From 7678f289552b9296cdc627c45993ff0443912518 Mon Sep 17 00:00:00 2001 From: Wei Liu Date: Mon, 22 Apr 2013 02:20:40 +0000 Subject: [PATCH] --- yaml --- r: 369365 b: refs/heads/master c: 697089dc13c52d668322ac6cb8548520de27ed0e h: refs/heads/master i: 369363: 7413caadfaa1386b66aa6650caa6d24044fb7d00 v: v3 --- [refs] | 2 +- trunk/drivers/net/xen-netfront.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/[refs] b/[refs] index c5847ea3a850..e6f190d7367b 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: 2bd92cd2a5f96458519ed4cbbf90d9bd108edcc6 +refs/heads/master: 697089dc13c52d668322ac6cb8548520de27ed0e diff --git a/trunk/drivers/net/xen-netfront.c b/trunk/drivers/net/xen-netfront.c index d9097a786962..1bb2e2072a6a 100644 --- a/trunk/drivers/net/xen-netfront.c +++ b/trunk/drivers/net/xen-netfront.c @@ -735,7 +735,7 @@ static int xennet_get_responses(struct netfront_info *np, /* * This definitely indicates a bug, either in this driver or in * the backend driver. In future this should flag the bad - * situation to the system controller to reboot the backed. + * situation to the system controller to reboot the backend. */ if (ref == GRANT_INVALID_REF) { if (net_ratelimit()) @@ -771,7 +771,7 @@ static int xennet_get_responses(struct netfront_info *np, if (unlikely(slots > max)) { if (net_ratelimit()) - dev_warn(dev, "Too many frags\n"); + dev_warn(dev, "Too many slots\n"); err = -E2BIG; }