G'day all. Quoting Chung-chieh Shan <[EMAIL PROTECTED]>:
Yes. You can even do this portably, using nothing "unsafe", with Dylan Thurston's technique:
That paper gives you a choice between inefficient and leaky. I think I'll take unsafeCoerce#. :-) Cheers, Andrew Bromage _______________________________________________ Haskell-Cafe mailing list Haskell-Cafe@haskell.org http://www.haskell.org/mailman/listinfo/haskell-cafe