Hi Jim, On Wed, Oct 5, 2011 at 5:00 PM, Jim Kukunas <james.t.kuku...@linux.intel.com> wrote: > The old version works because in every function in which > this macro is used ``l'' is the length and ``d'' is the > destination. This patch prevents future headaches when > those constraints no longer hold. > --- > evas/src/lib/include/evas_blend_ops.h | 8 ++++---- > 1 files changed, 4 insertions(+), 4 deletions(-) > > diff --git a/evas/src/lib/include/evas_blend_ops.h > b/evas/src/lib/include/evas_blend_ops.h > index 1429596..8f78256 100644 > --- a/evas/src/lib/include/evas_blend_ops.h > +++ b/evas/src/lib/include/evas_blend_ops.h > @@ -348,12 +348,12 @@ mul3_sym_sse3(__m128i x, __m128i y) { > return _mm_and_si128(res, RGB_MASK_SSE3); > } > > -#define LOOP_ALIGNED_U1_A48_SSE3(D, LENGTH, UOP,A4OP, A8OP) \ > +#define LOOP_ALIGNED_U1_A48_SSE3(DEST, LENGTH, UOP, A4OP, A8OP) \ > { \ > - while((uintptr_t)d & 0xF && l) UOP \ > + while((uintptr_t)DEST & 0xF && LENGTH) UOP \ > \ > - while(l) { \ > - switch(l) { \ > + while(LENGTH) { \ > + switch(LENGTH) { \ > case 3: UOP \ > case 2: UOP \ > case 1: UOP \
Makes sense. I'm going to commit it if nobody opposes to (or commit) meanwhile. Thanks. Lucas De Marchi ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ enlightenment-devel mailing list enlightenment-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/enlightenment-devel