xref: /titanic_50/usr/src/cmd/rcm_daemon/common/ip_rcm.c (revision 4045d94132614e1de2073685a6cdd4fbd86bec33)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 /*
29  * This RCM module adds support to the RCM framework for IP managed
30  * interfaces.
31  */
32 
33 #include <stdio.h>
34 #include <stdlib.h>
35 #include <unistd.h>
36 #include <assert.h>
37 #include <string.h>
38 #include <synch.h>
39 #include <libintl.h>
40 #include <errno.h>
41 #include <fcntl.h>
42 #include <sys/types.h>
43 #include <sys/stat.h>
44 #include <sys/socket.h>
45 #include <sys/sockio.h>
46 #include <net/if.h>
47 #include <netinet/in.h>
48 #include <netinet/tcp.h>
49 #include <arpa/inet.h>
50 #include <stropts.h>
51 #include <strings.h>
52 #include <libdevinfo.h>
53 #include <sys/systeminfo.h>
54 #include <netdb.h>
55 #include <inet/ip.h>
56 #include <libinetutil.h>
57 #include <libdllink.h>
58 
59 #include <ipmp_mpathd.h>
60 #include "rcm_module.h"
61 
62 /*
63  * Definitions
64  */
65 #ifndef lint
66 #define	_(x)	gettext(x)
67 #else
68 #define	_(x)	x
69 #endif
70 
71 /* Some generic well-knowns and defaults used in this module */
72 #define	ARP_MOD_NAME		"arp"		/* arp module */
73 #define	IP_MAX_MODS		9		/* max modules pushed on intr */
74 #define	MAX_RECONFIG_SIZE	1024		/* Max. reconfig string size */
75 
76 #define	RCM_LINK_PREFIX		"SUNW_datalink"	/* RCM datalink name prefix */
77 #define	RCM_LINK_RESOURCE_MAX	(13 + LINKID_STR_WIDTH)
78 
79 #define	RCM_STR_SUNW_IP		"SUNW_ip/"	/* IP address export prefix */
80 #define	RCM_SIZE_SUNW_IP	9		/* strlen("SUNW_ip/") + 1 */
81 
82 /* ifconfig(1M) */
83 #define	USR_SBIN_IFCONFIG	"/usr/sbin/ifconfig" /* ifconfig command */
84 #define	CFGFILE_FMT_IPV4	"/etc/hostname."  /* IPV4 config file */
85 #define	CFGFILE_FMT_IPV6	"/etc/hostname6." /* IPV6 config file */
86 #define	CFG_CMDS_STD	" netmask + broadcast + up" /* Normal config string */
87 #define	CONFIG_AF_INET		0x1		/* Post-configure IPv4 */
88 #define	CONFIG_AF_INET6		0x2		/* Post-configure IPv6 */
89 #define	MAXLINE			1024		/* Max. line length */
90 #define	MAXARGS			512		/* Max. args in ifconfig cmd */
91 
92 /* Physical interface flags mask */
93 #define	RCM_PIF_FLAGS		(IFF_OFFLINE | IFF_INACTIVE | IFF_FAILED | \
94 				    IFF_STANDBY)
95 
96 /* Some useful macros */
97 #ifndef MAX
98 #define	MAX(a, b)	(((a) > (b))?(a):(b))
99 #endif /* MAX */
100 
101 #ifndef ISSPACE
102 #define	ISSPACE(c)	((c) == ' ' || (c) == '\t')
103 #endif
104 
105 #ifndef	ISEOL
106 #define	ISEOL(c)	((c) == '\n' || (c) == '\r' || (c) == '\0')
107 #endif
108 
109 #ifndef	STREQ
110 #define	STREQ(a, b)	(*(a) == *(b) && strcmp((a), (b)) == 0)
111 #endif
112 
113 #ifndef ADDSPACE
114 #define	ADDSPACE(a)	((void) strcat((a), " "))
115 #endif
116 
117 /* Interface Cache state flags */
118 #define	CACHE_IF_STALE		0x1		/* stale cached data */
119 #define	CACHE_IF_NEW		0x2		/* new cached interface */
120 #define	CACHE_IF_OFFLINED	0x4		/* interface offlined */
121 #define	CACHE_IF_IGNORE		0x8		/* state held elsewhere */
122 
123 /* Network Cache lookup options */
124 #define	CACHE_NO_REFRESH	0x1		/* cache refresh not needed */
125 #define	CACHE_REFRESH		0x2		/* refresh cache */
126 
127 /* RCM IPMP Module specific property definitions */
128 #define	RCM_IPMP_MIN_REDUNDANCY	1		/* default min. redundancy */
129 
130 /* in.mpathd(1M) specifics */
131 #define	MPATHD_MAX_RETRIES	5	/* Max. offline retries */
132 
133 /* Stream module operations */
134 #define	MOD_INSERT		0	/* Insert a mid-stream module */
135 #define	MOD_REMOVE		1	/* Remove a mid-stream module */
136 #define	MOD_CHECK		2	/* Check mid-stream module safety */
137 
138 /*
139  * in.mpathd(1M) message passing formats
140  */
141 typedef struct mpathd_cmd {
142 	uint32_t	cmd_command;		/* message command */
143 	char		cmd_ifname[LIFNAMSIZ];	/* this interface name */
144 	char		cmd_movetoif[LIFNAMSIZ]; /* move to interface */
145 	uint32_t	cmd_min_red;		/* min. redundancy */
146 /* Message passing values for MI_SETOINDEX */
147 #define	from_lifname	cmd_ifname		/* current logical interface */
148 #define	to_pifname	cmd_movetoif		/* new physical interface */
149 #define	addr_family	cmd_min_red		/* address family */
150 } mpathd_cmd_t;
151 
152 /* This is needed since mpathd checks message size for offline */
153 typedef struct mpathd_unoffline {
154 	uint32_t	cmd_command;		/* offline / undo offline */
155 	char		cmd_ifname[LIFNAMSIZ];	/* this interface name */
156 } mpathd_unoffline_t;
157 
158 typedef struct mpathd_response {
159 	uint32_t	resp_sys_errno;		/* system errno */
160 	uint32_t	resp_mpathd_err;	/* mpathd error information */
161 } mpathd_response_t;
162 
163 /*
164  * IP module data types
165  */
166 
167 /* Physical interface representation */
168 typedef struct ip_pif {
169 	char			pi_ifname[LIFNAMSIZ+1];	/* interface name */
170 	char			pi_grpname[LIFNAMSIZ+1]; /* IPMP group name */
171 	struct ip_lif		*pi_lifs;	/* ptr to logical interfaces */
172 } ip_pif_t;
173 
174 /* Logical interface representation */
175 typedef struct ip_lif
176 {
177 	struct ip_lif		*li_next;	/* ptr to next lif */
178 	struct ip_lif		*li_prev;  	/* previous next ptr */
179 	ip_pif_t		*li_pif;	/* back ptr to phy int */
180 	ushort_t		li_ifnum;	/* interface number */
181 	union {
182 		sa_family_t		family;
183 		struct sockaddr_storage storage;
184 		struct sockaddr_in	ip4;    /* IPv4 */
185 		struct sockaddr_in6	ip6;    /* IPv6 */
186 	} li_addr;
187 	uint64_t		li_ifflags;	/* current IFF_* flags */
188 	int			li_modcnt;	/* # of modules */
189 	char	*li_modules[IP_MAX_MODS];	/* module list pushed */
190 	char	*li_reconfig;			/* Reconfiguration string */
191 	int32_t			li_cachestate;	/* cache state flags */
192 } ip_lif_t;
193 
194 /* Cache element */
195 typedef struct ip_cache
196 {
197 	struct ip_cache		*ip_next;	/* next cached resource */
198 	struct ip_cache		*ip_prev;	/* prev cached resource */
199 	char			*ip_resource;	/* resource name */
200 	ip_pif_t		*ip_pif;	/* ptr to phy int */
201 	int32_t			ip_ifred;	/* min. redundancy */
202 	int			ip_cachestate;	/* cache state flags */
203 } ip_cache_t;
204 
205 /*
206  * Global cache for network interfaces
207  */
208 static ip_cache_t	cache_head;
209 static ip_cache_t	cache_tail;
210 static mutex_t		cache_lock;
211 static int		events_registered = 0;
212 
213 /*
214  * RCM module interface prototypes
215  */
216 static int ip_register(rcm_handle_t *);
217 static int ip_unregister(rcm_handle_t *);
218 static int ip_get_info(rcm_handle_t *, char *, id_t, uint_t,
219 			char **, char **, nvlist_t *, rcm_info_t **);
220 static int ip_suspend(rcm_handle_t *, char *, id_t,
221 			timespec_t *, uint_t, char **, rcm_info_t **);
222 static int ip_resume(rcm_handle_t *, char *, id_t, uint_t,
223 			char **, rcm_info_t **);
224 static int ip_offline(rcm_handle_t *, char *, id_t, uint_t,
225 			char **, rcm_info_t **);
226 static int ip_undo_offline(rcm_handle_t *, char *, id_t, uint_t,
227 			char **, rcm_info_t **);
228 static int ip_remove(rcm_handle_t *, char *, id_t, uint_t,
229 			char **, rcm_info_t **);
230 static int ip_notify_event(rcm_handle_t *, char *, id_t, uint_t,
231 			char **, nvlist_t *, rcm_info_t **);
232 
233 /* Module private routines */
234 static void 	free_cache();
235 static int 	update_cache(rcm_handle_t *);
236 static void 	cache_remove(ip_cache_t *);
237 static ip_cache_t *cache_lookup(rcm_handle_t *, char *, char);
238 static void 	free_node(ip_cache_t *);
239 static void 	cache_insert(ip_cache_t *);
240 static char 	*ip_usage(ip_cache_t *);
241 static int 	update_pif(rcm_handle_t *, int, int, struct lifreq *);
242 static int 	ip_ipmp_offline(ip_cache_t *, ip_cache_t *);
243 static int	ip_ipmp_undo_offline(ip_cache_t *);
244 static int	if_cfginfo(ip_cache_t *, uint_t);
245 static int	if_unplumb(ip_cache_t *);
246 static int	if_replumb(ip_cache_t *);
247 static void 	ip_log_err(ip_cache_t *, char **, char *);
248 static char	*get_link_resource(const char *);
249 static void	clr_cfg_state(ip_pif_t *);
250 static uint64_t	if_get_flags(ip_pif_t *);
251 static int	mpathd_send_cmd(mpathd_cmd_t *);
252 static int	connect_to_mpathd(int);
253 static int	modop(char *, char *, int, char);
254 static int	get_modlist(char *, ip_lif_t *);
255 static int	ip_domux2fd(int *, int *, int *, struct lifreq *);
256 static int	ip_plink(int, int, int, struct lifreq *);
257 static int	ip_onlinelist(rcm_handle_t *, ip_cache_t *, char **, uint_t,
258 			rcm_info_t **);
259 static int	ip_offlinelist(rcm_handle_t *, ip_cache_t *, char **, uint_t,
260 			rcm_info_t **);
261 static char 	**ip_get_addrlist(ip_cache_t *);
262 static void	ip_free_addrlist(char **);
263 static void	ip_consumer_notify(rcm_handle_t *, datalink_id_t, char **,
264 			uint_t, rcm_info_t **);
265 
266 static int if_configure(datalink_id_t);
267 static int isgrouped(char *);
268 static int if_ipmp_config(char *, int, int);
269 static int if_mpathd_configure(char *, char *, int, int);
270 static char *get_mpathd_dest(char *, int);
271 static int if_getcount(int);
272 static void tokenize(char *, char **, char *, int *);
273 
274 
275 /* Module-Private data */
276 static struct rcm_mod_ops ip_ops =
277 {
278 	RCM_MOD_OPS_VERSION,
279 	ip_register,
280 	ip_unregister,
281 	ip_get_info,
282 	ip_suspend,
283 	ip_resume,
284 	ip_offline,
285 	ip_undo_offline,
286 	ip_remove,
287 	NULL,
288 	NULL,
289 	ip_notify_event
290 };
291 
292 /*
293  * rcm_mod_init() - Update registrations, and return the ops structure.
294  */
295 struct rcm_mod_ops *
296 rcm_mod_init(void)
297 {
298 	rcm_log_message(RCM_TRACE1, "IP: mod_init\n");
299 
300 	cache_head.ip_next = &cache_tail;
301 	cache_head.ip_prev = NULL;
302 	cache_tail.ip_prev = &cache_head;
303 	cache_tail.ip_next = NULL;
304 	(void) mutex_init(&cache_lock, NULL, NULL);
305 
306 	/* Return the ops vectors */
307 	return (&ip_ops);
308 }
309 
310 /*
311  * rcm_mod_info() - Return a string describing this module.
312  */
313 const char *
314 rcm_mod_info(void)
315 {
316 	rcm_log_message(RCM_TRACE1, "IP: mod_info\n");
317 
318 	return ("IP Multipathing module version %I%");
319 }
320 
321 /*
322  * rcm_mod_fini() - Destroy the network interfaces cache.
323  */
324 int
325 rcm_mod_fini(void)
326 {
327 	rcm_log_message(RCM_TRACE1, "IP: mod_fini\n");
328 
329 	free_cache();
330 	(void) mutex_destroy(&cache_lock);
331 	return (RCM_SUCCESS);
332 }
333 
334 /*
335  * ip_register() - Make sure the cache is properly sync'ed, and its
336  *		 registrations are in order.
337  */
338 static int
339 ip_register(rcm_handle_t *hd)
340 {
341 	rcm_log_message(RCM_TRACE1, "IP: register\n");
342 
343 	/* Guard against bad arguments */
344 	assert(hd != NULL);
345 
346 	if (update_cache(hd) < 0)
347 		return (RCM_FAILURE);
348 
349 	/*
350 	 * Need to register interest in all new resources
351 	 * getting attached, so we get attach event notifications
352 	 */
353 	if (!events_registered) {
354 		if (rcm_register_event(hd, RCM_RESOURCE_LINK_NEW, 0, NULL)
355 		    != RCM_SUCCESS) {
356 			rcm_log_message(RCM_ERROR,
357 			    _("IP: failed to register %s\n"),
358 			    RCM_RESOURCE_LINK_NEW);
359 			return (RCM_FAILURE);
360 		} else {
361 			rcm_log_message(RCM_DEBUG, "IP: registered %s\n",
362 			    RCM_RESOURCE_LINK_NEW);
363 			events_registered++;
364 		}
365 	}
366 
367 	return (RCM_SUCCESS);
368 }
369 
370 /*
371  * ip_unregister() - Walk the cache, unregistering all the networks.
372  */
373 static int
374 ip_unregister(rcm_handle_t *hd)
375 {
376 	ip_cache_t *probe;
377 
378 	rcm_log_message(RCM_TRACE1, "IP: unregister\n");
379 
380 	/* Guard against bad arguments */
381 	assert(hd != NULL);
382 
383 	/* Walk the cache, unregistering everything */
384 	(void) mutex_lock(&cache_lock);
385 	probe = cache_head.ip_next;
386 	while (probe != &cache_tail) {
387 		if (rcm_unregister_interest(hd, probe->ip_resource, 0)
388 		    != RCM_SUCCESS) {
389 			/* unregister failed for whatever reason */
390 			(void) mutex_unlock(&cache_lock);
391 			return (RCM_FAILURE);
392 		}
393 		cache_remove(probe);
394 		free_node(probe);
395 		probe = cache_head.ip_next;
396 	}
397 	(void) mutex_unlock(&cache_lock);
398 
399 	/*
400 	 * Need to unregister interest in all new resources
401 	 */
402 	if (events_registered) {
403 		if (rcm_unregister_event(hd, RCM_RESOURCE_LINK_NEW, 0)
404 		    != RCM_SUCCESS) {
405 			rcm_log_message(RCM_ERROR,
406 			    _("IP: failed to unregister %s\n"),
407 			    RCM_RESOURCE_LINK_NEW);
408 			return (RCM_FAILURE);
409 		} else {
410 			rcm_log_message(RCM_DEBUG, "IP: unregistered %s\n",
411 			    RCM_RESOURCE_LINK_NEW);
412 			events_registered--;
413 		}
414 	}
415 
416 	return (RCM_SUCCESS);
417 }
418 
419 /*
420  * ip_offline() - Offline an interface.
421  */
422 static int
423 ip_offline(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
424     char **errorp, rcm_info_t **depend_info)
425 {
426 	ip_cache_t *node;
427 	ip_pif_t *pif;
428 	int detachable = 0;
429 	int nofailover = 0;
430 	int ipmp = 0;
431 
432 	rcm_log_message(RCM_TRACE1, "IP: offline(%s)\n", rsrc);
433 
434 	/* Guard against bad arguments */
435 	assert(hd != NULL);
436 	assert(rsrc != NULL);
437 	assert(id == (id_t)0);
438 	assert(errorp != NULL);
439 	assert(depend_info != NULL);
440 
441 	/* Lock the cache and lookup the resource */
442 	(void) mutex_lock(&cache_lock);
443 	node = cache_lookup(hd, rsrc, CACHE_REFRESH);
444 	if (node == NULL) {
445 		ip_log_err(node, errorp, "Unrecognized resource");
446 		errno = ENOENT;
447 		(void) mutex_unlock(&cache_lock);
448 		return (RCM_SUCCESS);
449 	}
450 
451 	pif = node->ip_pif;
452 
453 	/* Establish default detachability criteria */
454 	if (flags & RCM_FORCE) {
455 		detachable++;
456 	}
457 
458 	/* Check if the interface is an IPMP grouped interface */
459 	if (strcmp(pif->pi_grpname, "")) {
460 		ipmp++;
461 	}
462 
463 	if (if_get_flags(pif) & IFF_NOFAILOVER) {
464 		nofailover++;
465 	}
466 
467 	/*
468 	 * Even if the interface is not in an IPMP group, it's possible that
469 	 * it's still okay to offline it as long as there are higher-level
470 	 * failover mechanisms for the addresses it owns (e.g., clustering).
471 	 * In this case, ip_offlinelist() will return RCM_SUCCESS, and we
472 	 * charge on.
473 	 */
474 	if (!ipmp && !detachable) {
475 		/* Inform consumers of IP addresses being offlined */
476 		if (ip_offlinelist(hd, node, errorp, flags, depend_info) ==
477 		    RCM_SUCCESS) {
478 			rcm_log_message(RCM_DEBUG,
479 			    "IP: consumers agree on detach");
480 		} else {
481 			ip_log_err(node, errorp,
482 			    "Device consumers prohibit offline");
483 			(void) mutex_unlock(&cache_lock);
484 			return (RCM_FAILURE);
485 		}
486 	}
487 
488 	/*
489 	 * Cannot remove an IPMP interface if IFF_NOFAILOVER is set.
490 	 */
491 	if (ipmp && nofailover) {
492 		/* Interface is part of an IPMP group, and cannot failover */
493 		ip_log_err(node, errorp, "Failover disabled");
494 		errno = EBUSY;
495 		(void) mutex_unlock(&cache_lock);
496 		return (RCM_FAILURE);
497 	}
498 
499 	/* Check if it's a query */
500 	if (flags & RCM_QUERY) {
501 		rcm_log_message(RCM_TRACE1, "IP: offline query success(%s)\n",
502 		    rsrc);
503 		(void) mutex_unlock(&cache_lock);
504 		return (RCM_SUCCESS);
505 	}
506 
507 	/* Check detachability, save configuration if detachable */
508 	if (if_cfginfo(node, (flags & RCM_FORCE)) < 0) {
509 		node->ip_cachestate |= CACHE_IF_IGNORE;
510 		rcm_log_message(RCM_TRACE1, "IP: Ignoring node(%s)\n", rsrc);
511 		(void) mutex_unlock(&cache_lock);
512 		return (RCM_SUCCESS);
513 	}
514 
515 	/* standalone detachable device */
516 	if (!ipmp) {
517 		if (if_unplumb(node) < 0) {
518 			ip_log_err(node, errorp,
519 			    "Failed to unplumb the device");
520 
521 			errno = EIO;
522 			(void) mutex_unlock(&cache_lock);
523 			return (RCM_FAILURE);
524 		}
525 
526 		node->ip_cachestate |= CACHE_IF_OFFLINED;
527 		rcm_log_message(RCM_TRACE1, "IP: Offline success(%s)\n", rsrc);
528 		(void) mutex_unlock(&cache_lock);
529 		return (RCM_SUCCESS);
530 	}
531 
532 	/*
533 	 * This an IPMP interface that can be failed over.
534 	 * Request in.mpathd(1M) to failover the physical interface.
535 	 */
536 
537 	/* Failover to "any", let mpathd determine best failover candidate */
538 	if (ip_ipmp_offline(node, NULL) < 0) {
539 		ip_log_err(node, errorp, "in.mpathd failover failed");
540 		/*
541 		 * Odds are that in.mpathd(1M) could not offline the device
542 		 * because it was the last interface in the group.  However,
543 		 * it's possible that it's still okay to offline it as long as
544 		 * there are higher-level failover mechanisms for the
545 		 * addresses it owns (e.g., clustering).  In this case,
546 		 * ip_offlinelist() will return RCM_SUCCESS, and we charge on.
547 		 *
548 		 * TODO: change ip_ipmp_offline() to return the actual failure
549 		 * from in.mpathd so that we can verify that it did indeed
550 		 * fail with IPMP_EMINRED.
551 		 */
552 		if (!detachable) {
553 			/* Inform consumers of IP addresses being offlined */
554 			if (ip_offlinelist(hd, node, errorp, flags,
555 			    depend_info) == RCM_SUCCESS) {
556 				rcm_log_message(RCM_DEBUG,
557 				    "IP: consumers agree on detach");
558 			} else {
559 				ip_log_err(node, errorp,
560 				    "Device consumers prohibit offline");
561 				(void) mutex_unlock(&cache_lock);
562 				errno = EBUSY;
563 				return (RCM_FAILURE);
564 			}
565 		}
566 	}
567 
568 	if (if_unplumb(node) < 0) {
569 		rcm_log_message(RCM_ERROR,
570 		    _("IP: Unplumb failed (%s)\n"),
571 		    pif->pi_ifname);
572 
573 		/* Request mpathd to undo the offline */
574 		if (ip_ipmp_undo_offline(node) < 0) {
575 			ip_log_err(node, errorp, "Undo offline failed");
576 			(void) mutex_unlock(&cache_lock);
577 			return (RCM_FAILURE);
578 		}
579 		(void) mutex_unlock(&cache_lock);
580 		return (RCM_FAILURE);
581 	}
582 
583 	node->ip_cachestate |= CACHE_IF_OFFLINED;
584 	rcm_log_message(RCM_TRACE1, "IP: offline success(%s)\n", rsrc);
585 	(void) mutex_unlock(&cache_lock);
586 	return (RCM_SUCCESS);
587 }
588 
589 /*
590  * ip_undo_offline() - Undo offline of a previously offlined device.
591  */
592 /*ARGSUSED*/
593 static int
594 ip_undo_offline(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
595     char **errorp, rcm_info_t **depend_info)
596 {
597 	ip_cache_t *node;
598 
599 	rcm_log_message(RCM_TRACE1, "IP: online(%s)\n", rsrc);
600 
601 	/* Guard against bad arguments */
602 	assert(hd != NULL);
603 	assert(rsrc != NULL);
604 	assert(id == (id_t)0);
605 	assert(errorp != NULL);
606 	assert(depend_info != NULL);
607 
608 	(void) mutex_lock(&cache_lock);
609 	node = cache_lookup(hd, rsrc, CACHE_NO_REFRESH);
610 
611 	if (node == NULL) {
612 		ip_log_err(node, errorp, "No such device");
613 		(void) mutex_unlock(&cache_lock);
614 		errno = ENOENT;
615 		return (RCM_FAILURE);
616 	}
617 
618 	/* Check if no attempt should be made to online the device here */
619 	if (node->ip_cachestate & CACHE_IF_IGNORE) {
620 		node->ip_cachestate &= ~(CACHE_IF_IGNORE);
621 		(void) mutex_unlock(&cache_lock);
622 		return (RCM_SUCCESS);
623 	}
624 
625 	/* Check if the interface was previously offlined */
626 	if (!(node->ip_cachestate & CACHE_IF_OFFLINED)) {
627 		ip_log_err(node, errorp, "Device not offlined");
628 		(void) mutex_unlock(&cache_lock);
629 		errno = ENOTSUP;
630 		return (RCM_FAILURE);
631 	}
632 
633 	if (if_replumb(node) == -1) {
634 		/* re-plumb failed */
635 		ip_log_err(node, errorp, "Replumb failed");
636 		(void) mutex_unlock(&cache_lock);
637 		errno = EIO;
638 		return (RCM_FAILURE);
639 
640 	}
641 
642 	/* Inform consumers about IP addresses being un-offlined */
643 	(void) ip_onlinelist(hd, node, errorp, flags, depend_info);
644 
645 	node->ip_cachestate &= ~(CACHE_IF_OFFLINED);
646 	rcm_log_message(RCM_TRACE1, "IP: online success(%s)\n", rsrc);
647 	(void) mutex_unlock(&cache_lock);
648 	return (RCM_SUCCESS);
649 }
650 
651 /*
652  * ip_get_info() - Gather usage information for this resource.
653  */
654 /*ARGSUSED*/
655 int
656 ip_get_info(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
657     char **usagep, char **errorp, nvlist_t *props, rcm_info_t **depend_info)
658 {
659 	ip_cache_t *node;
660 	char *infostr;
661 
662 	/* Guard against bad arguments */
663 	assert(hd != NULL);
664 	assert(rsrc != NULL);
665 	assert(id == (id_t)0);
666 	assert(usagep != NULL);
667 	assert(errorp != NULL);
668 	assert(depend_info != NULL);
669 
670 	rcm_log_message(RCM_TRACE1, "IP: get_info(%s)\n", rsrc);
671 
672 	(void) mutex_lock(&cache_lock);
673 	node = cache_lookup(hd, rsrc, CACHE_REFRESH);
674 	if (!node) {
675 		rcm_log_message(RCM_INFO,
676 		    _("IP: get_info(%s) unrecognized resource\n"), rsrc);
677 		(void) mutex_unlock(&cache_lock);
678 		errno = ENOENT;
679 		return (RCM_FAILURE);
680 	}
681 
682 	infostr = ip_usage(node);
683 
684 	if (infostr == NULL) {
685 		/* most likely malloc failure */
686 		rcm_log_message(RCM_ERROR,
687 		    _("IP: get_info(%s) malloc failure\n"), rsrc);
688 		(void) mutex_unlock(&cache_lock);
689 		errno = ENOMEM;
690 		*errorp = NULL;
691 		return (RCM_FAILURE);
692 	}
693 
694 	/* Set client/role properties */
695 	(void) nvlist_add_string(props, RCM_CLIENT_NAME, "IP");
696 
697 	/* Set usage property, infostr will be freed by caller */
698 	*usagep = infostr;
699 
700 	rcm_log_message(RCM_TRACE1, "IP: get_info(%s) info = %s \n",
701 	    rsrc, infostr);
702 
703 	(void) mutex_unlock(&cache_lock);
704 	return (RCM_SUCCESS);
705 }
706 
707 /*
708  * ip_suspend() - Nothing to do, always okay
709  */
710 /*ARGSUSED*/
711 static int
712 ip_suspend(rcm_handle_t *hd, char *rsrc, id_t id, timespec_t *interval,
713 			uint_t flags, char **errorp, rcm_info_t **depend_info)
714 {
715 	/* Guard against bad arguments */
716 	assert(hd != NULL);
717 	assert(rsrc != NULL);
718 	assert(id == (id_t)0);
719 	assert(interval != NULL);
720 	assert(errorp != NULL);
721 	assert(depend_info != NULL);
722 
723 	rcm_log_message(RCM_TRACE1, "IP: suspend(%s)\n", rsrc);
724 	return (RCM_SUCCESS);
725 }
726 
727 /*
728  * ip_resume() - Nothing to do, always okay
729  */
730 /*ARGSUSED*/
731 static int
732 ip_resume(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
733 		char **errorp, rcm_info_t ** depend_info)
734 {
735 	/* Guard against bad arguments */
736 	assert(hd != NULL);
737 	assert(rsrc != NULL);
738 	assert(id == (id_t)0);
739 	assert(errorp != NULL);
740 	assert(depend_info != NULL);
741 
742 	rcm_log_message(RCM_TRACE1, "IP: resume(%s)\n", rsrc);
743 
744 	return (RCM_SUCCESS);
745 }
746 
747 /*
748  * ip_remove() - remove a resource from cache
749  */
750 /*ARGSUSED*/
751 static int
752 ip_remove(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
753 		char **errorp, rcm_info_t **depend_info)
754 {
755 	ip_cache_t *node;
756 
757 	/* Guard against bad arguments */
758 	assert(hd != NULL);
759 	assert(rsrc != NULL);
760 	assert(id == (id_t)0);
761 	assert(errorp != NULL);
762 	assert(depend_info != NULL);
763 
764 	rcm_log_message(RCM_TRACE1, "IP: remove(%s)\n", rsrc);
765 
766 	(void) mutex_lock(&cache_lock);
767 	node = cache_lookup(hd, rsrc, CACHE_NO_REFRESH);
768 	if (!node) {
769 		rcm_log_message(RCM_INFO,
770 		    _("IP: remove(%s) unrecognized resource\n"), rsrc);
771 		(void) mutex_unlock(&cache_lock);
772 		errno = ENOENT;
773 		return (RCM_FAILURE);
774 	}
775 
776 	/* remove the cached entry for the resource */
777 	cache_remove(node);
778 	free_node(node);
779 
780 	(void) mutex_unlock(&cache_lock);
781 	return (RCM_SUCCESS);
782 }
783 
784 /*
785  * ip_notify_event - Project private implementation to receive new resource
786  *		   events. It intercepts all new resource events. If the
787  *		   new resource is a network resource, pass up a notify
788  *		   for it too. The new resource need not be cached, since
789  *		   it is done at register again.
790  */
791 /*ARGSUSED*/
792 static int
793 ip_notify_event(rcm_handle_t *hd, char *rsrc, id_t id, uint_t flags,
794 			char **errorp, nvlist_t *nvl, rcm_info_t **depend_info)
795 {
796 	datalink_id_t	linkid;
797 	nvpair_t *nvp = NULL;
798 	uint64_t id64;
799 
800 	assert(hd != NULL);
801 	assert(rsrc != NULL);
802 	assert(id == (id_t)0);
803 	assert(nvl != NULL);
804 
805 	rcm_log_message(RCM_TRACE1, "IP: notify_event(%s)\n", rsrc);
806 
807 	if (!STREQ(rsrc, RCM_RESOURCE_LINK_NEW)) {
808 		rcm_log_message(RCM_INFO,
809 		    _("IP: unrecognized event for %s\n"), rsrc);
810 		ip_log_err(NULL, errorp, "unrecognized event");
811 		errno = EINVAL;
812 		return (RCM_FAILURE);
813 	}
814 
815 	/* Update cache to reflect latest interfaces */
816 	if (update_cache(hd) < 0) {
817 		rcm_log_message(RCM_ERROR, _("IP: update_cache failed\n"));
818 		ip_log_err(NULL, errorp, "Private Cache update failed");
819 		return (RCM_FAILURE);
820 	}
821 
822 	rcm_log_message(RCM_TRACE1, "IP: process_nvlist\n");
823 	while ((nvp = nvlist_next_nvpair(nvl, nvp)) != NULL) {
824 		if (STREQ(nvpair_name(nvp), RCM_NV_LINKID)) {
825 			if (nvpair_value_uint64(nvp, &id64) != 0) {
826 				rcm_log_message(RCM_WARNING,
827 				    _("IP: cannot get linkid\n"));
828 				return (RCM_FAILURE);
829 			}
830 			linkid = (datalink_id_t)id64;
831 			if (if_configure(linkid) != 0) {
832 				rcm_log_message(RCM_ERROR,
833 				    _("IP: Configuration failed (%u)\n"),
834 				    linkid);
835 				ip_log_err(NULL, errorp,
836 				    "Failed configuring one or more IP "
837 				    "addresses");
838 			}
839 
840 			/* Notify all IP address consumers */
841 			ip_consumer_notify(hd, linkid, errorp, flags,
842 			    depend_info);
843 		}
844 	}
845 
846 	rcm_log_message(RCM_TRACE1,
847 	    "IP: notify_event: device configuration complete\n");
848 
849 	return (RCM_SUCCESS);
850 }
851 
852 /*
853  * ip_usage - Determine the usage of a device.  Call with cache_lock held.
854  *	    The returned buffer is owned by caller, and the caller
855  *	    must free it up when done.
856  */
857 static char *
858 ip_usage(ip_cache_t *node)
859 {
860 	ip_lif_t *lif;
861 	int numifs;
862 	char *buf;
863 	char *linkidstr;
864 	datalink_id_t linkid;
865 	const char *fmt;
866 	char *sep;
867 	char link[MAXLINKNAMELEN];
868 	char addrstr[INET6_ADDRSTRLEN];
869 	char errmsg[DLADM_STRSIZE];
870 	dladm_status_t status;
871 	int offline = 0;
872 	size_t bufsz;
873 
874 	rcm_log_message(RCM_TRACE2, "IP: usage(%s)\n", node->ip_resource);
875 
876 	/*
877 	 * Note that node->ip_resource is in the form of SUNW_datalink/<linkid>
878 	 */
879 	linkidstr = strchr(node->ip_resource, '/');
880 	assert(linkidstr != NULL);
881 	linkidstr = linkidstr ? linkidstr + 1 : node->ip_resource;
882 
883 	errno = 0;
884 	linkid = strtol(linkidstr, &buf, 10);
885 	if (errno != 0 || *buf != '\0') {
886 		rcm_log_message(RCM_ERROR,
887 		    _("IP: usage(%s) parse linkid failure (%s)\n"),
888 		    node->ip_resource, strerror(errno));
889 		return (NULL);
890 	}
891 
892 	if ((status = dladm_datalink_id2info(linkid, NULL, NULL, NULL, link,
893 	    sizeof (link))) != DLADM_STATUS_OK) {
894 		rcm_log_message(RCM_ERROR,
895 		    _("IP: usage(%s) get link name failure(%s)\n"),
896 		    node->ip_resource, dladm_status2str(status, errmsg));
897 		return (NULL);
898 	}
899 
900 	/* TRANSLATION_NOTE: separator used between IP addresses */
901 	sep = _(", ");
902 
903 	numifs = 0;
904 	for (lif = node->ip_pif->pi_lifs; lif != NULL; lif = lif->li_next) {
905 		if (lif->li_ifflags & IFF_UP) {
906 			numifs++;
907 		}
908 	}
909 
910 	if (node->ip_cachestate & CACHE_IF_OFFLINED) {
911 		offline++;
912 	}
913 
914 	if (!offline && numifs) {
915 		fmt = _("%1$s hosts IP addresses: ");
916 	} else if (offline) {
917 		fmt = _("%1$s offlined");
918 	} else {
919 		fmt = _("%1$s plumbed but down");
920 	}
921 
922 	/* space for addresses and separators, plus message */
923 	bufsz = ((numifs * (INET6_ADDRSTRLEN + strlen(sep))) +
924 	    strlen(fmt) + strlen(link) + 1);
925 	if ((buf = malloc(bufsz)) == NULL) {
926 		rcm_log_message(RCM_ERROR,
927 		    _("IP: usage(%s) malloc failure(%s)\n"),
928 		    node->ip_resource, strerror(errno));
929 		return (NULL);
930 	}
931 	bzero(buf, bufsz);
932 	(void) sprintf(buf, fmt, link);
933 
934 	if (offline || (numifs == 0)) {	/* Nothing else to do */
935 		rcm_log_message(RCM_TRACE2, "IP: usage (%s) info = %s\n",
936 		    node->ip_resource, buf);
937 
938 		return (buf);
939 	}
940 
941 	for (lif = node->ip_pif->pi_lifs; lif != NULL; lif = lif->li_next) {
942 
943 		void *addr;
944 		int af;
945 
946 		if (!(lif->li_ifflags & IFF_UP)) {
947 			/* ignore interfaces not up */
948 			continue;
949 		}
950 		af = lif->li_addr.family;
951 		if (af == AF_INET6) {
952 			addr = &lif->li_addr.ip6.sin6_addr;
953 		} else if (af == AF_INET) {
954 			addr = &lif->li_addr.ip4.sin_addr;
955 		} else {
956 			rcm_log_message(RCM_DEBUG,
957 			    "IP: unknown addr family %d, assuming AF_INET\n",
958 			    af);
959 			af = AF_INET;
960 			addr = &lif->li_addr.ip4.sin_addr;
961 		}
962 		if (inet_ntop(af, addr, addrstr, INET6_ADDRSTRLEN) == NULL) {
963 			rcm_log_message(RCM_ERROR,
964 			    _("IP: inet_ntop: %s\n"), strerror(errno));
965 			continue;
966 		}
967 		rcm_log_message(RCM_DEBUG, "IP addr := %s\n", addrstr);
968 
969 		(void) strcat(buf, addrstr);
970 		numifs--;
971 		if (numifs > 0) {
972 			(void) strcat(buf, ", ");
973 		}
974 	}
975 
976 	rcm_log_message(RCM_TRACE2, "IP: usage (%s) info = %s\n",
977 	    node->ip_resource, buf);
978 
979 	return (buf);
980 }
981 
982 /*
983  * Cache management routines, all cache management functions should be
984  * be called with cache_lock held.
985  */
986 
987 /*
988  * cache_lookup() - Get a cache node for a resource.
989  *		  Call with cache lock held.
990  *
991  * This ensures that the cache is consistent with the system state and
992  * returns a pointer to the cache element corresponding to the resource.
993  */
994 static ip_cache_t *
995 cache_lookup(rcm_handle_t *hd, char *rsrc, char options)
996 {
997 	ip_cache_t *probe;
998 
999 	rcm_log_message(RCM_TRACE2, "IP: cache lookup(%s)\n", rsrc);
1000 
1001 	if ((options & CACHE_REFRESH) && (hd != NULL)) {
1002 		/* drop lock since update locks cache again */
1003 		(void) mutex_unlock(&cache_lock);
1004 		(void) update_cache(hd);
1005 		(void) mutex_lock(&cache_lock);
1006 	}
1007 
1008 	probe = cache_head.ip_next;
1009 	while (probe != &cache_tail) {
1010 		if (probe->ip_resource &&
1011 		    STREQ(rsrc, probe->ip_resource)) {
1012 			rcm_log_message(RCM_TRACE2,
1013 			    "IP: cache lookup success(%s)\n", rsrc);
1014 			return (probe);
1015 		}
1016 		probe = probe->ip_next;
1017 	}
1018 	return (NULL);
1019 }
1020 
1021 /*
1022  * free_node - Free a node from the cache
1023  *	     Call with cache_lock held.
1024  */
1025 static void
1026 free_node(ip_cache_t *node)
1027 {
1028 	ip_pif_t *pif;
1029 	ip_lif_t *lif, *tmplif;
1030 
1031 	if (node) {
1032 		if (node->ip_resource) {
1033 			free(node->ip_resource);
1034 		}
1035 
1036 		/* free the pif */
1037 		pif = node->ip_pif;
1038 		if (pif) {
1039 			/* free logical interfaces */
1040 			lif = pif->pi_lifs;
1041 			while (lif) {
1042 				tmplif = lif->li_next;
1043 				free(lif);
1044 				lif = tmplif;
1045 			}
1046 			free(pif);
1047 		}
1048 		free(node);
1049 	}
1050 }
1051 
1052 /*
1053  * cache_insert - Insert a resource node in cache
1054  *		Call with the cache_lock held.
1055  */
1056 static void
1057 cache_insert(ip_cache_t *node)
1058 {
1059 	rcm_log_message(RCM_TRACE2, "IP: cache insert(%s)\n",
1060 	    node->ip_resource);
1061 
1062 	/* insert at the head for best performance */
1063 	node->ip_next = cache_head.ip_next;
1064 	node->ip_prev = &cache_head;
1065 
1066 	node->ip_next->ip_prev = node;
1067 	node->ip_prev->ip_next = node;
1068 }
1069 
1070 /*
1071  * cache_remove() - Remove a resource node from cache.
1072  *		  Call with the cache_lock held.
1073  */
1074 static void
1075 cache_remove(ip_cache_t *node)
1076 {
1077 	rcm_log_message(RCM_TRACE2, "IP: cache remove(%s)\n",
1078 	    node->ip_resource);
1079 
1080 	node->ip_next->ip_prev = node->ip_prev;
1081 	node->ip_prev->ip_next = node->ip_next;
1082 	node->ip_next = NULL;
1083 	node->ip_prev = NULL;
1084 }
1085 
1086 /*
1087  * update_pif() - Update physical interface properties
1088  *		Call with cache_lock held
1089  */
1090 /*ARGSUSED*/
1091 static int
1092 update_pif(rcm_handle_t *hd, int af, int sock, struct lifreq *lifr)
1093 {
1094 	char *rsrc;
1095 	ifspec_t ifspec;
1096 	ushort_t ifnumber = 0;
1097 	ip_cache_t *probe;
1098 	ip_pif_t pif;
1099 	ip_pif_t *probepif;
1100 	ip_lif_t *probelif;
1101 	struct lifreq lifreq;
1102 	struct sockaddr_storage ifaddr;
1103 	uint64_t ifflags;
1104 	int lif_listed = 0;
1105 
1106 	rcm_log_message(RCM_TRACE1, "IP: update_pif(%s)\n", lifr->lifr_name);
1107 
1108 	if (!ifparse_ifspec(lifr->lifr_name, &ifspec)) {
1109 		rcm_log_message(RCM_ERROR, _("IP: bad network interface: %s\n"),
1110 		    lifr->lifr_name);
1111 		return (-1);
1112 	}
1113 
1114 	(void) snprintf(pif.pi_ifname, sizeof (pif.pi_ifname), "%s%d",
1115 	    ifspec.ifsp_devnm, ifspec.ifsp_ppa);
1116 	if (ifspec.ifsp_lunvalid)
1117 		ifnumber = ifspec.ifsp_lun;
1118 
1119 	/* Get the interface flags */
1120 	(void) strcpy(lifreq.lifr_name, lifr->lifr_name);
1121 	if (ioctl(sock, SIOCGLIFFLAGS, (char *)&lifreq) < 0) {
1122 		rcm_log_message(RCM_ERROR,
1123 		    _("IP: SIOCGLIFFLAGS(%s): %s\n"),
1124 		    pif.pi_ifname, strerror(errno));
1125 		return (-1);
1126 	}
1127 	(void) memcpy(&ifflags, &lifreq.lifr_flags, sizeof (ifflags));
1128 
1129 	/*
1130 	 * Ignore interfaces that are always incapable of DR:
1131 	 *   - IFF_VIRTUAL:	e.g., loopback and vni
1132 	 *   - IFF_POINTOPOINT:	e.g., sppp and ip.tun
1133 	 *   - !IFF_MULTICAST:	e.g., ip.6to4tun
1134 	 *
1135 	 * Note: The !IFF_MULTICAST check can be removed once iptun is
1136 	 * implemented as a datalink.
1137 	 */
1138 	if (!(ifflags & IFF_MULTICAST) ||
1139 	    (ifflags & (IFF_POINTOPOINT | IFF_VIRTUAL))) {
1140 		rcm_log_message(RCM_TRACE3, "IP: if ignored (%s)\n",
1141 		    pif.pi_ifname);
1142 		return (0);
1143 	}
1144 
1145 	/* Get the interface group name for this interface */
1146 	if (ioctl(sock, SIOCGLIFGROUPNAME, (char *)&lifreq) < 0) {
1147 		rcm_log_message(RCM_ERROR,
1148 		    _("IP: SIOCGLIFGROUPNAME(%s): %s\n"),
1149 		    lifreq.lifr_name, strerror(errno));
1150 		return (-1);
1151 	}
1152 
1153 	/* copy the group name */
1154 	(void) memcpy(&pif.pi_grpname, &lifreq.lifr_groupname,
1155 	    sizeof (pif.pi_grpname));
1156 	pif.pi_grpname[sizeof (pif.pi_grpname) - 1] = '\0';
1157 
1158 	/* Get the interface address for this interface */
1159 	if (ioctl(sock, SIOCGLIFADDR, (char *)&lifreq) < 0) {
1160 		rcm_log_message(RCM_ERROR,
1161 		    _("IP: SIOCGLIFADDR(%s): %s\n"),
1162 		    lifreq.lifr_name, strerror(errno));
1163 		return (-1);
1164 	}
1165 	(void) memcpy(&ifaddr, &lifreq.lifr_addr, sizeof (ifaddr));
1166 
1167 	rsrc = get_link_resource(pif.pi_ifname);
1168 	if (rsrc == NULL) {
1169 		rcm_log_message(RCM_ERROR,
1170 		    _("IP: get_link_resource(%s) failed\n"),
1171 		    lifreq.lifr_name);
1172 		return (-1);
1173 	}
1174 
1175 	probe = cache_lookup(hd, rsrc, CACHE_NO_REFRESH);
1176 	if (probe != NULL) {
1177 		free(rsrc);
1178 		probe->ip_cachestate &= ~(CACHE_IF_STALE);
1179 	} else {
1180 		if ((probe = calloc(1, sizeof (ip_cache_t))) == NULL) {
1181 			/* malloc errors are bad */
1182 			free(rsrc);
1183 			rcm_log_message(RCM_ERROR, _("IP: calloc: %s\n"),
1184 			    strerror(errno));
1185 			return (-1);
1186 		}
1187 
1188 		probe->ip_resource = rsrc;
1189 		probe->ip_pif = NULL;
1190 		probe->ip_ifred = RCM_IPMP_MIN_REDUNDANCY;
1191 		probe->ip_cachestate |= CACHE_IF_NEW;
1192 
1193 		cache_insert(probe);
1194 	}
1195 
1196 	probepif = probe->ip_pif;
1197 	if (probepif != NULL) {
1198 		/* Check if lifs need to be updated */
1199 		probelif = probepif->pi_lifs;
1200 		while (probelif != NULL) {
1201 			if ((probelif->li_ifnum == ifnumber) &&
1202 			    (probelif->li_addr.family == ifaddr.ss_family)) {
1203 
1204 				rcm_log_message(RCM_TRACE2,
1205 				    "IP: refreshing lifs for %s, ifnum=%d\n",
1206 				    pif.pi_ifname, probelif->li_ifnum);
1207 
1208 				/* refresh lif properties */
1209 				(void) memcpy(&probelif->li_addr, &ifaddr,
1210 				    sizeof (probelif->li_addr));
1211 
1212 				probelif->li_ifflags = ifflags;
1213 
1214 				lif_listed++;
1215 				probelif->li_cachestate &= ~(CACHE_IF_STALE);
1216 				break;
1217 			}
1218 			probelif = probelif->li_next;
1219 		}
1220 	}
1221 
1222 	if (probepif == NULL) {
1223 		if ((probepif = calloc(1, sizeof (ip_pif_t))) == NULL) {
1224 			rcm_log_message(RCM_ERROR, _("IP: malloc: %s\n"),
1225 			    strerror(errno));
1226 			if (probe->ip_pif == NULL) {
1227 				/* we created it, so clean it up */
1228 				free(probe);
1229 			}
1230 			return (-1);
1231 		}
1232 
1233 		probe->ip_pif = probepif;
1234 
1235 		/* Save interface name */
1236 		(void) memcpy(&probepif->pi_ifname, &pif.pi_ifname,
1237 		    sizeof (pif.pi_ifname));
1238 	}
1239 
1240 	/* save pif properties */
1241 	(void) memcpy(&probepif->pi_grpname, &pif.pi_grpname,
1242 	    sizeof (pif.pi_grpname));
1243 
1244 	/* add lif, if this is a lif and it is not in cache */
1245 	if (!lif_listed) {
1246 		rcm_log_message(RCM_TRACE2, "IP: adding lifs to %s\n",
1247 		    pif.pi_ifname);
1248 
1249 		if ((probelif = calloc(1, sizeof (ip_lif_t))) == NULL) {
1250 			rcm_log_message(RCM_ERROR, _("IP: malloc: %s\n"),
1251 			    strerror(errno));
1252 			return (-1);
1253 		}
1254 
1255 		/* save lif properties */
1256 		(void) memcpy(&probelif->li_addr, &ifaddr,
1257 		    sizeof (probelif->li_addr));
1258 
1259 		probelif->li_ifnum = ifnumber;
1260 		probelif->li_ifflags = ifflags;
1261 
1262 		/* insert us at the head of the lif list */
1263 		probelif->li_next = probepif->pi_lifs;
1264 		if (probelif->li_next != NULL) {
1265 			probelif->li_next->li_prev = probelif;
1266 		}
1267 		probelif->li_prev = NULL;
1268 		probelif->li_pif = probepif;
1269 
1270 		probepif->pi_lifs = probelif;
1271 	}
1272 
1273 	rcm_log_message(RCM_TRACE3, "IP: update_pif: (%s) success\n",
1274 	    probe->ip_resource);
1275 
1276 	return (0);
1277 }
1278 
1279 /*
1280  * update_ipifs() - Determine all network interfaces in the system
1281  *		  Call with cache_lock held
1282  */
1283 static int
1284 update_ipifs(rcm_handle_t *hd, int af)
1285 {
1286 	int sock;
1287 	char *buf;
1288 	struct lifnum lifn;
1289 	struct lifconf lifc;
1290 	struct lifreq *lifrp;
1291 	int i;
1292 
1293 	rcm_log_message(RCM_TRACE2, "IP: update_ipifs\n");
1294 
1295 	if ((sock = socket(af, SOCK_DGRAM, 0)) == -1) {
1296 		rcm_log_message(RCM_ERROR,
1297 		    _("IP: failure opening %s socket: %s\n"),
1298 		    af == AF_INET6 ? "IPv6" : "IPv4", strerror(errno));
1299 		return (-1);
1300 	}
1301 
1302 	lifn.lifn_family = af;
1303 	lifn.lifn_flags = 0;
1304 	if (ioctl(sock, SIOCGLIFNUM, (char *)&lifn) < 0) {
1305 		rcm_log_message(RCM_ERROR,
1306 		    _("IP: SIOCLGIFNUM failed: %s\n"),
1307 		    strerror(errno));
1308 		(void) close(sock);
1309 		return (-1);
1310 	}
1311 
1312 	if ((buf = calloc(lifn.lifn_count, sizeof (struct lifreq))) == NULL) {
1313 		rcm_log_message(RCM_ERROR, _("IP: calloc: %s\n"),
1314 		    strerror(errno));
1315 		(void) close(sock);
1316 		return (-1);
1317 	}
1318 
1319 	lifc.lifc_family = af;
1320 	lifc.lifc_flags = 0;
1321 	lifc.lifc_len = sizeof (struct lifreq) * lifn.lifn_count;
1322 	lifc.lifc_buf = buf;
1323 
1324 	if (ioctl(sock, SIOCGLIFCONF, (char *)&lifc) < 0) {
1325 		rcm_log_message(RCM_ERROR,
1326 		    _("IP: SIOCGLIFCONF failed: %s\n"),
1327 		    strerror(errno));
1328 		free(buf);
1329 		(void) close(sock);
1330 		return (-1);
1331 	}
1332 
1333 	/* now we need to search for active interfaces */
1334 	lifrp = lifc.lifc_req;
1335 	for (i = 0; i < lifn.lifn_count; i++) {
1336 		(void) update_pif(hd, af, sock, lifrp);
1337 		lifrp++;
1338 	}
1339 
1340 	free(buf);
1341 	(void) close(sock);
1342 	return (0);
1343 }
1344 
1345 /*
1346  * update_cache() - Update cache with latest interface info
1347  */
1348 static int
1349 update_cache(rcm_handle_t *hd)
1350 {
1351 	ip_cache_t *probe;
1352 	struct ip_lif *lif;
1353 	struct ip_lif *nextlif;
1354 	int rv;
1355 	int i;
1356 
1357 	rcm_log_message(RCM_TRACE2, "IP: update_cache\n");
1358 
1359 	(void) mutex_lock(&cache_lock);
1360 
1361 	/* first we walk the entire cache, marking each entry stale */
1362 	probe = cache_head.ip_next;
1363 	while (probe != &cache_tail) {
1364 		probe->ip_cachestate |= CACHE_IF_STALE;
1365 		if ((probe->ip_pif != NULL) &&
1366 		    ((lif = probe->ip_pif->pi_lifs) != NULL)) {
1367 			while (lif != NULL) {
1368 				lif->li_cachestate |= CACHE_IF_STALE;
1369 				lif = lif->li_next;
1370 			}
1371 		}
1372 		probe = probe->ip_next;
1373 	}
1374 
1375 	rcm_log_message(RCM_TRACE2, "IP: scanning IPv4 interfaces\n");
1376 	if (update_ipifs(hd, AF_INET) < 0) {
1377 		(void) mutex_unlock(&cache_lock);
1378 		return (-1);
1379 	}
1380 
1381 	rcm_log_message(RCM_TRACE2, "IP: scanning IPv6 interfaces\n");
1382 	if (update_ipifs(hd, AF_INET6) < 0) {
1383 		(void) mutex_unlock(&cache_lock);
1384 		return (-1);
1385 	}
1386 
1387 	probe = cache_head.ip_next;
1388 	/* unregister devices that are not offlined and still in cache */
1389 	while (probe != &cache_tail) {
1390 		ip_cache_t *freeit;
1391 		if ((probe->ip_pif != NULL) &&
1392 		    ((lif = probe->ip_pif->pi_lifs) != NULL)) {
1393 			/* clear stale lifs */
1394 			while (lif != NULL) {
1395 				if (lif->li_cachestate & CACHE_IF_STALE) {
1396 					nextlif = lif->li_next;
1397 					if (lif->li_prev != NULL)
1398 						lif->li_prev->li_next = nextlif;
1399 					if (nextlif != NULL)
1400 						nextlif->li_prev = lif->li_prev;
1401 					if (probe->ip_pif->pi_lifs == lif)
1402 						probe->ip_pif->pi_lifs =
1403 						    nextlif;
1404 					for (i = 0; i < IP_MAX_MODS; i++) {
1405 						free(lif->li_modules[i]);
1406 					}
1407 					free(lif->li_reconfig);
1408 					free(lif);
1409 					lif = nextlif;
1410 				} else {
1411 					lif = lif->li_next;
1412 				}
1413 			}
1414 		}
1415 		if ((probe->ip_cachestate & CACHE_IF_STALE) &&
1416 		    !(probe->ip_cachestate & CACHE_IF_OFFLINED)) {
1417 			(void) rcm_unregister_interest(hd, probe->ip_resource,
1418 			    0);
1419 			rcm_log_message(RCM_DEBUG, "IP: unregistered %s\n",
1420 			    probe->ip_resource);
1421 			freeit = probe;
1422 			probe = probe->ip_next;
1423 			cache_remove(freeit);
1424 			free_node(freeit);
1425 			continue;
1426 		}
1427 
1428 		if (!(probe->ip_cachestate & CACHE_IF_NEW)) {
1429 			probe = probe->ip_next;
1430 			continue;
1431 		}
1432 
1433 		rv = rcm_register_interest(hd, probe->ip_resource, 0, NULL);
1434 		if (rv != RCM_SUCCESS) {
1435 			rcm_log_message(RCM_ERROR,
1436 			    _("IP: failed to register %s\n"),
1437 			    probe->ip_resource);
1438 			(void) mutex_unlock(&cache_lock);
1439 			return (-1);
1440 		} else {
1441 			rcm_log_message(RCM_DEBUG, "IP: registered %s\n",
1442 			    probe->ip_resource);
1443 			probe->ip_cachestate &= ~(CACHE_IF_NEW);
1444 		}
1445 		probe = probe->ip_next;
1446 	}
1447 
1448 	(void) mutex_unlock(&cache_lock);
1449 	return (0);
1450 }
1451 
1452 /*
1453  * free_cache() - Empty the cache
1454  */
1455 static void
1456 free_cache()
1457 {
1458 	ip_cache_t *probe;
1459 
1460 	rcm_log_message(RCM_TRACE2, "IP: free_cache\n");
1461 
1462 	(void) mutex_lock(&cache_lock);
1463 	probe = cache_head.ip_next;
1464 	while (probe != &cache_tail) {
1465 		cache_remove(probe);
1466 		free_node(probe);
1467 		probe = cache_head.ip_next;
1468 	}
1469 	(void) mutex_unlock(&cache_lock);
1470 }
1471 
1472 /*
1473  * ip_log_err() - RCM error log wrapper
1474  */
1475 static void
1476 ip_log_err(ip_cache_t *node, char **errorp, char *errmsg)
1477 {
1478 	char *ifname = NULL;
1479 	int len;
1480 	const char *errfmt;
1481 	char *error;
1482 
1483 	if ((node != NULL) && (node->ip_pif != NULL) &&
1484 	    (node->ip_pif->pi_ifname != NULL)) {
1485 		ifname = node->ip_pif->pi_ifname;
1486 	}
1487 
1488 	if (errorp != NULL)
1489 		*errorp = NULL;
1490 
1491 	if (ifname == NULL) {
1492 		rcm_log_message(RCM_ERROR, _("IP: %s\n"), errmsg);
1493 		errfmt = _("IP: %s");
1494 		len = strlen(errfmt) + strlen(errmsg) + 1;
1495 		if (error = (char *)calloc(1, len)) {
1496 			(void) sprintf(error, errfmt, errmsg);
1497 		}
1498 	} else {
1499 		rcm_log_message(RCM_ERROR, _("IP: %s(%s)\n"), errmsg, ifname);
1500 		errfmt = _("IP: %s(%s)");
1501 		len = strlen(errfmt) + strlen(errmsg) + strlen(ifname) + 1;
1502 		if (error = (char *)calloc(1, len)) {
1503 			(void) sprintf(error, errfmt, errmsg, ifname);
1504 		}
1505 	}
1506 
1507 	if (errorp != NULL)
1508 		*errorp = error;
1509 }
1510 
1511 
1512 /*
1513  * if_cfginfo() - Save off the config info for all interfaces
1514  */
1515 static int
1516 if_cfginfo(ip_cache_t *node, uint_t force)
1517 {
1518 	ip_lif_t *lif;
1519 	ip_pif_t *pif;
1520 	int i;
1521 	FILE *fp;
1522 	char syscmd[MAX_RECONFIG_SIZE + LIFNAMSIZ];
1523 	char buf[MAX_RECONFIG_SIZE];
1524 
1525 	rcm_log_message(RCM_TRACE2, "IP: if_cfginfo(%s)\n", node->ip_resource);
1526 
1527 	pif = node->ip_pif;
1528 	lif = pif->pi_lifs;
1529 
1530 	while (lif != NULL) {
1531 		/* Make a list of modules pushed and save */
1532 		if (lif->li_ifnum == 0) {	/* physical instance */
1533 			if (get_modlist(pif->pi_ifname, lif) == -1) {
1534 				rcm_log_message(RCM_ERROR,
1535 				    _("IP: get modlist error (%s) %s\n"),
1536 				    pif->pi_ifname, strerror(errno));
1537 				(void) clr_cfg_state(pif);
1538 				return (-1);
1539 			}
1540 
1541 			if (!force) {
1542 				/* Look if unknown modules have been inserted */
1543 				for (i = (lif->li_modcnt - 2); i > 0; i--) {
1544 					if (modop(pif->pi_ifname,
1545 					    lif->li_modules[i],
1546 					    i, MOD_CHECK) == -1) {
1547 						rcm_log_message(RCM_ERROR,
1548 						    _("IP: module %s@%d\n"),
1549 						    lif->li_modules[i], i);
1550 						(void) clr_cfg_state(pif);
1551 						return (-1);
1552 					}
1553 				}
1554 			}
1555 
1556 			/* Last module is the device driver, so ignore that */
1557 			for (i = (lif->li_modcnt - 2); i > 0; i--) {
1558 				rcm_log_message(RCM_TRACE2,
1559 				    "IP: modremove Pos = %d, Module = %s \n",
1560 				    i, lif->li_modules[i]);
1561 				if (modop(pif->pi_ifname, lif->li_modules[i],
1562 				    i, MOD_REMOVE) == -1) {
1563 					while (i != (lif->li_modcnt - 2)) {
1564 						if (modop(pif->pi_ifname,
1565 						    lif->li_modules[i],
1566 						    i, MOD_INSERT) == -1) {
1567 							/* Gross error */
1568 							rcm_log_message(
1569 							    RCM_ERROR,
1570 							    _("IP: if_cfginfo"
1571 							    "(%s) %s\n"),
1572 							    pif->pi_ifname,
1573 							    strerror(errno));
1574 							clr_cfg_state(pif);
1575 							return (-1);
1576 						}
1577 						i++;
1578 					}
1579 					rcm_log_message(
1580 					    RCM_ERROR,
1581 					    _("IP: if_cfginfo(%s): modremove "
1582 					    "%s failed: %s\n"), pif->pi_ifname,
1583 					    lif->li_modules[i],
1584 					    strerror(errno));
1585 					clr_cfg_state(pif);
1586 					return (-1);
1587 				}
1588 			}
1589 		}
1590 
1591 		/* Save reconfiguration information */
1592 		if (lif->li_ifflags & IFF_IPV4) {
1593 			(void) snprintf(syscmd, sizeof (syscmd),
1594 			    "%s %s:%d configinfo\n", USR_SBIN_IFCONFIG,
1595 			    pif->pi_ifname, lif->li_ifnum);
1596 		} else if (lif->li_ifflags & IFF_IPV6) {
1597 			(void) snprintf(syscmd, sizeof (syscmd),
1598 			    "%s %s:%d inet6 configinfo\n", USR_SBIN_IFCONFIG,
1599 			    pif->pi_ifname, lif->li_ifnum);
1600 		}
1601 		rcm_log_message(RCM_TRACE2, "IP: %s\n", syscmd);
1602 
1603 		/* open a pipe to retrieve reconfiguration info */
1604 		if ((fp = popen(syscmd, "r")) == NULL) {
1605 			rcm_log_message(RCM_ERROR,
1606 			    _("IP: ifconfig configinfo error (%s:%d) %s\n"),
1607 			    pif->pi_ifname, lif->li_ifnum, strerror(errno));
1608 			(void) clr_cfg_state(pif);
1609 			return (-1);
1610 		}
1611 		bzero(buf, MAX_RECONFIG_SIZE);
1612 
1613 		if (fgets(buf, MAX_RECONFIG_SIZE, fp) == NULL) {
1614 			rcm_log_message(RCM_ERROR,
1615 			    _("IP: ifconfig configinfo error (%s:%d) %s\n"),
1616 			    pif->pi_ifname, lif->li_ifnum, strerror(errno));
1617 			(void) pclose(fp);
1618 			(void) clr_cfg_state(pif);
1619 			return (-1);
1620 		}
1621 		(void) pclose(fp);
1622 
1623 		lif->li_reconfig = malloc(strlen(buf)+1);
1624 		if (lif->li_reconfig == NULL) {
1625 			rcm_log_message(RCM_ERROR,
1626 			    _("IP: malloc error (%s) %s\n"),
1627 			    pif->pi_ifname, strerror(errno));
1628 			(void) clr_cfg_state(pif);
1629 			return (-1);
1630 		}
1631 		(void) strcpy(lif->li_reconfig, buf);
1632 		rcm_log_message(RCM_DEBUG,
1633 		    "IP: if_cfginfo: reconfig string(%s:%d) = %s\n",
1634 		    pif->pi_ifname, lif->li_ifnum, lif->li_reconfig);
1635 
1636 		lif = lif->li_next;
1637 	}
1638 
1639 	return (0);
1640 }
1641 
1642 /*
1643  * if_unplumb() - Unplumb the interface
1644  *		Save off the modlist, ifconfig options and unplumb.
1645  *		Fail, if an unknown module lives between IP and driver and
1646  *		force is not set
1647  *		Call with cache_lock held
1648  */
1649 static int
1650 if_unplumb(ip_cache_t *node)
1651 {
1652 	ip_lif_t *lif;
1653 	ip_pif_t *pif;
1654 	int ipv4 = 0, ipv6 = 0;
1655 	char syscmd[MAX_RECONFIG_SIZE + LIFNAMSIZ];
1656 
1657 	rcm_log_message(RCM_TRACE2, "IP: if_unplumb(%s)\n", node->ip_resource);
1658 
1659 	pif = node->ip_pif;
1660 	lif = pif->pi_lifs;
1661 
1662 	while (lif != NULL) {
1663 		if (lif->li_ifflags & IFF_IPV4) {
1664 			ipv4++;
1665 		} else if (lif->li_ifflags & IFF_IPV6) {
1666 			ipv6++;
1667 		} else {
1668 			/* Unlikely case */
1669 			rcm_log_message(RCM_DEBUG,
1670 			    "IP: Unplumb ignored (%s:%d)\n",
1671 			    pif->pi_ifname, lif->li_ifnum);
1672 			lif = lif->li_next;
1673 			continue;
1674 		}
1675 		lif = lif->li_next;
1676 	}
1677 
1678 	/* Unplumb the physical interface */
1679 	if (ipv4) {
1680 		rcm_log_message(RCM_TRACE2,
1681 		    "IP: if_unplumb: ifconfig %s unplumb\n", pif->pi_ifname);
1682 		(void) snprintf(syscmd, sizeof (syscmd), "%s %s unplumb\n",
1683 		    USR_SBIN_IFCONFIG, pif->pi_ifname);
1684 		if (rcm_exec_cmd(syscmd) != 0) {
1685 			rcm_log_message(RCM_ERROR,
1686 			    _("IP: Cannot unplumb (%s) %s\n"),
1687 			    pif->pi_ifname, strerror(errno));
1688 			return (-1);
1689 		}
1690 	}
1691 	if (ipv6) {
1692 		rcm_log_message(RCM_TRACE2,
1693 		    "IP: if_unplumb: ifconfig %s inet6 unplumb\n",
1694 		    pif->pi_ifname);
1695 		(void) snprintf(syscmd, sizeof (syscmd),
1696 		    "%s %s inet6 unplumb\n", USR_SBIN_IFCONFIG, pif->pi_ifname);
1697 		if (rcm_exec_cmd(syscmd) != 0) {
1698 			rcm_log_message(RCM_ERROR,
1699 			    _("IP: Cannot unplumb (%s) %s\n"),
1700 			    pif->pi_ifname, strerror(errno));
1701 			return (-1);
1702 		}
1703 	}
1704 	rcm_log_message(RCM_TRACE2, "IP: if_unplumb(%s) success\n",
1705 	    node->ip_resource);
1706 
1707 	return (0);
1708 }
1709 
1710 /*
1711  * if_replumb() - Undo previous unplumb i.e. plumb back the physical interface
1712  *		instances and the logical interfaces in order, restoring
1713  *		all ifconfig options
1714  *		Call with cache_lock held
1715  */
1716 static int
1717 if_replumb(ip_cache_t *node)
1718 {
1719 	ip_lif_t *lif;
1720 	ip_pif_t *pif;
1721 	int i;
1722 	char syscmd[LIFNAMSIZ+MAXPATHLEN];	/* must be big enough */
1723 	int max_ipv4 = 0, max_ipv6 = 0;
1724 
1725 	rcm_log_message(RCM_TRACE2, "IP: if_replumb(%s)\n", node->ip_resource);
1726 
1727 	/*
1728 	 * Be extra careful about bringing up the interfaces in the
1729 	 * correct order:
1730 	 * - First plumb in the physical interface instances
1731 	 * - modinsert the necessary modules@pos
1732 	 * - Next, add the logical interfaces being careful about
1733 	 *   the order, (follow the cached interface number li_ifnum order)
1734 	 */
1735 
1736 	pif = node->ip_pif;
1737 	lif = pif->pi_lifs;
1738 
1739 	/*
1740 	 * Make a first pass to plumb in physical interfaces and get a count
1741 	 * of the max logical interfaces
1742 	 */
1743 	while (lif != NULL) {
1744 		if (lif->li_ifflags & IFF_IPV4) {
1745 			if (lif->li_ifnum > max_ipv4) {
1746 				max_ipv4 = lif->li_ifnum;
1747 			}
1748 		} else if (lif->li_ifflags & IFF_IPV6) {
1749 			if (lif->li_ifnum > max_ipv6) {
1750 				max_ipv6 = lif->li_ifnum;
1751 			}
1752 		} else {
1753 			/* Unlikely case */
1754 			rcm_log_message(RCM_DEBUG,
1755 			    "IP: Re-plumb ignored (%s:%d)\n",
1756 			    pif->pi_ifname, lif->li_ifnum);
1757 			lif = lif->li_next;
1758 			continue;
1759 		}
1760 
1761 		if (lif->li_ifnum == 0) { /* physical interface instance */
1762 			if ((lif->li_ifflags & IFF_NOFAILOVER) ||
1763 			    (strcmp(pif->pi_grpname, "") == 0)) {
1764 				(void) snprintf(syscmd, sizeof (syscmd),
1765 				    "%s %s\n", USR_SBIN_IFCONFIG,
1766 				    lif->li_reconfig);
1767 			} else if (lif->li_ifflags & IFF_IPV4) {
1768 				(void) snprintf(syscmd, sizeof (syscmd),
1769 				    "%s %s inet plumb group %s\n",
1770 				    USR_SBIN_IFCONFIG,
1771 				    pif->pi_ifname, pif->pi_grpname);
1772 			} else if (lif->li_ifflags & IFF_IPV6) {
1773 				(void) snprintf(syscmd, sizeof (syscmd),
1774 				    "%s %s inet6 plumb group %s\n",
1775 				    USR_SBIN_IFCONFIG,
1776 				    pif->pi_ifname, pif->pi_grpname);
1777 			}
1778 
1779 			rcm_log_message(RCM_TRACE2,
1780 			    "IP: if_replumb: %s\n", syscmd);
1781 			if (rcm_exec_cmd(syscmd) != 0) {
1782 				rcm_log_message(RCM_ERROR,
1783 				    _("IP: Cannot plumb (%s) %s\n"),
1784 				    pif->pi_ifname, strerror(errno));
1785 				return (-1);
1786 			}
1787 
1788 			rcm_log_message(RCM_TRACE2,
1789 			    "IP: if_replumb: Modcnt = %d\n", lif->li_modcnt);
1790 			/* modinsert modules in order, ignore driver(last) */
1791 			for (i = 0; i < (lif->li_modcnt - 1); i++) {
1792 				rcm_log_message(RCM_TRACE2,
1793 				    "IP: modinsert: Pos = %d Mod = %s\n",
1794 				    i, lif->li_modules[i]);
1795 				if (modop(pif->pi_ifname, lif->li_modules[i], i,
1796 				    MOD_INSERT) == -1) {
1797 					rcm_log_message(RCM_ERROR,
1798 					    _("IP: modinsert error(%s)\n"),
1799 					    pif->pi_ifname);
1800 					return (-1);
1801 				}
1802 			}
1803 		}
1804 
1805 		lif = lif->li_next;
1806 	}
1807 
1808 	/* Now, add all the logical interfaces in the correct order */
1809 	for (i = 1; i <= MAX(max_ipv6, max_ipv4); i++) {
1810 		/* reset lif through every iteration */
1811 		lif = pif->pi_lifs;
1812 		while (lif != NULL) {
1813 			if (((lif->li_ifflags & IFF_NOFAILOVER) ||
1814 			    (strcmp(pif->pi_grpname, "") == 0)) &&
1815 			    (lif->li_ifnum == i)) {
1816 				/* Plumb in the logical interface */
1817 				(void) snprintf(syscmd, sizeof (syscmd),
1818 				    "%s %s\n", USR_SBIN_IFCONFIG,
1819 				    lif->li_reconfig);
1820 				rcm_log_message(RCM_TRACE2,
1821 				    "IP: if_replumb: %s\n", syscmd);
1822 				if (rcm_exec_cmd(syscmd) != 0) {
1823 					rcm_log_message(RCM_ERROR,
1824 					    _("IP: Cannot addif (%s:%d) "
1825 					    "%s\n"),
1826 					    pif->pi_ifname, i, strerror(errno));
1827 					return (-1);
1828 				}
1829 			}
1830 			lif = lif->li_next;
1831 		}
1832 	}
1833 
1834 	rcm_log_message(RCM_TRACE2, "IP: if_replumb(%s) success \n",
1835 	    node->ip_resource);
1836 
1837 	return (0);
1838 }
1839 
1840 /*
1841  * clr_cfg_state() - Cleanup after errors in unplumb
1842  */
1843 static void
1844 clr_cfg_state(ip_pif_t *pif)
1845 {
1846 	ip_lif_t *lif;
1847 	int i;
1848 
1849 	lif = pif->pi_lifs;
1850 
1851 	while (lif != NULL) {
1852 		lif->li_modcnt = 0;
1853 		free(lif->li_reconfig);
1854 		lif->li_reconfig = NULL;
1855 		for (i = 0; i < IP_MAX_MODS; i++) {
1856 			free(lif->li_modules[i]);
1857 			lif->li_modules[i] = NULL;
1858 		}
1859 		lif = lif->li_next;
1860 	}
1861 }
1862 
1863 /*
1864  * ip_ipmp_offline() - Failover from if_from to if_to using a
1865  *		     minimum redudancy of min_red. This uses IPMPs
1866  *		     "offline" mechanism to achieve the failover.
1867  */
1868 static int
1869 ip_ipmp_offline(ip_cache_t *if_from, ip_cache_t *if_to)
1870 {
1871 	mpathd_cmd_t mpdcmd;
1872 
1873 	if ((if_from == NULL) || (if_from->ip_pif == NULL) ||
1874 	    (if_from->ip_pif->pi_ifname == NULL)) {
1875 		return (-1);
1876 	}
1877 
1878 	rcm_log_message(RCM_TRACE1, "IP: ip_ipmp_offline\n");
1879 
1880 	mpdcmd.cmd_command = MI_OFFLINE;
1881 	(void) strcpy(mpdcmd.cmd_ifname, if_from->ip_pif->pi_ifname);
1882 
1883 	if ((if_to != NULL) && (if_to->ip_pif != NULL) &&
1884 	    (if_to->ip_pif->pi_ifname != NULL)) {
1885 		rcm_log_message(RCM_TRACE1, "IP: ip_ipmp_offline (%s)->(%s)\n",
1886 		    if_from->ip_pif->pi_ifname, if_to->ip_pif->pi_ifname);
1887 		(void) strncpy(mpdcmd.cmd_movetoif, if_to->ip_pif->pi_ifname,
1888 		    sizeof (mpdcmd.cmd_movetoif));
1889 		mpdcmd.cmd_movetoif[sizeof (mpdcmd.cmd_movetoif) - 1] = '\0';
1890 	} else {
1891 		rcm_log_message(RCM_TRACE1, "IP: ip_ipmp_offline (%s)->(any)\n",
1892 		    if_from->ip_pif->pi_ifname);
1893 		(void) strcpy(mpdcmd.cmd_movetoif, "");	/* signifies any */
1894 	}
1895 	mpdcmd.cmd_min_red = if_from->ip_ifred;
1896 
1897 	if (mpathd_send_cmd(&mpdcmd) < 0) {
1898 		rcm_log_message(RCM_ERROR,
1899 		    _("IP: mpathd offline error: %s\n"),
1900 		    strerror(errno));
1901 		return (-1);
1902 	}
1903 
1904 	rcm_log_message(RCM_TRACE1, "IP: ipmp offline success\n");
1905 	return (0);
1906 }
1907 
1908 /*
1909  * ip_ipmp_undo_offline() - Undo prior offline of the interface.
1910  *			  This uses IPMPs "undo offline" feature.
1911  */
1912 static int
1913 ip_ipmp_undo_offline(ip_cache_t *node)
1914 {
1915 	mpathd_cmd_t mpdcmd;
1916 
1917 	mpdcmd.cmd_command = MI_UNDO_OFFLINE;
1918 	(void) strcpy(mpdcmd.cmd_ifname, node->ip_pif->pi_ifname);
1919 
1920 	if (mpathd_send_cmd(&mpdcmd) < 0) {
1921 		rcm_log_message(RCM_ERROR,
1922 		    _("IP: mpathd error: %s\n"),
1923 		    strerror(errno));
1924 		return (-1);
1925 	}
1926 
1927 	rcm_log_message(RCM_TRACE1, "IP: ipmp undo offline success\n");
1928 	return (0);
1929 }
1930 
1931 /*
1932  * get_link_resource() - Convert a link name (e.g., net0, hme1000) into a
1933  * dynamically allocated string containing the associated link resource
1934  * name ("SUNW_datalink/<linkid>").
1935  */
1936 static char *
1937 get_link_resource(const char *link)
1938 {
1939 	char		errmsg[DLADM_STRSIZE];
1940 	datalink_id_t	linkid;
1941 	uint32_t	flags;
1942 	char		*resource;
1943 	dladm_status_t	status;
1944 
1945 	if ((status = dladm_name2info(link, &linkid, &flags, NULL, NULL))
1946 	    != DLADM_STATUS_OK) {
1947 		goto fail;
1948 	}
1949 
1950 	if (!(flags & DLADM_OPT_ACTIVE)) {
1951 		status = DLADM_STATUS_FAILED;
1952 		goto fail;
1953 	}
1954 
1955 	resource = malloc(RCM_LINK_RESOURCE_MAX);
1956 	if (resource == NULL) {
1957 		rcm_log_message(RCM_ERROR, _("IP: malloc error(%s): %s\n"),
1958 		    strerror(errno), link);
1959 		return (NULL);
1960 	}
1961 
1962 	(void) snprintf(resource, RCM_LINK_RESOURCE_MAX, "%s/%u",
1963 	    RCM_LINK_PREFIX, linkid);
1964 
1965 	return (resource);
1966 
1967 fail:
1968 	rcm_log_message(RCM_ERROR,
1969 	    _("IP: get_link_resource for %s error(%s)\n"),
1970 	    link, dladm_status2str(status, errmsg));
1971 	return (NULL);
1972 }
1973 
1974 /*
1975  * if_get_flags() - Return the cached physical interface flags
1976  *		  Call with cache_lock held
1977  */
1978 static uint64_t
1979 if_get_flags(ip_pif_t *pif)
1980 {
1981 	ip_lif_t *lif;
1982 
1983 	for (lif = pif->pi_lifs; lif != NULL; lif = lif->li_next) {
1984 		if (lif->li_ifnum == 0) {
1985 			return (lif->li_ifflags & RCM_PIF_FLAGS);
1986 		}
1987 	}
1988 	return (0);
1989 }
1990 
1991 /*
1992  * mpathd_send_cmd() - Sends the command to in.mpathd.
1993  */
1994 static int
1995 mpathd_send_cmd(mpathd_cmd_t *mpd)
1996 {
1997 	mpathd_unoffline_t mpc;
1998 	struct mpathd_response mpr;
1999 	int i;
2000 	int s;
2001 
2002 	rcm_log_message(RCM_TRACE1, "IP: mpathd_send_cmd \n");
2003 
2004 	for (i = 0; i < MPATHD_MAX_RETRIES; i++) {
2005 		s = connect_to_mpathd(AF_INET);
2006 		if (s == -1) {
2007 			s = connect_to_mpathd(AF_INET6);
2008 			if (s == -1) {
2009 				rcm_log_message(RCM_ERROR,
2010 				    _("IP: Cannot talk to mpathd\n"));
2011 				return (-1);
2012 			}
2013 		}
2014 		switch (mpd->cmd_command) {
2015 		case MI_OFFLINE :
2016 			rcm_log_message(RCM_TRACE1, "IP: MI_OFFLINE: "
2017 			    "(%s)->(%s) redundancy = %d\n", mpd->cmd_ifname,
2018 			    mpd->cmd_movetoif, mpd->cmd_min_red);
2019 
2020 			if (write(s, mpd, sizeof (mpathd_cmd_t)) !=
2021 			    sizeof (mpathd_cmd_t)) {
2022 				rcm_log_message(RCM_ERROR,
2023 				    _("IP: mpathd write: %s\n"),
2024 				    strerror(errno));
2025 				(void) close(s);
2026 				return (-1);
2027 			}
2028 			break;
2029 
2030 		case MI_SETOINDEX :
2031 			rcm_log_message(RCM_TRACE1, "IP: MI_SETOINDEX: "
2032 			    "(%s)->(%s) family = %d\n", mpd->from_lifname,
2033 			    mpd->to_pifname, mpd->addr_family);
2034 
2035 			if (write(s, mpd, sizeof (mpathd_cmd_t)) !=
2036 			    sizeof (mpathd_cmd_t)) {
2037 				rcm_log_message(RCM_ERROR,
2038 				    _("IP: mpathd write: %s\n"),
2039 				    strerror(errno));
2040 				(void) close(s);
2041 				return (-1);
2042 			}
2043 			break;
2044 
2045 		case MI_UNDO_OFFLINE:
2046 			/* mpathd checks for exact size of the message */
2047 			mpc.cmd_command = mpd->cmd_command;
2048 			(void) strcpy(mpc.cmd_ifname, mpd->cmd_ifname);
2049 
2050 			rcm_log_message(RCM_TRACE1, "IP: MI_UNDO_OFFLINE: "
2051 			    "(%s)\n", mpd->cmd_ifname);
2052 
2053 			if (write(s, &mpc, sizeof (mpathd_unoffline_t)) !=
2054 			    sizeof (mpathd_unoffline_t)) {
2055 				rcm_log_message(RCM_ERROR,
2056 				    _("IP: mpathd write: %s\n"),
2057 				    strerror(errno));
2058 				(void) close(s);
2059 				return (-1);
2060 			}
2061 			break;
2062 		default :
2063 			rcm_log_message(RCM_ERROR,
2064 			    _("IP: unsupported mpathd command\n"));
2065 			(void) close(s);
2066 			return (-1);
2067 		}
2068 
2069 		bzero(&mpr, sizeof (struct mpathd_response));
2070 		/* Read the result from mpathd */
2071 		if (read(s, &mpr, sizeof (struct mpathd_response)) !=
2072 		    sizeof (struct mpathd_response)) {
2073 			rcm_log_message(RCM_ERROR,
2074 			    _("IP: mpathd read : %s\n"), strerror(errno));
2075 			(void) close(s);
2076 			return (-1);
2077 		}
2078 
2079 		(void) close(s);
2080 		if (mpr.resp_mpathd_err == 0) {
2081 			rcm_log_message(RCM_TRACE1,
2082 			    "IP: mpathd_send_cmd success\n");
2083 			return (0);			/* Successful */
2084 		}
2085 
2086 		if (mpr.resp_mpathd_err == MPATHD_SYS_ERROR) {
2087 			if (mpr.resp_sys_errno == EAGAIN) {
2088 				(void) sleep(1);
2089 				rcm_log_message(RCM_DEBUG,
2090 				    "IP: mpathd retrying\n");
2091 				continue;		/* Retry */
2092 			}
2093 			errno = mpr.resp_sys_errno;
2094 			rcm_log_message(RCM_WARNING,
2095 			    _("IP: mpathd_send_cmd error: %s\n"),
2096 			    strerror(errno));
2097 		} else if (mpr.resp_mpathd_err == MPATHD_MIN_RED_ERROR) {
2098 			errno = EIO;
2099 			rcm_log_message(RCM_ERROR, _("IP: in.mpathd(1M): "
2100 			    "Minimum redundancy not met\n"));
2101 		} else {
2102 			rcm_log_message(RCM_ERROR,
2103 			    _("IP: mpathd_send_cmd error\n"));
2104 		}
2105 		/* retry */
2106 	}
2107 
2108 	rcm_log_message(RCM_ERROR,
2109 	    _("IP: mpathd_send_cmd failed %d retries\n"), MPATHD_MAX_RETRIES);
2110 	return (-1);
2111 }
2112 
2113 /*
2114  * Returns -1 on failure. Returns the socket file descriptor on
2115  * success.
2116  */
2117 static int
2118 connect_to_mpathd(int family)
2119 {
2120 	int s;
2121 	struct sockaddr_storage ss;
2122 	struct sockaddr_in *sin = (struct sockaddr_in *)&ss;
2123 	struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&ss;
2124 	struct in6_addr loopback_addr = IN6ADDR_LOOPBACK_INIT;
2125 	int addrlen;
2126 	int ret;
2127 	int on;
2128 
2129 	rcm_log_message(RCM_TRACE1, "IP: connect_to_mpathd\n");
2130 
2131 	s = socket(family, SOCK_STREAM, 0);
2132 	if (s < 0) {
2133 		rcm_log_message(RCM_ERROR,
2134 		    _("IP: mpathd socket: %s\n"), strerror(errno));
2135 		return (-1);
2136 	}
2137 	bzero((char *)&ss, sizeof (ss));
2138 	ss.ss_family = family;
2139 	/*
2140 	 * Need to bind to a privelged port. For non-root, this
2141 	 * will fail. in.mpathd verifies that only commands coming
2142 	 * from priveleged ports succeed so that the ordinary user
2143 	 * can't issue offline commands.
2144 	 */
2145 	on = 1;
2146 	if (setsockopt(s, IPPROTO_TCP, TCP_ANONPRIVBIND, &on,
2147 	    sizeof (on)) < 0) {
2148 		rcm_log_message(RCM_ERROR,
2149 		    _("IP: mpathd setsockopt: TCP_ANONPRIVBIND: %s\n"),
2150 		    strerror(errno));
2151 		return (-1);
2152 	}
2153 	switch (family) {
2154 	case AF_INET:
2155 		sin->sin_port = 0;
2156 		sin->sin_addr.s_addr = htonl(INADDR_LOOPBACK);
2157 		addrlen = sizeof (struct sockaddr_in);
2158 		break;
2159 	case AF_INET6:
2160 		sin6->sin6_port = 0;
2161 		sin6->sin6_addr = loopback_addr;
2162 		addrlen = sizeof (struct sockaddr_in6);
2163 		break;
2164 	}
2165 	ret = bind(s, (struct sockaddr *)&ss, addrlen);
2166 	if (ret != 0) {
2167 		rcm_log_message(RCM_ERROR,
2168 		    _("IP: mpathd bind: %s\n"), strerror(errno));
2169 		return (-1);
2170 	}
2171 	switch (family) {
2172 	case AF_INET:
2173 		sin->sin_port = htons(MPATHD_PORT);
2174 		break;
2175 	case AF_INET6:
2176 		sin6->sin6_port = htons(MPATHD_PORT);
2177 		break;
2178 	}
2179 	ret = connect(s, (struct sockaddr *)&ss, addrlen);
2180 	if (ret != 0) {
2181 		if (errno == ECONNREFUSED) {
2182 			/* in.mpathd is not running, start it */
2183 			if (rcm_exec_cmd(MPATHD_PATH) == -1) {
2184 				rcm_log_message(RCM_ERROR,
2185 				    _("IP: mpathd exec: %s\n"),
2186 				    strerror(errno));
2187 				return (-1);
2188 			}
2189 			ret = connect(s, (struct sockaddr *)&ss, addrlen);
2190 		}
2191 		if (ret != 0) {
2192 			rcm_log_message(RCM_ERROR,
2193 			    _("IP: mpathd connect: %s\n"), strerror(errno));
2194 			return (-1);
2195 		}
2196 	}
2197 	on = 0;
2198 	if (setsockopt(s, IPPROTO_TCP, TCP_ANONPRIVBIND, &on,
2199 	    sizeof (on)) < 0) {
2200 		rcm_log_message(RCM_ERROR,
2201 		    _("IP: mpathd setsockopt TCP_ANONPRIVBIND: %s\n"),
2202 		    strerror(errno));
2203 		return (-1);
2204 	}
2205 
2206 	rcm_log_message(RCM_TRACE1, "IP: connect_to_mpathd success\n");
2207 
2208 	return (s);
2209 }
2210 
2211 /*
2212  * modop() - Remove/insert a module
2213  */
2214 static int
2215 modop(char *name, char *arg, int pos, char op)
2216 {
2217 	char syscmd[LIFNAMSIZ+MAXPATHLEN];	/* must be big enough */
2218 
2219 	rcm_log_message(RCM_TRACE1, "IP: modop(%s)\n", name);
2220 
2221 	/* Nothing to do with "ip", "arp" */
2222 	if ((arg == NULL) || (strcmp(arg, "") == 0) ||
2223 	    STREQ(arg, IP_MOD_NAME) || STREQ(arg, ARP_MOD_NAME)) {
2224 		rcm_log_message(RCM_TRACE1, "IP: modop success\n");
2225 		return (0);
2226 	}
2227 
2228 	if (op == MOD_CHECK) {
2229 		/*
2230 		 * No known good modules (yet) apart from ip and arp
2231 		 * which are handled above
2232 		 */
2233 		return (-1);
2234 	}
2235 
2236 	if (op == MOD_REMOVE) {
2237 		(void) snprintf(syscmd, sizeof (syscmd),
2238 		    "%s %s modremove %s@%d\n", USR_SBIN_IFCONFIG, name, arg,
2239 		    pos);
2240 	} else if (op == MOD_INSERT) {
2241 		(void) snprintf(syscmd, sizeof (syscmd),
2242 		    "%s %s modinsert %s@%d\n", USR_SBIN_IFCONFIG, name, arg,
2243 		    pos);
2244 	} else {
2245 		rcm_log_message(RCM_ERROR,
2246 		    _("IP: modop(%s): unknown operation\n"), name);
2247 		return (-1);
2248 	}
2249 
2250 	rcm_log_message(RCM_TRACE1, "IP: modop(%s): %s\n", name, syscmd);
2251 	if (rcm_exec_cmd(syscmd) == -1) {
2252 		rcm_log_message(RCM_ERROR,
2253 		    _("IP: modop(%s): %s\n"), name, strerror(errno));
2254 		return (-1);
2255 	}
2256 
2257 	rcm_log_message(RCM_TRACE1, "IP: modop success\n");
2258 	return (0);
2259 }
2260 
2261 /*
2262  * get_modlist() - return a list of pushed mid-stream modules
2263  *		 Required memory is malloced to construct the list,
2264  *		 Caller must free this memory list
2265  *		 Call with cache_lock held
2266  */
2267 static int
2268 get_modlist(char *name, ip_lif_t *lif)
2269 {
2270 	int mux_fd;
2271 	int muxid_fd;
2272 	int fd;
2273 	int i;
2274 	int num_mods;
2275 	struct lifreq lifr;
2276 	struct str_list strlist;
2277 
2278 	rcm_log_message(RCM_TRACE1, "IP: getmodlist(%s)\n", name);
2279 
2280 	(void) strncpy(lifr.lifr_name, name, sizeof (lifr.lifr_name));
2281 	lifr.lifr_flags = lif->li_ifflags;
2282 	if (ip_domux2fd(&mux_fd, &muxid_fd, &fd, &lifr) < 0) {
2283 		rcm_log_message(RCM_ERROR, _("IP: ip_domux2fd(%s)\n"), name);
2284 		return (-1);
2285 	}
2286 
2287 	if ((num_mods = ioctl(fd, I_LIST, NULL)) < 0) {
2288 		rcm_log_message(RCM_ERROR,
2289 		    _("IP: get_modlist(%s): I_LIST(%s) \n"),
2290 		    name, strerror(errno));
2291 		(void) ip_plink(mux_fd, muxid_fd, fd, &lifr);
2292 		return (-1);
2293 	}
2294 
2295 	strlist.sl_nmods = num_mods;
2296 	strlist.sl_modlist = malloc(sizeof (struct str_mlist) * num_mods);
2297 
2298 	if (strlist.sl_modlist == NULL) {
2299 		rcm_log_message(RCM_ERROR, _("IP: get_modlist(%s): %s\n"),
2300 		    name, strerror(errno));
2301 		(void) ip_plink(mux_fd, muxid_fd, fd, &lifr);
2302 		return (-1);
2303 	}
2304 
2305 	if (ioctl(fd, I_LIST, (caddr_t)&strlist) < 0) {
2306 		rcm_log_message(RCM_ERROR,
2307 		    _("IP: get_modlist(%s): I_LIST error: %s\n"),
2308 		    name, strerror(errno));
2309 		(void) ip_plink(mux_fd, muxid_fd, fd, &lifr);
2310 		return (-1);
2311 	}
2312 
2313 	for (i = 0; i < strlist.sl_nmods; i++) {
2314 		lif->li_modules[i] =
2315 		    malloc(strlen(strlist.sl_modlist[i].l_name)+1);
2316 		if (lif->li_modules[i] == NULL) {
2317 			rcm_log_message(RCM_ERROR,
2318 			    _("IP: get_modlist(%s): %s\n"),
2319 			    name, strerror(errno));
2320 			(void) ip_plink(mux_fd, muxid_fd, fd, &lifr);
2321 			return (-1);
2322 		}
2323 		(void) strcpy(lif->li_modules[i], strlist.sl_modlist[i].l_name);
2324 	}
2325 
2326 	lif->li_modcnt = strlist.sl_nmods;
2327 	free(strlist.sl_modlist);
2328 
2329 	rcm_log_message(RCM_TRACE1, "IP: getmodlist(%s) success\n", name);
2330 	return (ip_plink(mux_fd, muxid_fd, fd, &lifr));
2331 }
2332 
2333 /*
2334  * ip_domux2fd() - Helper function for mod*() functions
2335  *		 Stolen from ifconfig.c
2336  */
2337 static int
2338 ip_domux2fd(int *mux_fd, int *muxid_fdp, int *fd, struct lifreq *lifr)
2339 {
2340 	int muxid_fd;
2341 	char	*udp_dev_name;
2342 
2343 	if (lifr->lifr_flags & IFF_IPV6) {
2344 		udp_dev_name  = UDP6_DEV_NAME;
2345 	} else {
2346 		udp_dev_name  = UDP_DEV_NAME;
2347 	}
2348 
2349 	if ((muxid_fd = open(udp_dev_name, O_RDWR)) < 0) {
2350 		rcm_log_message(RCM_ERROR, _("IP: ip_domux2fd: open(%s) %s\n"),
2351 		    udp_dev_name, strerror(errno));
2352 		return (-1);
2353 	}
2354 	if ((*mux_fd = open(udp_dev_name, O_RDWR)) < 0) {
2355 		rcm_log_message(RCM_ERROR, _("IP: ip_domux2fd: open(%s) %s\n"),
2356 		    udp_dev_name, strerror(errno));
2357 		(void) close(muxid_fd);
2358 		return (-1);
2359 	}
2360 	if (ioctl(muxid_fd, SIOCGLIFMUXID, (caddr_t)lifr) < 0) {
2361 		rcm_log_message(RCM_ERROR,
2362 		    _("IP: ip_domux2fd: SIOCGLIFMUXID(%s): %s\n"),
2363 		    udp_dev_name, strerror(errno));
2364 		(void) close(*mux_fd);
2365 		(void) close(muxid_fd);
2366 		return (-1);
2367 	}
2368 
2369 	rcm_log_message(RCM_TRACE2,
2370 	    "IP: ip_domux2fd: ARP_muxid %d IP_muxid %d\n",
2371 	    lifr->lifr_arp_muxid, lifr->lifr_ip_muxid);
2372 
2373 	if ((*fd = ioctl(*mux_fd, _I_MUXID2FD, lifr->lifr_ip_muxid)) < 0) {
2374 		rcm_log_message(RCM_ERROR,
2375 		    _("IP: ip_domux2fd: _I_MUXID2FD(%s): %s\n"),
2376 		    udp_dev_name, strerror(errno));
2377 		(void) close(*mux_fd);
2378 		(void) close(muxid_fd);
2379 		return (-1);
2380 	}
2381 	if (ioctl(*mux_fd, I_PUNLINK, lifr->lifr_ip_muxid) < 0) {
2382 		rcm_log_message(RCM_ERROR,
2383 		    _("IP: ip_domux2fd: I_PUNLINK(%s): %s\n"),
2384 		    udp_dev_name, strerror(errno));
2385 		(void) close(*mux_fd);
2386 		(void) close(muxid_fd);
2387 		return (-1);
2388 	}
2389 
2390 	/* Note: mux_fd and muxid_fd are closed in ip_plink below */
2391 	*muxid_fdp = muxid_fd;
2392 	return (0);
2393 }
2394 
2395 /*
2396  * ip_plink() - Helper function for mod*() functions.
2397  *	      Stolen from ifconfig.c
2398  */
2399 static int
2400 ip_plink(int mux_fd, int muxid_fd, int fd, struct lifreq *lifr)
2401 {
2402 	int mux_id;
2403 
2404 	if ((mux_id = ioctl(mux_fd, I_PLINK, fd)) < 0) {
2405 		rcm_log_message(RCM_ERROR, _("IP: ip_plink I_PLINK(%s): %s\n"),
2406 		    UDP_DEV_NAME, strerror(errno));
2407 		(void) close(mux_fd);
2408 		(void) close(muxid_fd);
2409 		(void) close(fd);
2410 		return (-1);
2411 	}
2412 
2413 	lifr->lifr_ip_muxid = mux_id;
2414 	if (ioctl(muxid_fd, SIOCSLIFMUXID, (caddr_t)lifr) < 0) {
2415 		rcm_log_message(RCM_ERROR,
2416 		    _("IP: ip_plink SIOCSLIFMUXID(%s): %s\n"),
2417 		    UDP_DEV_NAME, strerror(errno));
2418 		(void) close(mux_fd);
2419 		(void) close(muxid_fd);
2420 		(void) close(fd);
2421 		return (-1);
2422 	}
2423 
2424 	(void) close(mux_fd);
2425 	(void) close(muxid_fd);
2426 	(void) close(fd);
2427 	return (0);
2428 }
2429 
2430 /*
2431  * ip_onlinelist()
2432  *
2433  *	Notify online to IP address consumers.
2434  */
2435 static int
2436 ip_onlinelist(rcm_handle_t *hd, ip_cache_t *node, char **errorp, uint_t flags,
2437 		rcm_info_t **depend_info)
2438 {
2439 	char **addrlist;
2440 	int ret = RCM_SUCCESS;
2441 
2442 	rcm_log_message(RCM_TRACE2, "IP: ip_onlinelist\n");
2443 
2444 	addrlist = ip_get_addrlist(node);
2445 	if (addrlist == NULL || addrlist[0] == NULL) {
2446 		rcm_log_message(RCM_TRACE2, "IP: ip_onlinelist none\n");
2447 		ip_free_addrlist(addrlist);
2448 		return (ret);
2449 	}
2450 
2451 	ret = rcm_notify_online_list(hd, addrlist, 0, depend_info);
2452 
2453 	ip_free_addrlist(addrlist);
2454 	rcm_log_message(RCM_TRACE2, "IP: ip_onlinelist done\n");
2455 	return (ret);
2456 }
2457 
2458 /*
2459  * ip_offlinelist()
2460  *
2461  *	Offline IP address consumers.
2462  */
2463 static int
2464 ip_offlinelist(rcm_handle_t *hd, ip_cache_t *node, char **errorp, uint_t flags,
2465 	rcm_info_t **depend_info)
2466 {
2467 	char **addrlist;
2468 	int ret = RCM_SUCCESS;
2469 
2470 	rcm_log_message(RCM_TRACE2, "IP: ip_offlinelist\n");
2471 
2472 	addrlist = ip_get_addrlist(node);
2473 	if (addrlist == NULL || addrlist[0] == NULL) {
2474 		rcm_log_message(RCM_TRACE2, "IP: ip_offlinelist none\n");
2475 		ip_free_addrlist(addrlist);
2476 		return (RCM_SUCCESS);
2477 	}
2478 
2479 	if ((ret = rcm_request_offline_list(hd, addrlist, flags, depend_info))
2480 	    != RCM_SUCCESS) {
2481 		if (ret == RCM_FAILURE)
2482 			(void) rcm_notify_online_list(hd, addrlist, 0, NULL);
2483 
2484 		ret = RCM_FAILURE;
2485 	}
2486 
2487 	ip_free_addrlist(addrlist);
2488 	rcm_log_message(RCM_TRACE2, "IP: ip_offlinelist done\n");
2489 	return (ret);
2490 }
2491 
2492 /*
2493  * ip_get_addrlist() -	Compile list of IP addresses hosted on this NIC (node)
2494  *			This routine malloc() required memeory for the list
2495  *			Returns list on success, NULL if failed
2496  *			Call with cache_lock held.
2497  */
2498 static char **
2499 ip_get_addrlist(ip_cache_t *node)
2500 {
2501 	ip_lif_t *lif;
2502 	char **addrlist = NULL;
2503 	int numifs;
2504 	char addrstr[INET6_ADDRSTRLEN];
2505 	void *addr;
2506 	int af;
2507 	int i;
2508 
2509 	rcm_log_message(RCM_TRACE2, "IP: ip_get_addrlist(%s)\n",
2510 	    node->ip_resource);
2511 
2512 	numifs = 0;
2513 	for (lif = node->ip_pif->pi_lifs; lif != NULL; lif = lif->li_next) {
2514 		numifs++;
2515 	}
2516 
2517 	/*
2518 	 * Allocate space for resource names list; add 1 and use calloc()
2519 	 * so that the list is NULL-terminated.
2520 	 */
2521 	if ((addrlist = calloc(numifs + 1, sizeof (char *))) == NULL) {
2522 		rcm_log_message(RCM_ERROR,
2523 		    _("IP: ip_get_addrlist(%s) malloc failure(%s)\n"),
2524 		    node->ip_resource, strerror(errno));
2525 		return (NULL);
2526 	}
2527 
2528 	for (lif = node->ip_pif->pi_lifs, i = 0; lif != NULL;
2529 	    lif = lif->li_next, i++) {
2530 
2531 		af = lif->li_addr.family;
2532 		if (af == AF_INET6) {
2533 			addr = &lif->li_addr.ip6.sin6_addr;
2534 		} else if (af == AF_INET) {
2535 			addr = &lif->li_addr.ip4.sin_addr;
2536 		} else {
2537 			rcm_log_message(RCM_DEBUG,
2538 			    "IP: unknown addr family %d, assuming AF_INET\n",
2539 			    af);
2540 			af = AF_INET;
2541 			addr = &lif->li_addr.ip4.sin_addr;
2542 		}
2543 		if (inet_ntop(af, addr, addrstr, INET6_ADDRSTRLEN) == NULL) {
2544 			rcm_log_message(RCM_ERROR,
2545 			    _("IP: inet_ntop: %s\n"), strerror(errno));
2546 			ip_free_addrlist(addrlist);
2547 			return (NULL);
2548 		}
2549 
2550 		if ((addrlist[i] = malloc(strlen(addrstr) + RCM_SIZE_SUNW_IP))
2551 		    == NULL) {
2552 			rcm_log_message(RCM_ERROR,
2553 			    _("IP: ip_get_addrlist(%s) malloc failure(%s)\n"),
2554 			    node->ip_resource, strerror(errno));
2555 			ip_free_addrlist(addrlist);
2556 			return (NULL);
2557 		}
2558 		(void) strcpy(addrlist[i], RCM_STR_SUNW_IP);	/* SUNW_ip/ */
2559 		(void) strcat(addrlist[i], addrstr);	/* SUNW_ip/<address> */
2560 
2561 		rcm_log_message(RCM_DEBUG, "Anon Address: %s\n", addrlist[i]);
2562 	}
2563 
2564 	rcm_log_message(RCM_TRACE2, "IP: get_addrlist (%s) done\n",
2565 	    node->ip_resource);
2566 
2567 	return (addrlist);
2568 }
2569 
2570 static void
2571 ip_free_addrlist(char **addrlist)
2572 {
2573 	int i;
2574 
2575 	if (addrlist == NULL)
2576 		return;
2577 
2578 	for (i = 0; addrlist[i] != NULL; i++)
2579 		free(addrlist[i]);
2580 	free(addrlist);
2581 }
2582 
2583 /*
2584  * ip_consumer_notify() - Notify consumers of IP addresses coming back online.
2585  */
2586 
2587 static void
2588 ip_consumer_notify(rcm_handle_t *hd, datalink_id_t linkid, char **errorp,
2589     uint_t flags, rcm_info_t **depend_info)
2590 {
2591 	char cached_name[RCM_LINK_RESOURCE_MAX];
2592 	ip_cache_t *node;
2593 
2594 	assert(linkid != DATALINK_INVALID_LINKID);
2595 
2596 	rcm_log_message(RCM_TRACE1, _("IP: ip_consumer_notify(%u)\n"), linkid);
2597 
2598 	/* Check for the interface in the cache */
2599 	(void) snprintf(cached_name, sizeof (cached_name), "%s/%u",
2600 	    RCM_LINK_PREFIX, linkid);
2601 
2602 	(void) mutex_lock(&cache_lock);
2603 	if ((node = cache_lookup(hd, cached_name, CACHE_REFRESH)) == NULL) {
2604 		rcm_log_message(RCM_TRACE1, _("IP: Skipping interface(%u)\n"),
2605 		    linkid);
2606 		(void) mutex_unlock(&cache_lock);
2607 		return;
2608 	}
2609 	/*
2610 	 * Inform anonymous consumers about IP addresses being
2611 	 * onlined
2612 	 */
2613 	(void) ip_onlinelist(hd, node, errorp, flags, depend_info);
2614 
2615 	(void) mutex_unlock(&cache_lock);
2616 
2617 	rcm_log_message(RCM_TRACE2, "IP: ip_consumer_notify success\n");
2618 	return;
2619 
2620 }
2621 
2622 /*
2623  * if_configure() - Configure a physical interface after attach
2624  */
2625 static int
2626 if_configure(datalink_id_t linkid)
2627 {
2628 	char ifinst[MAXLINKNAMELEN];
2629 	char cfgfile[MAXPATHLEN];
2630 	char cached_name[RCM_LINK_RESOURCE_MAX];
2631 	struct stat statbuf;
2632 	ip_cache_t *node;
2633 	int af = 0;
2634 	int ipmp = 0;
2635 
2636 	assert(linkid != DATALINK_INVALID_LINKID);
2637 
2638 	rcm_log_message(RCM_TRACE1, _("IP: if_configure(%u)\n"), linkid);
2639 
2640 	/* Check for the interface in the cache */
2641 	(void) snprintf(cached_name, sizeof (cached_name), "%s/%u",
2642 	    RCM_LINK_PREFIX, linkid);
2643 
2644 	/* Check if the interface is new or was previously offlined */
2645 	(void) mutex_lock(&cache_lock);
2646 	if (((node = cache_lookup(NULL, cached_name, CACHE_REFRESH)) != NULL) &&
2647 	    (!(node->ip_cachestate & CACHE_IF_OFFLINED))) {
2648 		rcm_log_message(RCM_TRACE1,
2649 		    _("IP: Skipping configured interface(%u)\n"), linkid);
2650 		(void) mutex_unlock(&cache_lock);
2651 		return (0);
2652 	}
2653 	(void) mutex_unlock(&cache_lock);
2654 
2655 	if (dladm_datalink_id2info(linkid, NULL, NULL, NULL, ifinst,
2656 	    sizeof (ifinst)) != DLADM_STATUS_OK) {
2657 		rcm_log_message(RCM_ERROR,
2658 		    _("IP: get %u link name failed\n"), linkid);
2659 		return (-1);
2660 	}
2661 
2662 	/* Scan IPv4 configuration first */
2663 	(void) snprintf(cfgfile, MAXPATHLEN, "%s%s", CFGFILE_FMT_IPV4, ifinst);
2664 	cfgfile[MAXPATHLEN - 1] = '\0';
2665 
2666 	rcm_log_message(RCM_TRACE1, "IP: Scanning %s\n", cfgfile);
2667 	if (stat(cfgfile, &statbuf) == 0) {
2668 		af |= CONFIG_AF_INET;
2669 		if (isgrouped(cfgfile)) {
2670 			ipmp++;
2671 		}
2672 	}
2673 
2674 	/* Scan IPv6 configuration details */
2675 	(void) snprintf(cfgfile, MAXPATHLEN, "%s%s", CFGFILE_FMT_IPV6, ifinst);
2676 	cfgfile[MAXPATHLEN - 1] = '\0';
2677 	rcm_log_message(RCM_TRACE1, "IP: Scanning %s\n", cfgfile);
2678 	if (stat(cfgfile, &statbuf) == 0) {
2679 		af |= CONFIG_AF_INET6;
2680 		if ((ipmp == 0) && isgrouped(cfgfile)) {
2681 			ipmp++;
2682 		}
2683 	}
2684 
2685 	if (af & CONFIG_AF_INET) {
2686 		if (if_ipmp_config(ifinst, CONFIG_AF_INET, ipmp) == -1) {
2687 			rcm_log_message(RCM_ERROR,
2688 			    _("IP: IPv4 Post-attach failed (%s)\n"), ifinst);
2689 			return (-1);
2690 		}
2691 	}
2692 
2693 	if (af & CONFIG_AF_INET6) {
2694 		if (if_ipmp_config(ifinst, CONFIG_AF_INET6, ipmp) == -1) {
2695 			rcm_log_message(RCM_ERROR,
2696 			    _("IP: IPv6 Post-attach failed(%s)\n"), ifinst);
2697 			return (-1);
2698 		}
2699 	}
2700 
2701 	rcm_log_message(RCM_TRACE1, "IP: if_configure(%s) success\n", ifinst);
2702 
2703 	return (0);
2704 
2705 }
2706 
2707 /*
2708  * isgrouped() - Scans the given config file to see if this is a grouped
2709  *	       interface
2710  *	       Returns non-zero if true; 0 if false
2711  */
2712 static int
2713 isgrouped(char *cfgfile)
2714 {
2715 	FILE *fp;
2716 	struct stat statb;
2717 	char *buf = NULL;
2718 	char *tokens[MAXARGS];		/* token pointers */
2719 	char tspace[MAXLINE];		/* token space */
2720 	int ntok;
2721 	int group = 0;
2722 
2723 	if (cfgfile == NULL)
2724 		return (0);
2725 
2726 	rcm_log_message(RCM_TRACE1, "IP: isgrouped(%s)\n", cfgfile);
2727 
2728 	if (stat(cfgfile, &statb) != 0) {
2729 		rcm_log_message(RCM_TRACE1,
2730 		    _("IP: No config file(%s)\n"), cfgfile);
2731 		return (0);
2732 	}
2733 
2734 	/*
2735 	 * We also ignore single-byte config files because the file should
2736 	 * always be newline-terminated, so we know there's nothing of
2737 	 * interest.  Further, a single-byte file would cause the fgets() loop
2738 	 * below to spin forever.
2739 	 */
2740 	if (statb.st_size <= 1) {
2741 		rcm_log_message(RCM_TRACE1,
2742 		    _("IP: Empty config file(%s)\n"), cfgfile);
2743 		return (0);
2744 	}
2745 
2746 	if ((fp = fopen(cfgfile, "r")) == NULL) {
2747 		rcm_log_message(RCM_ERROR,
2748 		    _("IP: Cannot open configuration file(%s): %s\n"), cfgfile,
2749 		    strerror(errno));
2750 		return (0);
2751 	}
2752 
2753 	if ((buf = calloc(1, statb.st_size)) == NULL) {
2754 		rcm_log_message(RCM_ERROR,
2755 		    _("IP: calloc failure(%s): %s\n"), cfgfile,
2756 		    strerror(errno));
2757 		(void) fclose(fp);
2758 		return (0);
2759 	}
2760 
2761 	while (fgets(buf, statb.st_size, fp) != NULL) {
2762 		if (*buf == '\0')
2763 			continue;
2764 
2765 		tokenize(buf, tokens, tspace, &ntok);
2766 		while (ntok) {
2767 			if (STREQ("group", tokens[ntok - 1])) {
2768 				if (tokens[ntok] != NULL) {
2769 					group++;
2770 				}
2771 			}
2772 			ntok--;
2773 		}
2774 	}
2775 
2776 	free(buf);
2777 
2778 	(void) fclose(fp);
2779 
2780 	if (group <= 0) {
2781 		rcm_log_message(RCM_TRACE1, "IP: isgrouped(%s) non-grouped\n",
2782 		    cfgfile);
2783 		return (0);
2784 	} else {
2785 		rcm_log_message(RCM_TRACE1, "IP: isgrouped(%s) grouped\n",
2786 		    cfgfile);
2787 		return (1);
2788 	}
2789 }
2790 
2791 
2792 /*
2793  * if_ipmp_config() - Configure an interface instance as specified by the
2794  *		    address family af and if it is grouped (ipmp).
2795  */
2796 static int
2797 if_ipmp_config(char *ifinst, int af, int ipmp)
2798 {
2799 	char cfgfile[MAXPATHLEN];	/* configuration file */
2800 	FILE *fp;
2801 	struct stat statb;
2802 	char *buf;
2803 	char *tokens[MAXARGS];		/* list of config attributes */
2804 	char tspace[MAXLINE];		/* token space */
2805 	char syscmd[MAX_RECONFIG_SIZE + MAXPATHLEN + 1];
2806 	char grpcmd[MAX_RECONFIG_SIZE + MAXPATHLEN + 1];
2807 	char fstr[8];		/* address family string inet or inet6 */
2808 	int nofailover = 0;
2809 	int newattach = 0;
2810 	int cmdvalid = 0;
2811 	int ntok;
2812 	int n;
2813 	int stdif = 0;
2814 
2815 	if (ifinst == NULL)
2816 		return (0);
2817 
2818 	rcm_log_message(RCM_TRACE1, "IP: if_ipmp_config(%s) ipmp = %d\n",
2819 	    ifinst, ipmp);
2820 
2821 	if (af & CONFIG_AF_INET) {
2822 		(void) snprintf(cfgfile, MAXPATHLEN, "%s%s", CFGFILE_FMT_IPV4,
2823 		    ifinst);
2824 		(void) strcpy(fstr, "inet");
2825 	} else if (af & CONFIG_AF_INET6) {
2826 		(void) snprintf(cfgfile, MAXPATHLEN, "%s%s", CFGFILE_FMT_IPV6,
2827 		    ifinst);
2828 		(void) strcpy(fstr, "inet6");
2829 	} else {
2830 		return (0);		/* nothing to do */
2831 	}
2832 
2833 	cfgfile[MAXPATHLEN - 1] = '\0';
2834 	grpcmd[0] = '\0';
2835 
2836 	if (stat(cfgfile, &statb) != 0) {
2837 		rcm_log_message(RCM_TRACE1,
2838 		    "IP: No config file(%s)\n", ifinst);
2839 		return (0);
2840 	}
2841 
2842 	/* Config file exists, plumb in the physical interface */
2843 	if (af & CONFIG_AF_INET6) {
2844 		if (if_getcount(AF_INET6) == 0) {
2845 			/*
2846 			 * Configure software loopback driver if this is the
2847 			 * first IPv6 interface plumbed
2848 			 */
2849 			newattach++;
2850 			(void) snprintf(syscmd, sizeof (syscmd),
2851 			    "%s lo0 %s plumb ::1 up", USR_SBIN_IFCONFIG, fstr);
2852 			if (rcm_exec_cmd(syscmd) != 0) {
2853 				rcm_log_message(RCM_ERROR,
2854 				    _("IP: Cannot plumb (%s) %s\n"),
2855 				    ifinst, strerror(errno));
2856 				return (-1);
2857 			}
2858 		}
2859 		(void) snprintf(syscmd, sizeof (syscmd), "%s %s %s plumb up",
2860 		    USR_SBIN_IFCONFIG, ifinst, fstr);
2861 	} else {
2862 		(void) snprintf(syscmd, sizeof (syscmd), "%s %s %s plumb ",
2863 		    USR_SBIN_IFCONFIG, ifinst, fstr);
2864 		if (if_getcount(AF_INET) == 0) {
2865 			newattach++;
2866 		}
2867 	}
2868 	rcm_log_message(RCM_TRACE1, "IP: Exec: %s\n", syscmd);
2869 
2870 	if (rcm_exec_cmd(syscmd) != 0) {
2871 		rcm_log_message(RCM_ERROR,
2872 		    _("IP: Cannot plumb (%s) %s\n"), ifinst, strerror(errno));
2873 		return (-1);
2874 	}
2875 
2876 	/* Check if config file is empty, if so, nothing else to do */
2877 	if (statb.st_size == 0) {
2878 		rcm_log_message(RCM_TRACE1,
2879 		    "IP: Zero size config file(%s)\n", ifinst);
2880 		return (0);
2881 	}
2882 
2883 	if ((fp = fopen(cfgfile, "r")) == NULL) {
2884 		rcm_log_message(RCM_ERROR,
2885 		    _("IP: Open error(%s): %s\n"), cfgfile, strerror(errno));
2886 		return (-1);
2887 	}
2888 
2889 	if ((buf = calloc(1, statb.st_size)) == NULL) {
2890 		rcm_log_message(RCM_ERROR,
2891 		    _("IP: calloc(%s): %s\n"), ifinst, strerror(errno));
2892 		(void) fclose(fp);
2893 		return (-1);
2894 	}
2895 
2896 	/* a single line with one token implies a classical if */
2897 	if (fgets(buf, statb.st_size, fp) != NULL) {
2898 		tokenize(buf, tokens, tspace, &ntok);
2899 		if (ntok == 1) {
2900 			rcm_log_message(RCM_TRACE1, "IP: Standard interface\n");
2901 			stdif++;
2902 		}
2903 	}
2904 	if (fseek(fp, 0L, SEEK_SET) == -1) {
2905 		rcm_log_message(RCM_ERROR, _("IP: fseek: %s\n"),
2906 		    strerror(errno));
2907 		return (-1);
2908 	}
2909 
2910 	/*
2911 	 * Process the config command
2912 	 * This loop also handles multiple logical interfaces that may
2913 	 * be configured on a single line
2914 	 */
2915 	while (fgets(buf, statb.st_size, fp) != NULL) {
2916 		nofailover = 0;
2917 		cmdvalid = 0;
2918 
2919 		if (*buf == '\0')
2920 			continue;
2921 
2922 		tokenize(buf, tokens, tspace, &ntok);
2923 		if (ntok <= 0)
2924 			continue;
2925 
2926 		/* Reset the config command */
2927 		(void) snprintf(syscmd, sizeof (syscmd), "%s %s %s ",
2928 		    USR_SBIN_IFCONFIG, ifinst, fstr);
2929 
2930 		/* No parsing if this is first interface of its kind */
2931 		if (newattach) {
2932 			(void) strcat(syscmd, buf);
2933 			/* Classic if */
2934 			if ((af & CONFIG_AF_INET) && (stdif == 1)) {
2935 				(void) strcat(syscmd, CFG_CMDS_STD);
2936 			}
2937 			rcm_log_message(RCM_TRACE1, "IP: New: %s\n", syscmd);
2938 			if (rcm_exec_cmd(syscmd) != 0) {
2939 				rcm_log_message(RCM_ERROR,
2940 				    _("IP: Error: %s (%s): %s\n"),
2941 				    syscmd, ifinst, strerror(errno));
2942 			}
2943 			continue;
2944 		}
2945 
2946 		/* Parse the tokens to determine nature of the interface */
2947 		for (n = 0; n < ntok; n++) {
2948 			/* Handle pathological failover cases */
2949 			if (STREQ("-failover", tokens[n]))
2950 				nofailover++;
2951 			if (STREQ("failover", tokens[n]))
2952 				nofailover--;
2953 
2954 			/* group attribute requires special processing */
2955 			if (STREQ("group", tokens[n])) {
2956 				if (tokens[n + 1] != NULL) {
2957 					(void) snprintf(grpcmd, sizeof (grpcmd),
2958 					    "%s %s %s %s %s", USR_SBIN_IFCONFIG,
2959 					    ifinst, fstr,
2960 					    tokens[n], tokens[n + 1]);
2961 					n++;		/* skip next token */
2962 					continue;
2963 				}
2964 			}
2965 
2966 			/* Execute buffered command ? */
2967 			if (STREQ("set", tokens[n]) ||
2968 			    STREQ("addif", tokens[n]) ||
2969 			    STREQ("removeif", tokens[n]) ||
2970 			    (n == (ntok -1))) {
2971 
2972 				/* config command complete ? */
2973 				if (n == (ntok -1)) {
2974 					ADDSPACE(syscmd);
2975 					(void) strcat(syscmd, tokens[n]);
2976 					cmdvalid++;
2977 				}
2978 
2979 				if (!cmdvalid) {
2980 					ADDSPACE(syscmd);
2981 					(void) strcat(syscmd, tokens[n]);
2982 					cmdvalid++;
2983 					continue;
2984 				}
2985 				/* Classic if ? */
2986 				if ((af & CONFIG_AF_INET) && (stdif == 1)) {
2987 					(void) strcat(syscmd, CFG_CMDS_STD);
2988 				}
2989 
2990 				if (nofailover > 0) {
2991 					rcm_log_message(RCM_TRACE1,
2992 					    "IP: Interim exec: %s\n", syscmd);
2993 					if (rcm_exec_cmd(syscmd) != 0) {
2994 						rcm_log_message(RCM_ERROR,
2995 						    _("IP: %s fail(%s): %s\n"),
2996 						    syscmd, ifinst,
2997 						    strerror(errno));
2998 					}
2999 				} else {
3000 					/* Have mpathd configure the address */
3001 					if (if_mpathd_configure(syscmd, ifinst,
3002 					    af, ipmp) != 0) {
3003 						rcm_log_message(RCM_ERROR,
3004 						    _("IP: %s fail(%s): %s\n"),
3005 						    syscmd, ifinst,
3006 						    strerror(errno));
3007 					}
3008 				}
3009 
3010 				/* Reset config command */
3011 				(void) snprintf(syscmd, sizeof (syscmd),
3012 				    "%s %s %s ", USR_SBIN_IFCONFIG, ifinst,
3013 				    fstr);
3014 				nofailover = 0;
3015 				cmdvalid = 0;
3016 			}
3017 			/*
3018 			 * Note: No explicit command validation is required
3019 			 *	since ifconfig to does it for us
3020 			 */
3021 			ADDSPACE(syscmd);
3022 			(void) strcat(syscmd, tokens[n]);
3023 			cmdvalid++;
3024 		}
3025 	}
3026 
3027 	free(buf);
3028 	(void) fclose(fp);
3029 
3030 	/*
3031 	 * The group name needs to be set after all the test/nofailover
3032 	 * addresses have been configured. Otherwise, if IPMP detects that the
3033 	 * interface is failed, the addresses will be moved to a working
3034 	 * interface before the '-failover' flag can be set.
3035 	 */
3036 	if (grpcmd[0] != '\0') {
3037 		rcm_log_message(RCM_TRACE1, "IP: set group name: %s\n", grpcmd);
3038 		if (rcm_exec_cmd(grpcmd) != 0) {
3039 			rcm_log_message(RCM_ERROR, _("IP: %s fail(%s): %s\n"),
3040 			    grpcmd, ifinst, strerror(errno));
3041 		}
3042 	}
3043 
3044 	rcm_log_message(RCM_TRACE1, "IP: if_ipmp_config(%s) success\n", ifinst);
3045 
3046 	return (0);
3047 }
3048 
3049 /*
3050  * if_mpathd_configure() - Determine configuration disposition of the interface
3051  */
3052 static int
3053 if_mpathd_configure(char *syscmd, char *ifinst, int af, int ipmp)
3054 {
3055 	char *tokens[MAXARGS];
3056 	char tspace[MAXLINE];
3057 	int ntok;
3058 	char *addr;
3059 	char *from_lifname;
3060 	mpathd_cmd_t mpdcmd;
3061 	int n;
3062 
3063 	rcm_log_message(RCM_TRACE1, "IP: if_mpathd_configure(%s): %s\n",
3064 	    ifinst, syscmd);
3065 
3066 	tokenize(syscmd, tokens, tspace, &ntok);
3067 	if (ntok <= 0)
3068 		return (0);
3069 
3070 	addr = tokens[3];	/* by default, third token is valid address */
3071 	for (n = 0; n < ntok; n++) {
3072 		if (STREQ("set", tokens[n]) ||
3073 		    STREQ("addif", tokens[n])) {
3074 			addr = tokens[n+1];
3075 			if (addr == NULL) {	/* invalid format */
3076 				return (-1);
3077 			} else
3078 				break;
3079 		}
3080 	}
3081 
3082 	/* Check std. commands or no failed over address */
3083 	if (STREQ("removeif", addr) || STREQ("group", addr) ||
3084 	    ((from_lifname = get_mpathd_dest(addr, af)) == NULL)) {
3085 		rcm_log_message(RCM_TRACE1,
3086 		    "IP: No failed-over host, exec %s\n", syscmd);
3087 		if (rcm_exec_cmd(syscmd) != 0) {
3088 			rcm_log_message(RCM_ERROR,
3089 			    _("IP: %s failed(%s): %s\n"),
3090 			    syscmd, ifinst, strerror(errno));
3091 			return (-1);
3092 		}
3093 		return (0);
3094 	}
3095 
3096 	/* Check for non-IPMP failover scenarios */
3097 	if ((ipmp <= 0) && (from_lifname != NULL)) {
3098 		/* Address already hosted on another NIC, return */
3099 		rcm_log_message(RCM_TRACE1,
3100 		    "IP: Non-IPMP failed-over host(%s): %s\n",
3101 		    ifinst, addr);
3102 		return (0);
3103 	}
3104 
3105 	/*
3106 	 * Valid failed-over host; have mpathd set the original index
3107 	 */
3108 	mpdcmd.cmd_command = MI_SETOINDEX;
3109 	(void) strcpy(mpdcmd.from_lifname, from_lifname);
3110 	(void) strcpy(mpdcmd.to_pifname, ifinst);
3111 	if (af & CONFIG_AF_INET6) {
3112 		mpdcmd.addr_family = AF_INET6;
3113 	} else {
3114 		mpdcmd.addr_family = AF_INET;
3115 	}
3116 
3117 	/* Send command to in.mpathd(1M) */
3118 	rcm_log_message(RCM_TRACE1,
3119 	    "IP: Attempting setoindex from (%s) to (%s) ....\n",
3120 	    from_lifname, ifinst);
3121 
3122 	if (mpathd_send_cmd(&mpdcmd) < 0) {
3123 		rcm_log_message(RCM_TRACE1,
3124 		    "IP: mpathd set original index unsuccessful: %s\n",
3125 		    strerror(errno));
3126 		return (-1);
3127 	}
3128 
3129 	rcm_log_message(RCM_TRACE1,
3130 	    "IP: setoindex success (%s) to (%s)\n",
3131 	    from_lifname, ifinst);
3132 
3133 	return (0);
3134 }
3135 
3136 /*
3137  * get_mpathd_dest() - Return current destination for lif; caller is
3138  *		     responsible to free memory allocated for address
3139  */
3140 static char *
3141 get_mpathd_dest(char *addr, int family)
3142 {
3143 	int sock;
3144 	char *buf;
3145 	struct lifnum lifn;
3146 	struct lifconf lifc;
3147 	struct lifreq *lifrp;
3148 	sa_family_t af = AF_INET;	/* IPv4 by default */
3149 	int i;
3150 	struct lifreq lifreq;
3151 	struct sockaddr_in *sin;
3152 	struct sockaddr_in6 *sin6;
3153 	struct hostent *hp;
3154 	char *ifname = NULL;
3155 	char *prefix = NULL;
3156 	char addrstr[INET6_ADDRSTRLEN];
3157 	char ifaddr[INET6_ADDRSTRLEN];
3158 	int err;
3159 
3160 	if (addr == NULL) {
3161 		return (NULL);
3162 	}
3163 
3164 	rcm_log_message(RCM_TRACE2, "IP: get_mpathd_dest(%s)\n", addr);
3165 
3166 	if (family & CONFIG_AF_INET6) {
3167 		af = AF_INET6;
3168 	} else {
3169 		af = AF_INET;
3170 	}
3171 
3172 	if ((sock = socket(af, SOCK_DGRAM, 0)) == -1) {
3173 		rcm_log_message(RCM_ERROR,
3174 		    _("IP: failure opening %s socket: %s\n"),
3175 		    af == AF_INET6 ? "IPv6" : "IPv4", strerror(errno));
3176 		return (NULL);
3177 	}
3178 
3179 	lifn.lifn_family = af;
3180 	lifn.lifn_flags = 0;
3181 	if (ioctl(sock, SIOCGLIFNUM, (char *)&lifn) < 0) {
3182 		rcm_log_message(RCM_ERROR,
3183 		    _("IP: SIOCLGIFNUM failed: %s\n"),
3184 		    strerror(errno));
3185 		(void) close(sock);
3186 		return (NULL);
3187 	}
3188 
3189 	if ((buf = calloc(lifn.lifn_count, sizeof (struct lifreq))) == NULL) {
3190 		rcm_log_message(RCM_ERROR, _("IP: calloc: %s\n"),
3191 		    strerror(errno));
3192 		(void) close(sock);
3193 		return (NULL);
3194 	}
3195 
3196 	lifc.lifc_family = af;
3197 	lifc.lifc_flags = 0;
3198 	lifc.lifc_len = sizeof (struct lifreq) * lifn.lifn_count;
3199 	lifc.lifc_buf = buf;
3200 
3201 	if (ioctl(sock, SIOCGLIFCONF, (char *)&lifc) < 0) {
3202 		rcm_log_message(RCM_ERROR,
3203 		    _("IP: SIOCGLIFCONF failed: %s\n"),
3204 		    strerror(errno));
3205 		free(buf);
3206 		(void) close(sock);
3207 		return (NULL);
3208 	}
3209 
3210 	/* Filter out prefix address from netmask */
3211 	(void) strcpy(ifaddr, addr);
3212 	if ((prefix = strchr(ifaddr, '/')) != NULL) {
3213 		*prefix = '\0';	/* We care about the address part only */
3214 	}
3215 
3216 	/* Check for aliases */
3217 	hp = getipnodebyname(ifaddr, af, AI_DEFAULT, &err);
3218 	if (hp) {
3219 		if (inet_ntop(af, (void *)hp->h_addr_list[0],
3220 		    ifaddr, sizeof (ifaddr)) == NULL) {
3221 			/* Restore original address and use it */
3222 			(void) strcpy(ifaddr, addr);
3223 			if ((prefix = strchr(ifaddr, '/')) != NULL) {
3224 				*prefix = '\0';
3225 			}
3226 		}
3227 		freehostent(hp);
3228 	}
3229 	rcm_log_message(RCM_TRACE2, "IP: ifaddr(%s) = %s\n", addr, ifaddr);
3230 
3231 	/* now search the interfaces */
3232 	lifrp = lifc.lifc_req;
3233 	for (i = 0; i < lifn.lifn_count; i++, lifrp++) {
3234 		(void) strcpy(lifreq.lifr_name, lifrp->lifr_name);
3235 		/* Get the interface address for this interface */
3236 		if (ioctl(sock, SIOCGLIFADDR, (char *)&lifreq) < 0) {
3237 			rcm_log_message(RCM_ERROR,
3238 			    _("IP: SIOCGLIFADDR: %s\n"), strerror(errno));
3239 			free(buf);
3240 			(void) close(sock);
3241 			return (NULL);
3242 		}
3243 
3244 		if (af == AF_INET6) {
3245 			sin6 = (struct sockaddr_in6 *)&lifreq.lifr_addr;
3246 			if (inet_ntop(AF_INET6, (void *)&sin6->sin6_addr,
3247 			    addrstr, sizeof (addrstr)) == NULL) {
3248 				continue;
3249 			}
3250 		} else {
3251 			sin = (struct sockaddr_in *)&lifreq.lifr_addr;
3252 			if (inet_ntop(AF_INET, (void *)&sin->sin_addr,
3253 			    addrstr, sizeof (addrstr)) == NULL) {
3254 				continue;
3255 			}
3256 		}
3257 
3258 		if (STREQ(addrstr, ifaddr)) {
3259 			/* Allocate memory to hold interface name */
3260 			if ((ifname = (char *)malloc(LIFNAMSIZ)) == NULL) {
3261 				rcm_log_message(RCM_ERROR,
3262 				    _("IP: malloc: %s\n"), strerror(errno));
3263 				free(buf);
3264 				(void) close(sock);
3265 				return (NULL);
3266 			}
3267 
3268 			/* Copy the interface name */
3269 			/*
3270 			 * (void) memcpy(ifname, lifrp->lifr_name,
3271 			 *  sizeof (ifname));
3272 			 * ifname[sizeof (ifname) - 1] = '\0';
3273 			 */
3274 			(void) strcpy(ifname, lifrp->lifr_name);
3275 			break;
3276 		}
3277 	}
3278 
3279 	(void) close(sock);
3280 	free(buf);
3281 
3282 	if (ifname == NULL)
3283 		rcm_log_message(RCM_TRACE2, "IP: get_mpathd_dest(%s): none\n",
3284 		    addr);
3285 	else
3286 		rcm_log_message(RCM_TRACE2, "IP: get_mpathd_dest(%s): %s\n",
3287 		    addr, ifname);
3288 
3289 	return (ifname);
3290 }
3291 
3292 static int
3293 if_getcount(int af)
3294 {
3295 	int sock;
3296 	struct lifnum lifn;
3297 
3298 	rcm_log_message(RCM_TRACE1, "IP: if_getcount\n");
3299 
3300 	if ((sock = socket(af, SOCK_DGRAM, 0)) == -1) {
3301 		rcm_log_message(RCM_ERROR,
3302 		    _("IP: failure opening %s socket: %s\n"),
3303 		    af == AF_INET6 ? "IPv6" : "IPv4", strerror(errno));
3304 		return (-1);
3305 	}
3306 
3307 	lifn.lifn_family = af;
3308 	lifn.lifn_flags = 0;
3309 	if (ioctl(sock, SIOCGLIFNUM, (char *)&lifn) < 0) {
3310 		rcm_log_message(RCM_ERROR,
3311 		    _("IP: SIOCLGIFNUM failed: %s\n"),
3312 		    strerror(errno));
3313 		(void) close(sock);
3314 		return (-1);
3315 	}
3316 	(void) close(sock);
3317 
3318 	rcm_log_message(RCM_TRACE1, "IP: if_getcount success: %d\n",
3319 	    lifn.lifn_count);
3320 
3321 	return (lifn.lifn_count);
3322 }
3323 
3324 /*
3325  * tokenize() - turn a command line into tokens; caller is responsible to
3326  *	      provide enough memory to hold all tokens
3327  */
3328 static void
3329 tokenize(char *line, char **tokens, char *tspace, int *ntok)
3330 {
3331 	char *cp;
3332 	char *sp;
3333 
3334 	sp = tspace;
3335 	cp = line;
3336 	for (*ntok = 0; *ntok < MAXARGS; (*ntok)++) {
3337 		tokens[*ntok] = sp;
3338 		while (ISSPACE(*cp))
3339 			cp++;
3340 		if (ISEOL(*cp))
3341 			break;
3342 		do {
3343 			*sp++ = *cp++;
3344 		} while (!ISSPACE(*cp) && !ISEOL(*cp));
3345 
3346 		*sp++ = '\0';
3347 	}
3348 }
3349