Someone else had the same problem and posted a ticket to Lighthouse
with a workaround patch.

The patch completely fixes our problem.

https://rails.lighthouseapp.com/projects/8994/tickets/3181-patch-activesupportmultibyteclean-is-very-slow

On Sep 10, 3:15 pm, Grant Hutchins <[email protected]>
wrote:
> We have applied the XSS vulnerability patch to the Rails 2.2.2
> codebase and built our own version of the 2.2.2 gems.
>
> When we run with this patched 2.2.2, we are seeing high CPU usage
> which seems to be a direct result of the additional UTF-8 checking.
> Unfortunately it has increased CPU load so much that we are no longer
> able to keep up with the requests coming in.
>
> One idea we've had is to try to minimize the use of tag helpers in our
> application, but that seems like a pretty drastic step to take
> considering that before the patch we had plenty of headroom. The
> increase in CPU load is high enough that it seems like there could be
> room for optimization in this patch.
>
> Has anyone else run into this issue? Does anyone know of a good way to
> improve performance in this area?
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Talk" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/rubyonrails-talk?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to