[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#764228: libpcap0.8: [kfreebsd] please re-enable zerocopy BPF



Package: libpcap
Version: 1.6.2-1
Severity: wishlist
Tags: patch
User: debian-bsd@lists.debian.org
Usertags: kfreebsd

Hi,

Updated kfreebsd-kernel-headers (10.1~4) in sid now define
__compiler_membar() for users of machine-*/atomic.h

Please consider re-enabling zerocopy BPF in libpcap.  Patch attached,
which has been tested with test-rebuild of tcpdump and wireshark and
subsequently testing those on a kfreebsd-amd64 jessie system.

Thanks.

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- libpcap-1.6.2/debian/patches/50_kfreebsd.diff.orig	2014-09-04 18:06:05.000000000 +0100
+++ libpcap-1.6.2/debian/patches/50_kfreebsd.diff	2014-10-06 12:08:45.906738513 +0100
@@ -19,27 +19,6 @@
  	V_PCAP=bpf
  elif test -r /usr/include/net/pfilt.h ; then
  	V_PCAP=pf
-@@ -523,20 +524,6 @@
- 	#
- 	AC_CHECK_HEADERS(net/if_media.h)
- 
--	AC_MSG_CHECKING(whether the system supports zerocopy BPF)
--	AC_TRY_COMPILE(
--	    [#include <sys/socket.h>
--	    #include <sys/ioctl.h>
--	    #include <net/if.h>
--	    #include <net/bpf.h>],
--	    [return (BIOCROTZBUF + BPF_BUFMODE_ZBUF);],
--	    [  
--		AC_MSG_RESULT(yes)
--		AC_DEFINE(HAVE_ZEROCOPY_BPF, 1,
--		[define if the system supports zerocopy BPF])
--	    ],
--	    AC_MSG_RESULT(no))
--
- 	    #
- 	    # Check whether we have struct BPF_TIMEVAL.
- 	    #
 @@ -549,6 +536,7 @@
  #endif
  #include <net/bpf.h>

Reply to: