refactor: correct typo

Signed-off-by: Kamil Kopryk <kamil.kopryk@intel.com>
This commit is contained in:
Kamil Kopryk
2024-05-20 16:31:30 +00:00
committed by Compute-Runtime-Automation
parent c39b750790
commit 3830423b3a
2 changed files with 2 additions and 2 deletions

View File

@@ -161,7 +161,7 @@ DecodeError decodeIntelGTNoteSection(ArrayRef<const uint8_t> intelGTNotesSection
auto currOffset = sizeof(Elf::ElfNoteSection) + alignUp(nameSz, 4) + alignUp(descSz, 4);
if (currentPos + currOffset > sectionSize) {
intelGTNotes.clear();
outErrReason.append("DeviceBinaryFormat::zebin : Offseting will cause out-of-bound memory read! Section size: " + std::to_string(sectionSize) +
outErrReason.append("DeviceBinaryFormat::zebin : Offsetting will cause out-of-bound memory read! Section size: " + std::to_string(sectionSize) +
", current section data offset: " + std::to_string(currentPos) + ", next offset : " + std::to_string(currOffset) + "\n");
return DecodeError::invalidBinary;
}

View File

@@ -6294,7 +6294,7 @@ TEST_F(IntelGTNotesFixture, WhenValidatingTargetDeviceGivenInvalidIntelGTNotesSe
auto result = validateTargetDevice(elf, targetDevice, outErrReason, outWarning, singleDeviceBinary);
EXPECT_FALSE(result);
EXPECT_TRUE(outWarning.empty());
auto errStr{"DeviceBinaryFormat::zebin : Offseting will cause out-of-bound memory read! Section size: " + std::to_string(incorrectSectionDataSize) +
auto errStr{"DeviceBinaryFormat::zebin : Offsetting will cause out-of-bound memory read! Section size: " + std::to_string(incorrectSectionDataSize) +
", current section data offset: " + std::to_string(sectionDataSize)};
EXPECT_TRUE(std::string::npos != outErrReason.find(errStr));
}