From 5343db4103370355a170832e532bb8533fbd6fcb Mon Sep 17 00:00:00 2001 From: Po Lu Date: Mon, 1 Jul 2024 18:22:01 +0800 Subject: [PATCH] ; * exec/trace.c (seccomp_system_call): Typo in commentary. (cherry picked from commit 5965614d3ecb6b09277ea857212467b2f3f9c8bc) --- exec/trace.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exec/trace.c b/exec/trace.c index 7cf95ed5733..dfbc255a894 100644 --- a/exec/trace.c +++ b/exec/trace.c @@ -1605,8 +1605,8 @@ seccomp_system_call (struct exec_tracee *tracee) In this context processes are resumed with PTRACE_CONT unless it is an `open' syscall that is being intercepted, which, if successfully - intercepted, must receive adjustments to their stack pointer upon - completion of said system call. */ + intercepted, they must receive adjustments to their stack pointer + upon completion of said system call. */ assert (!tracee->waiting_for_syscall); /* Save the stack pointer. */ -- 2.39.2