Techniques for optimizing a distributed lock manager (DLM) include transferring
lock information to a new master without freezing one or more shared resources.
A hash value range is associated with the resources by a hash function. A first
master node is established as master for the resources in response to a hash value
range being mapped to the first master node. Responsibility for mastering the resources
is transferred from the first master node to a second master node during a transfer
time interval. Lock requests received at a receiving node, either the first master
node or the second master node, are processed by the receiving node during the
transfer time interval.