The old version works because in every function in which
this macro is used ``l'' is the length and ``d'' is the
destination. This patch prevents future headaches when
those constraints no longer hold.
---
evas/src/lib/include/evas_blend_ops.h | 8 ++++----
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/evas/src/lib/include/evas_blend_ops.h
b/evas/src/lib/include/evas_blend_ops.h
index 1429596..8f78256 100644
--- a/evas/src/lib/include/evas_blend_ops.h
+++ b/evas/src/lib/include/evas_blend_ops.h
@@ -348,12 +348,12 @@ mul3_sym_sse3(__m128i x, __m128i y) {
return _mm_and_si128(res, RGB_MASK_SSE3);
}
-#define LOOP_ALIGNED_U1_A48_SSE3(D, LENGTH, UOP,A4OP, A8OP) \
+#define LOOP_ALIGNED_U1_A48_SSE3(DEST, LENGTH, UOP, A4OP, A8OP) \
{ \
- while((uintptr_t)d & 0xF && l) UOP \
+ while((uintptr_t)DEST & 0xF && LENGTH) UOP \
\
- while(l) { \
- switch(l) { \
+ while(LENGTH) { \
+ switch(LENGTH) { \
case 3: UOP \
case 2: UOP \
case 1: UOP \
--
1.7.3.4
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
enlightenment-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel