Package: libpcap Version: 1.6.2-1 Severity: wishlist Tags: patch User: [email protected] Usertags: kfreebsd
Hi, Updated kfreebsd-kernel-headers (10.1~4) in sid now define __compiler_membar() for users of machine-*/atomic.h Please consider re-enabling zerocopy BPF in libpcap. Patch attached, which has been tested with test-rebuild of tcpdump and wireshark and subsequently testing those on a kfreebsd-amd64 jessie system. Thanks. -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 9.0-2-amd64-xenhvm-ipsec Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash
--- libpcap-1.6.2/debian/patches/50_kfreebsd.diff.orig 2014-09-04 18:06:05.000000000 +0100 +++ libpcap-1.6.2/debian/patches/50_kfreebsd.diff 2014-10-06 12:08:45.906738513 +0100 @@ -19,27 +19,6 @@ V_PCAP=bpf elif test -r /usr/include/net/pfilt.h ; then V_PCAP=pf -@@ -523,20 +524,6 @@ - # - AC_CHECK_HEADERS(net/if_media.h) - -- AC_MSG_CHECKING(whether the system supports zerocopy BPF) -- AC_TRY_COMPILE( -- [#include <sys/socket.h> -- #include <sys/ioctl.h> -- #include <net/if.h> -- #include <net/bpf.h>], -- [return (BIOCROTZBUF + BPF_BUFMODE_ZBUF);], -- [ -- AC_MSG_RESULT(yes) -- AC_DEFINE(HAVE_ZEROCOPY_BPF, 1, -- [define if the system supports zerocopy BPF]) -- ], -- AC_MSG_RESULT(no)) -- - # - # Check whether we have struct BPF_TIMEVAL. - # @@ -549,6 +536,7 @@ #endif #include <net/bpf.h>

