From: David Neto Date: Thu, 27 Aug 2015 17:11:01 +0000 (-0400) Subject: Fix spelling of SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO X-Git-Tag: upstream/2018.6~1511^2~225 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=4799482787eb69fd2ca8c71b5ff9e2af62fdb0b0;p=platform%2Fupstream%2FSPIRV-Tools.git Fix spelling of SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO --- diff --git a/include/libspirv/libspirv.h b/include/libspirv/libspirv.h index eed681b..8f0b5ab 100644 --- a/include/libspirv/libspirv.h +++ b/include/libspirv/libspirv.h @@ -169,7 +169,7 @@ typedef enum spv_operand_type_t { SPV_OPERAND_TYPE_EXECUTION_SCOPE, SPV_OPERAND_TYPE_GROUP_OPERATION, SPV_OPERAND_TYPE_KERNEL_ENQ_FLAGS, - SPV_OPERAND_TYPE_KERENL_PROFILING_INFO, + SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO, SPV_OPERAND_TYPE_CAPABILITY, SPV_OPERAND_TYPE_ELLIPSIS, // NOTE: Unspecified variable operands diff --git a/source/binary.cpp b/source/binary.cpp index 69eb816..c71273a 100644 --- a/source/binary.cpp +++ b/source/binary.cpp @@ -302,7 +302,7 @@ spv_result_t spvBinaryDecodeOperand( case SPV_OPERAND_TYPE_EXECUTION_SCOPE: case SPV_OPERAND_TYPE_GROUP_OPERATION: case SPV_OPERAND_TYPE_KERNEL_ENQ_FLAGS: - case SPV_OPERAND_TYPE_KERENL_PROFILING_INFO: { + case SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO: { spv_operand_desc entry; spvCheck( spvOperandTableValueLookup(operandTable, type, diff --git a/source/opcode.cpp b/source/opcode.cpp index 74e17f6..feb829d 100644 --- a/source/opcode.cpp +++ b/source/opcode.cpp @@ -1554,7 +1554,7 @@ static const spv_opcode_desc_t opcodeTableEntries[] = { OpCaptureEventProfilingInfo, SPV_OPCODE_FLAGS_CAPABILITIES, CapabilityDeviceEnqueue, - {SPV_OPERAND_TYPE_ID, SPV_OPERAND_TYPE_KERENL_PROFILING_INFO, + {SPV_OPERAND_TYPE_ID, SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO, SPV_OPERAND_TYPE_ID}}, {"GetDefaultQueue", 3, diff --git a/source/operand.cpp b/source/operand.cpp index 747d25e..c714137 100644 --- a/source/operand.cpp +++ b/source/operand.cpp @@ -1429,7 +1429,7 @@ static const spv_operand_desc_group_t opcodeEntryTypes[] = { {SPV_OPERAND_TYPE_KERNEL_ENQ_FLAGS, sizeof(kernelKernelEnqueueFlagssEntries) / sizeof(spv_operand_desc_t), kernelKernelEnqueueFlagssEntries}, - {SPV_OPERAND_TYPE_KERENL_PROFILING_INFO, + {SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO, sizeof(kernelProfilingInfoEntries) / sizeof(spv_operand_desc_t), kernelProfilingInfoEntries}, {SPV_OPERAND_TYPE_CAPABILITY, @@ -1557,7 +1557,7 @@ const char *spvOperandTypeStr(spv_operand_type_t type) { return "group operation"; case SPV_OPERAND_TYPE_KERNEL_ENQ_FLAGS: return "kernel enqeue flags"; - case SPV_OPERAND_TYPE_KERENL_PROFILING_INFO: + case SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO: return "kernel profiling info"; case SPV_OPERAND_TYPE_CAPABILITY: return "capability"; diff --git a/source/validate.cpp b/source/validate.cpp index 07ecb79..6dca38b 100644 --- a/source/validate.cpp +++ b/source/validate.cpp @@ -103,7 +103,7 @@ spv_result_t spvValidateOperandValue(const spv_operand_type_t type, case SPV_OPERAND_TYPE_EXECUTION_SCOPE: case SPV_OPERAND_TYPE_GROUP_OPERATION: case SPV_OPERAND_TYPE_KERNEL_ENQ_FLAGS: - case SPV_OPERAND_TYPE_KERENL_PROFILING_INFO: { + case SPV_OPERAND_TYPE_KERNEL_PROFILING_INFO: { spv_operand_desc operandEntry = nullptr; spv_result_t error = spvOperandTableValueLookup(operandTable, type, word, &operandEntry);