about summary refs log tree commit diff stats
diff options
context:
space:
mode:
authorKartik K. Agaram <vc@akkartik.com>2015-07-25 17:24:57 -0700
committerKartik K. Agaram <vc@akkartik.com>2015-07-25 17:24:57 -0700
commit220f1e5fc9a5817906fc2b7441b903b21ab3f9f4 (patch)
tree9c8246ada5f216b2613ba1a25aa5a5b02fb9ec8d
parent6e21584e92e7ec3748e9ca75911d4a13eac594a5 (diff)
downloadmu-220f1e5fc9a5817906fc2b7441b903b21ab3f9f4.tar.gz
1850 - fix a warning on 32-bit systems
-rw-r--r--001help.cc2
1 files changed, 1 insertions, 1 deletions
diff --git a/001help.cc b/001help.cc
index 3e2a5944..24df0f29 100644
--- a/001help.cc
+++ b/001help.cc
@@ -78,7 +78,7 @@ bool is_equal(char* s, const char* lit) {
 // yadda-yadda. Instead use this macro below to perform an unsafe cast to
 // signed. We'll just give up immediately if a container's every too large.
 :(before "End Includes")
-#define SIZE(X) (assert(X.size() < (1LL<<62)), static_cast<long long int>(X.size()))
+#define SIZE(X) (assert(X.size() < (1LL<<(sizeof(long long int)*8-2))), static_cast<long long int>(X.size()))
 //
 // 5. Integer overflow is still impossible to guard against. Maybe after
 // reading http://www.cs.utah.edu/~regehr/papers/overflow12.pdf