Bug#764228: libpcap0.8: [kfreebsd] please re-enable zerocopy BPF
Package: libpcap
Version: 1.6.2-1
Severity: wishlist
Tags: patch
User: debian-bsd@lists.debian.org
Usertags: kfreebsd
Hi,
Updated kfreebsd-kernel-headers (10.1~4) in sid now define
__compiler_membar() for users of machine-*/atomic.h
Please consider re-enabling zerocopy BPF in libpcap. Patch attached,
which has been tested with test-rebuild of tcpdump and wireshark and
subsequently testing those on a kfreebsd-amd64 jessie system.
Thanks.
-- System Information:
Debian Release: jessie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable')
Architecture: kfreebsd-amd64 (x86_64)
Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- libpcap-1.6.2/debian/patches/50_kfreebsd.diff.orig 2014-09-04 18:06:05.000000000 +0100
+++ libpcap-1.6.2/debian/patches/50_kfreebsd.diff 2014-10-06 12:08:45.906738513 +0100
@@ -19,27 +19,6 @@
V_PCAP=bpf
elif test -r /usr/include/net/pfilt.h ; then
V_PCAP=pf
-@@ -523,20 +524,6 @@
- #
- AC_CHECK_HEADERS(net/if_media.h)
-
-- AC_MSG_CHECKING(whether the system supports zerocopy BPF)
-- AC_TRY_COMPILE(
-- [#include <sys/socket.h>
-- #include <sys/ioctl.h>
-- #include <net/if.h>
-- #include <net/bpf.h>],
-- [return (BIOCROTZBUF + BPF_BUFMODE_ZBUF);],
-- [
-- AC_MSG_RESULT(yes)
-- AC_DEFINE(HAVE_ZEROCOPY_BPF, 1,
-- [define if the system supports zerocopy BPF])
-- ],
-- AC_MSG_RESULT(no))
--
- #
- # Check whether we have struct BPF_TIMEVAL.
- #
@@ -549,6 +536,7 @@
#endif
#include <net/bpf.h>
Reply to: