s3:onefs: remove all onefs related code as it not maintained anymore
[samba.git] / source3 / smbd / oplock.c
index 8525687793739cb1bd42bed9a63a7dac15207866..e3f00a70ecc94aebaa03c61e2f12a2380e42a953 100644 (file)
@@ -3,39 +3,28 @@
    oplock processing
    Copyright (C) Andrew Tridgell 1992-1998
    Copyright (C) Jeremy Allison 1998 - 2001
-   
+   Copyright (C) Volker Lendecke 2005
+
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
-   
+
    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.
-   
+
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
+#define DBGC_CLASS DBGC_LOCKING
 #include "includes.h"
-
-/* Oplock ipc UDP socket. */
-static int oplock_sock = -1;
-uint16 global_oplock_port = 0;
-
-/* Current number of oplocks we have outstanding. */
-static int32 exclusive_oplocks_open = 0;
-static int32 level_II_oplocks_open = 0;
-BOOL global_client_failed_oplock_break = False;
-BOOL global_oplock_break = False;
-
-extern int smb_read_error;
-
-static struct kernel_oplocks *koplocks;
-
-static BOOL oplock_break(SMB_DEV_T dev, SMB_INO_T inode, unsigned long file_id, BOOL local);
+#include "smbd/smbd.h"
+#include "smbd/globals.h"
+#include "messages.h"
+#include "../librpc/gen_ndr/open_files.h"
 
 /****************************************************************************
  Get the number of current exclusive oplocks.
@@ -46,176 +35,65 @@ int32 get_number_of_exclusive_open_oplocks(void)
   return exclusive_oplocks_open;
 }
 
-/****************************************************************************
- Return True if an oplock message is pending.
-****************************************************************************/
-
-BOOL oplock_message_waiting(fd_set *fds)
+/*
+ * helper function used by the kernel oplock backends to post the break message
+ */
+void break_kernel_oplock(struct messaging_context *msg_ctx, files_struct *fsp)
 {
-       if (koplocks && koplocks->msg_waiting(fds))
-               return True;
+       uint8_t msg[MSG_SMB_KERNEL_BREAK_SIZE];
 
-       if (FD_ISSET(oplock_sock, fds))
-               return True;
+       /* Put the kernel break info into the message. */
+       push_file_id_24((char *)msg, &fsp->file_id);
+       SIVAL(msg,24,fsp->fh->gen_id);
 
-       return False;
+       /* Don't need to be root here as we're only ever
+          sending to ourselves. */
+
+       messaging_send_buf(msg_ctx, messaging_server_id(msg_ctx),
+                          MSG_SMB_KERNEL_BREAK,
+                          msg, MSG_SMB_KERNEL_BREAK_SIZE);
 }
 
 /****************************************************************************
- Read an oplock break message from either the oplock UDP fd or the
- kernel (if kernel oplocks are supported).
-
- If timeout is zero then *fds contains the file descriptors that
- are ready to be read and acted upon. If timeout is non-zero then
- *fds contains the file descriptors to be selected on for read.
- The timeout is in milliseconds
-
+ Attempt to set an oplock on a file. Succeeds if kernel oplocks are
+ disabled (just sets flags) and no byte-range locks in the file. Returns True
+ if oplock set.
 ****************************************************************************/
 
-BOOL receive_local_message( char *buffer, int buffer_len, int timeout)
+bool set_file_oplock(files_struct *fsp, int oplock_type)
 {
-       struct sockaddr_in from;
-       socklen_t fromlen = sizeof(from);
-       int32 msg_len = 0;
-       fd_set fds;
-       int selrtn = -1;
-
-       FD_ZERO(&fds);
-       smb_read_error = 0;
-
-       /*
-        * We need to check for kernel oplocks before going into the select
-        * here, as the EINTR generated by the linux kernel oplock may have
-        * already been eaten. JRA.
-        */
-
-       if (koplocks && koplocks->msg_waiting(&fds)) {
-               return koplocks->receive_message(&fds, buffer, buffer_len);
-       }
-
-       while (timeout > 0 && selrtn == -1) {
-               struct timeval to;
-               int maxfd = oplock_sock;
-               time_t starttime = time(NULL);
-
-               FD_ZERO(&fds);
-               maxfd = setup_oplock_select_set(&fds);
 
-               to.tv_sec = timeout / 1000;
-               to.tv_usec = (timeout % 1000) * 1000;
+       bool use_kernel = lp_kernel_oplocks(SNUM(fsp->conn)) && koplocks;
 
-               DEBUG(5,("receive_local_message: doing select with timeout of %d ms\n", timeout));
-
-               selrtn = sys_select(maxfd+1,&fds,NULL,NULL,&to);
-
-               if (selrtn == -1 && errno == EINTR) {
-
-                       /* could be a kernel oplock interrupt */
-                       if (koplocks && koplocks->msg_waiting(&fds)) {
-                               return koplocks->receive_message(&fds, buffer, buffer_len);
-                       }
-
-                       /*
-                        * Linux 2.0.x seems to have a bug in that
-                        * it can return -1, EINTR with a timeout of zero.
-                        * Make sure we bail out here with a read timeout
-                        * if we got EINTR on a timeout of 1 or less.
-                        */
-
-                       if (timeout <= 1) {
-                               smb_read_error = READ_TIMEOUT;
-                               return False;
-                       }
-
-                       /* Not a kernel interrupt - could be a SIGUSR1 message. We must restart. */
-                       /* We need to decrement the timeout here. */
-                       timeout -= ((time(NULL) - starttime)*1000);
-                       if (timeout < 0)
-                               timeout = 1;
-
-                       DEBUG(5,("receive_local_message: EINTR : new timeout %d ms\n", timeout));
-                       continue;
-               }
-
-               /* Check if error */
-               if(selrtn == -1) {
-                       /* something is wrong. Maybe the socket is dead? */
-                       smb_read_error = READ_ERROR;
-                       return False;
-               }
-
-               /* Did we timeout ? */
-               if (selrtn == 0) {
-                       smb_read_error = READ_TIMEOUT;
-                       return False;
+       if (fsp->oplock_type == LEVEL_II_OPLOCK) {
+               if (use_kernel &&
+                   !(koplocks->flags & KOPLOCKS_LEVEL2_SUPPORTED)) {
+                       DEBUG(10, ("Refusing level2 oplock, kernel oplocks "
+                                  "don't support them\n"));
+                       return false;
                }
        }
 
-       if (koplocks && koplocks->msg_waiting(&fds)) {
-               return koplocks->receive_message(&fds, buffer, buffer_len);
-       }
-
-       if (!FD_ISSET(oplock_sock, &fds))
-               return False;
-
-       /*
-        * From here down we deal with the smbd <--> smbd
-        * oplock break protocol only.
-        */
-
-       /*
-        * Read a loopback udp message.
-        */
-       msg_len = sys_recvfrom(oplock_sock, &buffer[OPBRK_CMD_HEADER_LEN],
-                                               buffer_len - OPBRK_CMD_HEADER_LEN, 0, (struct sockaddr *)&from, &fromlen);
-
-       if(msg_len < 0) {
-               DEBUG(0,("receive_local_message. Error in recvfrom. (%s).\n",strerror(errno)));
-               return False;
-       }
-
-       /* Validate message length. */
-       if(msg_len > (buffer_len - OPBRK_CMD_HEADER_LEN)) {
-               DEBUG(0,("receive_local_message: invalid msg_len (%d) max can be %d\n", msg_len,
-                       buffer_len  - OPBRK_CMD_HEADER_LEN));
+       if ((fsp->oplock_type != NO_OPLOCK) &&
+           (fsp->oplock_type != FAKE_LEVEL_II_OPLOCK) &&
+           use_kernel &&
+           !koplocks->ops->set_oplock(koplocks, fsp, oplock_type)) {
                return False;
        }
 
-       /* Validate message from address (must be localhost). */
-       if(from.sin_addr.s_addr != htonl(INADDR_LOOPBACK)) {
-               DEBUG(0,("receive_local_message: invalid 'from' address \
-(was %lx should be 127.0.0.1)\n", (long)from.sin_addr.s_addr));
-               return False;
-       }
-
-       /* Setup the message header */
-       SIVAL(buffer,OPBRK_CMD_LEN_OFFSET,msg_len);
-       SSVAL(buffer,OPBRK_CMD_PORT_OFFSET,ntohs(from.sin_port));
-
-       return True;
-}
-
-/****************************************************************************
- Attempt to set an oplock on a file. Always succeeds if kernel oplocks are
- disabled (just sets flags). Returns True if oplock set.
-****************************************************************************/
-
-BOOL set_file_oplock(files_struct *fsp, int oplock_type)
-{
-       if (koplocks && !koplocks->set_oplock(fsp, oplock_type))
-               return False;
-
        fsp->oplock_type = oplock_type;
        fsp->sent_oplock_break = NO_BREAK_SENT;
-       if (oplock_type == LEVEL_II_OPLOCK)
+       if (oplock_type == LEVEL_II_OPLOCK) {
                level_II_oplocks_open++;
-       else
+       } else if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
                exclusive_oplocks_open++;
+       }
 
-       DEBUG(5,("set_file_oplock: granted oplock on file %s, dev = %x, inode = %.0f, file_id = %lu, \
-tv_sec = %x, tv_usec = %x\n",
-                fsp->fsp_name, (unsigned int)fsp->dev, (double)fsp->inode, fsp->file_id,
-                (int)fsp->open_time.tv_sec, (int)fsp->open_time.tv_usec ));
+       DEBUG(5,("set_file_oplock: granted oplock on file %s, %s/%lu, "
+                   "tv_sec = %x, tv_usec = %x\n",
+                fsp_str_dbg(fsp), file_id_string_tos(&fsp->file_id),
+                fsp->fh->gen_id, (int)fsp->open_time.tv_sec,
+                (int)fsp->open_time.tv_usec ));
 
        return True;
 }
@@ -226,18 +104,33 @@ tv_sec = %x, tv_usec = %x\n",
 
 void release_file_oplock(files_struct *fsp)
 {
-       if ((fsp->oplock_type != NO_OPLOCK) && koplocks)
-               koplocks->release_oplock(fsp);
+       if ((fsp->oplock_type != NO_OPLOCK) &&
+           (fsp->oplock_type != FAKE_LEVEL_II_OPLOCK) &&
+           koplocks) {
+               koplocks->ops->release_oplock(koplocks, fsp, NO_OPLOCK);
+       }
 
-       if (fsp->oplock_type == LEVEL_II_OPLOCK)
+       if (fsp->oplock_type == LEVEL_II_OPLOCK) {
                level_II_oplocks_open--;
-       else if (fsp->oplock_type)
+       } else if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
                exclusive_oplocks_open--;
-       
-       fsp->oplock_type = NO_OPLOCK;
+       }
+
+       SMB_ASSERT(exclusive_oplocks_open>=0);
+       SMB_ASSERT(level_II_oplocks_open>=0);
+
+       if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
+               /* This doesn't matter for close. */
+               fsp->oplock_type = FAKE_LEVEL_II_OPLOCK;
+       } else {
+               fsp->oplock_type = NO_OPLOCK;
+       }
        fsp->sent_oplock_break = NO_BREAK_SENT;
-       
+
        flush_write_cache(fsp, OPLOCK_RELEASE_FLUSH);
+       delete_write_cache(fsp);
+
+       TALLOC_FREE(fsp->oplock_timeout);
 }
 
 /****************************************************************************
@@ -246,8 +139,14 @@ void release_file_oplock(files_struct *fsp)
 
 static void downgrade_file_oplock(files_struct *fsp)
 {
-       if (koplocks)
-               koplocks->release_oplock(fsp);
+       if (!EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
+               DEBUG(0, ("trying to downgrade an already-downgraded oplock!\n"));
+               return;
+       }
+
+       if (koplocks) {
+               koplocks->ops->release_oplock(koplocks, fsp, LEVEL_II_OPLOCK);
+       }
        fsp->oplock_type = LEVEL_II_OPLOCK;
        exclusive_oplocks_open--;
        level_II_oplocks_open++;
@@ -260,258 +159,104 @@ static void downgrade_file_oplock(files_struct *fsp)
  to none even if a "break-to-level II" was sent.
 ****************************************************************************/
 
-BOOL remove_oplock(files_struct *fsp, BOOL break_to_none)
+bool remove_oplock(files_struct *fsp)
 {
-       SMB_DEV_T dev = fsp->dev;
-       SMB_INO_T inode = fsp->inode;
-       BOOL ret = True;
+       bool ret;
+       struct share_mode_lock *lck;
 
        /* Remove the oplock flag from the sharemode. */
-       if (lock_share_entry_fsp(fsp) == False) {
-               DEBUG(0,("remove_oplock: failed to lock share entry for file %s\n",
-                        fsp->fsp_name ));
+       lck = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
+       if (lck == NULL) {
+               DEBUG(0,("remove_oplock: failed to lock share entry for "
+                        "file %s\n", fsp_str_dbg(fsp)));
                return False;
        }
-
-       if (fsp->sent_oplock_break == EXCLUSIVE_BREAK_SENT || break_to_none) {
-               /*
-                * Deal with a reply when a break-to-none was sent.
-                */
-
-               if(remove_share_oplock(fsp)==False) {
-                       DEBUG(0,("remove_oplock: failed to remove share oplock for file %s fnum %d, \
-dev = %x, inode = %.0f\n", fsp->fsp_name, fsp->fnum, (unsigned int)dev, (double)inode));
-                       ret = False;
-               }
-
-               release_file_oplock(fsp);
-       } else {
-               /*
-                * Deal with a reply when a break-to-level II was sent.
-                */
-               if(downgrade_share_oplock(fsp)==False) {
-                       DEBUG(0,("remove_oplock: failed to downgrade share oplock for file %s fnum %d, \
-dev = %x, inode = %.0f\n", fsp->fsp_name, fsp->fnum, (unsigned int)dev, (double)inode));
-                       ret = False;
-               }
-               
-               downgrade_file_oplock(fsp);
+       ret = remove_share_oplock(lck, fsp);
+       if (!ret) {
+               DEBUG(0,("remove_oplock: failed to remove share oplock for "
+                        "file %s fnum %d, %s\n",
+                        fsp_str_dbg(fsp), fsp->fnum,
+                        file_id_string_tos(&fsp->file_id)));
        }
-
-       unlock_share_entry_fsp(fsp);
+       release_file_oplock(fsp);
+       TALLOC_FREE(lck);
        return ret;
 }
 
-/****************************************************************************
- Setup the listening set of file descriptors for an oplock break
- message either from the UDP socket or from the kernel. Returns the maximum
- fd used.
-****************************************************************************/
-
-int setup_oplock_select_set( fd_set *fds)
+/*
+ * Deal with a reply when a break-to-level II was sent.
+ */
+bool downgrade_oplock(files_struct *fsp)
 {
-       int maxfd = oplock_sock;
-
-       if(oplock_sock == -1)
-               return 0;
+       bool ret;
+       struct share_mode_lock *lck;
 
-       FD_SET(oplock_sock,fds);
-
-       if (koplocks && koplocks->notification_fd != -1) {
-               FD_SET(koplocks->notification_fd, fds);
-               maxfd = MAX(maxfd, koplocks->notification_fd);
+       lck = get_existing_share_mode_lock(talloc_tos(), fsp->file_id);
+       if (lck == NULL) {
+               DEBUG(0,("downgrade_oplock: failed to lock share entry for "
+                        "file %s\n", fsp_str_dbg(fsp)));
+               return False;
+       }
+       ret = downgrade_share_oplock(lck, fsp);
+       if (!ret) {
+               DEBUG(0,("downgrade_oplock: failed to downgrade share oplock "
+                        "for file %s fnum %d, file_id %s\n",
+                        fsp_str_dbg(fsp), fsp->fnum,
+                        file_id_string_tos(&fsp->file_id)));
        }
 
-       return maxfd;
+       downgrade_file_oplock(fsp);
+       TALLOC_FREE(lck);
+       return ret;
 }
 
-/****************************************************************************
- Process an oplock break message - whether it came from the UDP socket
- or from the kernel.
-****************************************************************************/
-
-BOOL process_local_message(char *buffer, int buf_size)
+/*
+ * Some kernel oplock implementations handle the notification themselves.
+ */
+bool should_notify_deferred_opens()
 {
-       int32 msg_len;
-       uint16 from_port;
-       char *msg_start;
-       pid_t remotepid;
-       SMB_DEV_T dev;
-       SMB_INO_T inode;
-       unsigned long file_id;
-       uint16 break_cmd_type;
-
-       msg_len = IVAL(buffer,OPBRK_CMD_LEN_OFFSET);
-       from_port = SVAL(buffer,OPBRK_CMD_PORT_OFFSET);
-
-       msg_start = &buffer[OPBRK_CMD_HEADER_LEN];
-
-       DEBUG(5,("process_local_message: Got a message of length %d from port (%d)\n", 
-               msg_len, from_port));
-
-       /* 
-        * Pull the info out of the requesting packet.
-        */
-
-       break_cmd_type = SVAL(msg_start,OPBRK_MESSAGE_CMD_OFFSET);
-
-       switch(break_cmd_type) {
-               case KERNEL_OPLOCK_BREAK_CMD:
-                       if (!koplocks) {
-                               DEBUG(0,("unexpected kernel oplock break!\n"));
-                               break;
-                       } 
-                       if (!koplocks->parse_message(msg_start, msg_len, &inode, &dev, &file_id)) {
-                               DEBUG(0,("kernel oplock break parse failure!\n"));
-                       }
-                       break;
-
-               case OPLOCK_BREAK_CMD:
-               case LEVEL_II_OPLOCK_BREAK_CMD:
-               case ASYNC_LEVEL_II_OPLOCK_BREAK_CMD:
-
-                       /* Ensure that the msg length is correct. */
-                       if(msg_len != OPLOCK_BREAK_MSG_LEN) {
-                               DEBUG(0,("process_local_message: incorrect length for OPLOCK_BREAK_CMD (was %d, should be %d).\n",
-                                       (int)msg_len, (int)OPLOCK_BREAK_MSG_LEN));
-                               return False;
-                       }
-
-                       memcpy((char *)&remotepid, msg_start+OPLOCK_BREAK_PID_OFFSET,sizeof(remotepid));
-                       memcpy((char *)&inode, msg_start+OPLOCK_BREAK_INODE_OFFSET,sizeof(inode));
-                       memcpy((char *)&dev, msg_start+OPLOCK_BREAK_DEV_OFFSET,sizeof(dev));
-                       memcpy((char *)&file_id, msg_start+OPLOCK_BREAK_FILEID_OFFSET,sizeof(file_id));
-
-                       DEBUG(5,("process_local_message: (%s) oplock break request from \
-pid %d, port %d, dev = %x, inode = %.0f, file_id = %lu\n",
-                               (break_cmd_type == OPLOCK_BREAK_CMD) ? "exclusive" : "level II",
-                               (int)remotepid, from_port, (unsigned int)dev, (double)inode, file_id));
-                       break;
-
-               /* 
-                * Keep this as a debug case - eventually we can remove it.
-                */
-               case 0x8001:
-                       DEBUG(0,("process_local_message: Received unsolicited break \
-reply - dumping info.\n"));
-
-                       if(msg_len != OPLOCK_BREAK_MSG_LEN) {
-                               DEBUG(0,("process_local_message: ubr: incorrect length for reply \
-(was %d, should be %d).\n", (int)msg_len, (int)OPLOCK_BREAK_MSG_LEN));
-                               return False;
-                       }
-
-                       memcpy((char *)&inode, msg_start+OPLOCK_BREAK_INODE_OFFSET,sizeof(inode));
-                       memcpy((char *)&remotepid, msg_start+OPLOCK_BREAK_PID_OFFSET,sizeof(remotepid));
-                       memcpy((char *)&dev, msg_start+OPLOCK_BREAK_DEV_OFFSET,sizeof(dev));
-                       memcpy((char *)&file_id, msg_start+OPLOCK_BREAK_FILEID_OFFSET,sizeof(file_id));
-
-                       DEBUG(0,("process_local_message: unsolicited oplock break reply from \
-pid %d, port %d, dev = %x, inode = %.0f, file_id = %lu\n",
-                               (int)remotepid, from_port, (unsigned int)dev, (double)inode, file_id));
-
-                       return False;
-
-               default:
-                       DEBUG(0,("process_local_message: unknown UDP message command code (%x) - ignoring.\n",
-                               (unsigned int)SVAL(msg_start,0)));
-                       return False;
-       }
-
-       /*
-        * Now actually process the break request.
-        */
-
-       if((exclusive_oplocks_open + level_II_oplocks_open) != 0) {
-               if (oplock_break(dev, inode, file_id, False) == False) {
-                       DEBUG(0,("process_local_message: oplock break failed.\n"));
-                       return False;
-               }
-       } else {
-               /*
-                * If we have no record of any currently open oplocks,
-                * it's not an error, as a close command may have
-                * just been issued on the file that was oplocked.
-                * Just log a message and return success in this case.
-                */
-               DEBUG(3,("process_local_message: oplock break requested with no outstanding \
-oplocks. Returning success.\n"));
-       }
-
-       /* 
-        * Do the appropriate reply - none in the kernel or async level II case.
-        */
-
-       if(break_cmd_type == OPLOCK_BREAK_CMD || break_cmd_type == LEVEL_II_OPLOCK_BREAK_CMD) {
-               struct sockaddr_in toaddr;
-
-               /* Send the message back after OR'ing in the 'REPLY' bit. */
-               SSVAL(msg_start,OPBRK_MESSAGE_CMD_OFFSET,break_cmd_type | CMD_REPLY);
-
-               memset((char *)&toaddr,'\0',sizeof(toaddr));
-               toaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
-               toaddr.sin_port = htons(from_port);
-               toaddr.sin_family = AF_INET;
-
-               if(sys_sendto( oplock_sock, msg_start, OPLOCK_BREAK_MSG_LEN, 0,
-                               (struct sockaddr *)&toaddr, sizeof(toaddr)) < 0) {
-                       DEBUG(0,("process_local_message: sendto process %d failed. Errno was %s\n",
-                               (int)remotepid, strerror(errno)));
-                       return False;
-               }
-
-               DEBUG(5,("process_local_message: oplock break reply sent to \
-pid %d, port %d, for file dev = %x, inode = %.0f, file_id = %lu\n",
-                       (int)remotepid, from_port, (unsigned int)dev, (double)inode, file_id));
-       }
-
-       return True;
+       return !(koplocks &&
+               (koplocks->flags & KOPLOCKS_DEFERRED_OPEN_NOTIFICATION));
 }
 
 /****************************************************************************
  Set up an oplock break message.
 ****************************************************************************/
 
-static void prepare_break_message(char *outbuf, files_struct *fsp, BOOL level2)
+static char *new_break_message_smb1(TALLOC_CTX *mem_ctx,
+                                  files_struct *fsp, int cmd)
 {
-       memset(outbuf,'\0',smb_size);
-       set_message(outbuf,8,0,True);
-
-       SCVAL(outbuf,smb_com,SMBlockingX);
-       SSVAL(outbuf,smb_tid,fsp->conn->cnum);
-       SSVAL(outbuf,smb_pid,0xFFFF);
-       SSVAL(outbuf,smb_uid,0);
-       SSVAL(outbuf,smb_mid,0xFFFF);
-       SCVAL(outbuf,smb_vwv0,0xFF);
-       SSVAL(outbuf,smb_vwv2,fsp->fnum);
-       SCVAL(outbuf,smb_vwv3,LOCKING_ANDX_OPLOCK_RELEASE);
-       SCVAL(outbuf,smb_vwv3+1,level2 ? OPLOCKLEVEL_II : OPLOCKLEVEL_NONE);
+       char *result = talloc_array(mem_ctx, char, smb_size + 8*2 + 0);
+
+       if (result == NULL) {
+               DEBUG(0, ("talloc failed\n"));
+               return NULL;
+       }
+
+       memset(result,'\0',smb_size);
+       srv_set_message(result,8,0,true);
+       SCVAL(result,smb_com,SMBlockingX);
+       SSVAL(result,smb_tid,fsp->conn->cnum);
+       SSVAL(result,smb_pid,0xFFFF);
+       SSVAL(result,smb_uid,0);
+       SSVAL(result,smb_mid,0xFFFF);
+       SCVAL(result,smb_vwv0,0xFF);
+       SSVAL(result,smb_vwv2,fsp->fnum);
+       SCVAL(result,smb_vwv3,LOCKING_ANDX_OPLOCK_RELEASE);
+       SCVAL(result,smb_vwv3+1,cmd);
+       return result;
 }
 
 /****************************************************************************
  Function to do the waiting before sending a local break.
 ****************************************************************************/
 
-static void wait_before_sending_break(BOOL local_request)
+static void wait_before_sending_break(void)
 {
-       extern struct timeval smb_last_time;
-
-       if(local_request) {
-               struct timeval cur_tv;
-               long wait_left = (long)lp_oplock_break_wait_time();
-
-               if (wait_left == 0)
-                       return;
+       long wait_time = (long)lp_oplock_break_wait_time();
 
-               GetTimeOfDay(&cur_tv);
-
-               wait_left -= ((cur_tv.tv_sec - smb_last_time.tv_sec)*1000) +
-                ((cur_tv.tv_usec - smb_last_time.tv_usec)/1000);
-
-               if(wait_left > 0) {
-                       wait_left = MIN(wait_left, 1000);
-                       sys_usleep(wait_left * 1000);
-               }
+       if (wait_time) {
+               smb_msleep(wait_time);
        }
 }
 
@@ -519,13 +264,15 @@ static void wait_before_sending_break(BOOL local_request)
  Ensure that we have a valid oplock.
 ****************************************************************************/
 
-static files_struct *initial_break_processing(SMB_DEV_T dev, SMB_INO_T inode, unsigned long file_id)
+static files_struct *initial_break_processing(
+       struct smbd_server_connection *sconn, struct file_id id,
+       unsigned long file_id)
 {
        files_struct *fsp = NULL;
 
        if( DEBUGLVL( 3 ) ) {
-               dbgtext( "initial_break_processing: called for dev = %x, inode = %.0f file_id = %lu\n",
-                       (unsigned int)dev, (double)inode, file_id);
+               dbgtext( "initial_break_processing: called for %s/%u\n",
+                        file_id_string_tos(&id), (int)file_id);
                dbgtext( "Current oplocks_open (exclusive = %d, levelII = %d)\n",
                        exclusive_oplocks_open, level_II_oplocks_open );
        }
@@ -536,14 +283,13 @@ static files_struct *initial_break_processing(SMB_DEV_T dev, SMB_INO_T inode, un
         * we have an oplock on it.
         */
 
-       fsp = file_find_dif(dev, inode, file_id);
+       fsp = file_find_dif(sconn, id, file_id);
 
        if(fsp == NULL) {
                /* The file could have been closed in the meantime - return success. */
                if( DEBUGLVL( 3 ) ) {
                        dbgtext( "initial_break_processing: cannot find open file with " );
-                       dbgtext( "dev = %x, inode = %.0f file_id = %lu", (unsigned int)dev,
-                               (double)inode, file_id);
+                       dbgtext( "file_id %s gen_id = %lu", file_id_string_tos(&id), file_id);
                        dbgtext( "allowing break to succeed.\n" );
                }
                return NULL;
@@ -561,9 +307,10 @@ static files_struct *initial_break_processing(SMB_DEV_T dev, SMB_INO_T inode, un
 
        if(fsp->oplock_type == NO_OPLOCK) {
                if( DEBUGLVL( 3 ) ) {
-                       dbgtext( "initial_break_processing: file %s ", fsp->fsp_name );
-                       dbgtext( "(dev = %x, inode = %.0f, file_id = %lu) has no oplock.\n",
-                               (unsigned int)dev, (double)inode, fsp->file_id );
+                       dbgtext( "initial_break_processing: file %s ",
+                                fsp_str_dbg(fsp));
+                       dbgtext( "(file_id = %s gen_id = %lu) has no oplock.\n",
+                                file_id_string_tos(&id), fsp->fh->gen_id );
                        dbgtext( "Allowing break to succeed regardless.\n" );
                }
                return NULL;
@@ -572,548 +319,442 @@ static files_struct *initial_break_processing(SMB_DEV_T dev, SMB_INO_T inode, un
        return fsp;
 }
 
-/****************************************************************************
- Process a level II oplock break directly.
-****************************************************************************/
-
-BOOL oplock_break_level2(files_struct *fsp, BOOL local_request, int token)
+static void oplock_timeout_handler(struct event_context *ctx,
+                                  struct timed_event *te,
+                                  struct timeval now,
+                                  void *private_data)
 {
-       extern uint32 global_client_caps;
-       char outbuf[128];
-       BOOL got_lock = False;
-       SMB_DEV_T dev = fsp->dev;
-       SMB_INO_T inode = fsp->inode;
-
-       /*
-        * We can have a level II oplock even if the client is not
-        * level II oplock aware. In this case just remove the
-        * flags and don't send the break-to-none message to
-        * the client.
-        */
-
-       if (global_client_caps & CAP_LEVEL_II_OPLOCKS) {
-               /*
-                * If we are sending an oplock break due to an SMB sent
-                * by our own client we ensure that we wait at leat
-                * lp_oplock_break_wait_time() milliseconds before sending
-                * the packet. Sending the packet sooner can break Win9x
-                * and has reported to cause problems on NT. JRA.
-                */
-
-               wait_before_sending_break(local_request);
-
-               /* Prepare the SMBlockingX message. */
+       files_struct *fsp = (files_struct *)private_data;
+
+       /* Remove the timed event handler. */
+       TALLOC_FREE(fsp->oplock_timeout);
+       DEBUG(0, ("Oplock break failed for file %s -- replying anyway\n",
+                 fsp_str_dbg(fsp)));
+       remove_oplock(fsp);
+       reply_to_oplock_break_requests(fsp);
+}
 
-               prepare_break_message( outbuf, fsp, False);
-               if (!send_smb(smbd_server_fd(), outbuf))
-                       exit_server("oplock_break_level2: send_smb failed.");
-       }
+/*******************************************************************
+ Add a timeout handler waiting for the client reply.
+*******************************************************************/
 
+static void add_oplock_timeout_handler(files_struct *fsp)
+{
        /*
-        * Now we must update the shared memory structure to tell
-        * everyone else we no longer have a level II oplock on 
-        * this open file. If local_request is true then token is
-        * the existing lock on the shared memory area.
+        * If kernel oplocks already notifies smbds when an oplock break times
+        * out, just return.
         */
-
-       if(!local_request && lock_share_entry_fsp(fsp) == False) {
-               DEBUG(0,("oplock_break_level2: unable to lock share entry for file %s\n", fsp->fsp_name ));
-       } else {
-               got_lock = True;
+       if (koplocks &&
+           (koplocks->flags & KOPLOCKS_TIMEOUT_NOTIFICATION)) {
+               return;
        }
 
-       if(remove_share_oplock(fsp)==False) {
-               DEBUG(0,("oplock_break_level2: unable to remove level II oplock for file %s\n", fsp->fsp_name ));
+       if (fsp->oplock_timeout != NULL) {
+               DEBUG(0, ("Logic problem -- have an oplock event hanging "
+                         "around\n"));
        }
 
-       release_file_oplock(fsp);
+       fsp->oplock_timeout =
+               tevent_add_timer(fsp->conn->sconn->ev_ctx, fsp,
+                                timeval_current_ofs(OPLOCK_BREAK_TIMEOUT, 0),
+                                oplock_timeout_handler, fsp);
 
-       if (!local_request && got_lock)
-               unlock_share_entry_fsp(fsp);
+       if (fsp->oplock_timeout == NULL) {
+               DEBUG(0, ("Could not add oplock timeout handler\n"));
+       }
+}
 
-       if(level_II_oplocks_open < 0) {
-               DEBUG(0,("oplock_break_level2: level_II_oplocks_open < 0 (%d). PANIC ERROR\n",
-                       level_II_oplocks_open));
-               abort();
+static void send_break_message_smb1(files_struct *fsp, int level)
+{
+       char *break_msg = new_break_message_smb1(talloc_tos(),
+                                       fsp,
+                                       level);
+       if (break_msg == NULL) {
+               exit_server("Could not talloc break_msg\n");
        }
 
-       if( DEBUGLVL( 3 ) ) {
-               dbgtext( "oplock_break_level2: returning success for " );
-               dbgtext( "dev = %x, inode = %.0f, file_id = %lu\n", (unsigned int)dev, (double)inode, fsp->file_id );
-               dbgtext( "Current level II oplocks_open = %d\n", level_II_oplocks_open );
+       show_msg(break_msg);
+       if (!srv_send_smb(fsp->conn->sconn,
+                       break_msg, false, 0,
+                       IS_CONN_ENCRYPTED(fsp->conn),
+                       NULL)) {
+               exit_server_cleanly("send_break_message_smb1: "
+                       "srv_send_smb failed.");
        }
 
-       return True;
+       TALLOC_FREE(break_msg);
 }
 
-/****************************************************************************
- Process an oplock break directly.
-****************************************************************************/
-
-static BOOL oplock_break(SMB_DEV_T dev, SMB_INO_T inode, unsigned long file_id, BOOL local_request)
+void break_level2_to_none_async(files_struct *fsp)
 {
-       extern uint32 global_client_caps;
-       extern struct current_user current_user;
-       char *inbuf = NULL;
-       char *outbuf = NULL;
-       files_struct *fsp = NULL;
-       time_t start_time;
-       BOOL shutdown_server = False;
-       BOOL oplock_timeout = False;
-       connection_struct *saved_user_conn;
-       connection_struct *saved_fsp_conn;
-       int saved_vuid;
-       pstring saved_dir; 
-       int timeout = (OPLOCK_BREAK_TIMEOUT * 1000);
-       pstring file_name;
-       BOOL using_levelII;
-
-       if((fsp = initial_break_processing(dev, inode, file_id)) == NULL)
-               return True;
+       struct smbd_server_connection *sconn = fsp->conn->sconn;
 
-       /*
-        * Deal with a level II oplock going break to none separately.
-        */
+       if (fsp->oplock_type == NO_OPLOCK) {
+               /* We already got a "break to none" message and we've handled
+                * it.  just ignore. */
+               DEBUG(3, ("process_oplock_async_level2_break_message: already "
+                         "broken to none, ignoring.\n"));
+               return;
+       }
 
-       if (LEVEL_II_OPLOCK_TYPE(fsp->oplock_type))
-               return oplock_break_level2(fsp, local_request, -1);
+       if (fsp->oplock_type == FAKE_LEVEL_II_OPLOCK) {
+               /* Don't tell the client, just downgrade. */
+               DEBUG(3, ("process_oplock_async_level2_break_message: "
+                         "downgrading fake level 2 oplock.\n"));
+               remove_oplock(fsp);
+               return;
+       }
 
-       /* Mark the oplock break as sent - we don't want to send twice! */
-       if (fsp->sent_oplock_break) {
-               if( DEBUGLVL( 0 ) ) {
-                       dbgtext( "oplock_break: ERROR: oplock_break already sent for " );
-                       dbgtext( "file %s ", fsp->fsp_name);
-                       dbgtext( "(dev = %x, inode = %.0f, file_id = %lu)\n", (unsigned int)dev, (double)inode, fsp->file_id );
-               }
+       /* Ensure we're really at level2 state. */
+       SMB_ASSERT(fsp->oplock_type == LEVEL_II_OPLOCK);
 
-               /*
-                * We have to fail the open here as we cannot send another oplock break on
-                * this file whilst we are awaiting a response from the client - neither
-                * can we allow another open to succeed while we are waiting for the client.
-                */
-               return False;
-       }
+       DEBUG(10,("process_oplock_async_level2_break_message: sending break "
+                 "to none message for fid %d, file %s\n", fsp->fnum,
+                 fsp_str_dbg(fsp)));
 
-       if(global_oplock_break) {
-               DEBUG(0,("ABORT : ABORT : recursion in oplock_break !!!!!\n"));
-               abort();
+       /* Now send a break to none message to our client. */
+       if (sconn->using_smb2) {
+               send_break_message_smb2(fsp, OPLOCKLEVEL_NONE);
+       } else {
+               send_break_message_smb1(fsp, OPLOCKLEVEL_NONE);
        }
 
-       /*
-        * Now comes the horrid part. We must send an oplock break to the client,
-        * and then process incoming messages until we get a close or oplock release.
-        * At this point we know we need a new inbuf/outbuf buffer pair.
-        * We cannot use these staticaly as we may recurse into here due to
-        * messages crossing on the wire.
-        */
+       /* Async level2 request, don't send a reply, just remove the oplock. */
+       remove_oplock(fsp);
+}
 
-       if((inbuf = (char *)malloc(BUFFER_SIZE + LARGE_WRITEX_HDR_SIZE + SAFETY_MARGIN))==NULL) {
-               DEBUG(0,("oplock_break: malloc fail for input buffer.\n"));
-               return False;
+/*******************************************************************
+ This handles the case of a write triggering a break to none
+ message on a level2 oplock.
+ When we get this message we may be in any of three states :
+ NO_OPLOCK, LEVEL_II, FAKE_LEVEL2. We only send a message to
+ the client for LEVEL2.
+*******************************************************************/
+
+static void process_oplock_async_level2_break_message(struct messaging_context *msg_ctx,
+                                                     void *private_data,
+                                                     uint32_t msg_type,
+                                                     struct server_id src,
+                                                     DATA_BLOB *data)
+{
+       struct share_mode_entry msg;
+       files_struct *fsp;
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
+
+       if (data->data == NULL) {
+               DEBUG(0, ("Got NULL buffer\n"));
+               return;
        }
 
-       if((outbuf = (char *)malloc(BUFFER_SIZE + LARGE_WRITEX_HDR_SIZE + SAFETY_MARGIN))==NULL) {
-               DEBUG(0,("oplock_break: malloc fail for output buffer.\n"));
-               SAFE_FREE(inbuf);
-               return False;
+       if (data->length != MSG_SMB_SHARE_MODE_ENTRY_SIZE) {
+               DEBUG(0, ("Got invalid msg len %d\n", (int)data->length));
+               return;
        }
 
-       /*
-        * If we are sending an oplock break due to an SMB sent
-        * by our own client we ensure that we wait at leat
-        * lp_oplock_break_wait_time() milliseconds before sending
-        * the packet. Sending the packet sooner can break Win9x
-        * and has reported to cause problems on NT. JRA.
-        */
+       /* De-linearize incoming message. */
+       message_to_share_mode_entry(&msg, (char *)data->data);
 
-       wait_before_sending_break(local_request);
+       DEBUG(10, ("Got oplock async level 2 break message from pid %s: "
+                  "%s/%llu\n", server_id_str(talloc_tos(), &src),
+                  file_id_string_tos(&msg.id),
+                  (unsigned long long)msg.share_file_id));
 
-       /* Prepare the SMBlockingX message. */
+       fsp = initial_break_processing(sconn, msg.id, msg.share_file_id);
 
-       if ((global_client_caps & CAP_LEVEL_II_OPLOCKS) && 
-                       !koplocks && /* NOTE: we force levelII off for kernel oplocks - this will change when it is supported */
-                       lp_level2_oplocks(SNUM(fsp->conn))) {
-               using_levelII = True;
-       } else {
-               using_levelII = False;
+       if (fsp == NULL) {
+               /* We hit a race here. Break messages are sent, and before we
+                * get to process this message, we have closed the file. 
+                * No need to reply as this is an async message. */
+               DEBUG(3, ("process_oplock_async_level2_break_message: Did not find fsp, ignoring\n"));
+               return;
        }
 
-       prepare_break_message( outbuf, fsp, using_levelII);
-       /* Remember if we just sent a break to level II on this file. */
-       fsp->sent_oplock_break = using_levelII? LEVEL_II_BREAK_SENT:EXCLUSIVE_BREAK_SENT;
-
-       if (!send_smb(smbd_server_fd(), outbuf))
-               exit_server("oplock_break: send_smb failed.");
+       break_level2_to_none_async(fsp);
+}
 
-       /* We need this in case a readraw crosses on the wire. */
-       global_oplock_break = True;
-       /* Process incoming messages. */
+/*******************************************************************
+ This handles the generic oplock break message from another smbd.
+*******************************************************************/
 
-       /*
-        * JRA - If we don't get a break from the client in OPLOCK_BREAK_TIMEOUT
-        * seconds we should just die....
-        */
+static void process_oplock_break_message(struct messaging_context *msg_ctx,
+                                        void *private_data,
+                                        uint32_t msg_type,
+                                        struct server_id src,
+                                        DATA_BLOB *data)
+{
+       struct share_mode_entry msg;
+       files_struct *fsp;
+       bool break_to_level2 = False;
+       bool use_kernel;
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
+
+       if (data->data == NULL) {
+               DEBUG(0, ("Got NULL buffer\n"));
+               return;
+       }
 
-       start_time = time(NULL);
+       if (data->length != MSG_SMB_SHARE_MODE_ENTRY_SIZE) {
+               DEBUG(0, ("Got invalid msg len %d\n", (int)data->length));
+               return;
+       }
 
-       /*
-        * Save the information we need to re-become the
-        * user, then unbecome the user whilst we're doing this.
-        */
-       saved_user_conn = current_user.conn;
-       saved_vuid = current_user.vuid;
-       saved_fsp_conn = fsp->conn;
-       change_to_root_user();
-       vfs_GetWd(saved_fsp_conn,saved_dir);
-       /* Save the chain fnum. */
-       file_chain_save();
+       /* De-linearize incoming message. */
+       message_to_share_mode_entry(&msg, (char *)data->data);
 
-       /*
-        * From Charles Hoch <hoch@exemplary.com>. If the break processing
-        * code closes the file (as it often does), then the fsp pointer here
-        * points to free()'d memory. We *must* revalidate fsp each time
-        * around the loop.
-        */
+       DEBUG(10, ("Got oplock break message from pid %s: %s/%llu\n",
+                  server_id_str(talloc_tos(), &src),
+                  file_id_string_tos(&msg.id),
+                  (unsigned long long)msg.share_file_id));
 
-       pstrcpy(file_name, fsp->fsp_name);
-
-       while((fsp = initial_break_processing(dev, inode, file_id)) &&
-                       OPEN_FSP(fsp) && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
-               if(receive_smb(smbd_server_fd(),inbuf, timeout) == False) {
-                       /*
-                        * Die if we got an error.
-                        */
-
-                       if (smb_read_error == READ_EOF) {
-                               DEBUG( 0, ( "oplock_break: end of file from client\n" ) );
-                               shutdown_server = True;
-                       } else if (smb_read_error == READ_ERROR) {
-                               DEBUG( 0, ("oplock_break: receive_smb error (%s)\n", strerror(errno)) );
-                               shutdown_server = True;
-                       } else if (smb_read_error == READ_TIMEOUT) {
-                               DEBUG( 0, ( "oplock_break: receive_smb timed out after %d seconds.\n", OPLOCK_BREAK_TIMEOUT ) );
-                               oplock_timeout = True;
-                       }
+       fsp = initial_break_processing(sconn, msg.id, msg.share_file_id);
 
-                       DEBUGADD( 0, ( "oplock_break failed for file %s ", file_name ) );
-                       DEBUGADD( 0, ( "(dev = %x, inode = %.0f, file_id = %lu).\n",
-                               (unsigned int)dev, (double)inode, file_id));
+       if (fsp == NULL) {
+               /* We hit a race here. Break messages are sent, and before we
+                * get to process this message, we have closed the file. Reply
+                * with 'ok, oplock broken' */
+               DEBUG(3, ("Did not find fsp\n"));
 
-                       break;
-               }
+               /* We just send the same message back. */
+               messaging_send_buf(msg_ctx, src, MSG_SMB_BREAK_RESPONSE,
+                                  (uint8 *)data->data,
+                                  MSG_SMB_SHARE_MODE_ENTRY_SIZE);
+               return;
+       }
 
-               /*
-                * There are certain SMB requests that we shouldn't allow
-                * to recurse. opens, renames and deletes are the obvious
-                * ones. This is handled in the switch_message() function.
-                * If global_oplock_break is set they will push the packet onto
-                * the pending smb queue and return -1 (no reply).
-                * JRA.
-                */
+       if (fsp->sent_oplock_break != NO_BREAK_SENT) {
+               /* Remember we have to inform the requesting PID when the
+                * client replies */
+               msg.pid = src;
+               ADD_TO_ARRAY(NULL, struct share_mode_entry, msg,
+                            &fsp->pending_break_messages,
+                            &fsp->num_pending_break_messages);
+               return;
+       }
 
-               process_smb(inbuf, outbuf);
+       if (EXCLUSIVE_OPLOCK_TYPE(msg.op_type) &&
+           !EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
+               DEBUG(3, ("Already downgraded oplock on %s: %s\n",
+                         file_id_string_tos(&fsp->file_id),
+                         fsp_str_dbg(fsp)));
+               /* We just send the same message back. */
+               messaging_send_buf(msg_ctx, src, MSG_SMB_BREAK_RESPONSE,
+                                  (uint8 *)data->data,
+                                  MSG_SMB_SHARE_MODE_ENTRY_SIZE);
+               return;
+       }
 
-               /*
-                * Die if we go over the time limit.
-                */
+       use_kernel = lp_kernel_oplocks(SNUM(fsp->conn)) && koplocks;
 
-               if((time(NULL) - start_time) > OPLOCK_BREAK_TIMEOUT) {
-                       if( DEBUGLVL( 0 ) ) {
-                               dbgtext( "oplock_break: no break received from client " );
-                               dbgtext( "within %d seconds.\n", OPLOCK_BREAK_TIMEOUT );
-                               dbgtext( "oplock_break failed for file %s ", fsp->fsp_name );
-                               dbgtext( "(dev = %x, inode = %.0f, file_id = %lu).\n",  
-                                       (unsigned int)dev, (double)inode, file_id );
-                       }
-                       oplock_timeout = True;
-                       break;
-               }
+       if ((global_client_caps & CAP_LEVEL_II_OPLOCKS) &&
+           !(msg.op_type & FORCE_OPLOCK_BREAK_TO_NONE) &&
+           !(use_kernel && !(koplocks->flags & KOPLOCKS_LEVEL2_SUPPORTED)) &&
+           lp_level2_oplocks(SNUM(fsp->conn))) {
+               break_to_level2 = True;
        }
 
-       /*
-        * Go back to being the user who requested the oplock
-        * break.
-        */
-       if((saved_user_conn != NULL) && (saved_vuid != UID_FIELD_INVALID) && !change_to_user(saved_user_conn, saved_vuid)) {
-               DEBUG( 0, ( "oplock_break: unable to re-become user!" ) );
-               DEBUGADD( 0, ( "Shutting down server\n" ) );
-               close(oplock_sock);
-               exit_server("unable to re-become user");
+       /* Need to wait before sending a break
+          message if we sent ourselves this message. */
+       if (procid_is_me(&src)) {
+               wait_before_sending_break();
        }
 
-       /* Including the directory. */
-       vfs_ChDir(saved_fsp_conn,saved_dir);
-
-       /* Restore the chain fnum. */
-       file_chain_restore();
-
-       /* Free the buffers we've been using to recurse. */
-       SAFE_FREE(inbuf);
-       SAFE_FREE(outbuf);
+       if (sconn->using_smb2) {
+               send_break_message_smb2(fsp, break_to_level2 ?
+                       OPLOCKLEVEL_II : OPLOCKLEVEL_NONE);
+       } else {
+               send_break_message_smb1(fsp, break_to_level2 ?
+                       OPLOCKLEVEL_II : OPLOCKLEVEL_NONE);
+       }
 
-       /* We need this in case a readraw crossed on the wire. */
-       if(global_oplock_break)
-               global_oplock_break = False;
+       fsp->sent_oplock_break = break_to_level2 ? LEVEL_II_BREAK_SENT:BREAK_TO_NONE_SENT;
 
-       /*
-        * If the client timed out then clear the oplock (or go to level II)
-        * and continue. This seems to be what NT does and is better than dropping
-        * the connection.
-        */
+       msg.pid = src;
+       ADD_TO_ARRAY(NULL, struct share_mode_entry, msg,
+                    &fsp->pending_break_messages,
+                    &fsp->num_pending_break_messages);
 
-       if(oplock_timeout && (fsp = initial_break_processing(dev, inode, file_id)) &&
-                       OPEN_FSP(fsp) && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
-               DEBUG(0,("oplock_break: client failure in oplock break in file %s\n", fsp->fsp_name));
-               remove_oplock(fsp,True);
-#if FASCIST_OPLOCK_BACKOFF
-               global_client_failed_oplock_break = True; /* Never grant this client an oplock again. */
-#endif
-       }
+       add_oplock_timeout_handler(fsp);
+}
 
-       /*
       * If the client had an error we must die.
-        */
+/*******************************************************************
This handles the kernel oplock break message.
+*******************************************************************/
 
-       if(shutdown_server) {
-               DEBUG( 0, ( "oplock_break: client failure in break - " ) );
-               DEBUGADD( 0, ( "shutting down this smbd.\n" ) );
-               close(oplock_sock);
-               exit_server("oplock break failure");
-       }
+static void process_kernel_oplock_break(struct messaging_context *msg_ctx,
+                                       void *private_data,
+                                       uint32_t msg_type,
+                                       struct server_id src,
+                                       DATA_BLOB *data)
+{
+       struct file_id id;
+       unsigned long file_id;
+       files_struct *fsp;
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
 
-       /* Santity check - remove this later. JRA */
-       if(exclusive_oplocks_open < 0) {
-               DEBUG(0,("oplock_break: exclusive_oplocks_open < 0 (%d). PANIC ERROR\n", exclusive_oplocks_open));
-               abort();
+       if (data->data == NULL) {
+               DEBUG(0, ("Got NULL buffer\n"));
+               return;
        }
 
-       if( DEBUGLVL( 3 ) ) {
-               dbgtext( "oplock_break: returning success for " );
-               dbgtext( "dev = %x, inode = %.0f, file_id = %lu\n", (unsigned int)dev, (double)inode, file_id );
-               dbgtext( "Current exclusive_oplocks_open = %d\n", exclusive_oplocks_open );
+       if (data->length != MSG_SMB_KERNEL_BREAK_SIZE) {
+               DEBUG(0, ("Got invalid msg len %d\n", (int)data->length));
+               return;
        }
 
-       return True;
-}
-
-/****************************************************************************
-Send an oplock break message to another smbd process. If the oplock is held 
-by the local smbd then call the oplock break function directly.
-****************************************************************************/
-
-BOOL request_oplock_break(share_mode_entry *share_entry, BOOL async)
-{
-       char op_break_msg[OPLOCK_BREAK_MSG_LEN];
-       struct sockaddr_in addr_out;
-       pid_t pid = sys_getpid();
-       time_t start_time;
-       int time_left;
-       SMB_DEV_T dev = share_entry->dev;
-       SMB_INO_T inode = share_entry->inode;
-       unsigned long file_id = share_entry->share_file_id;
-       uint16 break_cmd_type;
-
-       if(pid == share_entry->pid) {
-               /* We are breaking our own oplock, make sure it's us. */
-               if(share_entry->op_port != global_oplock_port) {
-                       DEBUG(0,("request_oplock_break: corrupt share mode entry - pid = %d, port = %d \
-should be %d\n", (int)pid, share_entry->op_port, global_oplock_port));
-                       return False;
-               }
+       /* Pull the data from the message. */
+       pull_file_id_24((char *)data->data, &id);
+       file_id = (unsigned long)IVAL(data->data, 24);
 
-               DEBUG(5,("request_oplock_break: breaking our own oplock\n"));
+       DEBUG(10, ("Got kernel oplock break message from pid %s: %s/%u\n",
+                  server_id_str(talloc_tos(), &src), file_id_string_tos(&id),
+                  (unsigned int)file_id));
 
-#if 1 /* JRA PARANOIA TEST.... */
-               {
-                       files_struct *fsp = file_find_dif(dev, inode, file_id);
-                       if (!fsp) {
-                               DEBUG(0,("request_oplock_break: PANIC : breaking our own oplock requested for \
-dev = %x, inode = %.0f, file_id = %lu and no fsp found !\n",
-            (unsigned int)dev, (double)inode, file_id ));
-                               smb_panic("request_oplock_break: no fsp found for our own oplock\n");
-                       }
-               }
-#endif /* END JRA PARANOIA TEST... */
+       fsp = initial_break_processing(sconn, id, file_id);
 
-               /* Call oplock break direct. */
-               return oplock_break(dev, inode, file_id, True);
+       if (fsp == NULL) {
+               DEBUG(3, ("Got a kernel oplock break message for a file "
+                         "I don't know about\n"));
+               return;
        }
 
-       /* We need to send a OPLOCK_BREAK_CMD message to the port in the share mode entry. */
+       if (fsp->sent_oplock_break != NO_BREAK_SENT) {
+               /* This is ok, kernel oplocks come in completely async */
+               DEBUG(3, ("Got a kernel oplock request while waiting for a "
+                         "break reply\n"));
+               return;
+       }
 
-       if (LEVEL_II_OPLOCK_TYPE(share_entry->op_type)) {
-               break_cmd_type = async ? ASYNC_LEVEL_II_OPLOCK_BREAK_CMD : LEVEL_II_OPLOCK_BREAK_CMD;
+       if (sconn->using_smb2) {
+               send_break_message_smb2(fsp, OPLOCKLEVEL_NONE);
        } else {
-               break_cmd_type = OPLOCK_BREAK_CMD;
+               send_break_message_smb1(fsp, OPLOCKLEVEL_NONE);
        }
 
-       SSVAL(op_break_msg,OPBRK_MESSAGE_CMD_OFFSET,break_cmd_type);
-       memcpy(op_break_msg+OPLOCK_BREAK_PID_OFFSET,(char *)&pid,sizeof(pid));
-       memcpy(op_break_msg+OPLOCK_BREAK_DEV_OFFSET,(char *)&dev,sizeof(dev));
-       memcpy(op_break_msg+OPLOCK_BREAK_INODE_OFFSET,(char *)&inode,sizeof(inode));
-       memcpy(op_break_msg+OPLOCK_BREAK_FILEID_OFFSET,(char *)&file_id,sizeof(file_id));
-
-       /* Set the address and port. */
-       memset((char *)&addr_out,'\0',sizeof(addr_out));
-       addr_out.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
-       addr_out.sin_port = htons( share_entry->op_port );
-       addr_out.sin_family = AF_INET;
-   
-       if( DEBUGLVL( 3 ) ) {
-               dbgtext( "request_oplock_break: sending a %s oplock break message to ", async ? "asynchronous" : "synchronous" );
-               dbgtext( "pid %d on port %d ", (int)share_entry->pid, share_entry->op_port );
-               dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
-            (unsigned int)dev, (double)inode, file_id );
-       }
+       fsp->sent_oplock_break = BREAK_TO_NONE_SENT;
 
-       if(sys_sendto(oplock_sock,op_break_msg,OPLOCK_BREAK_MSG_LEN,0,
-                       (struct sockaddr *)&addr_out,sizeof(addr_out)) < 0) {
-               if( DEBUGLVL( 0 ) ) {
-                       dbgtext( "request_oplock_break: failed when sending a oplock " );
-                       dbgtext( "break message to pid %d ", (int)share_entry->pid );
-                       dbgtext( "on port %d ", share_entry->op_port );
-                       dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
-                               (unsigned int)dev, (double)inode, file_id );
-                       dbgtext( "Error was %s\n", strerror(errno) );
-               }
-               return False;
-       }
+       add_oplock_timeout_handler(fsp);
+}
+
+void reply_to_oplock_break_requests(files_struct *fsp)
+{
+       int i;
 
        /*
-        * If we just sent a message to a level II oplock share entry in async mode then
-        * we are done and may return.
+        * If kernel oplocks already notifies smbds when oplocks are
+        * broken/removed, just return.
         */
-
-       if (LEVEL_II_OPLOCK_TYPE(share_entry->op_type) && async) {
-               DEBUG(3,("request_oplock_break: sent async break message to level II entry.\n"));
-               return True;
+       if (koplocks &&
+           (koplocks->flags & KOPLOCKS_OPLOCK_BROKEN_NOTIFICATION)) {
+               return;
        }
 
-       /*
-        * Now we must await the oplock broken message coming back
-        * from the target smbd process. Timeout if it fails to
-        * return in (OPLOCK_BREAK_TIMEOUT + OPLOCK_BREAK_TIMEOUT_FUDGEFACTOR) seconds.
-        * While we get messages that aren't ours, loop.
-        */
+       for (i=0; i<fsp->num_pending_break_messages; i++) {
+               struct share_mode_entry *e = &fsp->pending_break_messages[i];
+               char msg[MSG_SMB_SHARE_MODE_ENTRY_SIZE];
 
-       start_time = time(NULL);
-       time_left = OPLOCK_BREAK_TIMEOUT+OPLOCK_BREAK_TIMEOUT_FUDGEFACTOR;
-
-       while(time_left >= 0) {
-               char op_break_reply[OPBRK_CMD_HEADER_LEN+OPLOCK_BREAK_MSG_LEN];
-               uint16 reply_from_port;
-               char *reply_msg_start;
-
-               if(receive_local_message(op_break_reply, sizeof(op_break_reply),
-                               time_left ? time_left * 1000 : 1) == False) {
-                       if(smb_read_error == READ_TIMEOUT) {
-                               if( DEBUGLVL( 0 ) ) {
-                                       dbgtext( "request_oplock_break: no response received to oplock " );
-                                       dbgtext( "break request to pid %d ", (int)share_entry->pid );
-                                       dbgtext( "on port %d ", share_entry->op_port );
-                                       dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
-                                                       (unsigned int)dev, (double)inode, file_id );
-                               }
-
-                               /*
-                                * This is a hack to make handling of failing clients more robust.
-                                * If a oplock break response message is not received in the timeout
-                                * period we may assume that the smbd servicing that client holding
-                                * the oplock has died and the client changes were lost anyway, so
-                                * we should continue to try and open the file.
-                                */
-                               break;
-                       } else {
-                               if( DEBUGLVL( 0 ) ) {
-                                       dbgtext( "request_oplock_break: error in response received " );
-                                       dbgtext( "to oplock break request to pid %d ", (int)share_entry->pid );
-                                       dbgtext( "on port %d ", share_entry->op_port );
-                                       dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
-                                               (unsigned int)dev, (double)inode, file_id );
-                                       dbgtext( "Error was (%s).\n", strerror(errno) );
-                               }
-                       }
-                       return False;
-               }
+               share_mode_entry_to_message(msg, e);
 
-               reply_from_port = SVAL(op_break_reply,OPBRK_CMD_PORT_OFFSET);
-               reply_msg_start = &op_break_reply[OPBRK_CMD_HEADER_LEN];
+               messaging_send_buf(fsp->conn->sconn->msg_ctx, e->pid,
+                                  MSG_SMB_BREAK_RESPONSE,
+                                  (uint8 *)msg,
+                                  MSG_SMB_SHARE_MODE_ENTRY_SIZE);
+       }
 
-               /*
-                * Test to see if this is the reply we are awaiting (ie. the one we sent with the CMD_REPLY flag OR'ed in).
-                */
-               if((SVAL(reply_msg_start,OPBRK_MESSAGE_CMD_OFFSET) & CMD_REPLY) &&
-                       ((SVAL(reply_msg_start,OPBRK_MESSAGE_CMD_OFFSET) & ~CMD_REPLY) == break_cmd_type) &&
-                       (reply_from_port == share_entry->op_port) && 
-                       (memcmp(&reply_msg_start[OPLOCK_BREAK_PID_OFFSET], &op_break_msg[OPLOCK_BREAK_PID_OFFSET],
-                               OPLOCK_BREAK_MSG_LEN - OPLOCK_BREAK_PID_OFFSET) == 0)) {
-
-                       /*
-                        * This is the reply we've been waiting for.
-                        */
-                       break;
-               } else {
-                       /*
-                        * This is another message - a break request.
-                        * Note that both kernel oplock break requests
-                        * and UDP inter-smbd oplock break requests will
-                        * be processed here.
-                        *
-                        * Process it to prevent potential deadlock.
-                        * Note that the code in switch_message() prevents
-                        * us from recursing into here as any SMB requests
-                        * we might process that would cause another oplock
-                        * break request to be made will be queued.
-                        * JRA.
-                        */
-
-                       process_local_message(op_break_reply, sizeof(op_break_reply));
-               }
+       SAFE_FREE(fsp->pending_break_messages);
+       fsp->num_pending_break_messages = 0;
+       TALLOC_FREE(fsp->oplock_timeout);
+       return;
+}
+
+static void process_oplock_break_response(struct messaging_context *msg_ctx,
+                                         void *private_data,
+                                         uint32_t msg_type,
+                                         struct server_id src,
+                                         DATA_BLOB *data)
+{
+       struct share_mode_entry msg;
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
+
+       if (data->data == NULL) {
+               DEBUG(0, ("Got NULL buffer\n"));
+               return;
+       }
 
-               time_left -= (time(NULL) - start_time);
+       if (data->length != MSG_SMB_SHARE_MODE_ENTRY_SIZE) {
+               DEBUG(0, ("Got invalid msg len %u\n",
+                         (unsigned int)data->length));
+               return;
        }
 
-       DEBUG(3,("request_oplock_break: broke oplock.\n"));
+       /* De-linearize incoming message. */
+       message_to_share_mode_entry(&msg, (char *)data->data);
 
-       return True;
-}
+       DEBUG(10, ("Got oplock break response from pid %s: %s/%llu mid %llu\n",
+                  server_id_str(talloc_tos(), &src),
+                  file_id_string_tos(&msg.id),
+                  (unsigned long long)msg.share_file_id,
+                  (unsigned long long)msg.op_mid));
 
-/****************************************************************************
-  Attempt to break an oplock on a file (if oplocked).
-  Returns True if the file was closed as a result of
-  the oplock break, False otherwise.
-  Used as a last ditch attempt to free a space in the 
-  file table when we have run out.
-****************************************************************************/
+       schedule_deferred_open_message_smb(sconn, msg.op_mid);
+}
 
-BOOL attempt_close_oplocked_file(files_struct *fsp)
+static void process_open_retry_message(struct messaging_context *msg_ctx,
+                                      void *private_data,
+                                      uint32_t msg_type,
+                                      struct server_id src,
+                                      DATA_BLOB *data)
 {
-       DEBUG(5,("attempt_close_oplocked_file: checking file %s.\n", fsp->fsp_name));
+       struct share_mode_entry msg;
+       struct smbd_server_connection *sconn =
+               talloc_get_type_abort(private_data,
+               struct smbd_server_connection);
 
-       if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type) && !fsp->sent_oplock_break && (fsp->fd != -1)) {
-               /* Try and break the oplock. */
-               if (oplock_break(fsp->dev, fsp->inode, fsp->file_id, True)) {
-                       if(file_find_fsp(fsp) == NULL) /* Did the oplock break close the file ? */
-                               return True;
-               }
+       if (data->data == NULL) {
+               DEBUG(0, ("Got NULL buffer\n"));
+               return;
+       }
+
+       if (data->length != MSG_SMB_SHARE_MODE_ENTRY_SIZE) {
+               DEBUG(0, ("Got invalid msg len %d\n", (int)data->length));
+               return;
        }
 
-       return False;
+       /* De-linearize incoming message. */
+       message_to_share_mode_entry(&msg, (char *)data->data);
+
+       DEBUG(10, ("Got open retry msg from pid %s: %s mid %llu\n",
+                  server_id_str(talloc_tos(), &src), file_id_string_tos(&msg.id),
+                  (unsigned long long)msg.op_mid));
+
+       schedule_deferred_open_message_smb(sconn, msg.op_mid);
 }
 
+struct break_to_none_state {
+       struct smbd_server_connection *sconn;
+       struct file_id id;
+};
+static void do_break_to_none(struct tevent_req *req);
+
 /****************************************************************************
  This function is called on any file modification or lock request. If a file
- is level 2 oplocked then it must tell all other level 2 holders to break to none.
+ is level 2 oplocked then it must tell all other level 2 holders to break to
+ none.
 ****************************************************************************/
 
-void release_level_2_oplocks_on_change(files_struct *fsp)
+static void contend_level2_oplocks_begin_default(files_struct *fsp,
+                                             enum level2_contention_type type)
 {
-       share_mode_entry *share_list = NULL;
-       pid_t pid = sys_getpid();
-       int token = -1;
-       int num_share_modes = 0;
-       int i;
+       struct smbd_server_connection *sconn = fsp->conn->sconn;
+       struct tevent_req *req;
+       struct break_to_none_state *state;
 
        /*
         * If this file is level II oplocked then we need
@@ -1126,123 +767,230 @@ void release_level_2_oplocks_on_change(files_struct *fsp)
        if (!LEVEL_II_OPLOCK_TYPE(fsp->oplock_type))
                return;
 
-       if (lock_share_entry_fsp(fsp) == False) {
-               DEBUG(0,("release_level_2_oplocks_on_change: failed to lock share mode entry for file %s.\n", fsp->fsp_name ));
+       /*
+        * When we get here we might have a brlock entry locked. Also
+        * locking the share mode entry would violate the locking
+        * order. Breaking level2 oplocks to none is asynchronous
+        * anyway, so we postpone this into an immediate timed event.
+        */
+
+       state = talloc(sconn, struct break_to_none_state);
+       if (state == NULL) {
+               DEBUG(1, ("talloc failed\n"));
+               return;
+       }
+       state->sconn = sconn;
+       state->id = fsp->file_id;
+
+       req = tevent_wakeup_send(state, sconn->ev_ctx, timeval_set(0, 0));
+       if (req == NULL) {
+               DEBUG(1, ("tevent_wakeup_send failed\n"));
+               TALLOC_FREE(state);
+               return;
        }
+       tevent_req_set_callback(req, do_break_to_none, state);
+       return;
+}
+
+static void do_break_to_none(struct tevent_req *req)
+{
+       struct break_to_none_state *state = tevent_req_callback_data(
+               req, struct break_to_none_state);
+       bool ret;
+       int i;
+       struct share_mode_lock *lck;
 
-       num_share_modes = get_share_modes(fsp->conn, fsp->dev, fsp->inode, &share_list);
+       ret = tevent_wakeup_recv(req);
+       TALLOC_FREE(req);
+       if (!ret) {
+               DEBUG(1, ("tevent_wakeup_recv failed\n"));
+               goto done;
+       }
+       lck = get_existing_share_mode_lock(talloc_tos(), state->id);
+       if (lck == NULL) {
+               DEBUG(1, ("release_level_2_oplocks_on_change: failed to lock "
+                         "share mode entry for file %s.\n",
+                         file_id_string_tos(&state->id)));
+               goto done;
+       }
 
        DEBUG(10,("release_level_2_oplocks_on_change: num_share_modes = %d\n", 
-                       num_share_modes ));
+                 lck->data->num_share_modes ));
 
-       for(i = 0; i < num_share_modes; i++) {
-               share_mode_entry *share_entry = &share_list[i];
+       for(i = 0; i < lck->data->num_share_modes; i++) {
+               struct share_mode_entry *share_entry = &lck->data->share_modes[i];
+               char msg[MSG_SMB_SHARE_MODE_ENTRY_SIZE];
+
+               if (!is_valid_share_mode_entry(share_entry)) {
+                       continue;
+               }
 
                /*
-                * As there could have been multiple writes waiting at the lock_share_entry
-                * gate we may not be the first to enter. Hence the state of the op_types
-                * in the share mode entries may be partly NO_OPLOCK and partly LEVEL_II
-                * oplock. It will do no harm to re-send break messages to those smbd's
-                * that are still waiting their turn to remove their LEVEL_II state, and
-                * also no harm to ignore existing NO_OPLOCK states. JRA.
+                * As there could have been multiple writes waiting at the
+                * lock_share_entry gate we may not be the first to
+                * enter. Hence the state of the op_types in the share mode
+                * entries may be partly NO_OPLOCK and partly LEVEL_II or FAKE_LEVEL_II
+                * oplock. It will do no harm to re-send break messages to
+                * those smbd's that are still waiting their turn to remove
+                * their LEVEL_II state, and also no harm to ignore existing
+                * NO_OPLOCK states. JRA.
                 */
 
-               DEBUG(10,("release_level_2_oplocks_on_change: share_entry[%i]->op_type == %d\n",
-                               i, share_entry->op_type ));
+               DEBUG(10,("release_level_2_oplocks_on_change: "
+                         "share_entry[%i]->op_type == %d\n",
+                         i, share_entry->op_type ));
 
-               if (share_entry->op_type == NO_OPLOCK)
+               if (share_entry->op_type == NO_OPLOCK) {
                        continue;
+               }
 
                /* Paranoia .... */
                if (EXCLUSIVE_OPLOCK_TYPE(share_entry->op_type)) {
-                       DEBUG(0,("release_level_2_oplocks_on_change: PANIC. share mode entry %d is an exlusive oplock !\n", i ));
-                       unlock_share_entry(fsp->conn, fsp->dev, fsp->inode);
+                       DEBUG(0,("release_level_2_oplocks_on_change: PANIC. "
+                                "share mode entry %d is an exlusive "
+                                "oplock !\n", i ));
+                       TALLOC_FREE(lck);
                        abort();
                }
 
-               /*
-                * Check if this is a file we have open (including the
-                * file we've been called to do write_file on. If so
-                * then break it directly without releasing the lock.
-                */
-
-               if (pid == share_entry->pid) {
-                       files_struct *new_fsp = file_find_dif(share_entry->dev, share_entry->inode, share_entry->share_file_id);
+               share_mode_entry_to_message(msg, share_entry);
 
-                       /* Paranoia check... */
-                       if(new_fsp == NULL) {
-                               DEBUG(0,("release_level_2_oplocks_on_change: PANIC. share mode entry %d is not a local file !\n", i ));
-                               unlock_share_entry(fsp->conn, fsp->dev, fsp->inode);
-                               abort();
+               /*
+                * Deal with a race condition when breaking level2
+                * oplocks. Don't send all the messages and release
+                * the lock, this allows someone else to come in and
+                * get a level2 lock before any of the messages are
+                * processed, and thus miss getting a break message.
+                * Ensure at least one entry (the one we're breaking)
+                * is processed immediately under the lock and becomes
+                * set as NO_OPLOCK to stop any waiter getting a level2.
+                * Bugid #5980.
+                */
+
+               if (procid_is_me(&share_entry->pid)) {
+                       struct files_struct *cur_fsp =
+                               initial_break_processing(state->sconn,
+                                       share_entry->id,
+                                       share_entry->share_file_id);
+                       wait_before_sending_break();
+                       if (cur_fsp != NULL) {
+                               break_level2_to_none_async(cur_fsp);
+                       } else {
+                               DEBUG(3, ("release_level_2_oplocks_on_change: "
+                               "Did not find fsp, ignoring\n"));
                        }
+               } else {
+                       messaging_send_buf(state->sconn->msg_ctx,
+                                       share_entry->pid,
+                                       MSG_SMB_ASYNC_LEVEL2_BREAK,
+                                       (uint8 *)msg,
+                                       MSG_SMB_SHARE_MODE_ENTRY_SIZE);
+               }
+       }
 
-                       DEBUG(10,("release_level_2_oplocks_on_change: breaking our own oplock.\n"));
+       /* We let the message receivers handle removing the oplock state
+          in the share mode lock db. */
 
-                       oplock_break_level2(new_fsp, True, token);
+       TALLOC_FREE(lck);
+done:
+       TALLOC_FREE(state);
+       return;
+}
 
-               } else {
+void smbd_contend_level2_oplocks_begin(files_struct *fsp,
+                                 enum level2_contention_type type)
+{
+       if (koplocks && koplocks->ops->contend_level2_oplocks_begin) {
+               koplocks->ops->contend_level2_oplocks_begin(fsp, type);
+               return;
+       }
 
-                       /*
-                        * This is a remote file and so we send an asynchronous
-                        * message.
-                        */
+       contend_level2_oplocks_begin_default(fsp, type);
+}
 
-                       DEBUG(10,("release_level_2_oplocks_on_change: breaking remote oplock (async).\n"));
-                       request_oplock_break(share_entry, True);
-               }
+void smbd_contend_level2_oplocks_end(files_struct *fsp,
+                               enum level2_contention_type type)
+{
+       /* Only kernel oplocks implement this so far */
+       if (koplocks && koplocks->ops->contend_level2_oplocks_end) {
+               koplocks->ops->contend_level2_oplocks_end(fsp, type);
        }
+}
 
-       SAFE_FREE(share_list);
-       unlock_share_entry_fsp(fsp);
+/****************************************************************************
+ Linearize a share mode entry struct to an internal oplock break message.
+****************************************************************************/
 
-       /* Paranoia check... */
-       if (LEVEL_II_OPLOCK_TYPE(fsp->oplock_type)) {
-               DEBUG(0,("release_level_2_oplocks_on_change: PANIC. File %s still has a level II oplock.\n", fsp->fsp_name));
-               smb_panic("release_level_2_oplocks_on_change");
-       }
+void share_mode_entry_to_message(char *msg, const struct share_mode_entry *e)
+{
+       SIVAL(msg,OP_BREAK_MSG_PID_OFFSET,(uint32)e->pid.pid);
+       SBVAL(msg,OP_BREAK_MSG_MID_OFFSET,e->op_mid);
+       SSVAL(msg,OP_BREAK_MSG_OP_TYPE_OFFSET,e->op_type);
+       SIVAL(msg,OP_BREAK_MSG_ACCESS_MASK_OFFSET,e->access_mask);
+       SIVAL(msg,OP_BREAK_MSG_SHARE_ACCESS_OFFSET,e->share_access);
+       SIVAL(msg,OP_BREAK_MSG_PRIV_OFFSET,e->private_options);
+       SIVAL(msg,OP_BREAK_MSG_TIME_SEC_OFFSET,(uint32_t)e->time.tv_sec);
+       SIVAL(msg,OP_BREAK_MSG_TIME_USEC_OFFSET,(uint32_t)e->time.tv_usec);
+       push_file_id_24(msg+OP_BREAK_MSG_DEV_OFFSET, &e->id);
+       SIVAL(msg,OP_BREAK_MSG_FILE_ID_OFFSET,e->share_file_id);
+       SIVAL(msg,OP_BREAK_MSG_UID_OFFSET,e->uid);
+       SSVAL(msg,OP_BREAK_MSG_FLAGS_OFFSET,e->flags);
+       SIVAL(msg,OP_BREAK_MSG_NAME_HASH_OFFSET,e->name_hash);
+       SIVAL(msg,OP_BREAK_MSG_VNN_OFFSET,e->pid.vnn);
 }
 
 /****************************************************************************
-setup oplocks for this process
+ De-linearize an internal oplock break message to a share mode entry struct.
 ****************************************************************************/
 
-BOOL init_oplocks(void)
+void message_to_share_mode_entry(struct share_mode_entry *e, char *msg)
 {
-       struct sockaddr_in sock_name;
-       socklen_t len = sizeof(sock_name);
-
-       DEBUG(3,("open_oplock_ipc: opening loopback UDP socket.\n"));
-
-       /* Open a lookback UDP socket on a random port. */
-       oplock_sock = open_socket_in(SOCK_DGRAM, 0, 0, htonl(INADDR_LOOPBACK),False);
-       if (oplock_sock == -1) {
-               DEBUG(0,("open_oplock_ipc: Failed to get local UDP socket for \
-address %lx. Error was %s\n", (long)htonl(INADDR_LOOPBACK), strerror(errno)));
-               global_oplock_port = 0;
-               return(False);
-       }
+       e->pid.pid = (pid_t)IVAL(msg,OP_BREAK_MSG_PID_OFFSET);
+       e->op_mid = BVAL(msg,OP_BREAK_MSG_MID_OFFSET);
+       e->op_type = SVAL(msg,OP_BREAK_MSG_OP_TYPE_OFFSET);
+       e->access_mask = IVAL(msg,OP_BREAK_MSG_ACCESS_MASK_OFFSET);
+       e->share_access = IVAL(msg,OP_BREAK_MSG_SHARE_ACCESS_OFFSET);
+       e->private_options = IVAL(msg,OP_BREAK_MSG_PRIV_OFFSET);
+       e->time.tv_sec = (time_t)IVAL(msg,OP_BREAK_MSG_TIME_SEC_OFFSET);
+       e->time.tv_usec = (int)IVAL(msg,OP_BREAK_MSG_TIME_USEC_OFFSET);
+       pull_file_id_24(msg+OP_BREAK_MSG_DEV_OFFSET, &e->id);
+       e->share_file_id = (unsigned long)IVAL(msg,OP_BREAK_MSG_FILE_ID_OFFSET);
+       e->uid = (uint32)IVAL(msg,OP_BREAK_MSG_UID_OFFSET);
+       e->flags = (uint16)SVAL(msg,OP_BREAK_MSG_FLAGS_OFFSET);
+       e->name_hash = IVAL(msg,OP_BREAK_MSG_NAME_HASH_OFFSET);
+       e->pid.vnn = IVAL(msg,OP_BREAK_MSG_VNN_OFFSET);
+}
 
-       /* Find out the transient UDP port we have been allocated. */
-       if(getsockname(oplock_sock, (struct sockaddr *)&sock_name, &len)<0) {
-               DEBUG(0,("open_oplock_ipc: Failed to get local UDP port. Error was %s\n",
-                        strerror(errno)));
-               close(oplock_sock);
-               oplock_sock = -1;
-               global_oplock_port = 0;
-               return False;
-       }
-       global_oplock_port = ntohs(sock_name.sin_port);
+/****************************************************************************
+ Setup oplocks for this process.
+****************************************************************************/
 
-       if (lp_kernel_oplocks()) {
+bool init_oplocks(struct smbd_server_connection *sconn)
+{
+       DEBUG(3,("init_oplocks: initializing messages.\n"));
+
+       messaging_register(sconn->msg_ctx, sconn, MSG_SMB_BREAK_REQUEST,
+                          process_oplock_break_message);
+       messaging_register(sconn->msg_ctx, sconn, MSG_SMB_ASYNC_LEVEL2_BREAK,
+                          process_oplock_async_level2_break_message);
+       messaging_register(sconn->msg_ctx, sconn, MSG_SMB_BREAK_RESPONSE,
+                          process_oplock_break_response);
+       messaging_register(sconn->msg_ctx, sconn, MSG_SMB_KERNEL_BREAK,
+                          process_kernel_oplock_break);
+       messaging_register(sconn->msg_ctx, sconn, MSG_SMB_OPEN_RETRY,
+                          process_open_retry_message);
+
+       return true;
+}
+
+void init_kernel_oplocks(struct smbd_server_connection *sconn)
+{
+       /* only initialize once */
+       if (koplocks == NULL) {
 #if HAVE_KERNEL_OPLOCKS_IRIX
-               koplocks = irix_init_kernel_oplocks();
+               koplocks = irix_init_kernel_oplocks(sconn);
 #elif HAVE_KERNEL_OPLOCKS_LINUX
-               koplocks = linux_init_kernel_oplocks();
+               koplocks = linux_init_kernel_oplocks(sconn);
 #endif
        }
-
-       DEBUG(3,("open_oplock ipc: pid = %d, global_oplock_port = %u\n", 
-                (int)sys_getpid(), global_oplock_port));
-
-       return True;
 }