From 8ded9e8455579d66de104bb7c2a6b4f87b215ddf Mon Sep 17 00:00:00 2001 From: Jacqueline Nabaglo Date: Tue, 13 Jun 2023 10:39:11 -0700 Subject: [PATCH] Minor: William comment --- evm/src/cpu/stack_bounds.rs | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/evm/src/cpu/stack_bounds.rs b/evm/src/cpu/stack_bounds.rs index b1b953ac..63a00b28 100644 --- a/evm/src/cpu/stack_bounds.rs +++ b/evm/src/cpu/stack_bounds.rs @@ -1,8 +1,7 @@ //! Checks for stack overflow. //! //! The constraints defined herein validate that stack overflow did not occur. For example, if `dup` -//! is set but the copy would overflow would underflow, these constraints would make the proof -//! unverifiable. +//! is set but the copy would overflow, these constraints would make the proof unverifiable. //! //! Faults are handled under a separate operation flag, `exception` , which traps to the kernel. The //! kernel then handles the exception. However, before it may do so, it must verify in software that