diff --git a/.github/workflows/reusable_checks.yml b/.github/workflows/reusable_checks.yml index 4a68784662..180e56a4fe 100644 --- a/.github/workflows/reusable_checks.yml +++ b/.github/workflows/reusable_checks.yml @@ -57,7 +57,7 @@ jobs: ./scripts/check_license/check_headers.sh . "Apache-2.0 WITH LLVM-exception" -v - name: Run a spell check - uses: crate-ci/typos@a67079b4ae32e18c3f53d75368c52ce53b5fb56b # v1.35.4 + uses: crate-ci/typos@a4c3e43aea0a9e9b9e6578d2731ebd9a27e8f6cd # v1.35.5 with: config: ./.github/workflows/.spellcheck-conf.toml diff --git a/src/base_alloc/base_alloc.c b/src/base_alloc/base_alloc.c index 60126c9f0e..9f254e6758 100644 --- a/src/base_alloc/base_alloc.c +++ b/src/base_alloc/base_alloc.c @@ -128,7 +128,7 @@ static void ba_divide_memory_into_chunks(umf_ba_pool_t *pool, void *ptr, current_chunk->next = NULL; pool->metadata.free_list = ptr; // address of the first chunk - // mark the memory as unaccessible again + // mark the memory as inaccessible again utils_annotate_memory_inaccessible(ptr, size); } diff --git a/src/pool/pool_jemalloc.c b/src/pool/pool_jemalloc.c index 29e0953229..6882e2dd6f 100644 --- a/src/pool/pool_jemalloc.c +++ b/src/pool/pool_jemalloc.c @@ -128,7 +128,7 @@ static void *arena_extent_alloc(extent_hooks_t *extent_hooks, void *new_addr, #ifndef __SANITIZE_ADDRESS__ // jemalloc might write to new extents in realloc, so we cannot - // mark them as unaccessible under asan + // mark them as inaccessible under asan utils_annotate_memory_inaccessible(ptr, size); #endif