mirror of
https://github.com/intel/compute-runtime.git
synced 2025-12-19 16:24:18 +08:00
refactor: correct typo
Signed-off-by: Kamil Kopryk <kamil.kopryk@intel.com>
This commit is contained in:
committed by
Compute-Runtime-Automation
parent
c39b750790
commit
3830423b3a
@@ -161,7 +161,7 @@ DecodeError decodeIntelGTNoteSection(ArrayRef<const uint8_t> intelGTNotesSection
|
|||||||
auto currOffset = sizeof(Elf::ElfNoteSection) + alignUp(nameSz, 4) + alignUp(descSz, 4);
|
auto currOffset = sizeof(Elf::ElfNoteSection) + alignUp(nameSz, 4) + alignUp(descSz, 4);
|
||||||
if (currentPos + currOffset > sectionSize) {
|
if (currentPos + currOffset > sectionSize) {
|
||||||
intelGTNotes.clear();
|
intelGTNotes.clear();
|
||||||
outErrReason.append("DeviceBinaryFormat::zebin : Offseting will cause out-of-bound memory read! Section size: " + std::to_string(sectionSize) +
|
outErrReason.append("DeviceBinaryFormat::zebin : Offsetting will cause out-of-bound memory read! Section size: " + std::to_string(sectionSize) +
|
||||||
", current section data offset: " + std::to_string(currentPos) + ", next offset : " + std::to_string(currOffset) + "\n");
|
", current section data offset: " + std::to_string(currentPos) + ", next offset : " + std::to_string(currOffset) + "\n");
|
||||||
return DecodeError::invalidBinary;
|
return DecodeError::invalidBinary;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -6294,7 +6294,7 @@ TEST_F(IntelGTNotesFixture, WhenValidatingTargetDeviceGivenInvalidIntelGTNotesSe
|
|||||||
auto result = validateTargetDevice(elf, targetDevice, outErrReason, outWarning, singleDeviceBinary);
|
auto result = validateTargetDevice(elf, targetDevice, outErrReason, outWarning, singleDeviceBinary);
|
||||||
EXPECT_FALSE(result);
|
EXPECT_FALSE(result);
|
||||||
EXPECT_TRUE(outWarning.empty());
|
EXPECT_TRUE(outWarning.empty());
|
||||||
auto errStr{"DeviceBinaryFormat::zebin : Offseting will cause out-of-bound memory read! Section size: " + std::to_string(incorrectSectionDataSize) +
|
auto errStr{"DeviceBinaryFormat::zebin : Offsetting will cause out-of-bound memory read! Section size: " + std::to_string(incorrectSectionDataSize) +
|
||||||
", current section data offset: " + std::to_string(sectionDataSize)};
|
", current section data offset: " + std::to_string(sectionDataSize)};
|
||||||
EXPECT_TRUE(std::string::npos != outErrReason.find(errStr));
|
EXPECT_TRUE(std::string::npos != outErrReason.find(errStr));
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user