diff --git a/.github/workflows/ValidatePullRequest.yml b/.github/workflows/ValidatePullRequest.yml index 83a3cb2d4..4c8432cd7 100644 --- a/.github/workflows/ValidatePullRequest.yml +++ b/.github/workflows/ValidatePullRequest.yml @@ -65,7 +65,7 @@ jobs: steps: - uses: actions/checkout@v4 - name: Spell Check Repo - uses: crate-ci/typos@v1.33.1 + uses: crate-ci/typos@v1.34.0 license-headers: name: check license headers diff --git a/src/hyperlight_host/benches/benchmarks.rs b/src/hyperlight_host/benches/benchmarks.rs index a0943a1ea..c9160ff52 100644 --- a/src/hyperlight_host/benches/benchmarks.rs +++ b/src/hyperlight_host/benches/benchmarks.rs @@ -82,7 +82,7 @@ fn guest_call_benchmark(c: &mut Criterion) { fn guest_call_benchmark_large_param(c: &mut Criterion) { let mut group = c.benchmark_group("guest_functions_with_large_parameters"); #[cfg(target_os = "windows")] - group.sample_size(10); // This benchark is very slow on Windows, so we reduce the sample size to avoid long test runs. + group.sample_size(10); // This benchmark is very slow on Windows, so we reduce the sample size to avoid long test runs. // This benchmark includes time to first clone a vector and string, so it is not a "pure' benchmark of the guest call, but it's still useful group.bench_function("guest_call_with_large_parameters", |b| { diff --git a/src/hyperlight_host/src/seccomp/guest.rs b/src/hyperlight_host/src/seccomp/guest.rs index cd4801d89..b08f483f6 100644 --- a/src/hyperlight_host/src/seccomp/guest.rs +++ b/src/hyperlight_host/src/seccomp/guest.rs @@ -120,7 +120,7 @@ pub(crate) fn get_seccomp_filter_for_host_function_worker_thread( )? .try_into()?; - // If `openat` is an exclicitly allowed syscall, we shouldn't return the filter that forces it to return EACCES. + // If `openat` is an explicitly allowed syscall, we shouldn't return the filter that forces it to return EACCES. if let Some(extra_syscalls) = extra_allowed_syscalls { if extra_syscalls.contains(&libc::SYS_openat) { return Ok(vec![allowlist]);