Rollback of PR #1349: direct_mmap: Use off_t on linux... PiperOrigin-RevId: 501014555 Change-Id: Ie204d307a4e537935a04c0f23bb13532e3c84bc8
diff --git a/absl/base/internal/direct_mmap.h b/absl/base/internal/direct_mmap.h index 14efc63..815b8d2 100644 --- a/absl/base/internal/direct_mmap.h +++ b/absl/base/internal/direct_mmap.h
@@ -72,7 +72,7 @@ // Platform specific logic extracted from // https://chromium.googlesource.com/linux-syscall-support/+/master/linux_syscall_support.h inline void* DirectMmap(void* start, size_t length, int prot, int flags, int fd, - off_t offset) noexcept { + off64_t offset) noexcept { #if defined(__i386__) || defined(__ARM_ARCH_3__) || defined(__ARM_EABI__) || \ defined(__m68k__) || defined(__sh__) || \ (defined(__hppa__) && !defined(__LP64__)) || \ @@ -101,7 +101,8 @@ static_cast<size_t>(offset / pagesize)); #else return reinterpret_cast<void*>( - syscall(SYS_mmap2, start, length, prot, flags, fd, offset / pagesize)); + syscall(SYS_mmap2, start, length, prot, flags, fd, + static_cast<off_t>(offset / pagesize))); #endif #elif defined(__s390x__) // On s390x, mmap() arguments are passed in memory.