From da6bbca07c796c69172a649405474f03bee66754 Mon Sep 17 00:00:00 2001 From: Emilio Jesús Gallego Arias Date: Sat, 21 Feb 2009 20:17:23 +0100 Subject: xcb_io: Avoid datatype overflow on AMD64 and friends. --- src/xcb_io.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/xcb_io.c b/src/xcb_io.c index 96b82b86..4f0159c9 100644 --- a/src/xcb_io.c +++ b/src/xcb_io.c @@ -214,7 +214,7 @@ static void process_responses(Display *dpy, int wait_for_first_event, xcb_generi } else if(req && xcb_poll_for_reply(dpy->xcb->connection, req->sequence, &reply, &error)) { - unsigned int sequence = req->sequence; + uint64_t sequence = req->sequence; if(!reply) { dpy->xcb->pending_requests = req->next; @@ -300,7 +300,7 @@ void _XSend(Display *dpy, const char *data, long size) * we need to remember to check later. */ if(dpy->xcb->event_owner != XlibOwnsEventQueue || dpy->async_handlers) { - unsigned int sequence; + uint64_t sequence; for(sequence = dpy->xcb->last_flushed; sequence < dpy->request; ++sequence) { PendingRequest *req = malloc(sizeof(PendingRequest)); -- cgit v1.2.3