<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED - nftables.py cmd leaking memory when ruleset contains mapping ip length to range with high limit 65535"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1382#c4">Comment # 4</a>
on <a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED - nftables.py cmd leaking memory when ruleset contains mapping ip length to range with high limit 65535"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1382">bug 1382</a>
from <span class="vcard"><a class="email" href="mailto:karel@unitednetworks.cz" title="Karel Rericha <karel@unitednetworks.cz>"> <span class="fn">Karel Rericha</span></a>
</span></b>
<pre>I can confirm that after applying Pablo's patch there are no memory leaks with
given example:
Before patch:
Iterations: 10000
Total time: 0.5286474227905273
Iteration time: 5.286474227905273e-05
Total leak: 4874240
Iteration leak: 492.34747474747473
After patch:
Iterations: 10000
Total time: 0.5286917686462402
Iteration time: 5.2869176864624025e-05
Total leak: 0
Iteration leak: 0.0
Thanks a lot Pablo!
I will close this after patch will land in nftables git.
BTW Pablo will you be so kind and look at this bug too:
<a class="bz_bug_link
bz_status_NEW "
title="NEW - nftables.py cmd doesn't read updated counter values after first read"
href="show_bug.cgi?id=1386">https://bugzilla.netfilter.org/show_bug.cgi?id=1386</a></pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>