Hey Folks, we've been hunting an NLM bug here for a few days and I think we've got enough information to bring this one to the community. This exists, as far as we can tell, in the current tree, and goes back at least as early as .22. Two clients(one process per client), clientA holds a lock a full file lock on a file. The clientB is waiting on the lock. If a signal is received for the process on clientB, the lock is cancelled, then re-requested: [11269.808195] lockd: server 10.1.230.34 CANCEL (async) status 0 pid 0 (0) type 0x1 0 -> 9223372036854775807 fh(32) 0x003d71ae 0x107ebab1 0x00000020 0xb799de00 0x06c2e532 0x5b0098 a0 0x003d71ae 0x007ebab1 [11269.819230] lockd: server 10.1.230.34 LOCK status 3 pid 1 (0) type 0x1 0 -> 9223372036854775807 fh(32) 0x003d71ae 0x107ebab1 0x00000020 0xb799de00 0x06c2e532 0x5b0098a0 0x003d7 1ae 0x007ebab1 The pid being incremented between requests, as it should. Now, if clientA releases its lock, clientB gets the callback properly, and successfully gains the lock: [11298.158595] lockd: server 10.1.230.34 GRANTED status 0 pid 1 (1) type 0x1 0 -> 9223372036854775807 fh(32) 0x003d71ae 0x107ebab1 0x00000020 0xb799de00 0x06c2e532 0x5b0098a0 0x00 3d71ae 0x007ebab1 Now, clientB's process dies, releasing the lock: [11306.465702] lockd: server 10.1.230.34 UNLOCK (async) status 0 pid 2 (0) type 0x2 0 -> 9223372036854775807 fh(32) 0x003d71ae 0x107ebab1 0x00000020 0xb799de00 0x06c2e532 0x5b0098a0 0x003d71ae 0x007ebab1 Note the pid here has incorrectly incremented. We dug into this a bit and found that __nlm_find_lockowner() did not correctly match the lock we were trying to find and unlock, so it created a new lock "pid". This results in the server ignoring the unlock, and the file being permenently locked up. We're no kernel wizards here, so we're looking for a bit of help. Any suggestions on where to look from here would be appreciated. Thanks! -Aaron -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html