xref: /titanic_52/usr/src/lib/libsldap/common/ns_connmgmt.c (revision c1ecd8b9404ee0d96d93f02e82c441b9bb149a3d)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <string.h>
29 #include <errno.h>
30 #include <syslog.h>
31 #include <procfs.h>
32 #include <unistd.h>
33 #include <fcntl.h>
34 #include <libintl.h>
35 #include <atomic.h>
36 #include <pthread.h>
37 #include <sys/mman.h>
38 #include <time.h>
39 #include "solaris-int.h"
40 #include "ns_connmgmt.h"
41 #include "ns_cache_door.h"
42 #include "ns_internal.h"
43 
44 /*
45  * Access (reference, shutdown, or reload) the current connection
46  * management control structure conn_mgmt_t.
47  */
48 #define	NS_CONN_MGMT_OP_REF		1
49 #define	NS_CONN_MGMT_OP_SHUTDOWN	2
50 #define	NS_CONN_MGMT_OP_RELOAD_CONFIG	3
51 #define	NS_CONN_MGMT_OP_NEW_CONFIG	4
52 #define	NS_CONN_MGMT_OP_LIB_INIT	5
53 
54 static ns_conn_mgmt_t *access_conn_mgmt(int);
55 static ns_conn_mgmt_t *release_conn_mgmt(ns_conn_mgmt_t *, boolean_t);
56 static int close_conn_mt(ns_conn_mt_t *, int, ns_ldap_error_t **,
57 	ns_conn_user_t *);
58 static int close_conn_mt_when_nouser(ns_conn_mt_t *cm);
59 void shutdown_all_conn_mt(ns_conn_mgmt_t *cmg);
60 static int conn_signal(ns_conn_mt_t *);
61 static int conn_wait(ns_conn_mt_t *, ns_conn_user_t *);
62 static void close_conn_mt_by_procchg(ns_conn_mt_t *cm, int rc, char *errmsg);
63 static ns_conn_mgmt_t *proc_server_change(ns_server_status_change_t *chg,
64 	ns_conn_mgmt_t  *cmg);
65 static void get_preferred_servers(boolean_t, boolean_t, ns_conn_mgmt_t *);
66 static void start_thread();
67 
68 static ns_conn_mgmt_t	*ns_connmgmt = NULL;
69 static ns_conn_mgmt_t	*ns_connmgmt_parent = NULL;
70 static mutex_t		ns_connmgmt_lock = DEFAULTMUTEX;
71 static boolean_t	ns_connmgmt_shutting_down = B_FALSE;
72 
73 #define	NS_CONN_MSG_NO_CONN_MGMT gettext( \
74 	"libsldap: unable to allocate the connection management control")
75 #define	NS_CONN_MSG_NO_MTC_KEY gettext( \
76 	"libsldap: unable to allocate the TSD key for per-thread ldap error")
77 #define	NS_CONN_MSG_NO_CMG_KEY gettext( \
78 	"libsldap: unable to allocate the TSD key for connection management")
79 #define	NS_CONN_MSG_SHUTDOWN gettext("libsldap: library is being unloaded")
80 #define	NS_CONN_MSG_RELOADED gettext( \
81 	"libsldap: configuration has been reloaded")
82 #define	NS_CONN_MSG_SHUTDOWN_RELOADED gettext( \
83 	"libsldap: library unloaded or configuration has been reloaded")
84 #define	NS_CONN_MSG_BAD_CACHEMGR_DATA gettext( \
85 	"libsldap: received incorrect data from ldap_cachemgr")
86 #define	NS_CONN_MSG_MEMORY_ERROR gettext( \
87 	"libsldap: unable to allocate memory")
88 #define	NS_CONN_MSG_NO_PROCCHG_THREAD gettext( \
89 	"libsldap: unable to start the server monitor thread (%s)")
90 #define	NS_CONN_MSG_DOWN_FROM_CACHEMGR gettext( \
91 	"libsldap: server down reported by ldap_cachemgr")
92 
93 static int ns_conn_free = 1;
94 #define	NS_CONN_UNLOCK_AND_FREE(free, cm, cmg)  \
95 { \
96 	(void) mutex_unlock(&(cm)->lock);	\
97 	if (free == 1)	\
98 		cmg = free_conn_mt((cm), 1); \
99 	if (cmg != NULL) \
100 		(void) mutex_unlock(&(cmg)->lock); \
101 }
102 
103 #define	NS_CONN_CHECK_ABORT_AND_LOCK(cmg, cu, errp) \
104 { \
105 	char *msg = NULL; \
106 	(void) mutex_lock(&(cmg)->lock); \
107 	if ((cmg)->shutting_down == B_TRUE) \
108 		msg = NS_CONN_MSG_SHUTDOWN; \
109 	else if ((cmg)->cfg_reloaded == B_TRUE)  \
110 		msg = NS_CONN_MSG_RELOADED; \
111 	if (msg != NULL) { \
112 		(*errp) = __s_api_make_error(NS_LDAP_OP_FAILED, msg); \
113 		(void) mutex_unlock(&(cmg)->lock); \
114 		return (NS_LDAP_OP_FAILED); \
115 	} \
116 }
117 
118 /*
119  * TSD keys ns_mtckey and ns_cmgkey are for sharing ldap connections
120  * and their associated connection management structure among
121  * multiple threads. The pointers to the per-thread ldap error
122  * information and the connection management structure are
123  * saved in ns_mtckey and ns_cmgkey.
124  */
125 thread_key_t ns_mtckey = THR_ONCE_KEY;
126 thread_key_t ns_cmgkey = THR_ONCE_KEY;
127 
128 /* Per thread LDAP error resides in thread-specific data (ns_mtckey) */
129 struct ldap_error {
130 	int	le_errno;
131 	char	*le_matched;
132 	char	*le_errmsg;
133 };
134 
135 /* NULL struct ldap_error */
136 static struct ldap_error ldap_error_NULL = { LDAP_SUCCESS, NULL, NULL};
137 
138 /* destructor: free the ldap error data in the thread specific area */
139 static void
140 ns_mtckey_cleanup(void *key) {
141 	struct ldap_error *le = (struct ldap_error *)key;
142 
143 	if (le == NULL)
144 		return;
145 	if (le->le_matched != NULL) {
146 		ldap_memfree(le->le_matched);
147 	}
148 	if (le->le_errmsg != NULL) {
149 		ldap_memfree(le->le_errmsg);
150 	}
151 	free(le);
152 }
153 
154 /* Free/detach the thread specific data structures */
155 static void
156 conn_tsd_free() {
157 	void	*tsd = NULL;
158 	int	rc;
159 
160 	/* free the per-thread ldap error info */
161 	rc = thr_getspecific(ns_mtckey, &tsd);
162 	if (rc == 0 && tsd != NULL)
163 		ns_mtckey_cleanup(tsd);
164 	(void) thr_setspecific(ns_mtckey, NULL);
165 
166 	/* detach the connection management control */
167 	(void) thr_setspecific(ns_cmgkey, NULL);
168 }
169 
170 /* per-thread callback function for allocating a mutex */
171 static void *
172 ns_mutex_alloc(void)
173 {
174 	mutex_t *mutexp = NULL;
175 
176 	if ((mutexp = malloc(sizeof (mutex_t))) != NULL) {
177 		if (mutex_init(mutexp, USYNC_THREAD, NULL) != 0) {
178 			free(mutexp);
179 			mutexp = NULL;
180 		}
181 	}
182 	return (mutexp);
183 }
184 
185 /* per-thread callback function for freeing a mutex */
186 static void
187 ns_mutex_free(void *mutexp)
188 {
189 	(void) mutex_destroy((mutex_t *)mutexp);
190 	free(mutexp);
191 }
192 
193 /*
194  * Function for setting up thread-specific data
195  * where per thread LDAP error and the pointer
196  * to the active connection management control
197  * are stored.
198  */
199 static int
200 conn_tsd_setup(ns_conn_mgmt_t *cmg)
201 {
202 	void	*tsd;
203 	int	rc;
204 
205 	rc = thr_setspecific(ns_cmgkey, cmg);
206 	if (rc != 0) /* must be ENOMEM */
207 		return (-1);
208 
209 	/* return success if the ns_mtckey TSD is already set */
210 	rc = thr_getspecific(ns_mtckey, &tsd);
211 	if (rc == 0 && tsd != NULL)
212 		return (0);
213 
214 	/* allocate and set the ns_mtckey TSD */
215 	tsd = (void *) calloc(1, sizeof (struct ldap_error));
216 	if (tsd == NULL)
217 		return (-1);
218 	rc = thr_setspecific(ns_mtckey, tsd);
219 	if (rc != 0) { /* must be ENOMEM */
220 		free(tsd);
221 		return (-1);
222 	}
223 	return (0);
224 }
225 
226 /* Callback function for setting the per thread LDAP error */
227 /*ARGSUSED*/
228 static void
229 set_ld_error(int err, char *matched, char *errmsg, void *dummy)
230 {
231 	struct ldap_error	*le;
232 	int			eno;
233 
234 	if ((eno = thr_getspecific(ns_mtckey, (void **)&le)) != 0) {
235 		syslog(LOG_ERR, gettext(
236 		    "libsldap: set_ld_error: thr_getspecific failed (%s)."),
237 		    strerror(eno));
238 		return;
239 	}
240 
241 	/* play safe, do nothing if TSD pointer is NULL */
242 	if (le == NULL) {
243 		syslog(LOG_INFO, gettext(
244 		    "libsldap: set_ld_error: TSD pointer is NULL."));
245 		return;
246 	}
247 
248 	le->le_errno = err;
249 
250 	if (le->le_matched != NULL) {
251 		ldap_memfree(le->le_matched);
252 		le->le_matched = NULL;
253 	}
254 	le->le_matched = matched;
255 
256 	if (le->le_errmsg != NULL) {
257 		ldap_memfree(le->le_errmsg);
258 		le->le_errmsg = NULL;
259 	}
260 	le->le_errmsg = errmsg;
261 }
262 
263 /* check and allocate the thread-specific data for using a MT connection */
264 static int
265 conn_tsd_check(ns_conn_mgmt_t *cmg)
266 {
267 	if (conn_tsd_setup(cmg) != 0)
268 		return (NS_LDAP_MEMORY);
269 
270 	return (NS_LDAP_SUCCESS);
271 }
272 
273 /* Callback function for getting the per thread LDAP error */
274 /*ARGSUSED*/
275 static int
276 get_ld_error(char **matched, char **errmsg, void *dummy)
277 {
278 	struct ldap_error	*le;
279 	int			eno;
280 
281 	if ((eno = thr_getspecific(ns_mtckey, (void **)&le)) != 0) {
282 		syslog(LOG_ERR, gettext(
283 		    "libsldap: get_ld_error: thr_getspecific failed (%s)"),
284 		    strerror(eno));
285 		return (eno);
286 	}
287 
288 	/* play safe, return NULL error data, if TSD pointer is NULL */
289 	if (le == NULL)
290 		le = &ldap_error_NULL;
291 
292 	if (matched != NULL) {
293 		*matched = le->le_matched;
294 	}
295 	if (errmsg != NULL) {
296 		*errmsg = le->le_errmsg;
297 	}
298 	return (le->le_errno);
299 }
300 
301 /* Callback function for setting per thread errno */
302 static void
303 set_errno(int err)
304 {
305 	errno = err;
306 }
307 
308 /* Callback function for getting per thread errno */
309 static int
310 get_errno(void)
311 {
312 	return (errno);
313 }
314 
315 /* set up an ldap session 'ld' for sharing among multiple threads */
316 static int
317 setup_mt_conn(LDAP *ld)
318 {
319 
320 	struct ldap_thread_fns		tfns;
321 	struct ldap_extra_thread_fns	extrafns;
322 	int				rc;
323 
324 	/*
325 	 * Set the function pointers for dealing with mutexes
326 	 * and error information
327 	 */
328 	(void) memset(&tfns, '\0', sizeof (struct ldap_thread_fns));
329 	tfns.ltf_mutex_alloc = (void *(*)(void)) ns_mutex_alloc;
330 	tfns.ltf_mutex_free = (void (*)(void *)) ns_mutex_free;
331 	tfns.ltf_mutex_lock = (int (*)(void *)) mutex_lock;
332 	tfns.ltf_mutex_unlock = (int (*)(void *)) mutex_unlock;
333 	tfns.ltf_get_errno = get_errno;
334 	tfns.ltf_set_errno = set_errno;
335 	tfns.ltf_get_lderrno = get_ld_error;
336 	tfns.ltf_set_lderrno = set_ld_error;
337 	tfns.ltf_lderrno_arg = NULL;
338 
339 	/*
340 	 * Set up the ld to use those function pointers
341 	 */
342 	rc = ldap_set_option(ld, LDAP_OPT_THREAD_FN_PTRS,
343 	    (void *) &tfns);
344 	if (rc < 0) {
345 		syslog(LOG_INFO, gettext("libsldap: ldap_set_option "
346 		"(LDAP_OPT_THREAD_FN_PTRS)"));
347 		return (0);
348 	}
349 
350 	/*
351 	 * Set the function pointers for working with semaphores
352 	 */
353 	(void) memset(&extrafns, '\0',
354 	    sizeof (struct ldap_extra_thread_fns));
355 	extrafns.ltf_threadid_fn = (void * (*)(void))thr_self;
356 	extrafns.ltf_mutex_trylock = NULL;
357 	extrafns.ltf_sema_alloc = NULL;
358 	extrafns.ltf_sema_free = NULL;
359 	extrafns.ltf_sema_wait = NULL;
360 	extrafns.ltf_sema_post = NULL;
361 
362 	/* Set up the ld to use those function pointers */
363 	rc = ldap_set_option(ld, LDAP_OPT_EXTRA_THREAD_FN_PTRS,
364 	    (void *) &extrafns);
365 	if (rc < 0) {
366 		syslog(LOG_INFO, gettext("libsldap: ldap_set_option "
367 		"(LDAP_OPT_EXTRA_THREAD_FN_PTRS)"));
368 		return (0);
369 	}
370 
371 	return (1);
372 }
373 
374 /* set up an MT connection for sharing among multiple threads */
375 static int
376 setup_mt_ld(LDAP *ld, ns_conn_mgmt_t *cmg)
377 {
378 	thread_t	t = thr_self();
379 
380 	/* set up the per-thread data for using the MT connection */
381 	if (conn_tsd_setup(cmg) == -1) {
382 		syslog(LOG_WARNING,
383 		    gettext("libsldap: tid= %d: unable to set up TSD\n"), t);
384 		return (-1);
385 	}
386 
387 	if (setup_mt_conn(ld) == 0) {
388 		/* multiple threads per connection not supported */
389 		syslog(LOG_WARNING, gettext("libsldap: tid= %d: multiple "
390 		    "threads per connection not supported\n"), t);
391 		conn_tsd_free();
392 		return (-1);
393 	}
394 	return (0);
395 }
396 
397 /*
398  * Check name and UID of process, if it is nscd.
399  *
400  * Input:
401  *   pid	: PID of checked process
402  *   check_uid	: check if UID == 0
403  * Output:
404  *   B_TRUE	: nscd detected
405  *   B_FALSE	: nscd not confirmed
406  */
407 static boolean_t
408 check_nscd_proc(pid_t pid, boolean_t check_uid)
409 {
410 	psinfo_t	pinfo;
411 	char		fname[MAXPATHLEN];
412 	ssize_t		ret;
413 	int		fd;
414 
415 	if (snprintf(fname, MAXPATHLEN, "/proc/%d/psinfo", pid) > 0) {
416 		if ((fd = open(fname,  O_RDONLY)) >= 0) {
417 			ret = read(fd, &pinfo, sizeof (psinfo_t));
418 			(void) close(fd);
419 			if ((ret == sizeof (psinfo_t)) &&
420 			    (strcmp(pinfo.pr_fname, "nscd") == 0)) {
421 				if (check_uid && (pinfo.pr_uid != 0))
422 					return (B_FALSE);
423 				return (B_TRUE);
424 			}
425 		}
426 	}
427 	return (B_FALSE);
428 }
429 
430 /*
431  * Check if this process is peruser nscd.
432  */
433 boolean_t
434 __s_api_peruser_proc(void)
435 {
436 	pid_t		my_ppid;
437 	static mutex_t	nscdLock = DEFAULTMUTEX;
438 	static pid_t	checkedPpid = (pid_t)-1;
439 	static boolean_t isPeruserNscd = B_FALSE;
440 
441 	my_ppid = getppid();
442 
443 	/*
444 	 * Already checked before for this process? If yes, return cached
445 	 * response.
446 	 */
447 	if (my_ppid == checkedPpid) {
448 		return (isPeruserNscd);
449 	}
450 
451 	(void) mutex_lock(&nscdLock);
452 
453 	/* Check once more incase another thread has just complete this. */
454 	if (my_ppid == checkedPpid) {
455 		(void) mutex_unlock(&nscdLock);
456 		return (isPeruserNscd);
457 	}
458 
459 	/* Reinitialize to be sure there is no residue after fork. */
460 	isPeruserNscd = B_FALSE;
461 
462 	/* Am I the nscd process? */
463 	if (check_nscd_proc(getpid(), B_FALSE)) {
464 		/* Is my parent the nscd process with UID == 0. */
465 		isPeruserNscd = check_nscd_proc(my_ppid, B_TRUE);
466 	}
467 
468 	/* Remember for whom isPeruserNscd is. */
469 	checkedPpid = my_ppid;
470 
471 	(void) mutex_unlock(&nscdLock);
472 	return (isPeruserNscd);
473 }
474 
475 /*
476  * Check if this process is main nscd.
477  */
478 boolean_t
479 __s_api_nscd_proc(void)
480 {
481 	pid_t		my_pid;
482 	static mutex_t	nscdLock = DEFAULTMUTEX;
483 	static pid_t	checkedPid = (pid_t)-1;
484 	static boolean_t isMainNscd = B_FALSE;
485 
486 	/*
487 	 * Don't bother checking if this process isn't root, this cannot
488 	 * be main nscd.
489 	 */
490 	if (getuid() != 0)
491 		return (B_FALSE);
492 
493 	my_pid = getpid();
494 
495 	/*
496 	 * Already checked before for this process? If yes, return cached
497 	 * response.
498 	 */
499 	if (my_pid == checkedPid) {
500 		return (isMainNscd);
501 	}
502 
503 	(void) mutex_lock(&nscdLock);
504 
505 	/* Check once more incase another thread has just done this. */
506 	if (my_pid == checkedPid) {
507 		(void) mutex_unlock(&nscdLock);
508 		return (isMainNscd);
509 	}
510 
511 	/*
512 	 * Am I the nscd process? UID is already checked, not needed from
513 	 * psinfo.
514 	 */
515 	isMainNscd = check_nscd_proc(my_pid, B_FALSE);
516 
517 	/* Remember for whom isMainNscd is. */
518 	checkedPid = my_pid;
519 
520 	(void) mutex_unlock(&nscdLock);
521 	return (isMainNscd);
522 }
523 
524 /*
525  * initialize a connection management control structure conn_mgmt_t
526  */
527 ns_conn_mgmt_t *
528 init_conn_mgmt()
529 {
530 	ns_conn_mgmt_t	*cmg;
531 
532 	cmg = (ns_conn_mgmt_t *)calloc(1, sizeof (*cmg));
533 	if (cmg == NULL) {
534 		syslog(LOG_ERR, NS_CONN_MSG_NO_CONN_MGMT);
535 		return (NULL);
536 	}
537 
538 	/* is this process nscd or peruser nscd ? */
539 	cmg->is_nscd = __s_api_nscd_proc();
540 	cmg->is_peruser_nscd = __s_api_peruser_proc();
541 
542 	/*
543 	 * assume the underlying libldap allows multiple threads sharing
544 	 * the same ldap connection (MT connection)
545 	 */
546 	cmg->ldap_mt = B_TRUE;
547 	/* state is inactive until MT connection is required/requested */
548 	cmg->state = NS_CONN_MGMT_INACTIVE;
549 
550 	(void) mutex_init(&cmg->lock, USYNC_THREAD, NULL);
551 	(void) mutex_init(&cmg->cfg_lock, USYNC_THREAD, NULL);
552 	cmg->pid = getpid();
553 
554 	/* for nscd or peruser nscd, MT connection is required */
555 	if (cmg->is_nscd == B_TRUE || cmg->is_peruser_nscd == B_TRUE)
556 		cmg->state = NS_CONN_MGMT_ACTIVE;
557 
558 	/*
559 	 * reference (or initialize) the current Native LDAP configuration and
560 	 * if in nscd process, make it never refreshed
561 	 */
562 	cmg->config = __s_api_get_default_config_global();
563 	if (cmg->config == NULL)
564 		cmg->config = __s_api_loadrefresh_config_global();
565 	if (cmg->config != NULL) {
566 		/*
567 		 * main nscd get config change notice from ldap_cachemgr
568 		 * so won't times out and refresh the config
569 		 */
570 		if (cmg->is_nscd  == B_TRUE)
571 			(cmg->config)->paramList[NS_LDAP_EXP_P].ns_tm = 0;
572 		cmg->cfg_cookie = cmg->config->config_cookie;
573 	}
574 
575 	return (cmg);
576 }
577 
578 static void
579 mark_shutdown_or_reloaded(int op)
580 {
581 	ns_conn_mgmt_t	*cmg = ns_connmgmt;
582 
583 	(void) mutex_lock(&cmg->lock);
584 	if (op == NS_CONN_MGMT_OP_SHUTDOWN)
585 		cmg->shutting_down = B_TRUE;
586 	else
587 		cmg->cfg_reloaded = B_TRUE;
588 	atomic_inc_uint(&cmg->ref_cnt);
589 	cmg->state = NS_CONN_MGMT_DETACHED;
590 
591 	if (op == NS_CONN_MGMT_OP_RELOAD_CONFIG)
592 		__s_api_init_config_global(NULL);
593 
594 	(void) mutex_unlock(&cmg->lock);
595 }
596 
597 /*
598  * Return a pointer to the current connection management. If
599  * it has not been created, or is requested to recreate, then
600  * create and return the pointer. It is possible, the current
601  * one is created by the parent before fork, create a new
602  * one too in such a case.
603  */
604 static ns_conn_mgmt_t *
605 get_current_conn_mgmt(int op)
606 {
607 	ns_conn_mgmt_t	*cmg = ns_connmgmt;
608 	static pid_t	checked_pid = (pid_t)-1;
609 	pid_t		mypid;
610 
611 	mypid = getpid();
612 	if (cmg == NULL || checked_pid != mypid) {
613 		checked_pid = mypid;
614 
615 		/*
616 		 * if current conn_mgmt not created yet or is from parent
617 		 * or is requested to recreate, create it
618 		 */
619 		if (cmg == NULL || cmg->pid != mypid) {
620 			if (cmg != NULL) {
621 				/*
622 				 * We don't want to free the conn_mgmt
623 				 * allocated by the parent, since
624 				 * there may be ldap connections
625 				 * still being used. So leave it
626 				 * alone but keep it referenced,
627 				 * so that it will not be flagged
628 				 * as a piece of leaked memory.
629 				 */
630 				ns_connmgmt_parent = cmg;
631 				/*
632 				 * avoid lint warning; does not
633 				 * change the conn_mgmt in parent
634 				 */
635 				ns_connmgmt_parent->state =
636 				    NS_CONN_MGMT_DETACHED;
637 			}
638 			ns_connmgmt = init_conn_mgmt();
639 			cmg = ns_connmgmt;
640 			/*
641 			 * ensure it will not be destroyed until explicitly
642 			 * shut down or reloaded
643 			 */
644 			if (op == NS_CONN_MGMT_OP_REF)
645 				atomic_inc_uint(&cmg->ref_cnt);
646 		}
647 	}
648 
649 	return (cmg);
650 }
651 
652 static ns_conn_mgmt_t *
653 access_conn_mgmt(int op)
654 {
655 	ns_conn_mgmt_t	*cmg = NULL;
656 	ns_conn_mgmt_t	*cmg_prev;
657 
658 	(void) mutex_lock(&ns_connmgmt_lock);
659 
660 	/*
661 	 * connection management is not available when the libsldap is being
662 	 * unloaded or shut down
663 	 */
664 	if (ns_connmgmt_shutting_down == B_TRUE) {
665 		(void) mutex_unlock(&ns_connmgmt_lock);
666 		return (NULL);
667 	}
668 
669 	if (op == NS_CONN_MGMT_OP_SHUTDOWN) {
670 		ns_connmgmt_shutting_down = B_TRUE;
671 		if (ns_connmgmt != NULL) {
672 			cmg = ns_connmgmt;
673 			mark_shutdown_or_reloaded(op);
674 			ns_connmgmt = NULL;
675 		}
676 		(void) mutex_unlock(&ns_connmgmt_lock);
677 		return (cmg);
678 	}
679 
680 	if (op == NS_CONN_MGMT_OP_RELOAD_CONFIG ||
681 	    op == NS_CONN_MGMT_OP_NEW_CONFIG) {
682 		cmg_prev = ns_connmgmt;
683 		mark_shutdown_or_reloaded(op);
684 		/*
685 		 * the previous cmg (cmg_prev) will be freed later
686 		 * when its ref count reaches zero
687 		 */
688 		ns_connmgmt = NULL;
689 	}
690 
691 	cmg = get_current_conn_mgmt(op);
692 	if (cmg == NULL) {
693 		(void) mutex_unlock(&ns_connmgmt_lock);
694 		return (NULL);
695 	}
696 
697 	atomic_inc_uint(&cmg->ref_cnt);
698 	if (op == NS_CONN_MGMT_OP_RELOAD_CONFIG ||
699 	    op == NS_CONN_MGMT_OP_NEW_CONFIG)
700 		cmg = cmg_prev;
701 	else { /* op is  NS_CONN_MGMT_OP_REF  or NS_CONN_MGMT_OP_LIB_INIT */
702 		if (cmg->config == NULL)
703 			cmg->config = __s_api_get_default_config();
704 	}
705 
706 	(void) mutex_unlock(&ns_connmgmt_lock);
707 	return (cmg);
708 }
709 
710 /*
711  * free a connection management control
712  */
713 static void
714 free_conn_mgmt(ns_conn_mgmt_t *cmg)
715 {
716 	union {
717 		ldap_data_t	s_d;
718 		char		s_b[1024];
719 	} space;
720 	ldap_data_t	*sptr;
721 	int		ndata;
722 	int		adata;
723 	int		rc;
724 	ldap_get_chg_cookie_t cookie;
725 
726 	if (cmg == NULL)
727 		return;
728 	cookie = cmg->cfg_cookie;
729 
730 	__s_api_free2dArray(cmg->pservers);
731 	/* destroy the previous config or release the current one */
732 	if (cmg->config != NULL) {
733 		if (cmg->state == NS_CONN_MGMT_DETACHED)
734 			__s_api_destroy_config(cmg->config);
735 		else
736 			__s_api_release_config(cmg->config);
737 	}
738 
739 	/* stop the server status/config-change monitor thread */
740 	if (cmg->procchg_started == B_TRUE) {
741 		if (cmg->procchg_tid != thr_self()) {
742 			if (cmg->procchg_door_call == B_TRUE) {
743 				adata = sizeof (ldap_call_t) + 1;
744 				ndata = sizeof (space);
745 				space.s_d.ldap_call.ldap_callnumber =
746 				    GETSTATUSCHANGE;
747 				space.s_d.ldap_call.ldap_u.get_change.op =
748 				    NS_STATUS_CHANGE_OP_STOP;
749 				space.s_d.ldap_call.ldap_u.get_change.cookie =
750 				    cookie;
751 				sptr = &space.s_d;
752 				rc = __ns_ldap_trydoorcall(&sptr, &ndata,
753 				    &adata);
754 				if (rc != NS_CACHE_SUCCESS)
755 					syslog(LOG_INFO,
756 					    gettext("libsldap: "
757 					    "free_conn_mgmt():"
758 					    " stopping door call "
759 					    " GETSTATUSCHANGE failed "
760 					    " (rc = %d)"), rc);
761 			}
762 			(void) pthread_cancel(cmg->procchg_tid);
763 			cmg->procchg_started = B_FALSE;
764 		}
765 	}
766 
767 	free(cmg);
768 }
769 
770 static ns_conn_mgmt_t *
771 release_conn_mgmt(ns_conn_mgmt_t *cmg, boolean_t unlock_cmg)
772 {
773 	if (cmg == NULL)
774 		return (NULL);
775 	if (atomic_dec_uint_nv(&cmg->ref_cnt) == 0) {
776 		if (cmg->state == NS_CONN_MGMT_DETACHED) {
777 			if (unlock_cmg == B_TRUE)
778 				(void) mutex_unlock(&cmg->lock);
779 			free_conn_mgmt(cmg);
780 			return (NULL);
781 		} else {
782 			syslog(LOG_WARNING,
783 			    gettext("libsldap: connection management "
784 			    " has a refcount of zero but the state "
785 			    " is not DETACHED (%d)"), cmg->state);
786 			cmg = NULL;
787 		}
788 	}
789 	return (cmg);
790 }
791 
792 /*
793  * exposed function for initializing a connection management control structure
794  */
795 ns_conn_mgmt_t *
796 __s_api_conn_mgmt_init()
797 {
798 	if (thr_keycreate_once(&ns_mtckey, ns_mtckey_cleanup) != 0) {
799 		syslog(LOG_WARNING, NS_CONN_MSG_NO_MTC_KEY);
800 		return (NULL);
801 	}
802 
803 	if (thr_keycreate_once(&ns_cmgkey, NULL) != 0) {
804 		syslog(LOG_WARNING, NS_CONN_MSG_NO_CMG_KEY);
805 		return (NULL);
806 	}
807 
808 	return (access_conn_mgmt(NS_CONN_MGMT_OP_LIB_INIT));
809 }
810 
811 /* initialize a connection user */
812 ns_conn_user_t *
813 __s_api_conn_user_init(int type, void *userinfo, boolean_t referral)
814 {
815 	ns_conn_user_t	*cu;
816 	ns_conn_mgmt_t	*cmg;
817 
818 	/* delete the reference to the previously used conn_mgmt */
819 	(void) thr_setspecific(ns_cmgkey, NULL);
820 
821 	cmg = access_conn_mgmt(NS_CONN_MGMT_OP_REF);
822 	if (cmg == NULL)
823 		return (NULL);
824 
825 	if (cmg->state != NS_CONN_MGMT_ACTIVE &&
826 	    cmg->state != NS_CONN_MGMT_INACTIVE) {
827 		atomic_dec_uint(&cmg->ref_cnt);
828 		return (NULL);
829 	}
830 
831 	cu = (ns_conn_user_t *)calloc(1, sizeof (*cu));
832 	if (cu == NULL) {
833 		atomic_dec_uint(&cmg->ref_cnt);
834 		return (NULL);
835 	}
836 
837 	cu->type = type;
838 	cu->state = NS_CONN_USER_ALLOCATED;
839 	cu->tid = thr_self();
840 	cu->userinfo = userinfo;
841 	cu->referral = referral;
842 	cu->ns_rc = NS_LDAP_SUCCESS;
843 	cu->conn_mgmt = cmg;
844 
845 	(void) conn_tsd_setup(cmg);
846 
847 	return (cu);
848 }
849 
850 /*
851  * Free the resources used by a connection user.
852  * The caller should ensure this conn_user is
853  * not associated with any conn_mt, i.e.,
854  * not in any conn_mt's linked list of conn_users.
855  * The caller needs to free the userinfo member
856  * as well.
857  */
858 void
859 __s_api_conn_user_free(ns_conn_user_t *cu)
860 {
861 	ns_conn_mgmt_t	*cmg;
862 
863 	if (cu == NULL)
864 		return;
865 
866 	cu->state = NS_CONN_USER_FREED;
867 	if (cu->ns_error != NULL)
868 		(void) __ns_ldap_freeError(&cu->ns_error);
869 
870 	cmg = cu->conn_mgmt;
871 	conn_tsd_free();
872 	(void) release_conn_mgmt(cmg, B_FALSE);
873 	(void) free(cu);
874 }
875 
876 /*
877  * Initialize an MT connection control structure
878  * that will be used to represent an ldap connection
879  * to be shared among multiple threads and to hold
880  * and manage all the conn_users using the ldap
881  * connection.
882  */
883 static ns_conn_mt_t *
884 init_conn_mt(ns_conn_mgmt_t *cmg, ns_ldap_error_t **ep)
885 {
886 	ns_conn_mt_t	*cm;
887 	ns_conn_mgmt_t	*cmg_a;
888 
889 	cm = (ns_conn_mt_t *)calloc(1, sizeof (*cm));
890 	if (cm == NULL) {
891 		if (ep != NULL)
892 			*ep = __s_api_make_error(NS_LDAP_MEMORY, NULL);
893 		return (NULL);
894 	}
895 
896 	cmg_a = access_conn_mgmt(NS_CONN_MGMT_OP_REF);
897 	if (cmg_a != cmg) {
898 		if (cmg_a != NULL) {
899 			(void) release_conn_mgmt(cmg_a, B_FALSE);
900 			if (ep != NULL)
901 				*ep = __s_api_make_error(NS_LDAP_OP_FAILED,
902 				    NS_CONN_MSG_SHUTDOWN_RELOADED);
903 		}
904 		return (NULL);
905 	}
906 
907 	(void) mutex_init(&cm->lock, USYNC_THREAD, NULL);
908 	cm->state = NS_CONN_MT_CONNECTING;
909 	cm->tid = thr_self();
910 	cm->pid = getpid();
911 	cm->next = NULL;
912 	cm->cu_head = NULL;
913 	cm->cu_tail = NULL;
914 	cm->conn = NULL;
915 	cm->conn_mgmt = cmg;
916 
917 	return (cm);
918 }
919 
920 /*
921  * Free an MT connection control structure, assume conn_mgmt is locked.
922  * 'unlock_cmg' is passed to release_conn_mgmt() to indicate the
923  * cmg needs to be unlocked or not.
924  */
925 static ns_conn_mgmt_t *
926 free_conn_mt(ns_conn_mt_t *cm, int unlock_cmg)
927 {
928 	ns_conn_mgmt_t	*cmg;
929 
930 	if (cm == NULL)
931 		return (NULL);
932 	if (cm->ns_error != NULL)
933 		(void) __ns_ldap_freeError(&cm->ns_error);
934 	if (cm->conn != NULL) {
935 		if (cm->conn->ld != NULL)
936 			(void) ldap_unbind(cm->conn->ld);
937 		__s_api_freeConnection(cm->conn);
938 	}
939 	cmg = cm->conn_mgmt;
940 	free(cm);
941 	return (release_conn_mgmt(cmg, unlock_cmg));
942 }
943 
944 /* add a connection user to an MT connection */
945 static void
946 add_cu2cm(ns_conn_user_t *cu, ns_conn_mt_t *cm)
947 {
948 
949 	if (cm->cu_head == NULL) {
950 		cm->cu_head = cu;
951 		cm->cu_tail = cu;
952 	} else {
953 		cm->cu_tail->next = cu;
954 		cm->cu_tail = cu;
955 	}
956 	cm->cu_cnt++;
957 }
958 
959 /* add an MT connection to the connection management */
960 static void
961 add_cm2cmg(ns_conn_mt_t *cm, ns_conn_mgmt_t *cmg)
962 {
963 	/*
964 	 * add connection opened for WRITE to top of list
965 	 * for garbage collection purpose. This is to
966 	 * ensure the connection will be closed after a
967 	 * certain amount of time (60 seconds).
968 	 */
969 	if (cmg->cm_head == NULL) {
970 		cmg->cm_head = cm;
971 		cmg->cm_tail = cm;
972 	} else {
973 		if (cm->opened_for == NS_CONN_USER_WRITE) {
974 			cm->next = cmg->cm_head;
975 			cmg->cm_head = cm;
976 		} else {
977 			cmg->cm_tail->next = cm;
978 			cmg->cm_tail = cm;
979 		}
980 	}
981 	cmg->cm_cnt++;
982 }
983 
984 /* delete a connection user from an MT connection */
985 static void
986 del_cu4cm(ns_conn_user_t *cu, ns_conn_mt_t *cm)
987 {
988 	ns_conn_user_t *pu, *u;
989 
990 	if (cu == NULL || cm->cu_head == NULL || cm->cu_cnt == 0)
991 		return;
992 
993 	/* only one conn_user on list */
994 	if (cm->cu_head == cm->cu_tail) {
995 		if (cu == cm->cu_head) {
996 			cm->cu_head = cm->cu_tail = NULL;
997 			cm->cu_cnt = 0;
998 			cu->next = NULL;
999 		}
1000 		return;
1001 	}
1002 
1003 	/* more than one and cu is the first one */
1004 	if (cu == cm->cu_head) {
1005 		cm->cu_head = cu->next;
1006 		cm->cu_cnt--;
1007 		cu->next = NULL;
1008 		return;
1009 	}
1010 
1011 	pu = cm->cu_head;
1012 	for (u = cm->cu_head->next; u; u = u->next) {
1013 		if (cu == u)
1014 			break;
1015 		pu = u;
1016 	}
1017 	if (pu != cm->cu_tail) {
1018 		pu->next = cu->next;
1019 		if (pu->next == NULL)
1020 			cm->cu_tail = pu;
1021 		cm->cu_cnt--;
1022 		cu->next = NULL;
1023 	} else {
1024 		syslog(LOG_INFO, gettext(
1025 		    "libsldap: del_cu4cm(): connection user not found"));
1026 	}
1027 }
1028 
1029 /* delete an MT connection from the connection management control structure */
1030 static void
1031 del_cm4cmg(ns_conn_mt_t *cm, ns_conn_mgmt_t *cmg)
1032 {
1033 	ns_conn_mt_t *pm, *m;
1034 
1035 	if (cm == NULL || cmg->cm_head == NULL || cmg->cm_cnt == 0)
1036 		return;
1037 
1038 	/* only one conn_mt on list */
1039 	if (cmg->cm_head == cmg->cm_tail) {
1040 		if (cm == cmg->cm_head) {
1041 			cmg->cm_head = cmg->cm_tail = NULL;
1042 			cmg->cm_cnt = 0;
1043 			cm->next = NULL;
1044 		}
1045 		return;
1046 	}
1047 
1048 	/* more than one and cm is the first one */
1049 	if (cm == cmg->cm_head) {
1050 		cmg->cm_head = cm->next;
1051 		cmg->cm_cnt--;
1052 		cm->next = NULL;
1053 		return;
1054 	}
1055 
1056 	pm = cmg->cm_head;
1057 	for (m = cmg->cm_head->next; m; m = m->next) {
1058 		if (cm == m)
1059 			break;
1060 		pm = m;
1061 	}
1062 	if (pm != cmg->cm_tail) {
1063 		pm->next = cm->next;
1064 		if (pm->next == NULL)
1065 			cmg->cm_tail = pm;
1066 		cmg->cm_cnt--;
1067 		cm->next = NULL;
1068 	} else {
1069 		syslog(LOG_INFO, gettext(
1070 		    "libsldap: del_cm4cmg(): MT connection not found"));
1071 	}
1072 }
1073 
1074 /*
1075  * compare to see if the server and credential for authentication match
1076  * those used by an MT connection
1077  */
1078 static boolean_t
1079 is_server_cred_matched(const char *server, const ns_cred_t *cred,
1080 	ns_conn_mt_t *cm)
1081 {
1082 	Connection	*cp = cm->conn;
1083 
1084 	/* check server first */
1085 	if (server != NULL && *server != 0) {
1086 		if (strcasecmp(server, cp->serverAddr) != 0)
1087 			return (B_FALSE);
1088 	}
1089 
1090 	if (cred == NULL)
1091 		return (B_TRUE);
1092 
1093 	/* then check cred */
1094 	return (__s_api_is_auth_matched(cp->auth, cred));
1095 }
1096 
1097 /*
1098  * Wait until a pending MT connection becomes available.
1099  * Return 1 if so, 0 if error.
1100  *
1101  * Assume the current conn_mgmt and the input conn_mt
1102  * are locked.
1103  */
1104 static int
1105 wait_for_conn_mt(ns_conn_user_t *cu, ns_conn_mt_t *cm)
1106 {
1107 
1108 	cu->state = NS_CONN_USER_WAITING;
1109 	add_cu2cm(cu, cm);
1110 	cu->conn_mt = cm;
1111 
1112 	(void) mutex_unlock(&cm->lock);
1113 	/*
1114 	 * It could take some time so we don't want to hold
1115 	 * cm->conn_mgmt across the wait
1116 	 */
1117 	(void) mutex_unlock(&(cm->conn_mgmt)->lock);
1118 
1119 	(void) mutex_lock(&cm->lock);
1120 	/* check one more time see if need to wait */
1121 	if (cm->state == NS_CONN_MT_CONNECTING) {
1122 		(void) conn_wait(cm, cu);
1123 
1124 		/* cm->lock is locked again at this point */
1125 
1126 		cu->state = NS_CONN_USER_WOKEUP;
1127 	}
1128 
1129 	if (cm->state == NS_CONN_MT_CONNECTED)
1130 		return (1);
1131 	else {
1132 		del_cu4cm(cu, cm);
1133 		cu->conn_mt = NULL;
1134 		cu->bad_mt_conn = B_FALSE;
1135 		return (0);
1136 	}
1137 }
1138 
1139 /*
1140  * Check and see if the input MT connection '*cm' should be closed.
1141  * In two cases, it should be closed. If a preferred server is
1142  * found to be up when ldap_cachemgr is queried and reported back.
1143  * Or when the server being used for the connection is found to
1144  * be down. Return B_FALSE if the connection is not closed (or not marked
1145  * to be closed), otherwise unlock mutex (*cm)->lock and return B_TRUE.
1146  * This function assumes conn_mgmt cmg and conn_mt *cm are locked.
1147  */
1148 static boolean_t
1149 check_and_close_conn(ns_conn_mgmt_t *cmg, ns_conn_mt_t **cm,
1150 	ns_conn_user_t *cu) {
1151 
1152 	int rc;
1153 	int j;
1154 	int svridx = -1;
1155 	int upidx = -1;
1156 	int free_cm;
1157 	ns_server_info_t sinfo;
1158 	ns_ldap_error_t *errorp = NULL;
1159 
1160 	/*
1161 	 * check only if preferred servers are defined
1162 	 */
1163 	if (cmg->pservers_loaded == B_FALSE)
1164 		get_preferred_servers(B_FALSE, B_FALSE, cmg);
1165 	if (cmg->pservers == NULL)
1166 		return (B_FALSE);
1167 
1168 	/*
1169 	 * ask ldap_cachemgr for the first available server
1170 	 */
1171 	rc = __s_api_requestServer(NS_CACHE_NEW, NULL,
1172 	    &sinfo, &errorp, NS_CACHE_ADDR_IP);
1173 	if (rc != NS_LDAP_SUCCESS || sinfo.server == NULL) {
1174 		(void) __ns_ldap_freeError(&errorp);
1175 		return (B_FALSE);
1176 	}
1177 
1178 	/*
1179 	 * Did ldap_cachemgr return a preferred server ?
1180 	 */
1181 	for (j = 0; cmg->pservers[j] != NULL; j++) {
1182 		if (strcasecmp(sinfo.server, cmg->pservers[j]) != 0)
1183 			continue;
1184 		upidx = j;
1185 		break;
1186 	}
1187 
1188 	/*
1189 	 * Is the server being used a preferred one ?
1190 	 */
1191 	for (j = 0; cmg->pservers[j] != NULL; j++) {
1192 		if (strcasecmp(cmg->pservers[j], (*cm)->conn->serverAddr) != 0)
1193 			continue;
1194 		svridx = j;
1195 		break;
1196 	}
1197 
1198 	/*
1199 	 * Need to fall back to a down-but-now-up preferred server ?
1200 	 * A preferred server falls back to a more preferred one.
1201 	 * A regular one falls back to any preferred ones. So if
1202 	 * both are preferred ones and same index, or both
1203 	 * are not preferred ones, then no need to close the
1204 	 * connection.
1205 	 */
1206 	if ((upidx == -1 && svridx == -1) ||
1207 	    (upidx != -1 && svridx != -1 && upidx == svridx)) {
1208 		__s_api_free_server_info(&sinfo);
1209 		return (B_FALSE);
1210 	}
1211 
1212 	/*
1213 	 * otherwise, 4 cases, all may need to close the connection:
1214 	 * For case 1 and 2, both servers are preferred ones:
1215 	 * 1. ldap_cachemgr returned a better one to use (upidx < svridx)
1216 	 * 2. the server being used is down (upidx > svridx)
1217 	 * 3. ldap_cachemgr returned a preferred one, but the server
1218 	 *    being used is not, so need to fall back to the preferred server
1219 	 * 4. ldap_cachemgr returned a non-preferred one, but the server
1220 	 *    being used is a preferred one, so it must be down (since
1221 	 *    ldap_cachemgr always returns a preferred one when possible).
1222 	 * For case 1 & 3, close the READ connection when no user uses it.
1223 	 * For 2 and 4, close the connection with error rc, LDAP_SERVER_DOWN.
1224 	 */
1225 	if (upidx != -1 && (svridx == -1 || upidx < svridx)) { /* case 1 & 3 */
1226 		/* fallback does not make sense for WRITE/referred connection */
1227 		if ((*cm)->opened_for == NS_CONN_USER_WRITE ||
1228 		    (*cm)->referral == B_TRUE) {
1229 			__s_api_free_server_info(&sinfo);
1230 			return (B_FALSE);
1231 		}
1232 		free_cm = close_conn_mt_when_nouser(*cm);
1233 		if (cmg->shutting_down == B_FALSE)
1234 			cu->retry = B_TRUE;
1235 	} else {
1236 		ns_ldap_error_t *ep;
1237 		ep = __s_api_make_error(LDAP_SERVER_DOWN,
1238 		    NS_CONN_MSG_DOWN_FROM_CACHEMGR);
1239 		/* cu has not been attached to cm yet, use NULL as cu pointer */
1240 		free_cm = close_conn_mt(*cm, LDAP_SERVER_DOWN, &ep, NULL);
1241 		if (cmg->shutting_down == B_FALSE)
1242 			cu->retry = B_TRUE;
1243 		(void) __ns_ldap_freeError(&ep);
1244 	}
1245 
1246 	(void) mutex_unlock(&(*cm)->lock);
1247 	if (free_cm == 1) {
1248 		(void) free_conn_mt(*cm, 0);
1249 		*cm = NULL;
1250 	}
1251 
1252 	__s_api_free_server_info(&sinfo);
1253 
1254 	return (B_TRUE);
1255 }
1256 
1257 /*
1258  * Check to see if a conn_mt matches the connection criteria from
1259  * a conn_user. Return B_TRUE if yes, B_FALSE, otherwise. The input
1260  * conn_mt pointer (*cmt) may be freed and *cmt will be set to NULL
1261  * to indicate so.
1262  * conn_mt *cmt and conn_mgmt cm->conn_mgmt are assumed locked.
1263  * cm->lock is unlocked at exit if rc is B_FALSE.
1264  */
1265 static boolean_t
1266 match_conn_mt(ns_conn_user_t *cu, ns_conn_mt_t **cmt,
1267 	ns_conn_mt_state_t st, const char *server,
1268 	const ns_cred_t *cred)
1269 {
1270 	boolean_t	matched = B_FALSE;
1271 	boolean_t	drop_conn;
1272 	int		free_cm = 0;
1273 	ns_conn_mt_t	*cm = *cmt;
1274 	ns_conn_mgmt_t	*cmg = cm->conn_mgmt;
1275 
1276 	if (cm->state != st || cm->close_when_nouser  == B_TRUE ||
1277 	    cm->detached == B_TRUE || cm->pid != getpid() ||
1278 	    cm->referral != cu->referral) {
1279 		(void) mutex_unlock(&cm->lock);
1280 		return (B_FALSE);
1281 	}
1282 
1283 	/*
1284 	 * if a conn_mt opened for WRITE is idle
1285 	 * long enough, then close it. To improve
1286 	 * the performance of applications, such
1287 	 * as ldapaddent, a WRITE connection is
1288 	 * given a short time to live in the
1289 	 * connection pool, expecting the write
1290 	 * requests to come in a quick succession.
1291 	 * To save resource, the connection will
1292 	 * be closed if idle more than 60 seconds.
1293 	 */
1294 	if (cm->opened_for == NS_CONN_USER_WRITE &&
1295 	    cu->type != NS_CONN_USER_WRITE && cm->cu_cnt == 0 &&
1296 	    ((time(NULL) - cm->access_time) > 60)) {
1297 		/*
1298 		 * NS_LDAP_INTERNAL is irrelevant here. There no
1299 		 * conn_user to consume the rc
1300 		 */
1301 		free_cm = close_conn_mt(cm, NS_LDAP_INTERNAL, NULL, NULL);
1302 		(void) mutex_unlock(&cm->lock);
1303 		if (free_cm == 1) {
1304 			(void) free_conn_mt(cm, 0);
1305 			*cmt = NULL;
1306 		}
1307 		return (B_FALSE);
1308 	}
1309 
1310 	switch (cu->type) {
1311 	case NS_CONN_USER_SEARCH:
1312 	case NS_CONN_USER_GETENT:
1313 		if (cm->opened_for == NS_CONN_USER_SEARCH ||
1314 		    cm->opened_for == NS_CONN_USER_GETENT)
1315 			matched = B_TRUE;
1316 		break;
1317 
1318 	case NS_CONN_USER_WRITE:
1319 		if (cm->opened_for == NS_CONN_USER_WRITE)
1320 			matched = B_TRUE;
1321 		break;
1322 
1323 	default:
1324 		matched = B_FALSE;
1325 		break;
1326 	}
1327 
1328 	if (matched == B_TRUE && ((server != NULL || cred != NULL) &&
1329 	    is_server_cred_matched(server, cred, cm) == B_FALSE))
1330 		matched = B_FALSE;
1331 
1332 	if (matched != B_FALSE) {
1333 		/*
1334 		 * Check and drop the 'connected' connection if
1335 		 * necessary. Main nscd gets status changes from
1336 		 * the ldap_cachemgr daemon directly via the
1337 		 * GETSTATUSCHANGE door call, the standalone
1338 		 * function works in a no ldap_cachemgr environment,
1339 		 * so no need to check and drop connections.
1340 		 */
1341 		if (cm->state == NS_CONN_MT_CONNECTED &&
1342 		    cmg->is_nscd == B_FALSE && !__s_api_isStandalone()) {
1343 			drop_conn = check_and_close_conn(cmg, &cm, cu);
1344 			if (drop_conn == B_TRUE) {
1345 				if (cm == NULL)
1346 					*cmt = NULL;
1347 				return (B_FALSE);
1348 			}
1349 		}
1350 
1351 		/* check if max. users using or waiting for the connection */
1352 		if ((cm->state == NS_CONN_MT_CONNECTED &&
1353 		    cm->cu_max != NS_CONN_MT_USER_NO_MAX &&
1354 		    cm->cu_cnt >= cm->cu_max) ||
1355 		    (cm->state == NS_CONN_MT_CONNECTING &&
1356 		    cm->cu_max != NS_CONN_MT_USER_NO_MAX &&
1357 		    cm->waiter_cnt >= cm->cu_max - 1))
1358 			matched = B_FALSE;
1359 	}
1360 
1361 	if (matched == B_FALSE)
1362 		(void) mutex_unlock(&cm->lock);
1363 
1364 	return (matched);
1365 }
1366 
1367 /*
1368  * obtain an MT connection from the connection management for a conn_user
1369  *
1370  * Input:
1371  *   server	: server name or IP address
1372  *   flags	: libsldap API flags
1373  *   cred	: pointer to the user credential
1374  *   cu		: pointer to the conn_user structure
1375  * Output:
1376  *   session	: hold pointer to the Connection structure
1377  *   errorp	: hold pointer to error info (ns_ldap_error_t)
1378  */
1379 int
1380 __s_api_conn_mt_get(const char *server, const int flags, const ns_cred_t *cred,
1381 	Connection **session, ns_ldap_error_t **errorp, ns_conn_user_t *cu)
1382 {
1383 	int		rc;
1384 	int		i;
1385 	ns_conn_mt_t	*cn;
1386 	ns_conn_mt_state_t st;
1387 	ns_conn_mgmt_t	*cmg;
1388 
1389 	if (errorp == NULL || cu == NULL || session == NULL)
1390 		return (NS_LDAP_INVALID_PARAM);
1391 
1392 	*session = NULL;
1393 	cmg = cu->conn_mgmt;
1394 
1395 	/*
1396 	 * for pam_ldap, always try opening a new connection
1397 	 */
1398 	if (cu->type == NS_CONN_USER_AUTH)
1399 		return (NS_LDAP_NOTFOUND);
1400 
1401 	/* if need a new conn, then don't reuse */
1402 	if (flags & NS_LDAP_NEW_CONN)
1403 		return (NS_LDAP_NOTFOUND);
1404 
1405 	if (flags & NS_LDAP_KEEP_CONN)
1406 		cu->keep_conn = B_TRUE;
1407 
1408 	/*
1409 	 * We want to use MT connection only if keep-connection flag is
1410 	 * set or if MT was requested (or active)
1411 	 */
1412 	if (!((cmg->state == NS_CONN_MGMT_INACTIVE &&
1413 	    cu->keep_conn == B_TRUE) || cmg->state == NS_CONN_MGMT_ACTIVE))
1414 		return (NS_LDAP_NOTFOUND);
1415 
1416 	/* MT connection will be used now (if possible/available) */
1417 	cu->use_mt_conn = B_TRUE;
1418 
1419 	NS_CONN_CHECK_ABORT_AND_LOCK(cmg, cu, errorp);
1420 
1421 	/* first look for a connection already open */
1422 	st = NS_CONN_MT_CONNECTED;
1423 	cu->state = NS_CONN_USER_FINDING;
1424 	for (i = 0; i < 2; i++) {
1425 		for (cn = cmg->cm_head; cn; cn = cn->next) {
1426 			(void) mutex_lock(&cn->lock);
1427 			rc = match_conn_mt(cu, &cn, st, server, cred);
1428 			if (rc == B_FALSE && cn != NULL) /* not found */
1429 				continue;
1430 			if (cn == NULL) { /* not found and cn freed */
1431 				/*
1432 				 * as the conn_mt list could
1433 				 * be different due to cn's
1434 				 * deletion, scan the entire
1435 				 * conn_mt list again
1436 				 */
1437 				st = NS_CONN_MT_CONNECTED;
1438 				i = -1;
1439 				break;
1440 			}
1441 
1442 			/* return a connected one if found */
1443 			if (cn->state == NS_CONN_MT_CONNECTED) {
1444 				*session = cn->conn;
1445 				add_cu2cm(cu, cn);
1446 				cu->conn_mt = cn;
1447 				cu->state = NS_CONN_USER_CONNECTED;
1448 				(void) mutex_unlock(&cn->lock);
1449 				(void) mutex_unlock(&cmg->lock);
1450 				return (NS_LDAP_SUCCESS);
1451 			}
1452 
1453 			/*
1454 			 * if cn is not connecting, or allow only
1455 			 * one user, skip it
1456 			 */
1457 			if (cn->state != NS_CONN_MT_CONNECTING ||
1458 			    cn->cu_max == 1) {
1459 				(void) mutex_unlock(&cn->lock);
1460 				continue;
1461 			}
1462 
1463 			/* wait for the connecting conn_mt */
1464 			if (wait_for_conn_mt(cu, cn) != 1) {
1465 				/*
1466 				 * NS_LDAP_NOTFOUND signals that the function
1467 				 * __s_api_check_libldap_MT_conn_support()
1468 				 * detected that the lower libldap library
1469 				 * does not support MT connection, so return
1470 				 * NS_LDAP_NOTFOUND to let the caller to
1471 				 * open a non-MT conneciton. Otherwise,
1472 				 * connect error occurred, return
1473 				 * NS_CONN_USER_CONNECT_ERROR
1474 				 */
1475 				if (cn->ns_rc != NS_LDAP_NOTFOUND)
1476 					cu->state = NS_CONN_USER_CONNECT_ERROR;
1477 				else {
1478 					cu->state = NS_CONN_USER_FINDING;
1479 					cu->use_mt_conn = B_FALSE;
1480 				}
1481 				(void) mutex_unlock(&cn->lock);
1482 
1483 				/* cmg->lock unlocked by wait_for_conn_mt() */
1484 
1485 				return (cn->ns_rc);
1486 			}
1487 
1488 			/* return the newly available conn_mt */
1489 			*session = cn->conn;
1490 			cu->state = NS_CONN_USER_CONNECTED;
1491 			(void) mutex_unlock(&cn->lock);
1492 
1493 			/* cmg->lock unlocked by wait_for_conn_mt() */
1494 
1495 			return (NS_LDAP_SUCCESS);
1496 		}
1497 
1498 		/* next, look for a connecting conn_mt */
1499 		if (i == 0)
1500 			st = NS_CONN_MT_CONNECTING;
1501 	}
1502 
1503 	/* no connection found, start opening one */
1504 	cn = init_conn_mt(cmg, errorp);
1505 	if (cn == NULL) {
1506 		(void) mutex_unlock(&cmg->lock);
1507 		return ((*errorp)->status);
1508 	}
1509 	cu->conn_mt = cn;
1510 	cn->opened_for = cu->type;
1511 	cn->referral = cu->referral;
1512 	if (cmg->ldap_mt == B_TRUE)
1513 		cn->cu_max = NS_CONN_MT_USER_MAX;
1514 	else
1515 		cn->cu_max = 1;
1516 	add_cm2cmg(cn, cmg);
1517 	(void) mutex_unlock(&cmg->lock);
1518 
1519 	return (NS_LDAP_NOTFOUND);
1520 }
1521 
1522 
1523 /*
1524  * add an MT connection to the connection management
1525  *
1526  * Input:
1527  *   con	: pointer to the Connection info
1528  *   cu		: pointer to the conn_user structure
1529  * Output:
1530  *   ep		: hold pointer to error info (ns_ldap_error_t)
1531  */
1532 int
1533 __s_api_conn_mt_add(Connection *con, ns_conn_user_t *cu, ns_ldap_error_t **ep)
1534 {
1535 	ns_conn_mgmt_t	*cmg = cu->conn_mgmt;
1536 	ns_conn_mt_t	*cm = cu->conn_mt;
1537 
1538 	/* if the conn_mgmt is being shut down, return error */
1539 	NS_CONN_CHECK_ABORT_AND_LOCK(cmg, cu, ep);
1540 
1541 	/*
1542 	 * start the change monitor thread only if it
1543 	 * hasn't been started and the process is the
1544 	 * main nscd (not peruser nscd)
1545 	 */
1546 	if (cmg->procchg_started == B_FALSE && cmg->is_nscd == B_TRUE) {
1547 		start_thread(cmg);
1548 		cmg->procchg_started = B_TRUE;
1549 	}
1550 	(void) mutex_lock(&cm->lock);
1551 	cm->conn = con;
1552 	cm->state = NS_CONN_MT_CONNECTED;
1553 	cm->pid = getpid();
1554 	cm->create_time = time(NULL);
1555 	cm->access_time = cm->create_time;
1556 	cm->opened_for = cu->type;
1557 	add_cu2cm(cu, cm);
1558 	cu->conn_mt = cm;
1559 	cu->state = NS_CONN_USER_CONNECTED;
1560 	if (cmg->ldap_mt == B_TRUE)
1561 		cm->cu_max = NS_CONN_MT_USER_MAX;
1562 	else
1563 		cm->cu_max = 1;
1564 
1565 	/* wake up the waiters if any */
1566 	(void) conn_signal(cm);
1567 
1568 	(void) mutex_unlock(&cm->lock);
1569 	(void) mutex_unlock(&cmg->lock);
1570 
1571 	return (NS_LDAP_SUCCESS);
1572 }
1573 
1574 /*
1575  * return an MT connection to the pool when a conn user is done using it
1576  *
1577  * Input:
1578  *   cu		: pointer to the conn_user structure
1579  * Output:	NONE
1580  */
1581 void
1582 __s_api_conn_mt_return(ns_conn_user_t *cu)
1583 {
1584 	ns_conn_mt_t	*cm;
1585 	ns_conn_mgmt_t	*cmg;
1586 
1587 	if (cu == NULL || cu->use_mt_conn == B_FALSE)
1588 		return;
1589 	cm = cu->conn_mt;
1590 	if (cm == NULL)
1591 		return;
1592 	cmg = cu->conn_mgmt;
1593 
1594 	(void) mutex_lock(&cm->lock);
1595 	del_cu4cm(cu, cm);
1596 	cu->state = NS_CONN_USER_DISCONNECTED;
1597 	cu->conn_mt = NULL;
1598 	cu->bad_mt_conn = B_FALSE;
1599 
1600 	/*
1601 	 *  if this MT connection is no longer needed, or not usable, and
1602 	 * no more conn_user uses it, then close it.
1603 	 */
1604 
1605 	if ((cm->close_when_nouser == B_TRUE ||
1606 	    cm->state != NS_CONN_MT_CONNECTED) && cm->cu_cnt == 0) {
1607 		(void) mutex_unlock(&cm->lock);
1608 		(void) mutex_lock(&cmg->lock);
1609 		(void) mutex_lock(&cm->lock);
1610 		del_cm4cmg(cm, cmg);
1611 		/* use ns_conn_free (instead of 1) to avoid lint warning */
1612 		NS_CONN_UNLOCK_AND_FREE(ns_conn_free, cm, cmg);
1613 	} else {
1614 		if (cm->state == NS_CONN_MT_CONNECTED && cm->cu_cnt == 0 &&
1615 		    cm->conn != NULL && cm->conn->ld != NULL) {
1616 			struct timeval	zerotime;
1617 			LDAPMessage	*res;
1618 
1619 			zerotime.tv_sec = zerotime.tv_usec = 0L;
1620 			/* clean up remaining results just in case */
1621 			while (ldap_result(cm->conn->ld, LDAP_RES_ANY,
1622 			    LDAP_MSG_ALL, &zerotime, &res) > 0) {
1623 				if (res != NULL)
1624 					(void) ldap_msgfree(res);
1625 			}
1626 		}
1627 		(void) mutex_unlock(&cm->lock);
1628 	}
1629 }
1630 
1631 /* save error info (rc and ns_ldap_error_t) in the conn_mt */
1632 static void
1633 err2cm(ns_conn_mt_t *cm, int rc, ns_ldap_error_t **errorp) {
1634 	ns_ldap_error_t	*ep;
1635 
1636 	cm->ns_rc = rc;
1637 	cm->ns_error = NULL;
1638 	if (errorp != NULL && *errorp != NULL) {
1639 		ep = __s_api_copy_error(*errorp);
1640 		if (ep == NULL)
1641 			cm->ns_rc = NS_LDAP_MEMORY;
1642 		else
1643 			cm->ns_error = ep;
1644 	}
1645 }
1646 
1647 /* copy error info (rc and ns_ldap_error_t) from conn_mt to conn_user */
1648 static void
1649 err_from_cm(ns_conn_user_t *cu, ns_conn_mt_t *cm) {
1650 	ns_ldap_error_t	*ep;
1651 
1652 	cu->ns_rc = cm->ns_rc;
1653 	if (cu->ns_error != NULL)
1654 		(void) __ns_ldap_freeError(&cu->ns_error);
1655 	cu->ns_error = NULL;
1656 	if (cm->ns_rc != NS_LDAP_SUCCESS && cm->ns_error != NULL) {
1657 		ep = __s_api_copy_error(cm->ns_error);
1658 		if (ep == NULL)
1659 			cu->ns_rc = NS_LDAP_MEMORY;
1660 		else
1661 			cu->ns_error = ep;
1662 	}
1663 }
1664 
1665 /* copy error info (rc and ns_ldap_error_t) from caller to conn_user */
1666 static void
1667 err_from_caller(ns_conn_user_t *cu, int rc, ns_ldap_error_t **errorp) {
1668 
1669 	cu->ns_rc = rc;
1670 	if (errorp != NULL) {
1671 		if (cu->ns_error != NULL)
1672 			(void) __ns_ldap_freeError(&cu->ns_error);
1673 		cu->ns_error = *errorp;
1674 		*errorp = NULL;
1675 	} else
1676 		cu->ns_error = NULL;
1677 }
1678 
1679 /*
1680  * remove an MT connection from the connection management when failed to open
1681  *
1682  * Input:
1683  *   cu		: pointer to the conn_user structure
1684  *   rc		: error code
1685  *   errorp	: pointer to pointer to error info (ns_ldap_error_t)
1686  * Output:
1687  *   errorp	: set to NULL, if none NULL cm, callers do not need to free it
1688  */
1689 void
1690 __s_api_conn_mt_remove(ns_conn_user_t *cu, int rc, ns_ldap_error_t **errorp)
1691 {
1692 	ns_conn_mgmt_t	*cmg;
1693 	ns_conn_mt_t	*cm;
1694 	int		free_cm = 0;
1695 
1696 	if (cu == NULL || cu->use_mt_conn == B_FALSE)
1697 		return;
1698 	if ((cm = cu->conn_mt) == NULL)
1699 		return;
1700 	cmg = cu->conn_mgmt;
1701 
1702 	(void) mutex_lock(&cmg->lock);
1703 	(void) mutex_lock(&cm->lock);
1704 	if (cm->state != NS_CONN_MT_CONNECT_ERROR) {
1705 		cm->state = NS_CONN_MT_CONNECT_ERROR;
1706 		cm->ns_rc = rc;
1707 		if (errorp != NULL) {
1708 			cm->ns_error = *errorp;
1709 			*errorp = NULL;
1710 		}
1711 	}
1712 
1713 	/* all the conn_users share the same error rc and ns_ldap_error_t */
1714 	err_from_cm(cu, cm);
1715 	/* wake up the waiters if any */
1716 	(void) conn_signal(cm);
1717 
1718 	del_cu4cm(cu, cm);
1719 	cu->conn_mt = NULL;
1720 	cu->bad_mt_conn = B_FALSE;
1721 	if (cm->cu_cnt == 0) {
1722 		del_cm4cmg(cm, cmg);
1723 		free_cm = 1;
1724 	}
1725 
1726 	NS_CONN_UNLOCK_AND_FREE(free_cm, cm, cmg);
1727 }
1728 
1729 /*
1730  * check to see if the underlying libldap supports multi-threaded client
1731  * (MT connections)
1732  */
1733 int
1734 __s_api_check_libldap_MT_conn_support(ns_conn_user_t *cu, LDAP *ld,
1735 	ns_ldap_error_t **ep)
1736 {
1737 	int		rc;
1738 	ns_conn_mgmt_t	*cmg;
1739 
1740 	/* if no need to check, just return success */
1741 	if (cu->conn_mt == NULL || cu->use_mt_conn == B_FALSE)
1742 		return (NS_LDAP_SUCCESS);
1743 
1744 	cmg = cu->conn_mgmt;
1745 	rc = setup_mt_ld(ld, cmg);
1746 
1747 	if (cmg->do_mt_conn == B_FALSE) {
1748 		/*
1749 		 * If the conn_mgmt is being shut down, return error.
1750 		 * if cmg is usable, cmg->lock will be locked. Otherwise,
1751 		 * this function will return with rc NS_LDAP_OP_FAILED.
1752 		 */
1753 		NS_CONN_CHECK_ABORT_AND_LOCK(cmg, cu, ep);
1754 		if (cmg->do_mt_conn == B_FALSE) {
1755 			if (rc < 0)
1756 				cmg->ldap_mt = B_FALSE;
1757 			else {
1758 				cmg->ldap_mt = B_TRUE;
1759 				if (cmg->is_nscd  == B_TRUE ||
1760 				    cmg->is_peruser_nscd == B_TRUE) {
1761 					cmg->do_mt_conn = B_TRUE;
1762 					cmg->state = NS_CONN_MGMT_ACTIVE;
1763 				}
1764 			}
1765 		}
1766 		(void) mutex_unlock(&cmg->lock);
1767 	}
1768 
1769 	if (rc < 0)
1770 		__s_api_conn_mt_remove(cu, NS_LDAP_NOTFOUND, NULL);
1771 	return (NS_LDAP_SUCCESS);
1772 }
1773 
1774 /*
1775  * Close an MT connection.
1776  * Assume cm not null and locked, assume conn_mgmt is also locked.
1777  * Return -1 if error, 1 if the cm should be freed, otherwise 0.
1778  */
1779 static int
1780 close_conn_mt(ns_conn_mt_t *cm, int rc, ns_ldap_error_t **errorp,
1781 	ns_conn_user_t *cu)
1782 {
1783 	ns_conn_mgmt_t	*cmg = cm->conn_mgmt;
1784 	ns_conn_mt_t	*m;
1785 	ns_conn_user_t	*u;
1786 
1787 	if ((cm->state != NS_CONN_MT_CONNECTED && cm->state !=
1788 	    NS_CONN_MT_CLOSING) || cmg->cm_head == NULL || cmg->cm_cnt == 0)
1789 		return (-1);
1790 
1791 	/* if the conn_mt is not in the MT connection pool, nothing to do */
1792 	for (m = cmg->cm_head; m; m = m->next) {
1793 		if (cm == m)
1794 			break;
1795 	}
1796 	if (m == NULL)
1797 		return (-1);
1798 
1799 	if (cm->state == NS_CONN_MT_CONNECTED) { /* first time in here */
1800 		cm->state = NS_CONN_MT_CLOSING;
1801 		/*
1802 		 * If more cu exist to consume the error info, copy
1803 		 * it to the cm. If the caller calls on behalf of
1804 		 * a cu, cu won't be NULL. Check to see if there's
1805 		 * more cu that needs the error info. If caller does
1806 		 * not have a specific cu attached to it (e.g.,
1807 		 * shutdown_all_conn_mt()), cu is NULL, check if at
1808 		 * least one cu exists.
1809 		 */
1810 		if ((cu != NULL && cm->cu_cnt > 1) ||
1811 		    (cu == NULL && cm->cu_cnt > 0)) {
1812 			err2cm(cm, rc, errorp);
1813 			/* wake up waiter (conn_user) if any */
1814 			(void) conn_signal(cm);
1815 		}
1816 
1817 		/* for each conn_user using the conn_mt, set bad_mt_conn flag */
1818 		if (cm->cu_head != NULL) {
1819 			for (u = cm->cu_head; u; u = u->next) {
1820 				u->bad_mt_conn = B_TRUE;
1821 				if (cmg->shutting_down == B_FALSE)
1822 					u->retry = B_TRUE;
1823 			}
1824 		}
1825 	}
1826 
1827 	/* detach the conn_mt if no more conn_user left */
1828 	if ((cu != NULL && cm->cu_cnt == 1) ||
1829 	    (cu == NULL && cm->cu_cnt ==  0)) {
1830 		del_cm4cmg(cm, cmg);
1831 		cm->detached = B_TRUE;
1832 		return (1);
1833 	}
1834 
1835 	return (0);
1836 }
1837 
1838 /*
1839  * An MT connection becomes bad, close it and free resources.
1840  * This function is called with a ns_conn_user_t representing
1841  * a user of the MT connection.
1842  *
1843  * Input:
1844  *   cu		: pointer to the conn_user structure
1845  *   rc		: error code
1846  *   errorp	: pointer to pointer to error info (ns_ldap_error_t)
1847  * Output:
1848  *   errorp	: set to NULL (if no error), callers do not need to free it
1849  */
1850 void
1851 __s_api_conn_mt_close(ns_conn_user_t *cu, int rc, ns_ldap_error_t **errorp)
1852 {
1853 	ns_conn_mgmt_t	*cmg;
1854 	ns_conn_mt_t	*cm;
1855 	int		free_cm = 0;
1856 
1857 	if (cu == NULL || cu->use_mt_conn == B_FALSE)
1858 		return;
1859 
1860 	if (cu->state != NS_CONN_USER_CONNECTED || (cm = cu->conn_mt) == NULL)
1861 		return;
1862 	cmg = cu->conn_mgmt;
1863 
1864 	(void) mutex_lock(&cmg->lock);
1865 	(void) mutex_lock(&cm->lock);
1866 
1867 	/* close the MT connection if possible */
1868 	free_cm = close_conn_mt(cm, rc, errorp, cu);
1869 	if (free_cm == -1) { /* error case */
1870 		(void) mutex_unlock(&cm->lock);
1871 		(void) mutex_unlock(&cmg->lock);
1872 		return;
1873 	}
1874 
1875 	if (rc != NS_LDAP_SUCCESS) { /* error info passed in, use it */
1876 		err_from_caller(cu, rc, errorp);
1877 	} else { /* error not passed in, use those saved in the conn_mt */
1878 		err_from_cm(cu, cm);
1879 	}
1880 
1881 	/* detach the conn_user from the conn_mt */
1882 	del_cu4cm(cu, cm);
1883 	cu->conn_mt = NULL;
1884 	cu->bad_mt_conn = B_FALSE;
1885 	if (cmg->shutting_down == B_FALSE)
1886 		cu->retry = B_TRUE;
1887 	NS_CONN_UNLOCK_AND_FREE(free_cm, cm, cmg);
1888 }
1889 
1890 /*
1891  * Close an MT connection when the associated server is known to be
1892  * down. This function is called with a ns_conn_mt_t representing
1893  * the MT connection. That is, the caller is not a conn_user
1894  * thread but rather the procchg thread.
1895  */
1896 static void
1897 close_conn_mt_by_procchg(ns_conn_mt_t *cm, int rc, char *errmsg)
1898 {
1899 	ns_conn_mgmt_t	*cmg;
1900 	int		free_cm = 0;
1901 	ns_ldap_error_t	*ep;
1902 
1903 	if (cm == NULL)
1904 		return;
1905 	cmg = cm->conn_mgmt;
1906 
1907 	ep = (ns_ldap_error_t *)calloc(1, sizeof (*ep));
1908 	if (ep != NULL) {
1909 		ep->status = rc;
1910 		if (errmsg != NULL)
1911 			ep->message =  strdup(errmsg); /* OK if returns NULL */
1912 	}
1913 
1914 	(void) mutex_lock(&cmg->lock);
1915 	(void) mutex_lock(&cm->lock);
1916 
1917 	/* close the MT connection if possible */
1918 	free_cm = close_conn_mt(cm, LDAP_SERVER_DOWN, &ep, NULL);
1919 	if (free_cm == -1) { /* error case */
1920 		(void) mutex_unlock(&cm->lock);
1921 		(void) mutex_unlock(&cmg->lock);
1922 		return;
1923 	}
1924 	(void) __ns_ldap_freeError(&ep);
1925 
1926 	NS_CONN_UNLOCK_AND_FREE(free_cm, cm, cmg);
1927 }
1928 
1929 /*
1930  * Close an MT connection when there is a better server to connect to.
1931  * Mark the connection as to-be-closed-when-no-one-using so that
1932  * any outstanding ldap operations can run to completion.
1933  * Assume that both the conn_mt and conn_mgmt are locked.
1934  * Return 1 if the conn_mt should be freed.
1935  */
1936 static int
1937 close_conn_mt_when_nouser(ns_conn_mt_t *cm)
1938 {
1939 	int		free_cm = 0;
1940 
1941 	if (cm->cu_cnt == 0) {
1942 		del_cm4cmg(cm, cm->conn_mgmt);
1943 		free_cm = 1;
1944 	} else {
1945 		cm->close_when_nouser = B_TRUE;
1946 	}
1947 
1948 	return (free_cm);
1949 }
1950 
1951 /*
1952  * Retrieve the configured preferred server list.
1953  * This function locked the conn_mgmt and does not
1954  * unlock at exit.
1955  */
1956 static void
1957 get_preferred_servers(boolean_t lock, boolean_t reload, ns_conn_mgmt_t *cmg)
1958 {
1959 	ns_ldap_error_t *errorp = NULL;
1960 	void		**pservers = NULL;
1961 
1962 	if (lock == B_TRUE)
1963 		(void) mutex_lock(&cmg->lock);
1964 
1965 	/* if already done, and no reload, then return */
1966 	if (cmg->pservers_loaded == B_TRUE && reload == B_FALSE)
1967 		return;
1968 
1969 	if (cmg->pservers != NULL) {
1970 		(void) __ns_ldap_freeParam((void ***)&cmg->pservers);
1971 		cmg->pservers = NULL;
1972 	}
1973 
1974 	if (__ns_ldap_getParam(NS_LDAP_SERVER_PREF_P,
1975 	    &pservers, &errorp) == NS_LDAP_SUCCESS) {
1976 		cmg->pservers = (char **)pservers;
1977 		cmg->pservers_loaded = B_TRUE;
1978 	} else {
1979 		(void) __ns_ldap_freeError(&errorp);
1980 		(void) __ns_ldap_freeParam(&pservers);
1981 	}
1982 }
1983 
1984 /*
1985  * This function handles the config or server status change notification
1986  * from the ldap_cachemgr.
1987  */
1988 static ns_conn_mgmt_t *
1989 proc_server_change(ns_server_status_change_t *chg, ns_conn_mgmt_t  *cmg)
1990 {
1991 	int		cnt, i, j, k, n;
1992 	boolean_t	loop = B_TRUE;
1993 	boolean_t	cmg_locked = B_FALSE;
1994 	char 		*s;
1995 	ns_conn_mt_t	*cm;
1996 	ns_conn_mgmt_t	*ocmg;
1997 
1998 	/* if config changed, reload the configuration */
1999 	if (chg->config_changed == B_TRUE) {
2000 		/* reload the conn_mgmt and Native LDAP config */
2001 		ocmg = access_conn_mgmt(NS_CONN_MGMT_OP_RELOAD_CONFIG);
2002 		shutdown_all_conn_mt(ocmg);
2003 		/* release the one obtained from access_conn_mgmt(RELOAD) */
2004 		(void) release_conn_mgmt(ocmg, B_FALSE);
2005 		/* release the one obtained when ocmg was created */
2006 		(void) release_conn_mgmt(ocmg, B_FALSE);
2007 		return (ocmg);
2008 	}
2009 
2010 	if ((cnt = chg->num_server) == 0)
2011 		return (cmg);
2012 
2013 	/* handle down servers first */
2014 	for (i = 0; i < cnt; i++) {
2015 
2016 		if (chg->changes[i] != NS_SERVER_DOWN)
2017 			continue;
2018 		s = chg->servers[i];
2019 
2020 		/*
2021 		 * look for a CONNECTED MT connection using
2022 		 * the same server s, and close it
2023 		 */
2024 		while (loop) {
2025 			if (cmg_locked == B_FALSE) {
2026 				(void) mutex_lock(&cmg->lock);
2027 				cmg_locked = B_TRUE;
2028 			}
2029 			for (cm = cmg->cm_head; cm; cm = cm->next) {
2030 				(void) mutex_lock(&cm->lock);
2031 
2032 				if (cm->state == NS_CONN_MT_CONNECTED &&
2033 				    cm->conn != NULL &&
2034 				    strcasecmp(cm->conn->serverAddr, s) == 0) {
2035 					(void) mutex_unlock(&cm->lock);
2036 					break;
2037 				}
2038 
2039 				(void) mutex_unlock(&cm->lock);
2040 			}
2041 			if (cm != NULL) {
2042 				(void) mutex_unlock(&cmg->lock);
2043 				cmg_locked = B_FALSE;
2044 				close_conn_mt_by_procchg(cm, LDAP_SERVER_DOWN,
2045 				    NS_CONN_MSG_DOWN_FROM_CACHEMGR);
2046 				/*
2047 				 * Process the next cm using server s.
2048 				 * Start from the head of the cm linked
2049 				 * list again, as the cm list may change
2050 				 * after close_conn_mt_by_procchg() is done.
2051 				 */
2052 				continue;
2053 			}
2054 
2055 			/*
2056 			 * No (more) MT connection using the down server s.
2057 			 * Process the next server on the list.
2058 			 */
2059 			break;
2060 		} /* while loop */
2061 	}
2062 
2063 	/*
2064 	 * Next handle servers whose status changed to up.
2065 	 * Get the preferred server list first if not done yet.
2066 	 * get_preferred_servers() leaves conn_mgmt locked.
2067 	 */
2068 	get_preferred_servers(cmg_locked == B_FALSE ? B_TRUE : B_FALSE,
2069 	    B_FALSE, cmg);
2070 	cmg_locked = B_TRUE;
2071 	/*
2072 	 * if no preferred server configured, we don't switch MT connection
2073 	 * to a more preferred server (i.e., fallback), so just return
2074 	 */
2075 	if (cmg->pservers == NULL) {
2076 		(void) mutex_unlock(&cmg->lock);
2077 		return (cmg);
2078 	}
2079 
2080 	/* for each server that is up now */
2081 	for (i = 0; i < cnt; i++) {
2082 		if (chg->changes[i] != NS_SERVER_UP)
2083 			continue;
2084 		s = chg->servers[i];
2085 
2086 		/*
2087 		 * look for a CONNECTED MT connection which uses
2088 		 * a server less preferred than s, and treat it
2089 		 * as 'fallback needed' by calling
2090 		 * close_conn_mt_when_nouser()
2091 		 */
2092 		k = -1;
2093 		loop = B_TRUE;
2094 		while (loop) {
2095 			if (cmg_locked == B_FALSE) {
2096 				(void) mutex_lock(&cmg->lock);
2097 				cmg_locked = B_TRUE;
2098 			}
2099 
2100 			/* Is s a preferred server ? */
2101 			if (k == -1) {
2102 				for (j = 0; cmg->pservers[j] != NULL; j++) {
2103 					if (strcasecmp(cmg->pservers[j],
2104 					    s) == 0) {
2105 						k = j;
2106 						break;
2107 					}
2108 				}
2109 			}
2110 			/* skip s if not a preferred server */
2111 			if (k == -1) {
2112 				break;
2113 			}
2114 
2115 			/* check each MT connection */
2116 			for (cm = cmg->cm_head; cm; cm = cm->next) {
2117 				(void) mutex_lock(&cm->lock);
2118 				/*
2119 				 * Find an MT connection that is connected and
2120 				 * not marked, but leave WRITE or REFERRAL
2121 				 * connections alone, since fallback does not
2122 				 * make sense for them.
2123 				 */
2124 				if (cm->state == NS_CONN_MT_CONNECTED &&
2125 				    cm->close_when_nouser == B_FALSE &&
2126 				    cm->conn != NULL && cm->opened_for !=
2127 				    NS_CONN_USER_WRITE &&
2128 				    cm->referral == B_FALSE) {
2129 					n = -1;
2130 					/*
2131 					 * j < k ??? should we close
2132 					 * an active MT that is using s ?
2133 					 * ie could s went down and up
2134 					 * again, but cm is bound prior to
2135 					 * the down ? Play safe here,
2136 					 * and check j <= k.
2137 					 */
2138 					for (j = 0; j <= k; j++) {
2139 						if (strcasecmp(
2140 						    cm->conn->serverAddr,
2141 						    cmg->pservers[j]) == 0) {
2142 							n = j;
2143 							break;
2144 						}
2145 					}
2146 					/*
2147 					 * s is preferred, if its location
2148 					 * in the preferred server list is
2149 					 * ahead of that of the server
2150 					 * used by the cm (i.e., no match
2151 					 * found before s)
2152 					 */
2153 					if (n == -1) { /* s is preferred */
2154 						int fr = 0;
2155 						fr = close_conn_mt_when_nouser(
2156 						    cm);
2157 						NS_CONN_UNLOCK_AND_FREE(fr,
2158 						    cm, cmg);
2159 						cmg_locked = B_FALSE;
2160 						/*
2161 						 * break, not continue,
2162 						 * because we need to
2163 						 * check the entire cm
2164 						 * list again. The call
2165 						 * above may change the
2166 						 * cm list.
2167 						 */
2168 						break;
2169 					}
2170 				}
2171 				(void) mutex_unlock(&cm->lock);
2172 			}
2173 			/* if no (more) cm using s, check next server */
2174 			if (cm == NULL)
2175 				loop = B_FALSE;
2176 		} /* while loop */
2177 	}
2178 	if (cmg_locked == B_TRUE)
2179 		(void) mutex_unlock(&cmg->lock);
2180 	return (cmg);
2181 }
2182 
2183 /* Shut down all MT connection managed by the connection management */
2184 void
2185 shutdown_all_conn_mt(ns_conn_mgmt_t  *cmg)
2186 {
2187 	ns_ldap_error_t	*ep;
2188 	ns_conn_mt_t	*cm;
2189 	int		free_cm = 0;
2190 	boolean_t	done = B_FALSE;
2191 
2192 	ep = (ns_ldap_error_t *)calloc(1, sizeof (*ep));
2193 	if (ep != NULL) { /* if NULL, not a problem */
2194 		/* OK if returns NULL */
2195 		ep->message = strdup(NS_CONN_MSG_SHUTDOWN_RELOADED);
2196 	}
2197 
2198 	(void) mutex_lock(&cmg->lock);
2199 	while (cmg->cm_head != NULL && done == B_FALSE) {
2200 		for (cm = cmg->cm_head; cm; cm = cm->next) {
2201 			(void) mutex_lock(&cm->lock);
2202 			if (cm->next == NULL)
2203 				done = B_TRUE;
2204 			/* shut down each conn_mt, ignore errors */
2205 			free_cm = close_conn_mt(cm, LDAP_OTHER, &ep, NULL);
2206 			(void) mutex_unlock(&cm->lock);
2207 			if (free_cm == 1) {
2208 				(void) free_conn_mt(cm, 0);
2209 				/*
2210 				 * conn_mt may change, so start from
2211 				 * top of list again
2212 				 */
2213 				break;
2214 			}
2215 		}
2216 	}
2217 	(void) mutex_unlock(&cmg->lock);
2218 	(void) __ns_ldap_freeError(&ep);
2219 }
2220 
2221 /* free all the resources used by the connection management */
2222 void
2223 __s_api_shutdown_conn_mgmt()
2224 {
2225 	ns_conn_mgmt_t	*cmg;
2226 
2227 	cmg = access_conn_mgmt(NS_CONN_MGMT_OP_SHUTDOWN);
2228 	if (cmg == NULL) /* already being SHUT done */
2229 		return;
2230 
2231 	(void) shutdown_all_conn_mt(cmg);
2232 	(void) release_conn_mgmt(cmg, B_FALSE);
2233 
2234 	/* then destroy the conn_mgmt */
2235 	(void) release_conn_mgmt(cmg, B_FALSE);
2236 }
2237 
2238 
2239 /*
2240  * Reinitialize the libsldap connection management after
2241  * a new native LDAP configuration is received.
2242  */
2243 void
2244 __s_api_reinit_conn_mgmt_new_config(ns_config_t *new_cfg)
2245 {
2246 	ns_conn_mgmt_t	*cmg;
2247 	ns_conn_mgmt_t	*ocmg;
2248 
2249 	cmg = access_conn_mgmt(NS_CONN_MGMT_OP_REF);
2250 	if (cmg == NULL)
2251 		return;
2252 	if (cmg->config == new_cfg || cmg->state == NS_CONN_MGMT_DETACHED) {
2253 		(void) release_conn_mgmt(cmg, B_FALSE);
2254 		return;
2255 	}
2256 
2257 	/* reload the conn_mgmt and native LDAP config */
2258 	ocmg = access_conn_mgmt(NS_CONN_MGMT_OP_NEW_CONFIG);
2259 	if (ocmg == cmg)
2260 		shutdown_all_conn_mt(ocmg);
2261 	/* release the one obtained from access_conn_mgmt(RELOAD) */
2262 	(void) release_conn_mgmt(ocmg, B_FALSE);
2263 	/* release the one obtained when ocmg was created */
2264 	(void) release_conn_mgmt(ocmg, B_FALSE);
2265 	/* release the one obtained when this function is entered */
2266 	(void) release_conn_mgmt(cmg, B_FALSE);
2267 }
2268 
2269 /*
2270  * Prepare to retry ldap search operation if needed.
2271  * Return 1 if retry is needed, otherwise 0.
2272  * If first time in, return 1. If not, return 1 if:
2273  * - not a NS_CONN_USER_GETENT conn_user AND
2274  * - have not retried 3 times yet AND
2275  * - previous search failed AND
2276  * - the retry flag is set in the ns_conn_user_t or config was reloaded
2277  */
2278 int
2279 __s_api_setup_retry_search(ns_conn_user_t **conn_user,
2280 	ns_conn_user_type_t type, int *try_cnt, int *rc,
2281 	ns_ldap_error_t **errorp)
2282 {
2283 	boolean_t	retry;
2284 	ns_conn_user_t	*cu = *conn_user;
2285 	ns_conn_mgmt_t	*cmg;
2286 
2287 	if (*try_cnt > 0 && cu != NULL) {
2288 		/*
2289 		 * if called from firstEntry(), keep conn_mt for
2290 		 * the subsequent getnext requests
2291 		 */
2292 		if (cu->type == NS_CONN_USER_GETENT && *rc == NS_LDAP_SUCCESS)
2293 			return (0);
2294 		cmg = cu->conn_mgmt;
2295 		retry = cu->retry;
2296 		if (cu->conn_mt != NULL)
2297 			__s_api_conn_mt_return(cu);
2298 		if (cmg != NULL && cmg->cfg_reloaded == B_TRUE)
2299 			retry = B_TRUE;
2300 		__s_api_conn_user_free(cu);
2301 		*conn_user = NULL;
2302 
2303 		if (*rc == NS_LDAP_SUCCESS || retry != B_TRUE)
2304 			return (0);
2305 	}
2306 
2307 	*try_cnt = *try_cnt + 1;
2308 	if (*try_cnt > NS_LIST_TRY_MAX)
2309 		return (0);
2310 
2311 	*conn_user = __s_api_conn_user_init(type, NULL, B_FALSE);
2312 	if (*conn_user == NULL) {
2313 		if (*try_cnt == 1) { /* first call before any retry */
2314 			*rc = NS_LDAP_MEMORY;
2315 			*errorp = NULL;
2316 		}
2317 		/* for 1+ try, use previous rc and errorp */
2318 		return (0);
2319 	}
2320 
2321 	/* free ldap_error_t from previous search */
2322 	if (*try_cnt > 1 && rc != NS_LDAP_SUCCESS && *errorp != NULL)
2323 		(void) __ns_ldap_freeError(errorp);
2324 
2325 	return (1);
2326 }
2327 
2328 /* prepare to get the next entry for an enumeration */
2329 int
2330 __s_api_setup_getnext(ns_conn_user_t *cu, int *ns_err,
2331 	ns_ldap_error_t **errorp)
2332 {
2333 	int rc;
2334 	ns_conn_mgmt_t	*cmg;
2335 
2336 	/*
2337 	 * if using an MT connection, ensure the thread-specific data are set,
2338 	 * but if the MT connection is no longer good, return the error saved.
2339 	 */
2340 	if (cu->conn_mt != NULL && (cmg = cu->conn_mgmt) != NULL) {
2341 
2342 		if (cu->bad_mt_conn ==  B_TRUE) {
2343 			__s_api_conn_mt_close(cu, 0, NULL);
2344 			*ns_err = cu->ns_rc;
2345 			*errorp = cu->ns_error;
2346 			cu->ns_error = NULL;
2347 			return (*ns_err);
2348 		}
2349 
2350 		rc = conn_tsd_check(cmg);
2351 		if (rc != NS_LDAP_SUCCESS) {
2352 			*errorp = NULL;
2353 			return (rc);
2354 		}
2355 	}
2356 
2357 	return (NS_LDAP_SUCCESS);
2358 }
2359 
2360 /* wait for an MT connection to become available */
2361 static int
2362 conn_wait(ns_conn_mt_t *conn_mt, ns_conn_user_t *conn_user)
2363 {
2364 	ns_conn_waiter_t	mywait;
2365 	ns_conn_waiter_t	*head = &conn_mt->waiter;
2366 
2367 	(void) cond_init(&(mywait.waitcv), USYNC_THREAD, 0);
2368 	mywait.key = conn_user;
2369 	mywait.signaled = 0;
2370 	mywait.next = head->next;
2371 	mywait.prev = head;
2372 	if (mywait.next)
2373 		mywait.next->prev = &mywait;
2374 	head->next = &mywait;
2375 	atomic_inc_uint(&conn_mt->waiter_cnt);
2376 
2377 	while (!mywait.signaled)
2378 		(void) cond_wait(&(mywait.waitcv), &conn_mt->lock);
2379 	if (mywait.prev)
2380 		mywait.prev->next = mywait.next;
2381 	if (mywait.next)
2382 		mywait.next->prev = mywait.prev;
2383 	return (0);
2384 }
2385 
2386 /* signal that an MT connection is now available */
2387 static int
2388 conn_signal(ns_conn_mt_t *conn_mt)
2389 {
2390 	int			c = 0;
2391 	ns_conn_waiter_t	*head = &conn_mt->waiter;
2392 	ns_conn_waiter_t	*tmp = head->next;
2393 
2394 	while (tmp) {
2395 		(void) cond_signal(&(tmp->waitcv));
2396 		tmp->signaled = 1;
2397 		atomic_dec_uint(&conn_mt->waiter_cnt);
2398 		c++;
2399 		tmp = tmp->next;
2400 	}
2401 
2402 	return (c);
2403 }
2404 
2405 /*
2406  * wait and process the server status and/or config change notification
2407  * from ldap_cachemgr
2408  */
2409 static void *
2410 get_server_change(void *arg)
2411 {
2412 	union {
2413 		ldap_data_t	s_d;
2414 		char		s_b[DOORBUFFERSIZE];
2415 	} space;
2416 	ldap_data_t	*sptr = &space.s_d;
2417 	int		ndata;
2418 	int		adata;
2419 	char		*ptr;
2420 	int		ds_cnt;
2421 	int		door_rc;
2422 	int		which;
2423 	int		retry = 0;
2424 	boolean_t	loop = B_TRUE;
2425 	char		*c, *oc;
2426 	int		dslen = strlen(DOORLINESEP);
2427 	char		dsep = DOORLINESEP_CHR;
2428 	char		chg_data[DOORBUFFERSIZE];
2429 	char		**servers = NULL;
2430 	boolean_t	getchg_not_supported = B_FALSE;
2431 	ns_conn_mgmt_t	*ocmg = (ns_conn_mgmt_t *)arg;
2432 	ns_conn_mgmt_t	*cmg;
2433 	ns_server_status_t *status = NULL;
2434 	ns_server_status_change_t chg = { 0 };
2435 	ldap_get_change_out_t *get_chg;
2436 	ldap_get_chg_cookie_t cookie;
2437 	ldap_get_chg_cookie_t new_cookie;
2438 
2439 	cmg = access_conn_mgmt(NS_CONN_MGMT_OP_REF);
2440 	if (cmg != ocmg)
2441 		thr_exit(NULL);
2442 	/* cmg is locked before called */
2443 	cmg->procchg_tid = thr_self();
2444 
2445 	/* make sure the thread specific data are set */
2446 	(void) conn_tsd_setup(cmg);
2447 	cookie = cmg->cfg_cookie;
2448 
2449 	while (loop) {
2450 
2451 		if (chg.servers != NULL)
2452 			free(chg.servers);
2453 		if (chg.changes != NULL)
2454 			free(chg.changes);
2455 		if (sptr != &space.s_d)
2456 			(void) munmap((char *)sptr, sizeof (space));
2457 
2458 		/*
2459 		 * If the attached conn_mgmt has been deleted,
2460 		 * then exit. The new conn_mgmt will starts it
2461 		 * own monitor thread later. If libsldap is being
2462 		 * unloaded or configuration reloaded, OR
2463 		 * ldap_cachemgr rejected the GETSTATUSCHANGE door
2464 		 * call, then exit as well.
2465 		 */
2466 		if (cmg == NULL || cmg->state == NS_CONN_MGMT_DETACHED ||
2467 		    getchg_not_supported == B_TRUE) {
2468 
2469 			if (cmg != NULL) {
2470 				cmg->procchg_started = B_FALSE;
2471 				(void) release_conn_mgmt(cmg, B_FALSE);
2472 			}
2473 
2474 			conn_tsd_free();
2475 			thr_exit(NULL);
2476 		}
2477 
2478 		(void) memset(space.s_b, 0, DOORBUFFERSIZE);
2479 		(void) memset(&chg, 0, sizeof (chg));
2480 		adata = sizeof (ldap_call_t) + 1;
2481 		ndata = sizeof (space);
2482 		space.s_d.ldap_call.ldap_callnumber = GETSTATUSCHANGE;
2483 		space.s_d.ldap_call.ldap_u.get_change.op =
2484 		    NS_STATUS_CHANGE_OP_START;
2485 		space.s_d.ldap_call.ldap_u.get_change.cookie = cookie;
2486 		sptr = &space.s_d;
2487 		door_rc = __ns_ldap_trydoorcall_getfd();
2488 		cmg->procchg_door_call = B_TRUE;
2489 		if (release_conn_mgmt(cmg, B_FALSE) == NULL) {
2490 			conn_tsd_free();
2491 			thr_exit(NULL);
2492 		}
2493 
2494 		if (door_rc == NS_CACHE_SUCCESS)
2495 			door_rc = __ns_ldap_trydoorcall_send(&sptr, &ndata,
2496 			    &adata);
2497 
2498 		/*
2499 		 * Check and see if the conn_mgmt is still current.
2500 		 * If not, no need to continue.
2501 		 */
2502 		cmg = access_conn_mgmt(NS_CONN_MGMT_OP_REF);
2503 		if (cmg != NULL)
2504 			cmg->procchg_door_call = B_FALSE;
2505 		if (cmg != ocmg) {
2506 			if (cmg != NULL) {
2507 				cmg->procchg_started = B_FALSE;
2508 				(void) release_conn_mgmt(cmg, B_FALSE);
2509 			}
2510 			conn_tsd_free();
2511 			thr_exit(NULL);
2512 		}
2513 
2514 		if (door_rc != NS_CACHE_SUCCESS) {
2515 			if (door_rc == NS_CACHE_NOSERVER) {
2516 				if (retry++ > 10)
2517 					getchg_not_supported = B_TRUE;
2518 				else {
2519 					/*
2520 					 * ldap_cachemgr may be down, give
2521 					 * it time to restart
2522 					 */
2523 					(void) sleep(2);
2524 				}
2525 			} else if (door_rc == NS_CACHE_NOTFOUND)
2526 				getchg_not_supported = B_TRUE;
2527 			continue;
2528 		} else
2529 			retry = 0;
2530 
2531 		/* copy info from door call return structure */
2532 		get_chg =  &sptr->ldap_ret.ldap_u.changes;
2533 		ptr = get_chg->data;
2534 		/* configuration change ? */
2535 		if (get_chg->type == NS_STATUS_CHANGE_TYPE_CONFIG) {
2536 			chg.config_changed = B_TRUE;
2537 			cmg = proc_server_change(&chg, cmg);
2538 			continue;
2539 		}
2540 
2541 		/* server status changes ? */
2542 		if (get_chg->type == NS_STATUS_CHANGE_TYPE_SERVER) {
2543 			/*
2544 			 * first check cookies, if don't match, config
2545 			 * has changed
2546 			 */
2547 			new_cookie = get_chg->cookie;
2548 			if (new_cookie.mgr_pid != cookie.mgr_pid ||
2549 			    new_cookie.seq_num != cookie.seq_num) {
2550 				chg.config_changed = B_TRUE;
2551 				cmg = proc_server_change(&chg, cmg);
2552 				continue;
2553 			}
2554 
2555 			(void) strlcpy(chg_data, ptr, sizeof (chg_data));
2556 			chg.num_server = get_chg->server_count;
2557 
2558 			servers = (char **)calloc(chg.num_server,
2559 			    sizeof (char *));
2560 			if (servers == NULL) {
2561 				syslog(LOG_INFO, NS_CONN_MSG_MEMORY_ERROR);
2562 				continue;
2563 			}
2564 			status = (ns_server_status_t *)calloc(chg.num_server,
2565 			    sizeof (int));
2566 			if (status == NULL) {
2567 				syslog(LOG_INFO, NS_CONN_MSG_MEMORY_ERROR);
2568 				free(servers);
2569 				continue;
2570 			}
2571 			ds_cnt = 0;
2572 			which = 0;
2573 			oc = ptr;
2574 			for (c = ptr; which != 2; c++) {
2575 				/* look for DOORLINESEP or end of string */
2576 				if (*c != dsep && *c != '\0')
2577 					continue;
2578 				if (*c == dsep) { /* DOORLINESEP */
2579 					*c = '\0'; /* current value */
2580 					c += dslen; /* skip to next value */
2581 				}
2582 				if (which == 0) { /* get server info */
2583 					servers[ds_cnt] = oc;
2584 					oc = c;
2585 					which = 1; /* get status next */
2586 					continue;
2587 				}
2588 				/* which == 1, get up/down status */
2589 				if (strcmp(NS_SERVER_CHANGE_UP, oc) == 0) {
2590 					status[ds_cnt] = NS_SERVER_UP;
2591 				} else if (strcmp(NS_SERVER_CHANGE_DOWN,
2592 				    oc) == 0)
2593 					status[ds_cnt] = NS_SERVER_DOWN;
2594 				else {
2595 					syslog(LOG_INFO,
2596 					    NS_CONN_MSG_BAD_CACHEMGR_DATA);
2597 					continue;
2598 				}
2599 				oc = c;
2600 				ds_cnt++;
2601 				if (*c == '\0')
2602 					which = 2; /* exit the loop */
2603 				else
2604 					which = 0; /* get server info next */
2605 			}
2606 			chg.servers = servers;
2607 			chg.changes = status;
2608 			cmg = proc_server_change(&chg, cmg);
2609 			continue;
2610 		}
2611 	}
2612 
2613 	return (NULL);
2614 }
2615 
2616 /* start the thread handling the change notification from ldap_cachemgr */
2617 static void
2618 start_thread(ns_conn_mgmt_t *cmg) {
2619 
2620 	int		errnum;
2621 
2622 	/*
2623 	 * start a thread to get and process config and server status changes
2624 	 */
2625 	if (thr_create(NULL, NULL, get_server_change,
2626 	    (void *)cmg, THR_DETACHED, NULL) != 0) {
2627 		errnum = errno;
2628 		syslog(LOG_WARNING, NS_CONN_MSG_NO_PROCCHG_THREAD,
2629 		    strerror(errnum));
2630 	}
2631 }
2632