diff options
author | Kartik K. Agaram <vc@akkartik.com> | 2015-07-25 17:24:57 -0700 |
---|---|---|
committer | Kartik K. Agaram <vc@akkartik.com> | 2015-07-25 17:24:57 -0700 |
commit | 220f1e5fc9a5817906fc2b7441b903b21ab3f9f4 (patch) | |
tree | 9c8246ada5f216b2613ba1a25aa5a5b02fb9ec8d | |
parent | 6e21584e92e7ec3748e9ca75911d4a13eac594a5 (diff) | |
download | mu-220f1e5fc9a5817906fc2b7441b903b21ab3f9f4.tar.gz |
1850 - fix a warning on 32-bit systems
-rw-r--r-- | 001help.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/001help.cc b/001help.cc index 3e2a5944..24df0f29 100644 --- a/001help.cc +++ b/001help.cc @@ -78,7 +78,7 @@ bool is_equal(char* s, const char* lit) { // yadda-yadda. Instead use this macro below to perform an unsafe cast to // signed. We'll just give up immediately if a container's every too large. :(before "End Includes") -#define SIZE(X) (assert(X.size() < (1LL<<62)), static_cast<long long int>(X.size())) +#define SIZE(X) (assert(X.size() < (1LL<<(sizeof(long long int)*8-2))), static_cast<long long int>(X.size())) // // 5. Integer overflow is still impossible to guard against. Maybe after // reading http://www.cs.utah.edu/~regehr/papers/overflow12.pdf |