diff --git a/cmd/evm/eest.go b/cmd/evm/eest.go index 43071a3e5d..4cda2fc517 100644 --- a/cmd/evm/eest.go +++ b/cmd/evm/eest.go @@ -22,7 +22,7 @@ import "regexp" // within its filename by the execution spec test (EEST). type testMetadata struct { fork string - module string // which python module gnerated the test, e.g. eip7702 + module string // which python module generated the test, e.g. eip7702 file string // exact file the test came from, e.g. test_gas.py function string // func that created the test, e.g. test_valid_mcopy_operations parameters string // the name of the parameters which were used to fill the test, e.g. zero_inputs diff --git a/core/remote_state_verifier.go b/core/remote_state_verifier.go index 59057b9f88..9754f96f35 100644 --- a/core/remote_state_verifier.go +++ b/core/remote_state_verifier.go @@ -322,7 +322,7 @@ func (vt *verifyTask) Start(verifyCh chan common.Hash) { } newVerifyMsgTypeGauge(msg.verifyResult.Status.Code, msg.peerId).Inc(1) case <-resend.C: - // if a task has run over 15s, try all the vaild peers to verify. + // if a task has run over 15s, try all the valid peers to verify. if time.Since(vt.startAt) < tryAllPeersTime { vt.sendVerifyRequest(1) } else { diff --git a/core/state_transition.go b/core/state_transition.go index 00a234331d..2461b121ca 100644 --- a/core/state_transition.go +++ b/core/state_transition.go @@ -595,7 +595,7 @@ func (st *stateTransition) validateAuthorization(auth *types.SetCodeAuthorizatio } } // Check the authority account - // 1) doesn't have code or has exisiting delegation + // 1) doesn't have code or has existing delegation // 2) matches the auth's nonce // // Note it is added to the access list even if the authorization is invalid.