The old version works because in every function in which this macro is used ``l'' is the length and ``d'' is the destination. This patch prevents future headaches when those constraints no longer hold. --- evas/src/lib/include/evas_blend_ops.h | 8 ++++---- 1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/evas/src/lib/include/evas_blend_ops.h b/evas/src/lib/include/evas_blend_ops.h index 1429596..8f78256 100644 --- a/evas/src/lib/include/evas_blend_ops.h +++ b/evas/src/lib/include/evas_blend_ops.h @@ -348,12 +348,12 @@ mul3_sym_sse3(__m128i x, __m128i y) { return _mm_and_si128(res, RGB_MASK_SSE3); } -#define LOOP_ALIGNED_U1_A48_SSE3(D, LENGTH, UOP,A4OP, A8OP) \ +#define LOOP_ALIGNED_U1_A48_SSE3(DEST, LENGTH, UOP, A4OP, A8OP) \ { \ - while((uintptr_t)d & 0xF && l) UOP \ + while((uintptr_t)DEST & 0xF && LENGTH) UOP \ \ - while(l) { \ - switch(l) { \ + while(LENGTH) { \ + switch(LENGTH) { \ case 3: UOP \ case 2: UOP \ case 1: UOP \ -- 1.7.3.4 ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ enlightenment-devel mailing list enlightenment-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/enlightenment-devel