From: Yu Watanabe Date: Thu, 1 Jan 2026 19:30:55 +0000 (+0900) Subject: ssh-proxy: fix typo X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=78247787e98826809e9a7ddb08596066fb57d3de;p=thirdparty%2Fsystemd.git ssh-proxy: fix typo Follow-up for dc3e544104218052664e2c6b08d1ae397e9a4faf. --- diff --git a/src/ssh-generator/ssh-proxy.c b/src/ssh-generator/ssh-proxy.c index f3810388efe..db40c960632 100644 --- a/src/ssh-generator/ssh-proxy.c +++ b/src/ssh-generator/ssh-proxy.c @@ -140,8 +140,8 @@ static int skip_ok_port_res(int fd, const char *path, const char *port) { because poll() returns readable as long as there is any data in the socket buffer for unix sockets, not respecting SO_RCVLOWAT. - XXX: We could have used SO_PEEK_OFF to continously peek more data without changing the socket - receive buffer, but this fucntion breaks since Linux 4.3 due to a kernel bug, which is fixed + XXX: We could have used SO_PEEK_OFF to continuously peek more data without changing the socket + receive buffer, but this function breaks since Linux 4.3 due to a kernel bug, which is fixed in Linux 6.18 commit 7bf3a476ce43 ("af_unix: Read sk_peek_offset() again after sleeping in unix_stream_read_generic()."). It is also not possible to detect whether the kernel is affected by this bug at runtime.