search for: started_on

Displaying 5 results from an estimated 5 matches for "started_on".

2007 Feb 26
2
Apache+mod_proxy_balancer+Mongrel+Mephisto, Apache kills CPU
...evancellc.com [Environment] Mac OS X Mephisto 0.7.3 Most recent version of all gems (nothing on edge) [Excerpt from threads.log] Mon Feb 26 14:37:16 PST 2007 REQUEST /archives/2006/5 0.0.0.0:8111 -- THREADS: 3 ----- KEYS: -- #<Thread:0x35e4030>: [:__inspect_key__, :started_on] -- #<Thread:0x36f8c78>: [:__inspect_key__, :started_on] -- #<Thread:0x35e352c>: [:__inspect_key__, :started_on] [Excerpt from mongrel.log when killing unresponsive mongrels] ** TERM signal received. Mon Feb 26 14:37:06 PST 2007: Reaping 3 threads for...
2007 Dec 19
8
Segmentation fault in Mongrel when run with --debug
...ongrel_debug/rails.log: 1 log/mongrel_debug/files.log: 1 log/mongrel_debug/threads.log: 1 log/mongrel_debug/access.log: 1 There are 2 threads running Wed Dec 19 15:10:21 -0700 2007 REQUEST /calibration/ackAdjustDistance 0.0.0.0:3000 -- THREADS: 2 ----- KEYS: -- #<Thread:0xb6e10738>: [:started_on] -- #<Thread:0xb75194bc>: [:started_on, :__inspect_key__] Mongrel stops with this output to stdout. 127.0.0.1 - [Wed, 19 Dec 2007 22:10:17 GMT] "POST /calibration/ackAdjustDistance HTTP/1.1" 127.0.0.1 - [Wed, 19 Dec 2007 22:10:19 GMT] "POST /calibration/ackAdjustDistance...
2007 Oct 15
24
Design flaw? - num_processors, accept/close
...ocessors max). Dropping connection." * 733 client.close rescue Object* 734 reap_dead_workers("max processors") 735 else 736 thread = Thread.new(client) {|c| process_client(c) } 737 thread[:started_on] = Time.now 738 @workers.add(thread) 739 740 sleep @timeout/100 if @timeout > 0 741 end -------------- next part -------------- A non-text attachment was scrubbed... Name: rob.vcf Type: text/x-vcard Size: 116 bytes Desc: not available Url...
2006 Oct 25
14
[SEC] Mongrel Temporary Fix For cgi.rb 99% CPU DoS Attack
This is important so please read this message very carefully. There is a DoS for Ruby''s cgi.rb that is easily exploitable. The attack involves sending a malformed multipart MIME body in an HTTP request. The full explanation of the attack as well as how to fix it RIGHT NOW is given below. Most of the work was done by Jeremy Kemper and Jamis Buck. They did all the work of building the
2006 Oct 01
11
Mongrel woes fixed
...b/mongrel.rb (revision 353) +++ lib/mongrel.rb (working copy) @@ -687,7 +687,6 @@ reap_dead_workers("max processors") else thread = Thread.new(client) {|c| process_client(c) } - thread.abort_on_exception = true thread[:started_on] = Time.now @workers.add(thread) -------------- next part -------------- --- sync.rb Sun Oct 1 21:02:28 2006 +++ sync.new.rb Sun Oct 1 21:05:28 2006 @@ -131,8 +131,10 @@ def sync_try_lock(mode = EX) return unlock if sync_mode == UN + print_critical("sync_try...