The patch titled via-rhine: disable rx_copybreak on archs that don't allow unaligned DMA access has been added to the -mm tree. Its filename is via-rhine-disable-rx_copybreak-on-archs-that.patch *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find out what to do about this ------------------------------------------------------ Subject: via-rhine: disable rx_copybreak on archs that don't allow unaligned DMA access From: Dustin Marquess <jailbird@xxxxxxxxxxxxxxxx> Patch to disable the rx_copybreak feature on hardware architectures that don't allow unaligned DMA access. #ifdef code taken from tulip_core.c. Problem pointed out by Ivan Kokshaysky. Signed-off-by: Dustin Marquess <jailbird@xxxxxxxxxxxxxxxx> Cc: Francois Romieu <romieu@xxxxxxxxxxxxx> Cc: Ivan Kokshaysky <ink@xxxxxxxxxxxxxxxxxxxx> Cc: Jeff Garzik <jeff@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- drivers/net/via-rhine.c | 6 ++++++ 1 files changed, 6 insertions(+) diff -puN drivers/net/via-rhine.c~via-rhine-disable-rx_copybreak-on-archs-that drivers/net/via-rhine.c --- a/drivers/net/via-rhine.c~via-rhine-disable-rx_copybreak-on-archs-that +++ a/drivers/net/via-rhine.c @@ -42,7 +42,13 @@ static int max_interrupt_work = 20; /* Set the copy breakpoint for the copy-only-tiny-frames scheme. Setting to > 1518 effectively disables this feature. */ +#if defined(__alpha__) || defined(__arm__) || defined(__hppa__) \ + || defined(CONFIG_SPARC) || defined(__ia64__) \ + || defined(__sh__) || defined(__mips__) +static int rx_copybreak = 1518; +#else static int rx_copybreak; +#endif /* Work-around for broken BIOSes: they are unable to get the chip back out of power state D3 so PXE booting fails. bootparam(7): via-rhine.avoid_D3=1 */ _ Patches currently in -mm which might be from jailbird@xxxxxxxxxxxxxxxx are via-rhine-disable-rx_copybreak-on-archs-that.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html