https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5821
--- Comment #4 from Jakub Zawadzki <darkjames@xxxxxxxxxxxxxxxx> 2011-04-13 05:15:15 PDT ---
(In reply to comment #0)
> 686 calls for 22500800 bytes: thread_7fff70cf6ca0 |start | main | cf_read |
> wtap_read | libpcap_read | libpcap_read_rec_data | file_read | fill_out_buffer
> | g_malloc | malloc | malloc_zone_malloc
>
> might be the fast-seek data structures, but we might want to make sure of that.
$ 22500800/686
32800
Looks like fast-seek.
Btw. Some implementation of random access compress 32 KB window.
I haven't got time to test if compressing (and later wasting CPU for
decompressing) is worth memory saved or no.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.