From 365cd52245ebc1d13a68671607856dc989fd95c7 Mon Sep 17 00:00:00 2001 From: Conrad Meyer Date: Sun, 12 Jan 2020 23:52:16 +0000 Subject: Fix a typo in r356667 comment No functional change. Reported by: bdragon Approved by: csprng(markm), earlier version X-MFC-With: r356667 --- sys/kern/sys_getrandom.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'sys/kern/sys_getrandom.c') diff --git a/sys/kern/sys_getrandom.c b/sys/kern/sys_getrandom.c index 612820cdbcc3..f58d0fe2af57 100644 --- a/sys/kern/sys_getrandom.c +++ b/sys/kern/sys_getrandom.c @@ -69,7 +69,7 @@ kern_getrandom(struct thread *td, void *user_buf, size_t buflen, * blocking, when the Linux API does not block. * * 2. Alternatively, we could treat GRND_INSECURE requests as requests - * for GRND_NONBLOCk. Here, the surprising result for Linux programs + * for GRND_NONBLOCK. Here, the surprising result for Linux programs * is that invocations with unseeded random(4) will produce EAGAIN, * rather than garbage. * -- cgit v1.2.3