Description: <short summary of the patch>
 TODO: Put a short summary on the line above and replace this paragraph
 with a longer explanation of this change. Complete the meta-information
 with other relevant fields (see below for details). To make it easier, the
 information below has been extracted from the changelog. Adjust it or drop
 it.
 .
 clsync (0.4.3-1) unstable; urgency=medium
 .
   [ Dmitry Yu Okunev ]
   * Fixed mode "simple": use absolute paths
   * Better error reporting on bad arguments/configuration.
   * Disabled "seccomp" features to make the package buildable
     on non-x86 platforms (closes: #844778)
   * Updated the manpage
 .
   [ Barak A. Pearlmutter ]
   * New Upstream Version
   * Bump policy version
   * Bump to debhelper 12
   * Update uscan debian/watch file
   * add git-buildpackage configuration file
   * dependency per lintian tag skip-systemd-native-flag-missing-pre-depends
   * move library package to section: libs
Author: Barak A. Pearlmutter <bap@debian.org>
Bug-Debian: https://bugs.debian.org/844778

---
The information above should follow the Patch Tagging Guidelines, please
checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
are templates for supplementary fields that you might want to add:

Origin: <vendor|upstream|other>, <url of original patch>
Bug: <url in upstream bugtracker>
Bug-Debian: https://bugs.debian.org/<bugnumber>
Bug-Ubuntu: https://launchpad.net/bugs/<bugnumber>
Forwarded: <no|not-needed|url proving that it has been forwarded>
Reviewed-By: <name and email of someone who approved the patch>
Last-Update: 2019-05-08

--- clsync-0.4.3.orig/cluster.c
+++ clsync-0.4.3/cluster.c
@@ -468,7 +468,7 @@ static inline int cluster_read ( int soc
 #ifdef PARANOID
 
 	if ( !readret ) {
-		error ( "recvfrom() returned 0. This shouldn't happend. Exit." );
+		error ( "recvfrom() returned 0. This shouldn't happen. Exit." );
 		return EINVAL;
 	}
 
--- clsync-0.4.3.orig/error.c
+++ clsync-0.4.3/error.c
@@ -184,7 +184,7 @@ void _critical ( const char *const funct
 		return;
 
 	struct timespec abs_time;
-	clock_gettime ( CLOCK_REALTIME , &abs_time );
+	clock_gettime ( CLOCK_REALTIME, &abs_time );
 	abs_time.tv_sec += 1;
 
 	if ( error_mutex_p != NULL )
--- clsync-0.4.3.orig/man/man1/clsync.1
+++ clsync-0.4.3/man/man1/clsync.1
@@ -757,7 +757,7 @@ separate collecting delay. This is suppo
 IO resources.
 
 To disable detection of "big files" set "0" (zero). This can improve
-perfomance by removing necessity in extra lstat() syscall.
+performance by removing necessity in extra lstat() syscall.
 
 The default value is "134217728" ["128 MiB"].
 .RE
@@ -1090,7 +1090,7 @@ This monitor subsystem cannot determine
 determine a directory where something happened. So
 .B clsync
 is have to rescan whole dir every time on any content change. Moreover, kqueue
-requires an open() on every watched file/dir. But FreeBSD doesn't allow to
+requires an open() on every watched file/dir. But FreeBSD doesn't allow one to
 open() symlink itself (without following) and it's highly invasively to open()
 pipes and devices. So
 .B clsync
@@ -1759,7 +1759,7 @@ Is not set by default.
 
 .SH PERFORMANCE
 
-Recommendations to improve the perfomance:
+Recommendations to improve the performance:
 .RS
 - Disable thread/process splitting.
 .br
@@ -2461,7 +2461,7 @@ equals to 23 and you're using
 .B clsync
 in conjunction with
 .BR rsync ,
-this may happend, for example in next cases:
+this may happen, for example, in the following cases:
 
 .RS
 
@@ -2506,7 +2506,7 @@ tries to read next files (in specified o
 /etc/clsync/clsync.conf
 .RE
 
-This may be overrided with option
+This may be overridden with option
 .IR \-\-config\-file .
 
 .B clsync
--- clsync-0.4.3.orig/mon_gio.c
+++ clsync-0.4.3/mon_gio.c
@@ -282,7 +282,7 @@ static inline int gio_wait_now ( ctx_t *
 		}
 	*/
 	debug_call  ( 40, pthread_spin_unlock ( &queue_lock ) );
-	debug ( 20 , "g_main_context_iteration(NULL, TRUE); queue_length == %i", queue_length );
+	debug ( 20, "g_main_context_iteration(NULL, TRUE); queue_length == %i", queue_length );
 	result  = g_main_context_iteration ( NULL, TRUE );
 	debug ( 10, "g_main_context_iteration() -> %i", result );
 	debug_call  ( 40, pthread_spin_lock ( &queue_lock ) );
--- clsync-0.4.3.orig/privileged.c
+++ clsync-0.4.3/privileged.c
@@ -111,11 +111,11 @@
 	SECCOMP_ALLOW_ACCUM_SYSCALL(nanosleep),				\
 	SECCOMP_ALLOW_ACCUM_SYSCALL(shmdt),				\
 	SECCOMP_ALLOW_ACCUM_SYSCALL(clone),		/* for --threading */		\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(set_robust_list),	/* for --threading? */		\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(madvise),				\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(exit),				\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(clock_gettime),			\
-	                             
+	SECCOMP_ALLOW_ACCUM_SYSCALL(set_robust_list),	/* for --threading? */		\
+	SECCOMP_ALLOW_ACCUM_SYSCALL(madvise),				\
+	SECCOMP_ALLOW_ACCUM_SYSCALL(exit),				\
+	SECCOMP_ALLOW_ACCUM_SYSCALL(clock_gettime),			\
+
 # ifdef __i386__
 #  define FILTER_TABLE_ARCHDEPENDED			/* unused */	\
 	SECCOMP_ALLOW_ACCUM_SYSCALL(fstat64),				\
@@ -125,14 +125,14 @@
 	SECCOMP_ALLOW_ACCUM_SYSCALL(mmap2),				\
 	SECCOMP_ALLOW_ACCUM_SYSCALL(gettimeofday),			\
 	SECCOMP_ALLOW_ACCUM_SYSCALL(_newselect),			\
-	 
+
 # else
 #  define FILTER_TABLE_ARCHDEPENDED					\
 	SECCOMP_ALLOW_ACCUM_SYSCALL(fstat),		/* unused */	\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(lstat),				\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(stat),		/* unused */	\
-	                            SECCOMP_ALLOW_ACCUM_SYSCALL(mmap),				\
-	                             
+	SECCOMP_ALLOW_ACCUM_SYSCALL(lstat),				\
+	SECCOMP_ALLOW_ACCUM_SYSCALL(stat),		/* unused */	\
+	SECCOMP_ALLOW_ACCUM_SYSCALL(mmap),				\
+
 # endif
 
 
@@ -649,7 +649,7 @@ int privileged_execvp_check_arguments (
 	}
 
 	debug ( 1, "a_i == %i; SHARGS_MAX == %i; u_argc == %i", SHARGS_MAX, a_i, u_argc );
-	critical ( "Arguments are wrong. This should happend only on hacking attack." );
+	critical ( "Arguments are wrong. This should happen only on hacking attack." );
 	return EPERM;
 }
 
--- clsync-0.4.3.orig/sync.c
+++ clsync-0.4.3/sync.c
@@ -2274,6 +2274,7 @@ int sync_prequeue_loadmark
 				*path_buf_p   = sync_path_rel2abs ( ctx_p, path_rel,  -1, path_buf_len_p, *path_buf_p );
 				path_full    = *path_buf_p;
 			}
+
 			return SAFE ( sync_dosync ( path_full, event_mask, ctx_p, indexes_p ), debug ( 1, "fpath == \"%s\"; evmask == 0x%o", path_full, event_mask ); return -1; );
 
 		default:
