Skip to content

Instantly share code, notes, and snippets.

🏠
Working from home

Paul Gregoire mondain

🏠
Working from home
Block or report user

Report or block mondain

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View gist:b9963d20c77b12fd79f40f878ab27fcf

When we run our Java based server on Linux on certain bare-metal servers we're seeing what may be some sort of file handle leak. To give more detail to this question, what would cause additional handles to be consumed outside of file access and socket creation? To get a total count we use lsof -i -n -p JAVA_APP_PID | wc -l to see the entire listing, we use lsof -i -n -p JAVA_APP_PID. On the listing there are entries like these that we don't recognize:

java     30464 mondain    0u      CHR             136,18      0t0       21 /dev/pts/18
java     30464 mondain    1u      CHR             136,18      0t0       21 /dev/pts/18
java     30464 mondain    2u      CHR             136,18      0t0       21 /dev/pts/18
java     30464 mondain  196u     unix 0x0000000000000000      0t0  5488165 type=STREAM
java     30464 mondain  200r     FIFO               0,10      0t0  5491231 pipe
View keybase.md

Keybase proof

I hereby claim:

  • I am mondain on github.
  • I am mondain (https://keybase.io/mondain) on keybase.
  • I have a public key ASAiorfzeX4Knscdu0yapQ0IXSAoqN6FxhPXBQa-b1XaEgo

To claim this, I am signing this object:

@mondain
mondain / ens.sol
Created Jan 16, 2018
ENS contract for deed info
View ens.sol
pragma solidity ^0.4.0;
/*
Temporary Hash Registrar
========================
This is a simplified version of a hash registrar. It is purporsefully limited:
names cannot be six letters or shorter, new auctions will stop after 4 years.
@mondain
mondain / index.js
Created Dec 23, 2017
requirebin sketch
View index.js
// Welcome! require() some modules from npm (like you were using browserify)
// and then hit Run Code to run your code on the right side.
// Modules get downloaded from browserify-cdn and bundled in your browser.
var Buffer = require('buffer').Buffer;
var forge = require('node-forge');
const key = {
'i': 'w',
'l': 'x',
View gist:cc2c3cac30a9e957fc3c6ad4b6ec1956
#!/bin/bash
for f in `find . -name '*.flv'`;
do ffmpeg -y -re -i ${f} -vcodec copy -acodec copy -f segment -segment_list ${f}.m3u8 ${f}%03d.ts;
done
@mondain
mondain / loadtest.sh
Created Aug 29, 2017
Chromium load test script
View loadtest.sh
#!/bin/bash
# maximum chromium instances to spawn
MAX_INSTANCES=50
# the testing url to request, default page will use "stream1"
#TEST_URL='http://localhost:5080/webrtcexamples/test/subscribe/''
#TEST_URL='http://webrtc.red5.org:5080/webrtcexamples/test/subscribe/'
#TEST_URL='https://webrtc.red5.org/live/viewer.jsp?host=webrtc.red5.org&stream=myStream'
TEST_URL='http://webrtc.red5.org:5080/live/viewer.jsp?host=webrtc.red5.org&stream=myStream'
View gist:444db0d82eba6a2a436e8928a582054a
v=0
o=- 2993238603765319990 2 IN IP4 127.0.0.1
s=-
t=0 0
a=group:BUNDLE audio video
a=msid-semantic: WMS AyZiiVhnAinEte7RxyRbOTqd0g1KbCMxmzEE
m=audio 9 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 110 112 113 126
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
a=ice-ufrag:uptc
View gist:27cd5c9ea5728eb148fc87075582132c
v=0
o=mozilla...THIS_IS_SDPARTA-54.0 1039943552010360183 0 IN IP4 0.0.0.0
s=-
t=0 0
a=fingerprint:sha-256 7D:D6:A1:06:55:5B:A4:51:D7:25:1D:82:0E:93:8D:50:3D:7E:65:32:EF:8C:B2:46:71:36:E0:30:4A:BD:C6:3B
a=group:BUNDLE sdparta_0 sdparta_1
a=ice-options:trickle
a=msid-semantic:WMS *
m=audio 9 UDP/TLS/RTP/SAVPF 109 9 0 8 101
c=IN IP4 0.0.0.0
@mondain
mondain / gist:95a6af74a2b2a85bfcdf40cdfd4e4bd7
Created Jul 8, 2017
WebRTC Apple Safari (preview) SDP offer
View gist:95a6af74a2b2a85bfcdf40cdfd4e4bd7
v=0
o=- 9045225780225639943 2 IN IP4 127.0.0.1
s=-
t=0 0
a=msid-semantic:WMS *
a=group:BUNDLE audio video
m=audio 9 UDP/TLS/RTP/SAVPF 111 103 104 9 102 0 8 106 105 13 110 112 113 126
c=IN IP4 0.0.0.0
b=AS:50
a=rtcp:9 IN IP4 0.0.0.0
View gist:3e3437f244970bfb8eee38ec2fe71ef0
v=0
o=thisisadapterortc 4297110096882024 2 IN IP4 127.0.0.1
s=-
t=0 0
a=msid-semantic:WMS *
a=group:BUNDLE a06j75e7a6 jqcf8mqvs4
a=ice-options:trickle
m=audio 9 UDP/TLS/RTP/SAVPF 104 102 9 0 8 103 97 13 118 101
c=IN IP4 0.0.0.0
a=rtcp:9 IN IP4 0.0.0.0
You can’t perform that action at this time.