Hi Jim,

On Wed, Oct 5, 2011 at 5:00 PM, Jim Kukunas
<james.t.kuku...@linux.intel.com> wrote:
> The old version works because in every function in which
> this macro is used ``l'' is the length and ``d'' is the
> destination. This patch prevents future headaches when
> those constraints no longer hold.
> ---
>  evas/src/lib/include/evas_blend_ops.h |    8 ++++----
>  1 files changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/evas/src/lib/include/evas_blend_ops.h 
> b/evas/src/lib/include/evas_blend_ops.h
> index 1429596..8f78256 100644
> --- a/evas/src/lib/include/evas_blend_ops.h
> +++ b/evas/src/lib/include/evas_blend_ops.h
> @@ -348,12 +348,12 @@ mul3_sym_sse3(__m128i x, __m128i y) {
>    return  _mm_and_si128(res, RGB_MASK_SSE3);
>  }
>
> -#define LOOP_ALIGNED_U1_A48_SSE3(D, LENGTH, UOP,A4OP, A8OP) \
> +#define LOOP_ALIGNED_U1_A48_SSE3(DEST, LENGTH, UOP, A4OP, A8OP) \
>    { \
> -      while((uintptr_t)d & 0xF && l) UOP \
> +      while((uintptr_t)DEST & 0xF && LENGTH) UOP \
>    \
> -      while(l) { \
> -         switch(l) { \
> +      while(LENGTH) { \
> +         switch(LENGTH) { \
>             case 3: UOP \
>             case 2: UOP \
>             case 1: UOP \


Makes sense. I'm going to commit it if nobody opposes to (or commit) meanwhile.

Thanks.

Lucas De Marchi

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
enlightenment-devel mailing list
enlightenment-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to