temporary hack to fixup the mach id for the wrt350nv2
[openwrt.git] / target / linux / ixp4xx / patches-2.6.23 / 400-dmabounce.patch
1 Index: linux-2.6.23.17/arch/arm/common/dmabounce.c
2 ===================================================================
3 --- linux-2.6.23.17.orig/arch/arm/common/dmabounce.c
4 +++ linux-2.6.23.17/arch/arm/common/dmabounce.c
5 @@ -116,6 +116,10 @@ alloc_safe_buffer(struct dmabounce_devic
6 } else if (size <= device_info->large.size) {
7 pool = &device_info->large;
8 } else {
9 +#ifdef CONFIG_DMABOUNCE_DEBUG
10 + printk(KERN_INFO "A dma bounce buffer outside the pool size was requested. Requested size was 0x%08X\nThe calling code was :\n", size);
11 + dump_stack();
12 +#endif
13 pool = NULL;
14 }
15
16 Index: linux-2.6.23.17/arch/arm/mach-ixp4xx/Kconfig
17 ===================================================================
18 --- linux-2.6.23.17.orig/arch/arm/mach-ixp4xx/Kconfig
19 +++ linux-2.6.23.17/arch/arm/mach-ixp4xx/Kconfig
20 @@ -220,6 +220,11 @@ config DMABOUNCE
21 default y
22 depends on PCI
23
24 +config DMABOUNCE_DEBUG
25 + bool "Enable DMABounce debuging"
26 + default n
27 + depends on DMABOUNCE
28 +
29 config IXP4XX_INDIRECT_PCI
30 bool "Use indirect PCI memory access"
31 depends on PCI
This page took 0.042022 seconds and 5 git commands to generate.