From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Oct 6 09:34:34 2013 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id E6138B00; Sun, 6 Oct 2013 09:34:34 +0000 (UTC) (envelope-from ohauer@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id BA9BB20D0; Sun, 6 Oct 2013 09:34:34 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r969YYJj025833; Sun, 6 Oct 2013 09:34:34 GMT (envelope-from ohauer@freefall.freebsd.org) Received: (from ohauer@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r969Khhc022073; Sun, 6 Oct 2013 09:20:43 GMT (envelope-from ohauer) Date: Sun, 6 Oct 2013 09:20:43 GMT Message-Id: <201310060920.r969Khhc022073@freefall.freebsd.org> To: jarrod@downtools.com.au.bdrewery@FreeBSD.org, ohauer@FreeBSD.org, freebsd-ports-bugs@FreeBSD.org, ohauer@FreeBSD.org From: ohauer@FreeBSD.org Subject: Re: ports/176438: net-mgmt/nrpe2 consuming cpu when handling new connections X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 06 Oct 2013 09:34:35 -0000 Synopsis: net-mgmt/nrpe2 consuming cpu when handling new connections Responsible-Changed-From-To: freebsd-ports-bugs->ohauer Responsible-Changed-By: ohauer Responsible-Changed-When: Sun Oct 6 09:14:18 UTC 2013 Responsible-Changed-Why: I'll take it. Kajetan thanks for the PR, I can verify the high CPU load. Please test the following patch: http://people.freebsd.org/~ohauer/diffs/nrpe_PR_176438.diff The patch resets the SSL connection after ~60s in case the SSL handshake is not finished. Additional I included a polling patch from OpenBSD's nrpe http://www.freebsd.org/cgi/query-pr.cgi?pr=176438