Someone else had the same problem and posted a ticket to Lighthouse with a workaround patch.
The patch completely fixes our problem. https://rails.lighthouseapp.com/projects/8994/tickets/3181-patch-activesupportmultibyteclean-is-very-slow On Sep 10, 3:15 pm, Grant Hutchins <[email protected]> wrote: > We have applied the XSS vulnerability patch to the Rails 2.2.2 > codebase and built our own version of the 2.2.2 gems. > > When we run with this patched 2.2.2, we are seeing high CPU usage > which seems to be a direct result of the additional UTF-8 checking. > Unfortunately it has increased CPU load so much that we are no longer > able to keep up with the requests coming in. > > One idea we've had is to try to minimize the use of tag helpers in our > application, but that seems like a pretty drastic step to take > considering that before the patch we had plenty of headroom. The > increase in CPU load is high enough that it seems like there could be > room for optimization in this patch. > > Has anyone else run into this issue? Does anyone know of a good way to > improve performance in this area? --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/rubyonrails-talk?hl=en -~----------~----~----~----~------~----~------~--~---

