diff options
author | Kartik K. Agaram <vc@akkartik.com> | 2015-09-12 14:39:20 -0700 |
---|---|---|
committer | Kartik K. Agaram <vc@akkartik.com> | 2015-09-12 14:39:20 -0700 |
commit | 7be15b8b4ac500face0c01294cad28c489dfcfbf (patch) | |
tree | 06284ec0a987efd6d7cfc8e87d2f2ec0e5481d4e /001help.cc | |
parent | fa94f4d92340f001560b16dd0c2e5681ca5db031 (diff) | |
download | mu-7be15b8b4ac500face0c01294cad28c489dfcfbf.tar.gz |
2184 - bugfix in trace_count
It was reading lines like this in scenarios: -warn: f: error error as: -warn: f which was causing them to be silently ignored. Also found an insane preprocessor expansion from not parenthesizing preprocessor arguments. SIZE(end+delim) worked even when end was an integer, but it happily didn't ever get the wrong answer.
Diffstat (limited to '001help.cc')
-rw-r--r-- | 001help.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/001help.cc b/001help.cc index 24df0f29..3fb7b905 100644 --- a/001help.cc +++ b/001help.cc @@ -78,7 +78,7 @@ bool is_equal(char* s, const char* lit) { // yadda-yadda. Instead use this macro below to perform an unsafe cast to // signed. We'll just give up immediately if a container's every too large. :(before "End Includes") -#define SIZE(X) (assert(X.size() < (1LL<<(sizeof(long long int)*8-2))), static_cast<long long int>(X.size())) +#define SIZE(X) (assert((X).size() < (1LL<<(sizeof(long long int)*8-2))), static_cast<long long int>((X).size())) // // 5. Integer overflow is still impossible to guard against. Maybe after // reading http://www.cs.utah.edu/~regehr/papers/overflow12.pdf |