Date: Sun, 12 Jan 2020 23:52:17 +0000 (UTC) From: Conrad Meyer <cem@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r356668 - head/sys/kern Message-ID: <202001122352.00CNqHG2018001@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cem Date: Sun Jan 12 23:52:16 2020 New Revision: 356668 URL: https://svnweb.freebsd.org/changeset/base/356668 Log: Fix a typo in r356667 comment No functional change. Reported by: bdragon Approved by: csprng(markm), earlier version X-MFC-With: r356667 Modified: head/sys/kern/sys_getrandom.c Modified: head/sys/kern/sys_getrandom.c ============================================================================== --- head/sys/kern/sys_getrandom.c Sun Jan 12 20:47:38 2020 (r356667) +++ head/sys/kern/sys_getrandom.c Sun Jan 12 23:52:16 2020 (r356668) @@ -69,7 +69,7 @@ kern_getrandom(struct thread *td, void *user_buf, size * blocking, when the Linux API does not block. * * 2. Alternatively, we could treat GRND_INSECURE requests as requests - * for GRND_NONBLOCk. Here, the surprising result for Linux programs + * for GRND_NONBLOCK. Here, the surprising result for Linux programs * is that invocations with unseeded random(4) will produce EAGAIN, * rather than garbage. *
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202001122352.00CNqHG2018001>