diff --git a/drivers/char/random.c b/drivers/char/random.c index b86bee9284fa..1ef94d112521 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -450,7 +450,7 @@ static ssize_t get_random_bytes_user(struct iov_iter *iter) /* * Immediately overwrite the ChaCha key at index 4 with random - * bytes, in case userspace causes copy_to_user() below to sleep + * bytes, in case userspace causes copy_to_iter() below to sleep * forever, so that we still retain forward secrecy in that case. */ crng_make_state(chacha_state, (u8 *)&chacha_state[4], CHACHA_KEY_SIZE);