeip_state *state)
   take over an ip address
  */
 static int32_t ctdb_do_takeip(struct ctdb_context *ctdb,
-                             struct ctdb_req_control *c,
+                             struct ctdb_req_control_old *c,
                              struct ctdb_vnn *vnn)
 {
        int ret;
@@ -532,8 +555,8 @@ static int32_t ctdb_do_takeip(struct ctdb_context *ctdb,
 }
 
 struct ctdb_do_updateip_state {
-       struct ctdb_req_control *c;
-       struct ctdb_iface *old;
+       struct ctdb_req_control_old *c;
+       struct ctdb_interface *old;
        struct ctdb_vnn *vnn;
 };
 
@@ -596,12 +619,12 @@ static int ctdb_updateip_destructor(struct ctdb_do_updateip_state *state)
   update (move) an ip address
  */
 static int32_t ctdb_do_updateip(struct ctdb_context *ctdb,
-                               struct ctdb_req_control *c,
+                               struct ctdb_req_control_old *c,
                                struct ctdb_vnn *vnn)
 {
        int ret;
        struct ctdb_do_updateip_state *state;
-       struct ctdb_iface *old = vnn->iface;
+       struct ctdb_interface *old = vnn->iface;
        const char *new_name;
 
        if (vnn->update_in_flight) {
@@ -692,7 +715,7 @@ static struct ctdb_vnn *find_public_ip_vnn(struct ctdb_context *ctdb, ctdb_sock_
   take over an ip address
  */
 int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb,
-                                struct ctdb_req_control *c,
+                                struct ctdb_req_control_old *c,
                                 TDB_DATA indata,
                                 bool *async_reply)
 {
@@ -702,7 +725,7 @@ int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb,
        bool have_ip = false;
        bool do_updateip = false;
        bool do_takeip = false;
-       struct ctdb_iface *best_iface = NULL;
+       struct ctdb_interface *best_iface = NULL;
 
        if (pip->pnn != ctdb->pnn) {
                DEBUG(DEBUG_ERR,(__location__" takeoverip called for an ip '%s' "
@@ -720,7 +743,7 @@ int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb,
                return 0;
        }
 
-       if (ctdb->do_checkpublicip) {
+       if (ctdb->tunable.disable_ip_failover == 0 && ctdb->do_checkpublicip) {
                have_ip = ctdb_sys_have_ip(&pip->addr);
        }
        best_iface = ctdb_vnn_best_iface(ctdb, vnn);
@@ -832,9 +855,9 @@ static void release_kill_clients(struct ctdb_context *ctdb, ctdb_sock_addr *addr
                        ctdb_addr_to_str(&ip->addr)));
 
                if (ctdb_same_ip(&tmp_addr, addr)) {
-                       struct ctdb_client *client = ctdb_reqid_find(ctdb, 
-                                                                    ip->client_id, 
-                                                                    struct ctdb_client);
+                       struct ctdb_client *client = reqid_find(ctdb->idr,
+                                                               ip->client_id,
+                                                               struct ctdb_client);
                        DEBUG(DEBUG_INFO,("matched client %u with IP %s and pid %u\n", 
                                ip->client_id,
                                ctdb_addr_to_str(&ip->addr),
@@ -873,7 +896,7 @@ static void release_ip_callback(struct ctdb_context *ctdb, int status,
                ctdb_ban_self(ctdb);
        }
 
-       if (ctdb->do_checkpublicip) {
+       if (ctdb->tunable.disable_ip_failover == 0 && ctdb->do_checkpublicip) {
                if  (ctdb_sys_have_ip(state->addr)) {
                        DEBUG(DEBUG_ERR,
                              ("IP %s still hosted during release IP callback, failing\n",
@@ -924,7 +947,7 @@ static int ctdb_releaseip_destructor(struct takeover_callback_state *state)
   release an ip address
  */
 int32_t ctdb_control_release_ip(struct ctdb_context *ctdb, 
-                               struct ctdb_req_control *c,
+                               struct ctdb_req_control_old *c,
                                TDB_DATA indata, 
                                bool *async_reply)
 {
@@ -952,7 +975,7 @@ int32_t ctdb_control_release_ip(struct ctdb_context *ctdb,
         * intended new node.  The following causes makes ctdbd ignore
         * a release for any address it doesn't host.
         */
-       if (ctdb->do_checkpublicip) {
+       if (ctdb->tunable.disable_ip_failover == 0 && ctdb->do_checkpublicip) {
                if (!ctdb_sys_have_ip(&pip->addr)) {
                        DEBUG(DEBUG_DEBUG,("Redundant release of IP %s/%u on interface %s (ip not held)\n",
                                ctdb_addr_to_str(&pip->addr),
@@ -1057,7 +1080,7 @@ static int ctdb_add_public_address(struct ctdb_context *ctdb,
        }
        free(tmp);
 
-       /* Verify that we dont have an entry for this ip yet */
+       /* Verify that we don't have an entry for this ip yet */
        for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
                if (ctdb_same_sockaddr(addr, &vnn->public_address)) {
                        DEBUG(DEBUG_CRIT,("Same ip '%s' specified multiple times in the public address list \n", 
@@ -1179,7 +1202,7 @@ int ctdb_set_single_public_ip(struct ctdb_context *ctdb,
                              const char *ip)
 {
        struct ctdb_vnn *svnn;
-       struct ctdb_iface *cur = NULL;
+       struct ctdb_interface *cur = NULL;
        bool ok;
        int ret;
 
@@ -1226,8 +1249,8 @@ int ctdb_set_single_public_ip(struct ctdb_context *ctdb,
        return 0;
 }
 
-struct ctdb_public_ip_list {
-       struct ctdb_public_ip_list *next;
+struct public_ip_list {
+       struct public_ip_list *next;
        uint32_t pnn;
        ctdb_sock_addr addr;
 };
@@ -1235,9 +1258,7 @@ struct ctdb_public_ip_list {
 /* Given a physical node, return the number of
    public addresses that is currently assigned to this node.
 */
-static int node_ip_coverage(struct ctdb_context *ctdb, 
-       int32_t pnn,
-       struct ctdb_public_ip_list *ips)
+static int node_ip_coverage(int32_t pnn, struct public_ip_list *ips)
 {
        int num=0;
 
@@ -1253,18 +1274,18 @@ static int node_ip_coverage(struct ctdb_context *ctdb,
 /* Can the given node host the given IP: is the public IP known to the
  * node and is NOIPHOST unset?
 */
-static bool can_node_host_ip(struct ctdb_context *ctdb, int32_t pnn, 
-                            struct ctdb_ipflags ipflags,
-                            struct ctdb_public_ip_list *ip)
+static bool can_node_host_ip(struct ipalloc_state *ipalloc_state,
+                            int32_t pnn,
+                            struct public_ip_list *ip)
 {
-       struct ctdb_all_public_ips *public_ips;
+       struct ctdb_public_ip_list_old *public_ips;
        int i;
 
-       if (ipflags.noiphost) {
+       if (ipalloc_state->noiphost[pnn]) {
                return false;
        }
 
-       public_ips = ctdb->nodes[pnn]->available_public_ips;
+       public_ips = ipalloc_state->available_public_ips[pnn];
 
        if (public_ips == NULL) {
                return false;
@@ -1280,39 +1301,37 @@ static bool can_node_host_ip(struct ctdb_context *ctdb, int32_t pnn,
        return false;
 }
 
-static bool can_node_takeover_ip(struct ctdb_context *ctdb, int32_t pnn, 
-                                struct ctdb_ipflags ipflags,
-                                struct ctdb_public_ip_list *ip)
+static bool can_node_takeover_ip(struct ipalloc_state *ipalloc_state,
+                                int32_t pnn,
+                                struct public_ip_list *ip)
 {
-       if (ipflags.noiptakeover) {
+       if (ipalloc_state->noiptakeover[pnn]) {
                return false;
        }
 
-       return can_node_host_ip(ctdb, pnn, ipflags, ip);
+       return can_node_host_ip(ipalloc_state, pnn, ip);
 }
 
 /* search the node lists list for a node to takeover this ip.
    pick the node that currently are serving the least number of ips
    so that the ips get spread out evenly.
 */
-static int find_takeover_node(struct ctdb_context *ctdb, 
-               struct ctdb_ipflags *ipflags,
-               struct ctdb_public_ip_list *ip,
-               struct ctdb_public_ip_list *all_ips)
+static int find_takeover_node(struct ipalloc_state *ipalloc_state,
+                             struct public_ip_list *ip)
 {
        int pnn, min=0, num;
        int i, numnodes;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
        pnn    = -1;
        for (i=0; i<numnodes; i++) {
                /* verify that this node can serve this ip */
-               if (!can_node_takeover_ip(ctdb, i, ipflags[i], ip)) {
+               if (!can_node_takeover_ip(ipalloc_state, i, ip)) {
                        /* no it couldnt   so skip to the next node */
                        continue;
                }
 
-               num = node_ip_coverage(ctdb, i, all_ips);
+               num = node_ip_coverage(i, ipalloc_state->all_ips);
                /* was this the first node we checked ? */
                if (pnn == -1) {
                        pnn = i;
@@ -1323,7 +1342,7 @@ static int find_takeover_node(struct ctdb_context *ctdb,
                                min  = num;
                        }
                }
-       }       
+       }
        if (pnn == -1) {
                DEBUG(DEBUG_WARNING,(__location__ " Could not find node to take over public address '%s'\n",
                        ctdb_addr_to_str(&ip->addr)));
@@ -1364,8 +1383,8 @@ static uint32_t *ip_key(ctdb_sock_addr *ip)
 
 static void *add_ip_callback(void *parm, void *data)
 {
-       struct ctdb_public_ip_list *this_ip = parm; 
-       struct ctdb_public_ip_list *prev_ip = data; 
+       struct public_ip_list *this_ip = parm;
+       struct public_ip_list *prev_ip = data;
 
        if (prev_ip == NULL) {
                return parm;
@@ -1379,29 +1398,88 @@ static void *add_ip_callback(void *parm, void *data)
 
 static int getips_count_callback(void *param, void *data)
 {
-       struct ctdb_public_ip_list **ip_list = (struct ctdb_public_ip_list **)param;
-       struct ctdb_public_ip_list *new_ip = (struct ctdb_public_ip_list *)data;
+       struct public_ip_list **ip_list = (struct public_ip_list **)param;
+       struct public_ip_list *new_ip = (struct public_ip_list *)data;
 
        new_ip->next = *ip_list;
        *ip_list     = new_ip;
        return 0;
 }
 
-static struct ctdb_public_ip_list *
-create_merged_ip_list(struct ctdb_context *ctdb)
+static int verify_remote_ip_allocation(struct ctdb_context *ctdb,
+                                      struct ctdb_public_ip_list_old *ips,
+                                      uint32_t pnn);
+
+static int ctdb_reload_remote_public_ips(struct ctdb_context *ctdb,
+                                        struct ipalloc_state *ipalloc_state,
+                                        struct ctdb_node_map_old *nodemap)
 {
-       int i, j;
-       struct ctdb_public_ip_list *ip_list;
-       struct ctdb_all_public_ips *public_ips;
+       int j;
+       int ret;
 
-       if (ctdb->ip_tree != NULL) {
-               talloc_free(ctdb->ip_tree);
-               ctdb->ip_tree = NULL;
+       if (ipalloc_state->num != nodemap->num) {
+               DEBUG(DEBUG_ERR,
+                     (__location__
+                      " ipalloc_state->num (%d) != nodemap->num (%d) invalid param\n",
+                      ipalloc_state->num, nodemap->num));
+               return -1;
        }
+
+       for (j=0; j<nodemap->num; j++) {
+               if (nodemap->nodes[j].flags & NODE_FLAGS_INACTIVE) {
+                       continue;
+               }
+
+               /* Retrieve the list of known public IPs from the node */
+               ret = ctdb_ctrl_get_public_ips_flags(ctdb,
+                                       TAKEOVER_TIMEOUT(),
+                                       j,
+                                       ipalloc_state->known_public_ips,
+                                       0,
+                                       &ipalloc_state->known_public_ips[j]);
+               if (ret != 0) {
+                       DEBUG(DEBUG_ERR,
+                             ("Failed to read known public IPs from node: %u\n",
+                              j));
+                       return -1;
+               }
+
+               if (ctdb->do_checkpublicip) {
+                       verify_remote_ip_allocation(ctdb,
+                                                   ipalloc_state->known_public_ips[j],
+                                                   j);
+               }
+
+               /* Retrieve the list of available public IPs from the node */
+               ret = ctdb_ctrl_get_public_ips_flags(ctdb,
+                                       TAKEOVER_TIMEOUT(),
+                                       j,
+                                       ipalloc_state->available_public_ips,
+                                       CTDB_PUBLIC_IP_FLAGS_ONLY_AVAILABLE,
+                                       &ipalloc_state->available_public_ips[j]);
+               if (ret != 0) {
+                       DEBUG(DEBUG_ERR,
+                             ("Failed to read available public IPs from node: %u\n",
+                              j));
+                       return -1;
+               }
+       }
+
+       return 0;
+}
+
+static struct public_ip_list *
+create_merged_ip_list(struct ctdb_context *ctdb, struct ipalloc_state *ipalloc_state)
+{
+       int i, j;
+       struct public_ip_list *ip_list;
+       struct ctdb_public_ip_list_old *public_ips;
+
+       TALLOC_FREE(ctdb->ip_tree);
        ctdb->ip_tree = trbt_create(ctdb, 0);
 
-       for (i=0;i<ctdb->num_nodes;i++) {
-               public_ips = ctdb->nodes[i]->known_public_ips;
+       for (i=0; i < ctdb->num_nodes; i++) {
+               public_ips = ipalloc_state->known_public_ips[i];
 
                if (ctdb->nodes[i]->flags & NODE_FLAGS_DELETED) {
                        continue;
@@ -1410,12 +1488,12 @@ create_merged_ip_list(struct ctdb_context *ctdb)
                /* there were no public ips for this node */
                if (public_ips == NULL) {
                        continue;
-               }               
+               }
 
-               for (j=0;j<public_ips->num;j++) {
-                       struct ctdb_public_ip_list *tmp_ip; 
+               for (j=0; j < public_ips->num; j++) {
+                       struct public_ip_list *tmp_ip;
 
-                       tmp_ip = talloc_zero(ctdb->ip_tree, struct ctdb_public_ip_list);
+                       tmp_ip = talloc_zero(ctdb->ip_tree, struct public_ip_list);
                        CTDB_NO_MEMORY_NULL(ctdb, tmp_ip);
                        /* Do not use information about IP addresses hosted
                         * on other nodes, it may not be accurate */
@@ -1484,15 +1562,15 @@ static uint32_t ip_distance(ctdb_sock_addr *ip1, ctdb_sock_addr *ip2)
    used in the main part of the algorithm.
  */
 static uint32_t ip_distance_2_sum(ctdb_sock_addr *ip,
-                                 struct ctdb_public_ip_list *ips,
+                                 struct public_ip_list *ips,
                                  int pnn)
 {
-       struct ctdb_public_ip_list *t;
+       struct public_ip_list *t;
        uint32_t d;
 
        uint32_t sum = 0;
 
-       for (t=ips; t != NULL; t=t->next) {
+       for (t = ips; t != NULL; t = t->next) {
                if (t->pnn != pnn) {
                        continue;
                }
@@ -1520,13 +1598,13 @@ static uint32_t ip_distance_2_sum(ctdb_sock_addr *ip,
 /* Return the LCP2 imbalance metric for addresses currently assigned
    to the given node.
  */
-static uint32_t lcp2_imbalance(struct ctdb_public_ip_list * all_ips, int pnn)
+static uint32_t lcp2_imbalance(struct public_ip_list * all_ips, int pnn)
 {
-       struct ctdb_public_ip_list *t;
+       struct public_ip_list *t;
 
        uint32_t imbalance = 0;
 
-       for (t=all_ips; t!=NULL; t=t->next) {
+       for (t = all_ips; t != NULL; t = t->next) {
                if (t->pnn != pnn) {
                        continue;
                }
@@ -1542,20 +1620,19 @@ static uint32_t lcp2_imbalance(struct ctdb_public_ip_list * all_ips, int pnn)
 /* Allocate any unassigned IPs just by looping through the IPs and
  * finding the best node for each.
  */
-static void basic_allocate_unassigned(struct ctdb_context *ctdb,
-                                     struct ctdb_ipflags *ipflags,
-                                     struct ctdb_public_ip_list *all_ips)
+static void basic_allocate_unassigned(struct ipalloc_state *ipalloc_state)
 {
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
 
-       /* loop over all ip's and find a physical node to cover for 
+       /* loop over all ip's and find a physical node to cover for
           each unassigned ip.
        */
-       for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-               if (tmp_ip->pnn == -1) {
-                       if (find_takeover_node(ctdb, ipflags, tmp_ip, all_ips)) {
-                               DEBUG(DEBUG_WARNING,("Failed to find node to cover ip %s\n",
-                                       ctdb_addr_to_str(&tmp_ip->addr)));
+       for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
+               if (t->pnn == -1) {
+                       if (find_takeover_node(ipalloc_state, t)) {
+                               DEBUG(DEBUG_WARNING,
+                                     ("Failed to find node to cover ip %s\n",
+                                      ctdb_addr_to_str(&t->addr)));
                        }
                }
        }
@@ -1563,16 +1640,14 @@ static void basic_allocate_unassigned(struct ctdb_context *ctdb,
 
 /* Basic non-deterministic rebalancing algorithm.
  */
-static void basic_failback(struct ctdb_context *ctdb,
-                          struct ctdb_ipflags *ipflags,
-                          struct ctdb_public_ip_list *all_ips,
+static void basic_failback(struct ipalloc_state *ipalloc_state,
                           int num_ips)
 {
        int i, numnodes;
        int maxnode, maxnum, minnode, minnum, num, retries;
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
        retries = 0;
 
 try_again:
@@ -1584,8 +1659,8 @@ try_again:
           serving the most and the node serving the least ip's are
           not greater than 1.
        */
-       for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-               if (tmp_ip->pnn == -1) {
+       for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
+               if (t->pnn == -1) {
                        continue;
                }
 
@@ -1596,12 +1671,13 @@ try_again:
                minnode = -1;
                for (i=0; i<numnodes; i++) {
                        /* only check nodes that can actually serve this ip */
-                       if (!can_node_takeover_ip(ctdb, i, ipflags[i], tmp_ip)) {
+                       if (!can_node_takeover_ip(ipalloc_state, i,
+                                                 t)) {
                                /* no it couldnt   so skip to the next node */
                                continue;
                        }
 
-                       num = node_ip_coverage(ctdb, i, all_ips);
+                       num = node_ip_coverage(i, ipalloc_state->all_ips);
                        if (maxnode == -1) {
                                maxnode = i;
                                maxnum  = num;
@@ -1622,8 +1698,9 @@ try_again:
                        }
                }
                if (maxnode == -1) {
-                       DEBUG(DEBUG_WARNING,(__location__ " Could not find maxnode. May not be able to serve ip '%s'\n",
-                               ctdb_addr_to_str(&tmp_ip->addr)));
+                       DEBUG(DEBUG_WARNING,
+                             (__location__ " Could not find maxnode. May not be able to serve ip '%s'\n",
+                              ctdb_addr_to_str(&t->addr)));
 
                        continue;
                }
@@ -1634,14 +1711,15 @@ try_again:
                   try to do this a limited number of times since we dont
                   want to spend too much time balancing the ip coverage.
                */
-               if ( (maxnum > minnum+1)
-                    && (retries < (num_ips + 5)) ){
-                       struct ctdb_public_ip_list *tmp;
+               if ((maxnum > minnum+1) &&
+                   (retries < (num_ips + 5))){
+                       struct public_ip_list *tt;
 
                        /* Reassign one of maxnode's VNNs */
-                       for (tmp=all_ips;tmp;tmp=tmp->next) {
-                               if (tmp->pnn == maxnode) {
-                                       (void)find_takeover_node(ctdb, ipflags, tmp, all_ips);
+                       for (tt = ipalloc_state->all_ips; tt != NULL; tt = tt->next) {
+                               if (tt->pnn == maxnode) {
+                                       (void)find_takeover_node(ipalloc_state,
+                                                                tt);
                                        retries++;
                                        goto try_again;;
                                }
@@ -1650,25 +1728,29 @@ try_again:
        }
 }
 
-static void lcp2_init(struct ctdb_context *tmp_ctx,
-                     struct ctdb_ipflags *ipflags,
-                     struct ctdb_public_ip_list *all_ips,
-                     uint32_t *force_rebalance_nodes,
+static bool lcp2_init(struct ipalloc_state *ipalloc_state,
                      uint32_t **lcp2_imbalances,
                      bool **rebalance_candidates)
 {
        int i, numnodes;
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
 
-       *rebalance_candidates = talloc_array(tmp_ctx, bool, numnodes);
-       CTDB_NO_MEMORY_FATAL(tmp_ctx, *rebalance_candidates);
-       *lcp2_imbalances = talloc_array(tmp_ctx, uint32_t, numnodes);
-       CTDB_NO_MEMORY_FATAL(tmp_ctx, *lcp2_imbalances);
+       *rebalance_candidates = talloc_array(ipalloc_state, bool, numnodes);
+       if (*rebalance_candidates == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " out of memory\n"));
+               return false;
+       }
+       *lcp2_imbalances = talloc_array(ipalloc_state, uint32_t, numnodes);
+       if (*lcp2_imbalances == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " out of memory\n"));
+               return false;
+       }
 
        for (i=0; i<numnodes; i++) {
-               (*lcp2_imbalances)[i] = lcp2_imbalance(all_ips, i);
+               (*lcp2_imbalances)[i] =
+                       lcp2_imbalance(ipalloc_state->all_ips, i);
                /* First step: assume all nodes are candidates */
                (*rebalance_candidates)[i] = true;
        }
@@ -1680,19 +1762,21 @@ static void lcp2_init(struct ctdb_context *tmp_ctx,
         * keep state and invalidate it every time the recovery master
         * changes.
         */
-       for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-               if (tmp_ip->pnn != -1) {
-                       (*rebalance_candidates)[tmp_ip->pnn] = false;
+       for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
+               if (t->pnn != -1) {
+                       (*rebalance_candidates)[t->pnn] = false;
                }
        }
 
        /* 3rd step: if a node is forced to re-balance then
           we allow failback onto the node */
-       if (force_rebalance_nodes == NULL) {
-               return;
+       if (ipalloc_state->force_rebalance_nodes == NULL) {
+               return true;
        }
-       for (i = 0; i < talloc_array_length(force_rebalance_nodes); i++) {
-               uint32_t pnn = force_rebalance_nodes[i];
+       for (i = 0;
+            i < talloc_array_length(ipalloc_state->force_rebalance_nodes);
+            i++) {
+               uint32_t pnn = ipalloc_state->force_rebalance_nodes[i];
                if (pnn >= numnodes) {
                        DEBUG(DEBUG_ERR,
                              (__location__ "unknown node %u\n", pnn));
@@ -1703,27 +1787,27 @@ static void lcp2_init(struct ctdb_context *tmp_ctx,
                      ("Forcing rebalancing of IPs to node %u\n", pnn));
                (*rebalance_candidates)[pnn] = true;
        }
+
+       return true;
 }
 
 /* Allocate any unassigned addresses using the LCP2 algorithm to find
  * the IP/node combination that will cost the least.
  */
-static void lcp2_allocate_unassigned(struct ctdb_context *ctdb,
-                                    struct ctdb_ipflags *ipflags,
-                                    struct ctdb_public_ip_list *all_ips,
+static void lcp2_allocate_unassigned(struct ipalloc_state *ipalloc_state,
                                     uint32_t *lcp2_imbalances)
 {
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
        int dstnode, numnodes;
 
        int minnode;
        uint32_t mindsum, dstdsum, dstimbl, minimbl;
-       struct ctdb_public_ip_list *minip;
+       struct public_ip_list *minip;
 
        bool should_loop = true;
        bool have_unassigned = true;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
 
        while (have_unassigned && should_loop) {
                should_loop = false;
@@ -1736,33 +1820,36 @@ static void lcp2_allocate_unassigned(struct ctdb_context *ctdb,
                minip = NULL;
 
                /* loop over each unassigned ip. */
-               for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-                       if (tmp_ip->pnn != -1) {
+               for (t = ipalloc_state->all_ips; t != NULL ; t = t->next) {
+                       if (t->pnn != -1) {
                                continue;
                        }
 
-                       for (dstnode=0; dstnode<numnodes; dstnode++) {
+                       for (dstnode = 0; dstnode < numnodes; dstnode++) {
                                /* only check nodes that can actually takeover this ip */
-                               if (!can_node_takeover_ip(ctdb, dstnode,
-                                                         ipflags[dstnode],
-                                                         tmp_ip)) {
+                               if (!can_node_takeover_ip(ipalloc_state,
+                                                         dstnode,
+                                                         t)) {
                                        /* no it couldnt   so skip to the next node */
                                        continue;
                                }
 
-                               dstdsum = ip_distance_2_sum(&(tmp_ip->addr), all_ips, dstnode);
+                               dstdsum = ip_distance_2_sum(&(t->addr),
+                                                           ipalloc_state->all_ips,
+                                                           dstnode);
                                dstimbl = lcp2_imbalances[dstnode] + dstdsum;
-                               DEBUG(DEBUG_DEBUG,(" %s -> %d [+%d]\n",
-                                                  ctdb_addr_to_str(&(tmp_ip->addr)),
-                                                  dstnode,
-                                                  dstimbl - lcp2_imbalances[dstnode]));
+                               DEBUG(DEBUG_DEBUG,
+                                     (" %s -> %d [+%d]\n",
+                                      ctdb_addr_to_str(&(t->addr)),
+                                      dstnode,
+                                      dstimbl - lcp2_imbalances[dstnode]));
 
 
                                if ((minnode == -1) || (dstdsum < mindsum)) {
                                        minnode = dstnode;
                                        minimbl = dstimbl;
                                        mindsum = dstdsum;
-                                       minip = tmp_ip;
+                                       minip = t;
                                        should_loop = true;
                                }
                        }
@@ -1782,8 +1869,8 @@ static void lcp2_allocate_unassigned(struct ctdb_context *ctdb,
 
                /* There might be a better way but at least this is clear. */
                have_unassigned = false;
-               for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-                       if (tmp_ip->pnn == -1) {
+               for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
+                       if (t->pnn == -1) {
                                have_unassigned = true;
                        }
                }
@@ -1793,10 +1880,11 @@ static void lcp2_allocate_unassigned(struct ctdb_context *ctdb,
         * well optimise.
         */
        if (have_unassigned) {
-               for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-                       if (tmp_ip->pnn == -1) {
-                               DEBUG(DEBUG_WARNING,("Failed to find node to cover ip %s\n",
-                                                    ctdb_addr_to_str(&tmp_ip->addr)));
+               for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
+                       if (t->pnn == -1) {
+                               DEBUG(DEBUG_WARNING,
+                                     ("Failed to find node to cover ip %s\n",
+                                      ctdb_addr_to_str(&t->addr)));
                        }
                }
        }
@@ -1806,9 +1894,7 @@ static void lcp2_allocate_unassigned(struct ctdb_context *ctdb,
  * to move IPs from, determines the best IP/destination node
  * combination to move from the source node.
  */
-static bool lcp2_failback_candidate(struct ctdb_context *ctdb,
-                                   struct ctdb_ipflags *ipflags,
-                                   struct ctdb_public_ip_list *all_ips,
+static bool lcp2_failback_candidate(struct ipalloc_state *ipalloc_state,
                                    int srcnode,
                                    uint32_t *lcp2_imbalances,
                                    bool *rebalance_candidates)
@@ -1816,8 +1902,8 @@ static bool lcp2_failback_candidate(struct ctdb_context *ctdb,
        int dstnode, mindstnode, numnodes;
        uint32_t srcimbl, srcdsum, dstimbl, dstdsum;
        uint32_t minsrcimbl, mindstimbl;
-       struct ctdb_public_ip_list *minip;
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *minip;
+       struct public_ip_list *t;
 
        /* Find an IP and destination node that best reduces imbalance. */
        srcimbl = 0;
@@ -1826,20 +1912,22 @@ static bool lcp2_failback_candidate(struct ctdb_context *ctdb,
        mindstnode = -1;
        mindstimbl = 0;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
 
        DEBUG(DEBUG_DEBUG,(" ----------------------------------------\n"));
        DEBUG(DEBUG_DEBUG,(" CONSIDERING MOVES FROM %d [%d]\n",
                           srcnode, lcp2_imbalances[srcnode]));
 
-       for (tmp_ip=all_ips; tmp_ip; tmp_ip=tmp_ip->next) {
+       for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
                /* Only consider addresses on srcnode. */
-               if (tmp_ip->pnn != srcnode) {
+               if (t->pnn != srcnode) {
                        continue;
                }
 
                /* What is this IP address costing the source node? */
-               srcdsum = ip_distance_2_sum(&(tmp_ip->addr), all_ips, srcnode);
+               srcdsum = ip_distance_2_sum(&(t->addr),
+                                           ipalloc_state->all_ips,
+                                           srcnode);
                srcimbl = lcp2_imbalances[srcnode] - srcdsum;
 
                /* Consider this IP address would cost each potential
@@ -1848,23 +1936,25 @@ static bool lcp2_failback_candidate(struct ctdb_context *ctdb,
                 * to do gratuitous failover of IPs just to make minor
                 * balance improvements.
                 */
-               for (dstnode=0; dstnode<numnodes; dstnode++) {
+               for (dstnode = 0; dstnode < numnodes; dstnode++) {
                        if (!rebalance_candidates[dstnode]) {
                                continue;
                        }
 
                        /* only check nodes that can actually takeover this ip */
-                       if (!can_node_takeover_ip(ctdb, dstnode,
-                                                 ipflags[dstnode], tmp_ip)) {
+                       if (!can_node_takeover_ip(ipalloc_state, dstnode,
+                                                 t)) {
                                /* no it couldnt   so skip to the next node */
                                continue;
                        }
 
-                       dstdsum = ip_distance_2_sum(&(tmp_ip->addr), all_ips, dstnode);
+                       dstdsum = ip_distance_2_sum(&(t->addr),
+                                                   ipalloc_state->all_ips,
+                                                   dstnode);
                        dstimbl = lcp2_imbalances[dstnode] + dstdsum;
                        DEBUG(DEBUG_DEBUG,(" %d [%d] -> %s -> %d [+%d]\n",
                                           srcnode, -srcdsum,
-                                          ctdb_addr_to_str(&(tmp_ip->addr)),
+                                          ctdb_addr_to_str(&(t->addr)),
                                           dstnode, dstdsum));
 
                        if ((dstimbl < lcp2_imbalances[srcnode]) &&
@@ -1872,7 +1962,7 @@ static bool lcp2_failback_candidate(struct ctdb_context *ctdb,
                            ((mindstnode == -1) ||                              \
                             ((srcimbl + dstimbl) < (minsrcimbl + mindstimbl)))) {
 
-                               minip = tmp_ip;
+                               minip = t;
                                minsrcimbl = srcimbl;
                                mindstnode = dstnode;
                                mindstimbl = dstimbl;
@@ -1883,10 +1973,11 @@ static bool lcp2_failback_candidate(struct ctdb_context *ctdb,
 
         if (mindstnode != -1) {
                /* We found a move that makes things better... */
-               DEBUG(DEBUG_INFO,("%d [%d] -> %s -> %d [+%d]\n",
-                                 srcnode, minsrcimbl - lcp2_imbalances[srcnode],
-                                 ctdb_addr_to_str(&(minip->addr)),
-                                 mindstnode, mindstimbl - lcp2_imbalances[mindstnode]));
+               DEBUG(DEBUG_INFO,
+                     ("%d [%d] -> %s -> %d [+%d]\n",
+                      srcnode, minsrcimbl - lcp2_imbalances[srcnode],
+                      ctdb_addr_to_str(&(minip->addr)),
+                      mindstnode, mindstimbl - lcp2_imbalances[mindstnode]));
 
 
                lcp2_imbalances[srcnode] = minsrcimbl;
@@ -1923,9 +2014,7 @@ static int lcp2_cmp_imbalance_pnn(const void * a, const void * b)
  * node with the highest LCP2 imbalance, and then determines the best
  * IP/destination node combination to move from the source node.
  */
-static void lcp2_failback(struct ctdb_context *ctdb,
-                         struct ctdb_ipflags *ipflags,
-                         struct ctdb_public_ip_list *all_ips,
+static void lcp2_failback(struct ipalloc_state *ipalloc_state,
                          uint32_t *lcp2_imbalances,
                          bool *rebalance_candidates)
 {
@@ -1933,7 +2022,7 @@ static void lcp2_failback(struct ctdb_context *ctdb,
        struct lcp2_imbalance_pnn * lips;
        bool again;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
 
 try_again:
        /* Put the imbalances and nodes into an array, sort them and
@@ -1942,8 +2031,8 @@ try_again:
         */
        DEBUG(DEBUG_DEBUG,("+++++++++++++++++++++++++++++++++++++++++\n"));
        DEBUG(DEBUG_DEBUG,("Selecting most imbalanced node from:\n"));
-       lips = talloc_array(ctdb, struct lcp2_imbalance_pnn, numnodes);
-       for (i=0; i<numnodes; i++) {
+       lips = talloc_array(ipalloc_state, struct lcp2_imbalance_pnn, numnodes);
+       for (i = 0; i < numnodes; i++) {
                lips[i].imbalance = lcp2_imbalances[i];
                lips[i].pnn = i;
                DEBUG(DEBUG_DEBUG,(" %d [%d]\n", i, lcp2_imbalances[i]));
@@ -1952,7 +2041,7 @@ try_again:
              lcp2_cmp_imbalance_pnn);
 
        again = false;
-       for (i=0; i<numnodes; i++) {
+       for (i = 0; i < numnodes; i++) {
                /* This means that all nodes had 0 or 1 addresses, so
                 * can't be imbalanced.
                 */
@@ -1960,9 +2049,7 @@ try_again:
                        break;
                }
 
-               if (lcp2_failback_candidate(ctdb,
-                                           ipflags,
-                                           all_ips,
+               if (lcp2_failback_candidate(ipalloc_state,
                                            lips[i].pnn,
                                            lcp2_imbalances,
                                            rebalance_candidates)) {
@@ -1977,38 +2064,33 @@ try_again:
        }
 }
 
-static void unassign_unsuitable_ips(struct ctdb_context *ctdb,
-                                   struct ctdb_ipflags *ipflags,
-                                   struct ctdb_public_ip_list *all_ips)
+static void unassign_unsuitable_ips(struct ipalloc_state *ipalloc_state)
 {
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
 
        /* verify that the assigned nodes can serve that public ip
           and set it to -1 if not
        */
-       for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
-               if (tmp_ip->pnn == -1) {
+       for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
+               if (t->pnn == -1) {
                        continue;
                }
-               if (!can_node_host_ip(ctdb, tmp_ip->pnn,
-                                     ipflags[tmp_ip->pnn], tmp_ip) != 0) {
+               if (!can_node_host_ip(ipalloc_state, t->pnn, t) != 0) {
                        /* this node can not serve this ip. */
                        DEBUG(DEBUG_DEBUG,("Unassign IP: %s from %d\n",
-                                          ctdb_addr_to_str(&(tmp_ip->addr)),
-                                          tmp_ip->pnn));
-                       tmp_ip->pnn = -1;
+                                          ctdb_addr_to_str(&(t->addr)),
+                                          t->pnn));
+                       t->pnn = -1;
                }
        }
 }
 
-static void ip_alloc_deterministic_ips(struct ctdb_context *ctdb,
-                                      struct ctdb_ipflags *ipflags,
-                                      struct ctdb_public_ip_list *all_ips)
+static bool ipalloc_deterministic(struct ipalloc_state *ipalloc_state)
 {
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
        int i, numnodes;
 
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
 
        DEBUG(DEBUG_NOTICE,("Deterministic IPs enabled. Resetting all ip allocations\n"));
        /* Allocate IPs to nodes in a modulo fashion so that IPs will
@@ -2016,71 +2098,72 @@ static void ip_alloc_deterministic_ips(struct ctdb_context *ctdb,
         *  available/unavailable nodes.
        */
 
-       for (i=0,tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next,i++) {
-               tmp_ip->pnn = i % numnodes;
+       for (i = 0, t = ipalloc_state->all_ips; t!= NULL; t = t->next, i++) {
+               t->pnn = i % numnodes;
        }
 
        /* IP failback doesn't make sense with deterministic
         * IPs, since the modulo step above implicitly fails
         * back IPs to their "home" node.
         */
-       if (1 == ctdb->tunable.no_ip_failback) {
+       if (1 == ipalloc_state->no_ip_failback) {
                DEBUG(DEBUG_WARNING, ("WARNING: 'NoIPFailback' set but ignored - incompatible with 'DeterministicIPs\n"));
        }
 
-       unassign_unsuitable_ips(ctdb, ipflags, all_ips);
+       unassign_unsuitable_ips(ipalloc_state);
 
-       basic_allocate_unassigned(ctdb, ipflags, all_ips);
+       basic_allocate_unassigned(ipalloc_state);
 
        /* No failback here! */
+
+       return true;
 }
 
-static void ip_alloc_nondeterministic_ips(struct ctdb_context *ctdb,
-                                         struct ctdb_ipflags *ipflags,
-                                         struct ctdb_public_ip_list *all_ips)
+static bool ipalloc_nondeterministic(struct ipalloc_state *ipalloc_state)
 {
        /* This should be pushed down into basic_failback. */
-       struct ctdb_public_ip_list *tmp_ip;
+       struct public_ip_list *t;
        int num_ips = 0;
-       for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
+       for (t = ipalloc_state->all_ips; t != NULL; t = t->next) {
                num_ips++;
        }
 
-       unassign_unsuitable_ips(ctdb, ipflags, all_ips);
+       unassign_unsuitable_ips(ipalloc_state);
 
-       basic_allocate_unassigned(ctdb, ipflags, all_ips);
+       basic_allocate_unassigned(ipalloc_state);
 
        /* If we don't want IPs to fail back then don't rebalance IPs. */
-       if (1 == ctdb->tunable.no_ip_failback) {
-               return;
+       if (1 == ipalloc_state->no_ip_failback) {
+               return true;
        }
 
        /* Now, try to make sure the ip adresses are evenly distributed
           across the nodes.
        */
-       basic_failback(ctdb, ipflags, all_ips, num_ips);
+       basic_failback(ipalloc_state, num_ips);
+
+       return true;
 }
 
-static void ip_alloc_lcp2(struct ctdb_context *ctdb,
-                         struct ctdb_ipflags *ipflags,
-                         struct ctdb_public_ip_list *all_ips,
-                         uint32_t *force_rebalance_nodes)
+static bool ipalloc_lcp2(struct ipalloc_state *ipalloc_state)
 {
        uint32_t *lcp2_imbalances;
        bool *rebalance_candidates;
        int numnodes, num_rebalance_candidates, i;
+       bool ret = true;
 
-       TALLOC_CTX *tmp_ctx = talloc_new(ctdb);
-
-       unassign_unsuitable_ips(ctdb, ipflags, all_ips);
+       unassign_unsuitable_ips(ipalloc_state);
 
-       lcp2_init(tmp_ctx, ipflags, all_ips,force_rebalance_nodes,
-                 &lcp2_imbalances, &rebalance_candidates);
+       if (!lcp2_init(ipalloc_state,
+                      &lcp2_imbalances, &rebalance_candidates)) {
+               ret = false;
+               goto finished;
+       }
 
-       lcp2_allocate_unassigned(ctdb, ipflags, all_ips, lcp2_imbalances);
+       lcp2_allocate_unassigned(ipalloc_state, lcp2_imbalances);
 
        /* If we don't want IPs to fail back then don't rebalance IPs. */
-       if (1 == ctdb->tunable.no_ip_failback) {
+       if (1 == ipalloc_state->no_ip_failback) {
                goto finished;
        }
 
@@ -2088,7 +2171,7 @@ static void ip_alloc_lcp2(struct ctdb_context *ctdb,
         * nodes to transfer IPs to.  This check is much cheaper than
         * continuing on...
         */
-       numnodes = talloc_array_length(ipflags);
+       numnodes = ipalloc_state->num;
        num_rebalance_candidates = 0;
        for (i=0; i<numnodes; i++) {
                if (rebalance_candidates[i]) {
@@ -2102,14 +2185,13 @@ static void ip_alloc_lcp2(struct ctdb_context *ctdb,
        /* Now, try to make sure the ip adresses are evenly distributed
           across the nodes.
        */
-       lcp2_failback(ctdb, ipflags, all_ips,
-                     lcp2_imbalances, rebalance_candidates);
+       lcp2_failback(ipalloc_state, lcp2_imbalances, rebalance_candidates);
 
 finished:
-       talloc_free(tmp_ctx);
+       return ret;
 }
 
-static bool all_nodes_are_disabled(struct ctdb_node_map *nodemap)
+static bool all_nodes_are_disabled(struct ctdb_node_map_old *nodemap)
 {
        int i;
 
@@ -2124,34 +2206,27 @@ static bool all_nodes_are_disabled(struct ctdb_node_map *nodemap)
 }
 
 /* The calculation part of the IP allocation algorithm. */
-static void ctdb_takeover_run_core(struct ctdb_context *ctdb,
-                                  struct ctdb_ipflags *ipflags,
-                                  struct ctdb_public_ip_list **all_ips_p,
-                                  uint32_t *force_rebalance_nodes)
+static bool ipalloc(struct ipalloc_state *ipalloc_state)
 {
-       /* since nodes only know about those public addresses that
-          can be served by that particular node, no single node has
-          a full list of all public addresses that exist in the cluster.
-          Walk over all node structures and create a merged list of
-          all public addresses that exist in the cluster.
-
-          keep the tree of ips around as ctdb->ip_tree
-       */
-       *all_ips_p = create_merged_ip_list(ctdb);
+       bool ret;
 
-        if (1 == ctdb->tunable.lcp2_public_ip_assignment) {
-               ip_alloc_lcp2(ctdb, ipflags, *all_ips_p, force_rebalance_nodes);
-       } else if (1 == ctdb->tunable.deterministic_public_ips) {
-               ip_alloc_deterministic_ips(ctdb, ipflags, *all_ips_p);
-       } else {
-               ip_alloc_nondeterministic_ips(ctdb, ipflags, *all_ips_p);
+       switch (ipalloc_state->algorithm) {
+       case IPALLOC_LCP2:
+               ret = ipalloc_lcp2(ipalloc_state);
+               break;
+       case IPALLOC_DETERMINISTIC:
+               ret = ipalloc_deterministic(ipalloc_state);
+               break;
+       case IPALLOC_NONDETERMINISTIC:
+               ret = ipalloc_nondeterministic(ipalloc_state);
+               break;
        }
 
        /* at this point ->pnn is the node which will own each IP
           or -1 if there is no node that can cover this ip
        */
 
-       return;
+       return ret;
 }
 
 struct get_tunable_callback_data {
@@ -2222,7 +2297,7 @@ static void get_tunable_fail_callback(struct ctdb_context *ctdb, uint32_t pnn,
 
 static uint32_t *get_tunable_from_nodes(struct ctdb_context *ctdb,
                                        TALLOC_CTX *tmp_ctx,
-                                       struct ctdb_node_map *nodemap,
+                                       struct ctdb_node_map_old *nodemap,
                                        const char *tunable,
                                        uint32_t default_value)
 {
@@ -2266,98 +2341,6 @@ static uint32_t *get_tunable_from_nodes(struct ctdb_context *ctdb,
        return tvals;
 }
 
-struct get_runstate_callback_data {
-       enum ctdb_runstate *out;
-       bool fatal;
-};
-
-static void get_runstate_callback(struct ctdb_context *ctdb, uint32_t pnn,
-                                 int32_t res, TDB_DATA outdata,
-                                 void *callback_data)
-{
-       struct get_runstate_callback_data *cd =
-               (struct get_runstate_callback_data *)callback_data;
-       int size;
-
-       if (res != 0) {
-               /* Already handled in fail callback */
-               return;
-       }
-
-       if (outdata.dsize != sizeof(uint32_t)) {
-               DEBUG(DEBUG_ERR,("Wrong size of returned data when getting runstate from node %d. Expected %d bytes but received %d bytes\n",
-                                pnn, (int)sizeof(uint32_t),
-                                (int)outdata.dsize));
-               cd->fatal = true;
-               return;
-       }
-
-       size = talloc_array_length(cd->out);
-       if (pnn >= size) {
-               DEBUG(DEBUG_ERR,("Got reply from node %d but nodemap only has %d entries\n",
-                                pnn, size));
-               return;
-       }
-
-       cd->out[pnn] = (enum ctdb_runstate)*(uint32_t *)outdata.dptr;
-}
-
-static void get_runstate_fail_callback(struct ctdb_context *ctdb, uint32_t pnn,
-                                      int32_t res, TDB_DATA outdata,
-                                      void *callback)
-{
-       struct get_runstate_callback_data *cd =
-               (struct get_runstate_callback_data *)callback;
-
-       switch (res) {
-       case -ETIME:
-               DEBUG(DEBUG_ERR,
-                     ("Timed out getting runstate from node %d\n", pnn));
-               cd->fatal = true;
-               break;
-       default:
-               DEBUG(DEBUG_WARNING,
-                     ("Error getting runstate from node %d - assuming runstates not supported\n",
-                      pnn));
-       }
-}
-
-static enum ctdb_runstate * get_runstate_from_nodes(struct ctdb_context *ctdb,
-                                                   TALLOC_CTX *tmp_ctx,
-                                                   struct ctdb_node_map *nodemap,
-                                                   enum ctdb_runstate default_value)
-{
-       uint32_t *nodes;
-       enum ctdb_runstate *rs;
-       struct get_runstate_callback_data callback_data;
-       int i;
-
-       rs = talloc_array(tmp_ctx, enum ctdb_runstate, nodemap->num);
-       CTDB_NO_MEMORY_NULL(ctdb, rs);
-       for (i=0; i<nodemap->num; i++) {
-               rs[i] = default_value;
-       }
-
-       callback_data.out = rs;
-       callback_data.fatal = false;
-
-       nodes = list_of_connected_nodes(ctdb, nodemap, tmp_ctx, true);
-       if (ctdb_client_async_control(ctdb, CTDB_CONTROL_GET_RUNSTATE,
-                                     nodes, 0, TAKEOVER_TIMEOUT(),
-                                     true, tdb_null,
-                                     get_runstate_callback,
-                                     get_runstate_fail_callback,
-                                     &callback_data) != 0) {
-               if (callback_data.fatal) {
-                       free(rs);
-                       rs = NULL;
-               }
-       }
-       talloc_free(nodes);
-
-       return rs;
-}
-
 /* Set internal flags for IP allocation:
  *   Clear ip flags
  *   Set NOIPTAKOVER ip flags from per-node NoIPTakeover tunable
@@ -2367,38 +2350,23 @@ static enum ctdb_runstate * get_runstate_from_nodes(struct ctdb_context *ctdb,
  *   else
  *     Set NOIPHOST ip flags for disabled nodes
  */
-static struct ctdb_ipflags *
-set_ipflags_internal(struct ctdb_context *ctdb,
-                    TALLOC_CTX *tmp_ctx,
-                    struct ctdb_node_map *nodemap,
-                    uint32_t *tval_noiptakeover,
-                    uint32_t *tval_noiphostonalldisabled,
-                    enum ctdb_runstate *runstate)
+static void set_ipflags_internal(struct ipalloc_state *ipalloc_state,
+                                struct ctdb_node_map_old *nodemap,
+                                uint32_t *tval_noiptakeover,
+                                uint32_t *tval_noiphostonalldisabled)
 {
        int i;
-       struct ctdb_ipflags *ipflags;
-
-       /* Clear IP flags - implicit due to talloc_zero */
-       ipflags = talloc_zero_array(tmp_ctx, struct ctdb_ipflags, nodemap->num);
-       CTDB_NO_MEMORY_NULL(ctdb, ipflags);
 
        for (i=0;i<nodemap->num;i++) {
                /* Can not take IPs on node with NoIPTakeover set */
                if (tval_noiptakeover[i] != 0) {
-                       ipflags[i].noiptakeover = true;
+                       ipalloc_state->noiptakeover[i] = true;
                }
 
-               /* Can not host IPs on node not in RUNNING state */
-               if (runstate[i] != CTDB_RUNSTATE_RUNNING) {
-                       ipflags[i].noiphost = true;
-                       continue;
-               }
                /* Can not host IPs on INACTIVE node */
                if (nodemap->nodes[i].flags & NODE_FLAGS_INACTIVE) {
-                       ipflags[i].noiphost = true;
+                       ipalloc_state->noiphost[i] = true;
                }
-               /* Remember the runstate */
-               ipflags[i].runstate = runstate[i];
        }
 
        if (all_nodes_are_disabled(nodemap)) {
@@ -2407,7 +2375,7 @@ set_ipflags_internal(struct ctdb_context *ctdb,
                 */
                for (i=0;i<nodemap->num;i++) {
                        if (tval_noiphostonalldisabled[i] != 0) {
-                               ipflags[i].noiphost = true;
+                               ipalloc_state->noiphost[i] = true;
                        }
                }
        } else {
@@ -2416,59 +2384,102 @@ set_ipflags_internal(struct ctdb_context *ctdb,
                 */
                for (i=0;i<nodemap->num;i++) {
                        if (nodemap->nodes[i].flags & NODE_FLAGS_DISABLED) {
-                               ipflags[i].noiphost = true;
+                               ipalloc_state->noiphost[i] = true;
                        }
                }
        }
-
-       return ipflags;
 }
 
-static struct ctdb_ipflags *set_ipflags(struct ctdb_context *ctdb,
-                                       TALLOC_CTX *tmp_ctx,
-                                       struct ctdb_node_map *nodemap)
+static bool set_ipflags(struct ctdb_context *ctdb,
+                       struct ipalloc_state *ipalloc_state,
+                       struct ctdb_node_map_old *nodemap)
 {
        uint32_t *tval_noiptakeover;
        uint32_t *tval_noiphostonalldisabled;
-       struct ctdb_ipflags *ipflags;
-       enum ctdb_runstate *runstate;
-
 
-       tval_noiptakeover = get_tunable_from_nodes(ctdb, tmp_ctx, nodemap,
+       tval_noiptakeover = get_tunable_from_nodes(ctdb, ipalloc_state, nodemap,
                                                   "NoIPTakeover", 0);
        if (tval_noiptakeover == NULL) {
-               return NULL;
+               return false;
        }
 
        tval_noiphostonalldisabled =
-               get_tunable_from_nodes(ctdb, tmp_ctx, nodemap,
+               get_tunable_from_nodes(ctdb, ipalloc_state, nodemap,
                                       "NoIPHostOnAllDisabled", 0);
        if (tval_noiphostonalldisabled == NULL) {
                /* Caller frees tmp_ctx */
+               return false;
+       }
+
+       set_ipflags_internal(ipalloc_state, nodemap,
+                            tval_noiptakeover,
+                            tval_noiphostonalldisabled);
+
+       talloc_free(tval_noiptakeover);
+       talloc_free(tval_noiphostonalldisabled);
+
+       return true;
+}
+
+static struct ipalloc_state * ipalloc_state_init(struct ctdb_context *ctdb,
+                                                TALLOC_CTX *mem_ctx)
+{
+       struct ipalloc_state *ipalloc_state =
+               talloc_zero(mem_ctx, struct ipalloc_state);
+       if (ipalloc_state == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " Out of memory\n"));
                return NULL;
        }
 
-       /* Any nodes where CTDB_CONTROL_GET_RUNSTATE is not supported
-        * will default to CTDB_RUNSTATE_RUNNING.  This ensures
-        * reasonable behaviour on a mixed cluster during upgrade.
-        */
-       runstate = get_runstate_from_nodes(ctdb, tmp_ctx, nodemap,
-                                          CTDB_RUNSTATE_RUNNING);
-       if (runstate == NULL) {
-               /* Caller frees tmp_ctx */
+       ipalloc_state->num = ctdb->num_nodes;
+       ipalloc_state->known_public_ips =
+               talloc_zero_array(ipalloc_state,
+                                 struct ctdb_public_ip_list_old *,
+                                 ipalloc_state->num);
+       if (ipalloc_state->known_public_ips == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " Out of memory\n"));
+               talloc_free(ipalloc_state);
+               return NULL;
+       }
+       ipalloc_state->available_public_ips =
+               talloc_zero_array(ipalloc_state,
+                                 struct ctdb_public_ip_list_old *,
+                                 ipalloc_state->num);
+       if (ipalloc_state->available_public_ips == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " Out of memory\n"));
+               talloc_free(ipalloc_state);
+               return NULL;
+       }
+       ipalloc_state->noiptakeover =
+               talloc_zero_array(ipalloc_state,
+                                 bool,
+                                 ipalloc_state->num);
+       if (ipalloc_state->noiptakeover == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " Out of memory\n"));
+               talloc_free(ipalloc_state);
+               return NULL;
+       }
+       ipalloc_state->noiphost =
+               talloc_zero_array(ipalloc_state,
+                                 bool,
+                                 ipalloc_state->num);
+       if (ipalloc_state->noiphost == NULL) {
+               DEBUG(DEBUG_ERR, (__location__ " Out of memory\n"));
+               talloc_free(ipalloc_state);
                return NULL;
        }
 
-       ipflags = set_ipflags_internal(ctdb, tmp_ctx, nodemap,
-                                      tval_noiptakeover,
-                                      tval_noiphostonalldisabled,
-                                      runstate);
+       if (1 == ctdb->tunable.lcp2_public_ip_assignment) {
+               ipalloc_state->algorithm = IPALLOC_LCP2;
+       } else if (1 == ctdb->tunable.deterministic_public_ips) {
+               ipalloc_state->algorithm = IPALLOC_DETERMINISTIC;
+       } else {
+               ipalloc_state->algorithm = IPALLOC_NONDETERMINISTIC;
+       }
 
-       talloc_free(tval_noiptakeover);
-       talloc_free(tval_noiphostonalldisabled);
-       talloc_free(runstate);
+       ipalloc_state->no_ip_failback = ctdb->tunable.no_ip_failback;
 
-       return ipflags;
+       return ipalloc_state;
 }
 
 struct iprealloc_callback_data {
@@ -2476,7 +2487,7 @@ struct iprealloc_callback_data {
        int retry_count;
        client_async_callback fail_callback;
        void *fail_callback_data;
-       struct ctdb_node_map *nodemap;
+       struct ctdb_node_map_old *nodemap;
 };
 
 static void iprealloc_fail_callback(struct ctdb_context *ctdb, uint32_t pnn,
@@ -2537,7 +2548,7 @@ struct takeover_callback_data {
        bool *node_failed;
        client_async_callback fail_callback;
        void *fail_callback_data;
-       struct ctdb_node_map *nodemap;
+       struct ctdb_node_map_old *nodemap;
 };
 
 static void takeover_run_fail_callback(struct ctdb_context *ctdb,
@@ -2570,20 +2581,20 @@ static void takeover_run_fail_callback(struct ctdb_context *ctdb,
 /*
   make any IP alias changes for public addresses that are necessary 
  */
-int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap,
+int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map_old *nodemap,
                      uint32_t *force_rebalance_nodes,
                      client_async_callback fail_callback, void *callback_data)
 {
        int i, j, ret;
        struct ctdb_public_ip ip;
        uint32_t *nodes;
-       struct ctdb_public_ip_list *all_ips, *tmp_ip;
+       struct public_ip_list *all_ips, *tmp_ip;
        TDB_DATA data;
        struct timeval timeout;
        struct client_async_data *async_data;
        struct ctdb_client_control_state *state;
        TALLOC_CTX *tmp_ctx = talloc_new(ctdb);
-       struct ctdb_ipflags *ipflags;
+       struct ipalloc_state *ipalloc_state;
        struct takeover_callback_data *takeover_data;
        struct iprealloc_callback_data iprealloc_data;
        bool *retry_data;
@@ -2597,18 +2608,29 @@ int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap,
                goto ipreallocated;
        }
 
-       ipflags = set_ipflags(ctdb, tmp_ctx, nodemap);
-       if (ipflags == NULL) {
+       ipalloc_state = ipalloc_state_init(ctdb, tmp_ctx);
+       if (ipalloc_state == NULL) {
+               talloc_free(tmp_ctx);
+               return -1;
+       }
+
+       if (!set_ipflags(ctdb, ipalloc_state, nodemap)) {
                DEBUG(DEBUG_ERR,("Failed to set IP flags - aborting takeover run\n"));
                talloc_free(tmp_ctx);
                return -1;
        }
 
-       /* Short-circuit IP allocation if no nodes are in the RUNNING
-        * runstate yet, since no nodes will be able to host IPs */
+       /* Fetch known/available public IPs from each active node */
+       ret = ctdb_reload_remote_public_ips(ctdb, ipalloc_state, nodemap);
+       if (ret != 0) {
+               talloc_free(tmp_ctx);
+               return -1;
+       }
+
+       /* Short-circuit IP allocation if no node has available IPs */
        can_host_ips = false;
-       for (i=0; i<nodemap->num; i++) {
-               if (ipflags[i].runstate == CTDB_RUNSTATE_RUNNING) {
+       for (i=0; i < ipalloc_state->num; i++) {
+               if (ipalloc_state->available_public_ips[i] != NULL) {
                        can_host_ips = true;
                }
        }
@@ -2617,8 +2639,21 @@ int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap,
                return 0;
        }
 
+       /* since nodes only know about those public addresses that
+          can be served by that particular node, no single node has
+          a full list of all public addresses that exist in the cluster.
+          Walk over all node structures and create a merged list of
+          all public addresses that exist in the cluster.
+
+          keep the tree of ips around as ctdb->ip_tree
+       */
+       all_ips = create_merged_ip_list(ctdb, ipalloc_state);
+       ipalloc_state->all_ips = all_ips;
+
+       ipalloc_state->force_rebalance_nodes = force_rebalance_nodes;
+
        /* Do the IP reassignment calculations */
-       ctdb_takeover_run_core(ctdb, ipflags, &all_ips, force_rebalance_nodes);
+       ipalloc(ipalloc_state);
 
        /* Now tell all nodes to release any public IPs should not
         * host.  This will be a NOOP on nodes that don't currently
@@ -2657,7 +2692,7 @@ int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap,
                for (tmp_ip=all_ips;tmp_ip;tmp_ip=tmp_ip->next) {
                        if (tmp_ip->pnn == nodemap->nodes[i].pnn) {
                                /* This node should be serving this
-                                  vnn so dont tell it to release the ip
+                                  vnn so don't tell it to release the ip
                                */
                                continue;
                        }
@@ -2811,10 +2846,10 @@ static int ctdb_client_ip_destructor(struct ctdb_client_ip *ip)
 int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
                                TDB_DATA indata)
 {
-       struct ctdb_client *client = ctdb_reqid_find(ctdb, client_id, struct ctdb_client);
-       struct ctdb_control_tcp_addr *tcp_sock = NULL;
+       struct ctdb_client *client = reqid_find(ctdb->idr, client_id, struct ctdb_client);
+       struct ctdb_connection *tcp_sock = NULL;
        struct ctdb_tcp_list *tcp;
-       struct ctdb_tcp_connection t;
+       struct ctdb_connection t;
        int ret;
        TDB_DATA data;
        struct ctdb_client_ip *ip;
@@ -2826,15 +2861,15 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
                return 0;
        }
 
-       tcp_sock = (struct ctdb_control_tcp_addr *)indata.dptr;
+       tcp_sock = (struct ctdb_connection *)indata.dptr;
 
        addr = tcp_sock->src;
        ctdb_canonicalize_ip(&addr,  &tcp_sock->src);
-       addr = tcp_sock->dest;
-       ctdb_canonicalize_ip(&addr, &tcp_sock->dest);
+       addr = tcp_sock->dst;
+       ctdb_canonicalize_ip(&addr, &tcp_sock->dst);
 
        ZERO_STRUCT(addr);
-       memcpy(&addr, &tcp_sock->dest, sizeof(addr));
+       memcpy(&addr, &tcp_sock->dst, sizeof(addr));
        vnn = find_public_ip_vnn(ctdb, &addr);
        if (vnn == NULL) {
                switch (addr.sa.sa_family) {
@@ -2875,13 +2910,13 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
        tcp = talloc(client, struct ctdb_tcp_list);
        CTDB_NO_MEMORY(ctdb, tcp);
 
-       tcp->connection.src_addr = tcp_sock->src;
-       tcp->connection.dst_addr = tcp_sock->dest;
+       tcp->connection.src = tcp_sock->src;
+       tcp->connection.dst = tcp_sock->dst;
 
        DLIST_ADD(client->tcp_list, tcp);
 
-       t.src_addr = tcp_sock->src;
-       t.dst_addr = tcp_sock->dest;
+       t.src = tcp_sock->src;
+       t.dst = tcp_sock->dst;
 
        data.dptr = (uint8_t *)&t;
        data.dsize = sizeof(t);
@@ -2889,13 +2924,13 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
        switch (addr.sa.sa_family) {
        case AF_INET:
                DEBUG(DEBUG_INFO,("registered tcp client for %u->%s:%u (client_id %u pid %u)\n",
-                       (unsigned)ntohs(tcp_sock->dest.ip.sin_port), 
+                       (unsigned)ntohs(tcp_sock->dst.ip.sin_port),
                        ctdb_addr_to_str(&tcp_sock->src),
                        (unsigned)ntohs(tcp_sock->src.ip.sin_port), client_id, client->pid));
                break;
        case AF_INET6:
                DEBUG(DEBUG_INFO,("registered tcp client for %u->%s:%u (client_id %u pid %u)\n",
-                       (unsigned)ntohs(tcp_sock->dest.ip6.sin6_port), 
+                       (unsigned)ntohs(tcp_sock->dst.ip6.sin6_port),
                        ctdb_addr_to_str(&tcp_sock->src),
                        (unsigned)ntohs(tcp_sock->src.ip6.sin6_port), client_id, client->pid));
                break;
@@ -2919,8 +2954,8 @@ int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id,
 /*
   find a tcp address on a list
  */
-static struct ctdb_tcp_connection *ctdb_tcp_find(struct ctdb_tcp_array *array, 
-                                          struct ctdb_tcp_connection *tcp)
+static struct ctdb_connection *ctdb_tcp_find(struct ctdb_tcp_array *array,
+                                          struct ctdb_connection *tcp)
 {
        int i;
 
@@ -2929,8 +2964,8 @@ static struct ctdb_tcp_connection *ctdb_tcp_find(struct ctdb_tcp_array *array,
        }
 
        for (i=0;i<array->num;i++) {
-               if (ctdb_same_sockaddr(&array->connections[i].src_addr, &tcp->src_addr) &&
-                   ctdb_same_sockaddr(&array->connections[i].dst_addr, &tcp->dst_addr)) {
+               if (ctdb_same_sockaddr(&array->connections[i].src, &tcp->src) &&
+                   ctdb_same_sockaddr(&array->connections[i].dst, &tcp->dst)) {
                        return &array->connections[i];
                }
        }
@@ -2946,9 +2981,9 @@ static struct ctdb_tcp_connection *ctdb_tcp_find(struct ctdb_tcp_array *array,
  */
 int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata, bool tcp_update_needed)
 {
-       struct ctdb_tcp_connection *p = (struct ctdb_tcp_connection *)indata.dptr;
+       struct ctdb_connection *p = (struct ctdb_connection *)indata.dptr;
        struct ctdb_tcp_array *tcparray;
-       struct ctdb_tcp_connection tcp;
+       struct ctdb_connection tcp;
        struct ctdb_vnn *vnn;
 
        /* If we don't have public IPs, tickles are useless */
@@ -2956,10 +2991,10 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata, bool tc
                return 0;
        }
 
-       vnn = find_public_ip_vnn(ctdb, &p->dst_addr);
+       vnn = find_public_ip_vnn(ctdb, &p->dst);
        if (vnn == NULL) {
                DEBUG(DEBUG_INFO,(__location__ " got TCP_ADD control for an address which is not a public address '%s'\n",
-                       ctdb_addr_to_str(&p->dst_addr)));
+                       ctdb_addr_to_str(&p->dst)));
 
                return -1;
        }
@@ -2974,11 +3009,11 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata, bool tc
                vnn->tcp_array = tcparray;
 
                tcparray->num = 0;
-               tcparray->connections = talloc_size(tcparray, sizeof(struct ctdb_tcp_connection));
+               tcparray->connections = talloc_size(tcparray, sizeof(struct ctdb_connection));
                CTDB_NO_MEMORY(ctdb, tcparray->connections);
 
-               tcparray->connections[tcparray->num].src_addr = p->src_addr;
-               tcparray->connections[tcparray->num].dst_addr = p->dst_addr;
+               tcparray->connections[tcparray->num].src = p->src;
+               tcparray->connections[tcparray->num].dst = p->dst;
                tcparray->num++;
 
                if (tcp_update_needed) {
@@ -2989,29 +3024,29 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata, bool tc
 
 
        /* Do we already have this tickle ?*/
-       tcp.src_addr = p->src_addr;
-       tcp.dst_addr = p->dst_addr;
+       tcp.src = p->src;
+       tcp.dst = p->dst;
        if (ctdb_tcp_find(tcparray, &tcp) != NULL) {
                DEBUG(DEBUG_DEBUG,("Already had tickle info for %s:%u for vnn:%u\n",
-                       ctdb_addr_to_str(&tcp.dst_addr),
-                       ntohs(tcp.dst_addr.ip.sin_port),
+                       ctdb_addr_to_str(&tcp.dst),
+                       ntohs(tcp.dst.ip.sin_port),
                        vnn->pnn));
                return 0;
        }
 
        /* A new tickle, we must add it to the array */
        tcparray->connections = talloc_realloc(tcparray, tcparray->connections,
-                                       struct ctdb_tcp_connection,
+                                       struct ctdb_connection,
                                        tcparray->num+1);
        CTDB_NO_MEMORY(ctdb, tcparray->connections);
 
-       tcparray->connections[tcparray->num].src_addr = p->src_addr;
-       tcparray->connections[tcparray->num].dst_addr = p->dst_addr;
+       tcparray->connections[tcparray->num].src = p->src;
+       tcparray->connections[tcparray->num].dst = p->dst;
        tcparray->num++;
 
        DEBUG(DEBUG_INFO,("Added tickle info for %s:%u from vnn %u\n",
-               ctdb_addr_to_str(&tcp.dst_addr),
-               ntohs(tcp.dst_addr.ip.sin_port),
+               ctdb_addr_to_str(&tcp.dst),
+               ntohs(tcp.dst.ip.sin_port),
                vnn->pnn));
 
        if (tcp_update_needed) {
@@ -3022,41 +3057,33 @@ int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata, bool tc
 }
 
 
-/*
-  called by a daemon to inform us of a TCP connection that one of its
-  clients managing that should tickled with an ACK when IP takeover is
-  done
- */
-static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tcp_connection *conn)
+static void ctdb_remove_connection(struct ctdb_vnn *vnn, struct ctdb_connection *conn)
 {
-       struct ctdb_tcp_connection *tcpp;
-       struct ctdb_vnn *vnn = find_public_ip_vnn(ctdb, &conn->dst_addr);
+       struct ctdb_connection *tcpp;
 
        if (vnn == NULL) {
-               DEBUG(DEBUG_ERR,(__location__ " unable to find public address %s\n",
-                       ctdb_addr_to_str(&conn->dst_addr)));
                return;
        }
 
        /* if the array is empty we cant remove it
-          and we dont need to do anything
+          and we don't need to do anything
         */
        if (vnn->tcp_array == NULL) {
                DEBUG(DEBUG_INFO,("Trying to remove tickle that doesnt exist (array is empty) %s:%u\n",
-                       ctdb_addr_to_str(&conn->dst_addr),
-                       ntohs(conn->dst_addr.ip.sin_port)));
+                       ctdb_addr_to_str(&conn->dst),
+                       ntohs(conn->dst.ip.sin_port)));
                return;
        }
 
 
        /* See if we know this connection
-          if we dont know this connection  then we dont need to do anything
+          if we don't know this connection  then we dont need to do anything
         */
        tcpp = ctdb_tcp_find(vnn->tcp_array, conn);
        if (tcpp == NULL) {
                DEBUG(DEBUG_INFO,("Trying to remove tickle that doesnt exist %s:%u\n",
-                       ctdb_addr_to_str(&conn->dst_addr),
-                       ntohs(conn->dst_addr.ip.sin_port)));
+                       ctdb_addr_to_str(&conn->dst),
+                       ntohs(conn->dst.ip.sin_port)));
                return;
        }
 
@@ -3080,8 +3107,8 @@ static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tc
        vnn->tcp_update_needed = true;
 
        DEBUG(DEBUG_INFO,("Removed tickle info for %s:%u\n",
-               ctdb_addr_to_str(&conn->src_addr),
-               ntohs(conn->src_addr.ip.sin_port)));
+               ctdb_addr_to_str(&conn->src),
+               ntohs(conn->src.ip.sin_port)));
 }
 
 
@@ -3091,14 +3118,23 @@ static void ctdb_remove_tcp_connection(struct ctdb_context *ctdb, struct ctdb_tc
  */
 int32_t ctdb_control_tcp_remove(struct ctdb_context *ctdb, TDB_DATA indata)
 {
-       struct ctdb_tcp_connection *conn = (struct ctdb_tcp_connection *)indata.dptr;
+       struct ctdb_vnn *vnn;
+       struct ctdb_connection *conn = (struct ctdb_connection *)indata.dptr;
 
        /* If we don't have public IPs, tickles are useless */
        if (ctdb->vnn == NULL) {
                return 0;
        }
 
-       ctdb_remove_tcp_connection(ctdb, conn);
+       vnn = find_public_ip_vnn(ctdb, &conn->dst);
+       if (vnn == NULL) {
+               DEBUG(DEBUG_ERR,
+                     (__location__ " unable to find public address %s\n",
+                      ctdb_addr_to_str(&conn->dst)));
+               return 0;
+       }
+
+       ctdb_remove_connection(vnn, conn);
 
        return 0;
 }
@@ -3133,21 +3169,45 @@ int32_t ctdb_control_startup(struct ctdb_context *ctdb, uint32_t pnn)
 void ctdb_takeover_client_destructor_hook(struct ctdb_client *client)
 {
        while (client->tcp_list) {
+               struct ctdb_vnn *vnn;
                struct ctdb_tcp_list *tcp = client->tcp_list;
+               struct ctdb_connection *conn = &tcp->connection;
+
                DLIST_REMOVE(client->tcp_list, tcp);
-               ctdb_remove_tcp_connection(client->ctdb, &tcp->connection);
+
+               vnn = find_public_ip_vnn(client->ctdb,
+                                        &conn->dst);
+               if (vnn == NULL) {
+                       DEBUG(DEBUG_ERR,
+                             (__location__ " unable to find public address %s\n",
+                              ctdb_addr_to_str(&conn->dst)));
+                       continue;
+               }
+
+               /* If the IP address is hosted on this node then
+                * remove the connection. */
+               if (vnn->pnn == client->ctdb->pnn) {
+                       ctdb_remove_connection(vnn, conn);
+               }
+
+               /* Otherwise this function has been called because the
+                * server IP address has been released to another node
+                * and the client has exited.  This means that we
+                * should not delete the connection information.  The
+                * takeover node processes connections too. */
        }
 }
 
 
-/*
-  release all IPs on shutdown
- */
 void ctdb_release_all_ips(struct ctdb_context *ctdb)
 {
        struct ctdb_vnn *vnn;
        int count = 0;
 
+       if (ctdb->tunable.disable_ip_failover == 1) {
+               return;
+       }
+
        for (vnn=ctdb->vnn;vnn;vnn=vnn->next) {
                if (!ctdb_sys_have_ip(&vnn->public_address)) {
                        ctdb_vnn_unassign_iface(ctdb, vnn);
@@ -3157,6 +3217,20 @@ void ctdb_release_all_ips(struct ctdb_context *ctdb)
                        continue;
                }
 
+               /* Don't allow multiple releases at once.  Some code,
+                * particularly ctdb_tickle_sentenced_connections() is
+                * not re-entrant */
+               if (vnn->update_in_flight) {
+                       DEBUG(DEBUG_WARNING,
+                             (__location__
+                              " Not releasing IP %s/%u on interface %s, an update is already in progess\n",
+                                   ctdb_addr_to_str(&vnn->public_address),
+                                   vnn->public_netmask_bits,
+                                   ctdb_vnn_iface_string(vnn)));
+                       continue;
+               }
+               vnn->update_in_flight = true;
+
                DEBUG(DEBUG_INFO,("Release of IP %s/%u on interface %s node:-1\n",
                                    ctdb_addr_to_str(&vnn->public_address),
                                    vnn->public_netmask_bits,
@@ -3168,6 +3242,7 @@ void ctdb_release_all_ips(struct ctdb_context *ctdb)
                                  vnn->public_netmask_bits);
                release_kill_clients(ctdb, &vnn->public_address);
                ctdb_vnn_unassign_iface(ctdb, vnn);
+               vnn->update_in_flight = false;
                count++;
        }
 
@@ -3179,10 +3254,10 @@ void ctdb_release_all_ips(struct ctdb_context *ctdb)
   get list of public IPs
  */
 int32_t ctdb_control_get_public_ips(struct ctdb_context *ctdb, 
-                                   struct ctdb_req_control *c, TDB_DATA *outdata)
+                                   struct ctdb_req_control_old *c, TDB_DATA *outdata)
 {
        int i, num, len;
-       struct ctdb_all_public_ips *ips;
+       struct ctdb_public_ip_list_old *ips;
        struct ctdb_vnn *vnn;
        bool only_available = false;
 
@@ -3196,7 +3271,7 @@ int32_t ctdb_control_get_public_ips(struct ctdb_context *ctdb,
                num++;
        }
 
-       len = offsetof(struct ctdb_all_public_ips, ips) + 
+       len = offsetof(struct ctdb_public_ip_list_old, ips) +
                num*sizeof(struct ctdb_public_ip);
        ips = talloc_zero_size(outdata, len);
        CTDB_NO_MEMORY(ctdb, ips);
@@ -3211,7 +3286,7 @@ int32_t ctdb_control_get_public_ips(struct ctdb_context *ctdb,
                i++;
        }
        ips->num = i;
-       len = offsetof(struct ctdb_all_public_ips, ips) +
+       len = offsetof(struct ctdb_public_ip_list_old, ips) +
                i*sizeof(struct ctdb_public_ip);
 
        outdata->dsize = len;
@@ -3222,13 +3297,13 @@ int32_t ctdb_control_get_public_ips(struct ctdb_context *ctdb,
 
 
 int32_t ctdb_control_get_public_ip_info(struct ctdb_context *ctdb,
-                                       struct ctdb_req_control *c,
+                                       struct ctdb_req_control_old *c,
                                        TDB_DATA indata,
                                        TDB_DATA *outdata)
 {
        int i, num, len;
        ctdb_sock_addr *addr;
-       struct ctdb_control_public_ip_info *info;
+       struct ctdb_public_ip_info_old *info;
        struct ctdb_vnn *vnn;
 
        addr = (ctdb_sock_addr *)indata.dptr;
@@ -3255,8 +3330,8 @@ int32_t ctdb_control_get_public_ip_info(struct ctdb_context *ctdb,
                num++;
        }
 
-       len = offsetof(struct ctdb_control_public_ip_info, ifaces) +
-               num*sizeof(struct ctdb_control_iface_info);
+       len = offsetof(struct ctdb_public_ip_info_old, ifaces) +
+               num*sizeof(struct ctdb_iface);
        info = talloc_zero_size(outdata, len);
        CTDB_NO_MEMORY(ctdb, info);
 
@@ -3265,7 +3340,7 @@ int32_t ctdb_control_get_public_ip_info(struct ctdb_context *ctdb,
        info->active_idx = 0xFFFFFFFF;
 
        for (i=0; vnn->ifaces[i]; i++) {
-               struct ctdb_iface *cur;
+               struct ctdb_interface *cur;
 
                cur = ctdb_find_iface(ctdb, vnn->ifaces[i]);
                if (cur == NULL) {
@@ -3281,8 +3356,8 @@ int32_t ctdb_control_get_public_ip_info(struct ctdb_context *ctdb,
                info->ifaces[i].references = cur->references;
        }
        info->num = i;
-       len = offsetof(struct ctdb_control_public_ip_info, ifaces) +
-               i*sizeof(struct ctdb_control_iface_info);
+       len = offsetof(struct ctdb_public_ip_info_old, ifaces) +
+               i*sizeof(struct ctdb_iface);
 
        outdata->dsize = len;
        outdata->dptr  = (uint8_t *)info;
@@ -3291,12 +3366,12 @@ int32_t ctdb_control_get_public_ip_info(struct ctdb_context *ctdb,
 }
 
 int32_t ctdb_control_get_ifaces(struct ctdb_context *ctdb,
-                               struct ctdb_req_control *c,
+                               struct ctdb_req_control_old *c,
                                TDB_DATA *outdata)
 {
        int i, num, len;
-       struct ctdb_control_get_ifaces *ifaces;
-       struct ctdb_iface *cur;
+       struct ctdb_iface_list_old *ifaces;
+       struct ctdb_interface *cur;
 
        /* count how many public ip structures we have */
        num = 0;
@@ -3304,8 +3379,8 @@ int32_t ctdb_control_get_ifaces(struct ctdb_context *ctdb,
                num++;
        }
 
-       len = offsetof(struct ctdb_control_get_ifaces, ifaces) +
-               num*sizeof(struct ctdb_control_iface_info);
+       len = offsetof(struct ctdb_iface_list_old, ifaces) +
+               num*sizeof(struct ctdb_iface);
        ifaces = talloc_zero_size(outdata, len);
        CTDB_NO_MEMORY(ctdb, ifaces);
 
@@ -3317,8 +3392,8 @@ int32_t ctdb_control_get_ifaces(struct ctdb_context *ctdb,
                i++;
        }
        ifaces->num = i;
-       len = offsetof(struct ctdb_control_get_ifaces, ifaces) +
-               i*sizeof(struct ctdb_control_iface_info);
+       len = offsetof(struct ctdb_iface_list_old, ifaces) +
+               i*sizeof(struct ctdb_iface);
 
        outdata->dsize = len;
        outdata->dptr  = (uint8_t *)ifaces;
@@ -3327,14 +3402,14 @@ int32_t ctdb_control_get_ifaces(struct ctdb_context *ctdb,
 }
 
 int32_t ctdb_control_set_iface_link(struct ctdb_context *ctdb,
-                                   struct ctdb_req_control *c,
+                                   struct ctdb_req_control_old *c,
                                    TDB_DATA indata)
 {
-       struct ctdb_control_iface_info *info;
-       struct ctdb_iface *iface;
+       struct ctdb_iface *info;
+       struct ctdb_interface *iface;
        bool link_up = false;
 
-       info = (struct ctdb_control_iface_info *)indata.dptr;
+       info = (struct ctdb_iface *)indata.dptr;
 
        if (info->name[CTDB_IFACE_SIZE] != '\0') {
                int len = strnlen(info->name, CTDB_IFACE_SIZE);
@@ -3390,7 +3465,7 @@ struct ctdb_kill_tcp {
        struct ctdb_vnn *vnn;
        struct ctdb_context *ctdb;
        int capture_fd;
-       struct fd_event *fde;
+       struct tevent_fd *fde;
        trbt_tree_t *connections;
        void *private_data;
 };
@@ -3457,7 +3532,8 @@ static uint32_t *killtcp_key(ctdb_sock_addr *src, ctdb_sock_addr *dst)
 /*
   called when we get a read event on the raw socket
  */
-static void capture_tcp_handler(struct event_context *ev, struct fd_event *fde, 
+static void capture_tcp_handler(struct tevent_context *ev,
+                               struct tevent_fd *fde,
                                uint16_t flags, void *private_data)
 {
        struct ctdb_kill_tcp *killtcp = talloc_get_type(private_data, struct ctdb_kill_tcp);
@@ -3465,7 +3541,7 @@ static void capture_tcp_handler(struct event_context *ev, struct fd_event *fde,
        ctdb_sock_addr src, dst;
        uint32_t ack_seq, seq;
 
-       if (!(flags & EVENT_FD_READ)) {
+       if (!(flags & TEVENT_FD_READ)) {
                return;
        }
 
@@ -3529,7 +3605,8 @@ static int tickle_connection_traverse(void *param, void *data)
 /* 
    called every second until all sentenced connections have been reset
  */
-static void ctdb_tickle_sentenced_connections(struct event_context *ev, struct timed_event *te, 
+static void ctdb_tickle_sentenced_connections(struct tevent_context *ev,
+                                             struct tevent_timer *te,
                                              struct timeval t, void *private_data)
 {
        struct ctdb_kill_tcp *killtcp = talloc_get_type(private_data, struct ctdb_kill_tcp);
@@ -3552,8 +3629,9 @@ static void ctdb_tickle_sentenced_connections(struct event_context *ev, struct t
 
        /* try tickling them again in a seconds time
         */
-       event_add_timed(killtcp->ctdb->ev, killtcp, timeval_current_ofs(1, 0), 
-                       ctdb_tickle_sentenced_connections, killtcp);
+       tevent_add_timer(killtcp->ctdb->ev, killtcp,
+                        timeval_current_ofs(1, 0),
+                        ctdb_tickle_sentenced_connections, killtcp);
 }
 
 /*
@@ -3587,7 +3665,7 @@ static int ctdb_killtcp_destructor(struct ctdb_kill_tcp *killtcp)
 /* nothing fancy here, just unconditionally replace any existing
    connection structure with the new one.
 
-   dont even free the old one if it did exist, that one is talloc_stolen
+   don't even free the old one if it did exist, that one is talloc_stolen
    by the same node in the tree anyway and will be deleted when the new data 
    is deleted
 */
@@ -3664,7 +3742,7 @@ static int ctdb_killtcp_add_connection(struct ctdb_context *ctdb,
                        add_killtcp_callback, con);
 
        /* 
-          If we dont have a socket to listen on yet we must create it
+          If we don't have a socket to listen on yet we must create it
         */
        if (killtcp->capture_fd == -1) {
                const char *iface = ctdb_vnn_iface_string(vnn);
@@ -3679,16 +3757,17 @@ static int ctdb_killtcp_add_connection(struct ctdb_context *ctdb,
 
 
        if (killtcp->fde == NULL) {
-               killtcp->fde = event_add_fd(ctdb->ev, killtcp, killtcp->capture_fd, 
-                                           EVENT_FD_READ,
-                                           capture_tcp_handler, killtcp);
+               killtcp->fde = tevent_add_fd(ctdb->ev, killtcp,
+                                            killtcp->capture_fd,
+                                            TEVENT_FD_READ,
+                                            capture_tcp_handler, killtcp);
                tevent_fd_set_auto_close(killtcp->fde);
 
                /* We also need to set up some events to tickle all these connections
                   until they are all reset
                */
-               event_add_timed(ctdb->ev, killtcp, timeval_current_ofs(1, 0), 
-                               ctdb_tickle_sentenced_connections, killtcp);
+               tevent_add_timer(ctdb->ev, killtcp, timeval_current_ofs(1, 0),
+                                ctdb_tickle_sentenced_connections, killtcp);
        }
 
        /* tickle him once now */
@@ -3710,9 +3789,9 @@ failed:
  */
 int32_t ctdb_control_kill_tcp(struct ctdb_context *ctdb, TDB_DATA indata)
 {
-       struct ctdb_control_killtcp *killtcp = (struct ctdb_control_killtcp *)indata.dptr;
+       struct ctdb_connection *killtcp = (struct ctdb_connection *)indata.dptr;
 
-       return ctdb_killtcp_add_connection(ctdb, &killtcp->src_addr, &killtcp->dst_addr);
+       return ctdb_killtcp_add_connection(ctdb, &killtcp->src, &killtcp->dst);
 }
 
 /*
@@ -3723,25 +3802,22 @@ int32_t ctdb_control_kill_tcp(struct ctdb_context *ctdb, TDB_DATA indata)
  */
 int32_t ctdb_control_set_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA indata)
 {
-       struct ctdb_control_tcp_tickle_list *list = (struct ctdb_control_tcp_tickle_list *)indata.dptr;
+       struct ctdb_tickle_list_old *list = (struct ctdb_tickle_list_old *)indata.dptr;
        struct ctdb_tcp_array *tcparray;
        struct ctdb_vnn *vnn;
 
        /* We must at least have tickles.num or else we cant verify the size
           of the received data blob
         */
-       if (indata.dsize < offsetof(struct ctdb_control_tcp_tickle_list, 
-                                       tickles.connections)) {
-               DEBUG(DEBUG_ERR,("Bad indata in ctdb_control_set_tcp_tickle_list. Not enough data for the tickle.num field\n"));
+       if (indata.dsize < offsetof(struct ctdb_tickle_list_old, connections)) {
+               DEBUG(DEBUG_ERR,("Bad indata in ctdb_tickle_list. Not enough data for the tickle.num field\n"));
                return -1;
        }
 
        /* verify that the size of data matches what we expect */
-       if (indata.dsize < offsetof(struct ctdb_control_tcp_tickle_list, 
-                               tickles.connections)
-                        + sizeof(struct ctdb_tcp_connection)
-                                * list->tickles.num) {
-               DEBUG(DEBUG_ERR,("Bad indata in ctdb_control_set_tcp_tickle_list\n"));
+       if (indata.dsize < offsetof(struct ctdb_tickle_list_old, connections)
+                        + sizeof(struct ctdb_connection) * list->num) {
+               DEBUG(DEBUG_ERR,("Bad indata in ctdb_tickle_list\n"));
                return -1;
        }
 
@@ -3756,6 +3832,13 @@ int32_t ctdb_control_set_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
                return 1;
        }
 
+       if (vnn->pnn == ctdb->pnn) {
+               DEBUG(DEBUG_INFO,
+                     ("Ignoring redundant set tcp tickle list, this node hosts '%s'\n",
+                      ctdb_addr_to_str(&list->addr)));
+               return 0;
+       }
+
        /* remove any old ticklelist we might have */
        talloc_free(vnn->tcp_array);
        vnn->tcp_array = NULL;
@@ -3763,13 +3846,13 @@ int32_t ctdb_control_set_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
        tcparray = talloc(vnn, struct ctdb_tcp_array);
        CTDB_NO_MEMORY(ctdb, tcparray);
 
-       tcparray->num = list->tickles.num;
+       tcparray->num = list->num;
 
-       tcparray->connections = talloc_array(tcparray, struct ctdb_tcp_connection, tcparray->num);
+       tcparray->connections = talloc_array(tcparray, struct ctdb_connection, tcparray->num);
        CTDB_NO_MEMORY(ctdb, tcparray->connections);
 
-       memcpy(tcparray->connections, &list->tickles.connections[0],
-              sizeof(struct ctdb_tcp_connection)*tcparray->num);
+       memcpy(tcparray->connections, &list->connections[0],
+              sizeof(struct ctdb_connection)*tcparray->num);
 
        /* We now have a new fresh tickle list array for this vnn */
        vnn->tcp_array = tcparray;
@@ -3784,7 +3867,7 @@ int32_t ctdb_control_set_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
 int32_t ctdb_control_get_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA indata, TDB_DATA *outdata)
 {
        ctdb_sock_addr *addr = (ctdb_sock_addr *)indata.dptr;
-       struct ctdb_control_tcp_tickle_list *list;
+       struct ctdb_tickle_list_old *list;
        struct ctdb_tcp_array *tcparray;
        int num;
        struct ctdb_vnn *vnn;
@@ -3804,19 +3887,18 @@ int32_t ctdb_control_get_tcp_tickle_list(struct ctdb_context *ctdb, TDB_DATA ind
                num = 0;
        }
 
-       outdata->dsize = offsetof(struct ctdb_control_tcp_tickle_list, 
-                               tickles.connections)
-                       + sizeof(struct ctdb_tcp_connection) * num;
+       outdata->dsize = offsetof(struct ctdb_tickle_list_old, connections)
+                       + sizeof(struct ctdb_connection) * num;
 
        outdata->dptr  = talloc_size(outdata, outdata->dsize);
        CTDB_NO_MEMORY(ctdb, outdata->dptr);
-       list = (struct ctdb_control_tcp_tickle_list *)outdata->dptr;
+       list = (struct ctdb_tickle_list_old *)outdata->dptr;
 
        list->addr = *addr;
-       list->tickles.num = num;
+       list->num = num;
        if (num) {
-               memcpy(&list->tickles.connections[0], tcparray->connections, 
-                       sizeof(struct ctdb_tcp_connection) * num);
+               memcpy(&list->connections[0], tcparray->connections,
+                       sizeof(struct ctdb_connection) * num);
        }
 
        return 0;
@@ -3832,7 +3914,7 @@ static int ctdb_send_set_tcp_tickles_for_ip(struct ctdb_context *ctdb,
 {
        int ret, num;
        TDB_DATA data;
-       struct ctdb_control_tcp_tickle_list *list;
+       struct ctdb_tickle_list_old *list;
 
        if (tcparray) {
                num = tcparray->num;
@@ -3840,17 +3922,16 @@ static int ctdb_send_set_tcp_tickles_for_ip(struct ctdb_context *ctdb,
                num = 0;
        }
 
-       data.dsize = offsetof(struct ctdb_control_tcp_tickle_list, 
-                               tickles.connections) +
-                       sizeof(struct ctdb_tcp_connection) * num;
+       data.dsize = offsetof(struct ctdb_tickle_list_old, connections) +
+                       sizeof(struct ctdb_connection) * num;
        data.dptr = talloc_size(ctdb, data.dsize);
        CTDB_NO_MEMORY(ctdb, data.dptr);
 
-       list = (struct ctdb_control_tcp_tickle_list *)data.dptr;
+       list = (struct ctdb_tickle_list_old *)data.dptr;
        list->addr = *addr;
-       list->tickles.num = num;
+       list->num = num;
        if (tcparray) {
-               memcpy(&list->tickles.connections[0], tcparray->connections, sizeof(struct ctdb_tcp_connection) * num);
+               memcpy(&list->connections[0], tcparray->connections, sizeof(struct ctdb_connection) * num);
        }
 
        ret = ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_ALL, 0,
@@ -3870,9 +3951,9 @@ static int ctdb_send_set_tcp_tickles_for_ip(struct ctdb_context *ctdb,
 /*
   perform tickle updates if required
  */
-static void ctdb_update_tcp_tickles(struct event_context *ev, 
-                               struct timed_event *te, 
-                               struct timeval t, void *private_data)
+static void ctdb_update_tcp_tickles(struct tevent_context *ev,
+                                   struct tevent_timer *te,
+                                   struct timeval t, void *private_data)
 {
        struct ctdb_context *ctdb = talloc_get_type(private_data, struct ctdb_context);
        int ret;
@@ -3903,11 +3984,10 @@ static void ctdb_update_tcp_tickles(struct event_context *ev,
                }
        }
 
-       event_add_timed(ctdb->ev, ctdb->tickle_update_context,
-                            timeval_current_ofs(ctdb->tunable.tickle_update_interval, 0), 
-                            ctdb_update_tcp_tickles, ctdb);
-}              
-       
+       tevent_add_timer(ctdb->ev, ctdb->tickle_update_context,
+                        timeval_current_ofs(ctdb->tunable.tickle_update_interval, 0),
+                        ctdb_update_tcp_tickles, ctdb);
+}
 
 /*
   start periodic update of tcp tickles
@@ -3916,9 +3996,9 @@ void ctdb_start_tcp_tickle_update(struct ctdb_context *ctdb)
 {
        ctdb->tickle_update_context = talloc_new(ctdb);
 
-       event_add_timed(ctdb->ev, ctdb->tickle_update_context,
-                            timeval_current_ofs(ctdb->tunable.tickle_update_interval, 0), 
-                            ctdb_update_tcp_tickles, ctdb);
+       tevent_add_timer(ctdb->ev, ctdb->tickle_update_context,
+                        timeval_current_ofs(ctdb->tunable.tickle_update_interval, 0),
+                        ctdb_update_tcp_tickles, ctdb);
 }
 
 
@@ -3934,8 +4014,9 @@ struct control_gratious_arp {
 /*
   send a control_gratuitous arp
  */
-static void send_gratious_arp(struct event_context *ev, struct timed_event *te, 
-                                 struct timeval t, void *private_data)
+static void send_gratious_arp(struct tevent_context *ev,
+                             struct tevent_timer *te,
+                             struct timeval t, void *private_data)
 {
        int ret;
        struct control_gratious_arp *arp = talloc_get_type(private_data, 
@@ -3954,9 +4035,9 @@ static void send_gratious_arp(struct event_context *ev, struct timed_event *te,
                return;
        }
 
-       event_add_timed(arp->ctdb->ev, arp, 
-                       timeval_current_ofs(CTDB_ARP_INTERVAL, 0), 
-                       send_gratious_arp, arp);
+       tevent_add_timer(arp->ctdb->ev, arp,
+                        timeval_current_ofs(CTDB_ARP_INTERVAL, 0),
+                        send_gratious_arp, arp);
 }
 
 
@@ -3965,24 +4046,24 @@ static void send_gratious_arp(struct event_context *ev, struct timed_event *te,
  */
 int32_t ctdb_control_send_gratious_arp(struct ctdb_context *ctdb, TDB_DATA indata)
 {
-       struct ctdb_control_gratious_arp *gratious_arp = (struct ctdb_control_gratious_arp *)indata.dptr;
+       struct ctdb_addr_info_old *gratious_arp = (struct ctdb_addr_info_old *)indata.dptr;
        struct control_gratious_arp *arp;
 
        /* verify the size of indata */
-       if (indata.dsize < offsetof(struct ctdb_control_gratious_arp, iface)) {
+       if (indata.dsize < offsetof(struct ctdb_addr_info_old, iface)) {
                DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_gratious_arp structure. Got %u require %u bytes\n", 
                                 (unsigned)indata.dsize, 
-                                (unsigned)offsetof(struct ctdb_control_gratious_arp, iface)));
+                                (unsigned)offsetof(struct ctdb_addr_info_old, iface)));
                return -1;
        }
        if (indata.dsize != 
-               ( offsetof(struct ctdb_control_gratious_arp, iface)
+               ( offsetof(struct ctdb_addr_info_old, iface)
                + gratious_arp->len ) ){
 
                DEBUG(DEBUG_ERR,(__location__ " Wrong size of indata. Was %u bytes "
                        "but should be %u bytes\n", 
                         (unsigned)indata.dsize, 
-                        (unsigned)(offsetof(struct ctdb_control_gratious_arp, iface)+gratious_arp->len)));
+                        (unsigned)(offsetof(struct ctdb_addr_info_old, iface)+gratious_arp->len)));
                return -1;
        }
 
@@ -3995,31 +4076,31 @@ int32_t ctdb_control_send_gratious_arp(struct ctdb_context *ctdb, TDB_DATA indat
        arp->iface = talloc_strdup(arp, gratious_arp->iface);
        CTDB_NO_MEMORY(ctdb, arp->iface);
        arp->count = 0;
-       
-       event_add_timed(arp->ctdb->ev, arp, 
-                       timeval_zero(), send_gratious_arp, arp);
+
+       tevent_add_timer(arp->ctdb->ev, arp,
+                        timeval_zero(), send_gratious_arp, arp);
 
        return 0;
 }
 
 int32_t ctdb_control_add_public_address(struct ctdb_context *ctdb, TDB_DATA indata)
 {
-       struct ctdb_control_ip_iface *pub = (struct ctdb_control_ip_iface *)indata.dptr;
+       struct ctdb_addr_info_old *pub = (struct ctdb_addr_info_old *)indata.dptr;
        int ret;
 
        /* verify the size of indata */
-       if (indata.dsize < offsetof(struct ctdb_control_ip_iface, iface)) {
-               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_ip_iface structure\n"));
+       if (indata.dsize < offsetof(struct ctdb_addr_info_old, iface)) {
+               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_addr_info structure\n"));
                return -1;
        }
        if (indata.dsize != 
-               ( offsetof(struct ctdb_control_ip_iface, iface)
+               ( offsetof(struct ctdb_addr_info_old, iface)
                + pub->len ) ){
 
                DEBUG(DEBUG_ERR,(__location__ " Wrong size of indata. Was %u bytes "
                        "but should be %u bytes\n", 
                         (unsigned)indata.dsize, 
-                        (unsigned)(offsetof(struct ctdb_control_ip_iface, iface)+pub->len)));
+                        (unsigned)(offsetof(struct ctdb_addr_info_old, iface)+pub->len)));
                return -1;
        }
 
@@ -4036,7 +4117,7 @@ int32_t ctdb_control_add_public_address(struct ctdb_context *ctdb, TDB_DATA inda
 }
 
 struct delete_ip_callback_state {
-       struct ctdb_req_control *c;
+       struct ctdb_req_control_old *c;
 };
 
 /*
@@ -4056,25 +4137,25 @@ static void delete_ip_callback(struct ctdb_context *ctdb,
 }
 
 int32_t ctdb_control_del_public_address(struct ctdb_context *ctdb,
-                                       struct ctdb_req_control *c,
+                                       struct ctdb_req_control_old *c,
                                        TDB_DATA indata, bool *async_reply)
 {
-       struct ctdb_control_ip_iface *pub = (struct ctdb_control_ip_iface *)indata.dptr;
+       struct ctdb_addr_info_old *pub = (struct ctdb_addr_info_old *)indata.dptr;
        struct ctdb_vnn *vnn;
 
        /* verify the size of indata */
-       if (indata.dsize < offsetof(struct ctdb_control_ip_iface, iface)) {
-               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_control_ip_iface structure\n"));
+       if (indata.dsize < offsetof(struct ctdb_addr_info_old, iface)) {
+               DEBUG(DEBUG_ERR,(__location__ " Too small indata to hold a ctdb_addr_info structure\n"));
                return -1;
        }
        if (indata.dsize != 
-               ( offsetof(struct ctdb_control_ip_iface, iface)
+               ( offsetof(struct ctdb_addr_info_old, iface)
                + pub->len ) ){
 
                DEBUG(DEBUG_ERR,(__location__ " Wrong size of indata. Was %u bytes "
                        "but should be %u bytes\n", 
                         (unsigned)indata.dsize, 
-                        (unsigned)(offsetof(struct ctdb_control_ip_iface, iface)+pub->len)));
+                        (unsigned)(offsetof(struct ctdb_addr_info_old, iface)+pub->len)));
                return -1;
        }
 
@@ -4145,7 +4226,7 @@ int32_t ctdb_control_del_public_address(struct ctdb_context *ctdb,
 
 
 struct ipreallocated_callback_state {
-       struct ctdb_req_control *c;
+       struct ctdb_req_control_old *c;
 };
 
 static void ctdb_ipreallocated_callback(struct ctdb_context *ctdb,
@@ -4169,7 +4250,7 @@ static void ctdb_ipreallocated_callback(struct ctdb_context *ctdb,
 
 /* A control to run the ipreallocated event */
 int32_t ctdb_control_ipreallocated(struct ctdb_context *ctdb,
-                                  struct ctdb_req_control *c,
+                                  struct ctdb_req_control_old *c,
                                   bool *async_reply)
 {
        int ret;
@@ -4203,15 +4284,15 @@ int32_t ctdb_control_ipreallocated(struct ctdb_context *ctdb,
    node has the expected ip allocation.
    This is verified against ctdb->ip_tree
 */
-int verify_remote_ip_allocation(struct ctdb_context *ctdb,
-                               struct ctdb_all_public_ips *ips,
-                               uint32_t pnn)
+static int verify_remote_ip_allocation(struct ctdb_context *ctdb,
+                                      struct ctdb_public_ip_list_old *ips,
+                                      uint32_t pnn)
 {
-       struct ctdb_public_ip_list *tmp_ip; 
+       struct public_ip_list *tmp_ip;
        int i;
 
        if (ctdb->ip_tree == NULL) {
-               /* dont know the expected allocation yet, assume remote node
+               /* don't know the expected allocation yet, assume remote node
                   is correct. */
                return 0;
        }
@@ -4246,7 +4327,12 @@ int verify_remote_ip_allocation(struct ctdb_context *ctdb,
 
 int update_ip_assignment_tree(struct ctdb_context *ctdb, struct ctdb_public_ip *ip)
 {
-       struct ctdb_public_ip_list *tmp_ip; 
+       struct public_ip_list *tmp_ip;
+
+       /* IP tree is never built if DisableIPFailover is set */
+       if (ctdb->tunable.disable_ip_failover != 0) {
+               return 0;
+       }
 
        if (ctdb->ip_tree == NULL) {
                DEBUG(DEBUG_ERR,("No ctdb->ip_tree yet. Failed to update ip assignment\n"));
@@ -4265,14 +4351,18 @@ int update_ip_assignment_tree(struct ctdb_context *ctdb, struct ctdb_public_ip *
        return 0;
 }
 
+void clear_ip_assignment_tree(struct ctdb_context *ctdb)
+{
+       TALLOC_FREE(ctdb->ip_tree);
+}
 
 struct ctdb_reloadips_handle {
        struct ctdb_context *ctdb;
-       struct ctdb_req_control *c;
+       struct ctdb_req_control_old *c;
        int status;
        int fd[2];
        pid_t child;
-       struct fd_event *fde;
+       struct tevent_fd *fde;
 };
 
 static int ctdb_reloadips_destructor(struct ctdb_reloadips_handle *h)
@@ -4288,17 +4378,18 @@ static int ctdb_reloadips_destructor(struct ctdb_reloadips_handle *h)
        return 0;
 }
 
-static void ctdb_reloadips_timeout_event(struct event_context *ev,
-                               struct timed_event *te,
-                               struct timeval t, void *private_data)
+static void ctdb_reloadips_timeout_event(struct tevent_context *ev,
+                                        struct tevent_timer *te,
+                                        struct timeval t, void *private_data)
 {
        struct ctdb_reloadips_handle *h = talloc_get_type(private_data, struct ctdb_reloadips_handle);
 
        talloc_free(h);
-}      
+}
 
-static void ctdb_reloadips_child_handler(struct event_context *ev, struct fd_event *fde, 
-                            uint16_t flags, void *private_data)
+static void ctdb_reloadips_child_handler(struct tevent_context *ev,
+                                        struct tevent_fd *fde,
+                                        uint16_t flags, void *private_data)
 {
        struct ctdb_reloadips_handle *h = talloc_get_type(private_data, struct ctdb_reloadips_handle);
 
@@ -4318,7 +4409,7 @@ static void ctdb_reloadips_child_handler(struct event_context *ev, struct fd_eve
 static int ctdb_reloadips_child(struct ctdb_context *ctdb)
 {
        TALLOC_CTX *mem_ctx = talloc_new(NULL);
-       struct ctdb_all_public_ips *ips;
+       struct ctdb_public_ip_list_old *ips;
        struct ctdb_vnn *vnn;
        struct client_async_data *async_data;
        struct timeval timeout;
@@ -4363,14 +4454,13 @@ static int ctdb_reloadips_child(struct ctdb_context *ctdb)
 
                if (vnn == NULL) {
                        /* Delete IP ips->ips[i] */
-                       struct ctdb_control_ip_iface *pub;
+                       struct ctdb_addr_info_old *pub;
 
                        DEBUG(DEBUG_NOTICE,
                              ("IP %s no longer configured, deleting it\n",
                               ctdb_addr_to_str(&ips->ips[i].addr)));
 
-                       pub = talloc_zero(mem_ctx,
-                                         struct ctdb_control_ip_iface);
+                       pub = talloc_zero(mem_ctx, struct ctdb_addr_info_old);
                        CTDB_NO_MEMORY(ctdb, pub);
 
                        pub->addr  = ips->ips[i].addr;
@@ -4379,7 +4469,7 @@ static int ctdb_reloadips_child(struct ctdb_context *ctdb)
 
                        timeout = TAKEOVER_TIMEOUT();
 
-                       data.dsize = offsetof(struct ctdb_control_ip_iface,
+                       data.dsize = offsetof(struct ctdb_addr_info_old,
                                              iface) + pub->len;
                        data.dptr = (uint8_t *)pub;
 
@@ -4410,7 +4500,7 @@ static int ctdb_reloadips_child(struct ctdb_context *ctdb)
                }
                if (i == ips->num) {
                        /* Add IP ips->ips[i] */
-                       struct ctdb_control_ip_iface *pub;
+                       struct ctdb_addr_info_old *pub;
                        const char *ifaces = NULL;
                        uint32_t len;
                        int iface = 0;
@@ -4447,7 +4537,7 @@ static int ctdb_reloadips_child(struct ctdb_context *ctdb)
 
                        len   = strlen(ifaces) + 1;
                        pub = talloc_zero_size(mem_ctx,
-                                              offsetof(struct ctdb_control_ip_iface, iface) + len);
+                                              offsetof(struct ctdb_addr_info_old, iface) + len);
                        CTDB_NO_MEMORY(ctdb, pub);
 
                        pub->addr  = vnn->public_address;
@@ -4457,7 +4547,7 @@ static int ctdb_reloadips_child(struct ctdb_context *ctdb)
 
                        timeout = TAKEOVER_TIMEOUT();
 
-                       data.dsize = offsetof(struct ctdb_control_ip_iface,
+                       data.dsize = offsetof(struct ctdb_addr_info_old,
                                              iface) + pub->len;
                        data.dptr = (uint8_t *)pub;
 
@@ -4493,7 +4583,7 @@ failed:
    and drop any addresses we should nnot longer host, and add new addresses
    that we are now able to host
 */
-int32_t ctdb_control_reload_public_ips(struct ctdb_context *ctdb, struct ctdb_req_control *c, bool *async_reply)
+int32_t ctdb_control_reload_public_ips(struct ctdb_context *ctdb, struct ctdb_req_control_old *c, bool *async_reply)
 {
        struct ctdb_reloadips_handle *h;
        pid_t parent = getpid();
@@ -4531,7 +4621,7 @@ int32_t ctdb_control_reload_public_ips(struct ctdb_context *ctdb, struct ctdb_re
                close(h->fd[0]);
                debug_extra = talloc_asprintf(NULL, "reloadips:");
 
-               ctdb_set_process_name("ctdb_reloadips");
+               prctl_set_comment("ctdb_reloadips");
                if (switch_from_server_to_client(ctdb, "reloadips-child") != 0) {
                        DEBUG(DEBUG_CRIT,("ERROR: Failed to switch reloadips child into client mode\n"));
                        res = -1;
@@ -4558,14 +4648,12 @@ int32_t ctdb_control_reload_public_ips(struct ctdb_context *ctdb, struct ctdb_re
        talloc_set_destructor(h, ctdb_reloadips_destructor);
 
 
-       h->fde = event_add_fd(ctdb->ev, h, h->fd[0],
-                       EVENT_FD_READ, ctdb_reloadips_child_handler,
-                       (void *)h);
+       h->fde = tevent_add_fd(ctdb->ev, h, h->fd[0], TEVENT_FD_READ,
+                              ctdb_reloadips_child_handler, (void *)h);
        tevent_fd_set_auto_close(h->fde);
 
-       event_add_timed(ctdb->ev, h,
-                       timeval_current_ofs(120, 0),
-                       ctdb_reloadips_timeout_event, h);
+       tevent_add_timer(ctdb->ev, h, timeval_current_ofs(120, 0),
+                        ctdb_reloadips_timeout_event, h);
 
        /* we reply later */
        *async_reply = true;