@@ -26,7 +26,7 @@ volatile const u64 attr_type_int64slice;
2626volatile const u64 attr_type_float64slice ;
2727volatile const u64 attr_type_stringslice ;
2828
29- static __always_inline bool set_attr_value (otel_attirbute_t * attr ,
29+ static __always_inline bool set_attr_value (otel_attribute_t * attr ,
3030 go_otel_attr_value_t * go_attr_value ) {
3131 u64 vtype = go_attr_value -> vtype ;
3232
@@ -67,11 +67,11 @@ convert_go_otel_attributes(void *attrs_buf, u64 slice_len, otel_attributes_t *en
6767 go_otel_attr_value_t go_attr_value = {0 };
6868 struct go_string go_str = {0 };
6969 u8 valid_attrs = enc_attrs -> valid_attrs ;
70- if (valid_attrs >= OTEL_ATTRUBUTE_MAX_COUNT ) {
70+ if (valid_attrs >= OTEL_ATTRIBUTE_MAX_COUNT ) {
7171 return ;
7272 }
7373
74- for (u8 go_attr_index = 0 ; go_attr_index < OTEL_ATTRUBUTE_MAX_COUNT ; go_attr_index ++ ) {
74+ for (u8 go_attr_index = 0 ; go_attr_index < OTEL_ATTRIBUTE_MAX_COUNT ; go_attr_index ++ ) {
7575 if (go_attr_index >= slice_len ) {
7676 break ;
7777 }
@@ -94,7 +94,7 @@ convert_go_otel_attributes(void *attrs_buf, u64 slice_len, otel_attributes_t *en
9494 // Need to check valid_attrs otherwise the ebpf verifier thinks it's possible to exceed
9595 // the max register value for a downstream call, even though it's not possible with
9696 // this same check at the end of the loop.
97- if (valid_attrs >= OTEL_ATTRUBUTE_MAX_COUNT ) {
97+ if (valid_attrs >= OTEL_ATTRIBUTE_MAX_COUNT ) {
9898 break ;
9999 }
100100
@@ -108,7 +108,7 @@ convert_go_otel_attributes(void *attrs_buf, u64 slice_len, otel_attributes_t *en
108108
109109 enc_attrs -> attrs [valid_attrs ].vtype = go_attr_value .vtype ;
110110 valid_attrs ++ ;
111- if (valid_attrs >= OTEL_ATTRUBUTE_MAX_COUNT ) {
111+ if (valid_attrs >= OTEL_ATTRIBUTE_MAX_COUNT ) {
112112 // No more space for attributes
113113 break ;
114114 }
0 commit comments