From owner-freebsd-bugs@FreeBSD.ORG Fri Jun 13 15:22:05 2014 Return-Path: Delivered-To: freebsd-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id AB1E781E for ; Fri, 13 Jun 2014 15:22:05 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 9346E26AA for ; Fri, 13 Jun 2014 15:22:05 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.8/8.14.8) with ESMTP id s5DFM5ra049351 for ; Fri, 13 Jun 2014 16:22:05 +0100 (BST) (envelope-from bz-noreply@freebsd.org) From: bz-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 191002] [openbsm] auditdistd 1.2-alpha3 leaves kqueue handles open, hits system maxfiles limit Date: Fri, 13 Jun 2014 15:22:05 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: zi@FreeBSD.org X-Bugzilla-Status: Needs Triage X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Jun 2014 15:22:05 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=191002 --- Comment #2 from Ryan Steinmetz --- mjg reviewed this and believes that for each new file there is new kqueue descriptor opened (/bin/auditdistd/sender.c -> read_thread_wait -> wait_for_file_init) ... and that always calls kqueue. It appears as if the kqueue descriptors aren't being closed when this happens. On the systems where this is an issue for me, they are ones that would have higher-than-usual audit log sizes. (nagios host, etc.). A hack-patch might look like this: http://pastebin.com/5SaBUuqF Although, he recommended that we remove the old watchers as a more proper fix. -- You are receiving this mail because: You are the assignee for the bug.