Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 12 Jan 2020 23:52:17 +0000 (UTC)
From:      Conrad Meyer <cem@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r356668 - head/sys/kern
Message-ID:  <202001122352.00CNqHG2018001@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cem
Date: Sun Jan 12 23:52:16 2020
New Revision: 356668
URL: https://svnweb.freebsd.org/changeset/base/356668

Log:
  Fix a typo in r356667 comment
  
  No functional change.
  
  Reported by:	bdragon
  Approved by:	csprng(markm), earlier version
  X-MFC-With:	r356667

Modified:
  head/sys/kern/sys_getrandom.c

Modified: head/sys/kern/sys_getrandom.c
==============================================================================
--- head/sys/kern/sys_getrandom.c	Sun Jan 12 20:47:38 2020	(r356667)
+++ head/sys/kern/sys_getrandom.c	Sun Jan 12 23:52:16 2020	(r356668)
@@ -69,7 +69,7 @@ kern_getrandom(struct thread *td, void *user_buf, size
 	 * blocking, when the Linux API does not block.
 	 *
 	 * 2. Alternatively, we could treat GRND_INSECURE requests as requests
-	 * for GRND_NONBLOCk.  Here, the surprising result for Linux programs
+	 * for GRND_NONBLOCK.  Here, the surprising result for Linux programs
 	 * is that invocations with unseeded random(4) will produce EAGAIN,
 	 * rather than garbage.
 	 *



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202001122352.00CNqHG2018001>