path: root/arch/um/os-Linux/aio.c
diff options
authorPaolo 'Blaisorblade' Giarrusso <>2005-09-21 18:40:29 +0200
committerLinus Torvalds <>2005-09-21 16:16:30 -0700
commita46c9047642d70f5619e4a14129d74dd1f6ea74f (patch)
tree1d0850d57ad6c3d109c700c071e7cd468306a1e8 /arch/um/os-Linux/aio.c
parentae756df8ddd00a30bb3bdf6774b514c096dda4a4 (diff)
[PATCH] uml: comment about cast build fix
Explain why the casting we do to silence this warning is indeed safe. It is because the field we're casting from, though being 64-bit wide, was filled with a pointer in first place by ourselves. Signed-off-by: Paolo 'Blaisorblade' Giarrusso <> Signed-off-by: Linus Torvalds <>
Diffstat (limited to 'arch/um/os-Linux/aio.c')
1 files changed, 1 insertions, 0 deletions
diff --git a/arch/um/os-Linux/aio.c b/arch/um/os-Linux/aio.c
index 298d5632128b..f6e64026f995 100644
--- a/arch/um/os-Linux/aio.c
+++ b/arch/um/os-Linux/aio.c
@@ -144,6 +144,7 @@ static int aio_thread(void *arg)
"errno = %d\n", errno);
else {
+ /* This is safe as we've just a pointer here. */
aio = (struct aio_context *) (long);
if(update_aio(aio, event.res)){
do_aio(ctx, aio);