[INFO] fetching crate faer 0.19.3... [INFO] checking faer-0.19.3 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate faer 0.19.3 into /workspace/builds/worker-0-tc2/source [INFO] validating manifest of crates.io crate faer 0.19.3 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate faer 0.19.3 [INFO] removed 0 missing examples [INFO] finished tweaking crates.io crate faer 0.19.3 [INFO] tweaked toml for crates.io crate faer 0.19.3 written to /workspace/builds/worker-0-tc2/source/Cargo.toml [INFO] crate crates.io crate faer 0.19.3 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 1ae69b89ef852500bc58ecc086d2c03e232ed0c006e4dd6400c24ca83ac8a01e [INFO] running `Command { std: "docker" "start" "-a" "1ae69b89ef852500bc58ecc086d2c03e232ed0c006e4dd6400c24ca83ac8a01e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "1ae69b89ef852500bc58ecc086d2c03e232ed0c006e4dd6400c24ca83ac8a01e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1ae69b89ef852500bc58ecc086d2c03e232ed0c006e4dd6400c24ca83ac8a01e", kill_on_drop: false }` [INFO] [stdout] 1ae69b89ef852500bc58ecc086d2c03e232ed0c006e4dd6400c24ca83ac8a01e [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 2d2f6715c4554d78325b5a9b361c8e2586a7fb0024be4e91682ca44c8fe9532a [INFO] running `Command { std: "docker" "start" "-a" "2d2f6715c4554d78325b5a9b361c8e2586a7fb0024be4e91682ca44c8fe9532a", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (4 fixes) [INFO] [stderr] Compiling libm v0.2.8 [INFO] [stderr] Compiling libc v0.2.158 [INFO] [stderr] Checking cfg-if v1.0.0 [INFO] [stderr] Checking byteorder v1.5.0 [INFO] [stderr] Checking bytemuck v1.17.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling nano-gemm-codegen v0.1.0 [INFO] [stderr] Compiling syn v2.0.75 [INFO] [stderr] Compiling crossbeam-utils v0.8.20 [INFO] [stderr] Compiling serde v1.0.208 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Checking reborrow v0.5.5 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Compiling thiserror v1.0.63 [INFO] [stderr] Checking bitflags v1.3.2 [INFO] [stderr] Checking either v1.13.0 [INFO] [stderr] Checking raw-cpuid v10.7.0 [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Checking dyn-stack v0.10.0 [INFO] [stderr] Compiling seq-macro v0.3.5 [INFO] [stderr] Checking crossbeam-deque v0.8.5 [INFO] [stderr] Compiling ucd-trie v0.1.6 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Checking nano-gemm-core v0.1.0 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Compiling proc-macro2 v1.0.86 [INFO] [stderr] Checking utf8parse v0.2.2 [INFO] [stderr] Checking unicode-ident v1.0.12 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking siphasher v0.3.11 [INFO] [stderr] Checking anstyle-parse v0.2.5 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Compiling nano-gemm-f64 v0.1.0 [INFO] [stderr] Checking phf_shared v0.11.2 [INFO] [stderr] Compiling nano-gemm-c32 v0.1.0 [INFO] [stderr] Compiling nano-gemm-f32 v0.1.0 [INFO] [stderr] Compiling nano-gemm-c64 v0.1.0 [INFO] [stderr] Checking anstyle v1.0.8 [INFO] [stderr] Checking hashbrown v0.14.5 [INFO] [stderr] Checking num-integer v0.1.46 [INFO] [stderr] Checking colorchoice v1.0.2 [INFO] [stderr] Checking equivalent v1.0.1 [INFO] [stderr] Checking anstyle-query v1.1.1 [INFO] [stderr] Checking is_terminal_polyfill v1.70.1 [INFO] [stderr] Checking quote v1.0.36 [INFO] [stderr] Checking anstream v0.6.15 [INFO] [stderr] Checking num-bigint v0.4.6 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking safe_arch v0.7.2 [INFO] [stderr] Compiling matrixmultiply v0.3.9 [INFO] [stderr] Checking ryu v1.0.18 [INFO] [stderr] Checking regex-syntax v0.8.4 [INFO] [stderr] Checking indexmap v2.4.0 [INFO] [stderr] Checking clap_lex v0.7.2 [INFO] [stderr] Compiling prettyplease v0.2.20 [INFO] [stderr] Checking winnow v0.6.18 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking strsim v0.11.1 [INFO] [stderr] Compiling serde_json v1.0.125 [INFO] [stderr] Checking clap_builder v4.5.15 [INFO] [stderr] Compiling typenum v1.17.0 [INFO] [stderr] Checking wide v0.7.28 [INFO] [stderr] Checking approx v0.5.1 [INFO] [stderr] Checking rawpointer v0.2.1 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Checking matrixcompare-core v0.1.0 [INFO] [stderr] Checking coe-rs v0.1.2 [INFO] [stderr] Checking matrixcompare v0.3.0 [INFO] [stderr] Compiling zerocopy-derive v0.7.35 [INFO] [stderr] Compiling thiserror-impl v1.0.63 [INFO] [stderr] Compiling serde_derive v1.0.208 [INFO] [stderr] Compiling equator-macro v0.2.1 [INFO] [stderr] Checking zerocopy v0.7.35 [INFO] [stderr] Checking equator v0.2.2 [INFO] [stderr] Compiling phf_macros v0.11.2 [INFO] [stderr] Compiling pest v2.7.11 [INFO] [stderr] Checking ppv-lite86 v0.2.20 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Compiling clap_derive v4.5.13 [INFO] [stderr] Checking phf v0.11.2 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking csscolorparser v0.6.2 [INFO] [stderr] Compiling equator-macro v0.4.1 [INFO] [stderr] Checking num-complex v0.4.6 [INFO] [stderr] Compiling pest_meta v2.7.11 [INFO] [stderr] Checking equator v0.4.1 [INFO] [stderr] Checking pulp v0.18.22 [INFO] [stderr] Compiling pest_generator v2.7.11 [INFO] [stderr] Checking gemm-common v0.18.0 [INFO] [stderr] Checking faer-entity v0.19.2 [INFO] [stderr] Checking gemm-f32 v0.18.0 [INFO] [stderr] Compiling pest_derive v2.7.11 [INFO] [stderr] Checking py_literal v0.4.0 [INFO] [stderr] Checking gemm-c64 v0.18.0 [INFO] [stderr] Checking gemm-f64 v0.18.0 [INFO] [stderr] Checking gemm-c32 v0.18.0 [INFO] [stderr] Checking clap v4.5.16 [INFO] [stderr] Checking npyz v0.8.3 [INFO] [stderr] Checking simba v0.8.1 [INFO] [stderr] Checking rand_distr v0.4.3 [INFO] [stderr] Checking colorgrad v0.6.2 [INFO] [stderr] Checking serde_spanned v0.6.7 [INFO] [stderr] Checking toml_datetime v0.6.8 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking toml_edit v0.22.20 [INFO] [stderr] Checking gemm v0.18.0 [INFO] [stderr] Compiling nalgebra-macros v0.2.2 [INFO] [stderr] Checking num-rational v0.4.2 [INFO] [stderr] Checking num_cpus v1.16.0 [INFO] [stderr] Checking csv-core v0.1.11 [INFO] [stderr] Checking dyn-clone v1.0.17 [INFO] [stderr] Checking dbgf v0.1.2 [INFO] [stderr] Checking core_affinity v0.8.1 [INFO] [stderr] Checking serde_test v1.0.177 [INFO] [stderr] Checking csv v1.3.0 [INFO] [stderr] Checking aligned-vec v0.6.1 [INFO] [stderr] Checking amd v0.2.2 [INFO] [stderr] Checking matrix-market-rs v0.1.3 [INFO] [stderr] Checking assert_approx_eq v1.1.0 [INFO] [stderr] Checking toml v0.8.19 [INFO] [stderr] Checking diol v0.8.3 [INFO] [stderr] Checking nalgebra v0.32.6 [INFO] [stderr] Checking nano-gemm v0.1.2 [INFO] [stderr] Checking faer v0.19.3 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `faer` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/col/colmut.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/linalg/matmul/mod.rs [INFO] [stderr] * src/linalg/matmul/triangular.rs [INFO] [stderr] * src/row/rowmut.rs [INFO] [stderr] * src/sort.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:180:14 [INFO] [stderr] | [INFO] [stderr] 180 | ($E: ty, $val:expr_2021 $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:196:16 [INFO] [stderr] | [INFO] [stderr] 196 | ($E: ty, $($val:expr_2021),+ $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:7 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:30 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:73 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:92 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:111 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:127 [INFO] [stderr] | [INFO] [stderr] 206 | ...dent, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/matmul/mod.rs:1642:18 [INFO] [stderr] | [INFO] [stderr] 1642 | ($term: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:371:6 [INFO] [stderr] | [INFO] [stderr] 371 | ($head: expr_2021 $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:375:6 [INFO] [stderr] | [INFO] [stderr] 375 | ($head: expr_2021, $($tail: expr_2021),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:375:26 [INFO] [stderr] | [INFO] [stderr] 375 | ($head: expr_2021, $($tail: expr_2021),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:425:12 [INFO] [stderr] | [INFO] [stderr] 425 | ([$([$($col:expr_2021),*])*] $($v:expr_2021;)* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:425:36 [INFO] [stderr] | [INFO] [stderr] 425 | ([$([$($col:expr_2021),*])*] $($v:expr_2021;)* ) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:428:12 [INFO] [stderr] | [INFO] [stderr] 428 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:428:36 [INFO] [stderr] | [INFO] [stderr] 428 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:428:53 [INFO] [stderr] | [INFO] [stderr] 428 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:468:11 [INFO] [stderr] | [INFO] [stderr] 468 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:596:11 [INFO] [stderr] | [INFO] [stderr] 596 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:621:8 [INFO] [stderr] | [INFO] [stderr] 621 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:650:8 [INFO] [stderr] | [INFO] [stderr] 650 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:102:5 [INFO] [stderr] | [INFO] [stderr] 102 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 115 | / stack_mat!( [INFO] [stderr] 116 | | [16, 16], [INFO] [stderr] 117 | | temp_dst, [INFO] [stderr] 118 | | n, [INFO] [stderr] ... | [INFO] [stderr] 122 | | E [INFO] [stderr] 123 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:102:5 [INFO] [stderr] | [INFO] [stderr] 102 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 124 | / stack_mat!( [INFO] [stderr] 125 | | [16, 16], [INFO] [stderr] 126 | | temp_rhs, [INFO] [stderr] 127 | | n, [INFO] [stderr] ... | [INFO] [stderr] 131 | | E [INFO] [stderr] 132 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:102:5 [INFO] [stderr] | [INFO] [stderr] 102 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 115 | / stack_mat!( [INFO] [stderr] 116 | | [16, 16], [INFO] [stderr] 117 | | temp_dst, [INFO] [stderr] 118 | | n, [INFO] [stderr] ... | [INFO] [stderr] 122 | | E [INFO] [stderr] 123 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:102:5 [INFO] [stderr] | [INFO] [stderr] 102 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 124 | / stack_mat!( [INFO] [stderr] 125 | | [16, 16], [INFO] [stderr] 126 | | temp_rhs, [INFO] [stderr] 127 | | n, [INFO] [stderr] ... | [INFO] [stderr] 131 | | E [INFO] [stderr] 132 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:233:5 [INFO] [stderr] | [INFO] [stderr] 233 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 253 | / stack_mat!( [INFO] [stderr] 254 | | [16, 16], [INFO] [stderr] 255 | | temp_rhs, [INFO] [stderr] 256 | | n, [INFO] [stderr] ... | [INFO] [stderr] 260 | | E [INFO] [stderr] 261 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:233:5 [INFO] [stderr] | [INFO] [stderr] 233 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 253 | / stack_mat!( [INFO] [stderr] 254 | | [16, 16], [INFO] [stderr] 255 | | temp_rhs, [INFO] [stderr] 256 | | n, [INFO] [stderr] ... | [INFO] [stderr] 260 | | E [INFO] [stderr] 261 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:342:5 [INFO] [stderr] | [INFO] [stderr] 342 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 355 | / stack_mat!( [INFO] [stderr] 356 | | [16, 16], [INFO] [stderr] 357 | | temp_dst, [INFO] [stderr] 358 | | n, [INFO] [stderr] ... | [INFO] [stderr] 362 | | E [INFO] [stderr] 363 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:342:5 [INFO] [stderr] | [INFO] [stderr] 342 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 364 | / stack_mat!( [INFO] [stderr] 365 | | [16, 16], [INFO] [stderr] 366 | | temp_lhs, [INFO] [stderr] 367 | | n, [INFO] [stderr] ... | [INFO] [stderr] 371 | | E [INFO] [stderr] 372 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:342:5 [INFO] [stderr] | [INFO] [stderr] 342 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 373 | / stack_mat!( [INFO] [stderr] 374 | | [16, 16], [INFO] [stderr] 375 | | temp_rhs, [INFO] [stderr] 376 | | n, [INFO] [stderr] ... | [INFO] [stderr] 380 | | E [INFO] [stderr] 381 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:342:5 [INFO] [stderr] | [INFO] [stderr] 342 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 355 | / stack_mat!( [INFO] [stderr] 356 | | [16, 16], [INFO] [stderr] 357 | | temp_dst, [INFO] [stderr] 358 | | n, [INFO] [stderr] ... | [INFO] [stderr] 362 | | E [INFO] [stderr] 363 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:342:5 [INFO] [stderr] | [INFO] [stderr] 342 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 364 | / stack_mat!( [INFO] [stderr] 365 | | [16, 16], [INFO] [stderr] 366 | | temp_lhs, [INFO] [stderr] 367 | | n, [INFO] [stderr] ... | [INFO] [stderr] 371 | | E [INFO] [stderr] 372 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:342:5 [INFO] [stderr] | [INFO] [stderr] 342 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 373 | / stack_mat!( [INFO] [stderr] 374 | | [16, 16], [INFO] [stderr] 375 | | temp_rhs, [INFO] [stderr] 376 | | n, [INFO] [stderr] ... | [INFO] [stderr] 380 | | E [INFO] [stderr] 381 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:474:5 [INFO] [stderr] | [INFO] [stderr] 474 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 487 | / stack_mat!( [INFO] [stderr] 488 | | [16, 16], [INFO] [stderr] 489 | | temp_lhs, [INFO] [stderr] 490 | | n, [INFO] [stderr] ... | [INFO] [stderr] 494 | | E [INFO] [stderr] 495 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:474:5 [INFO] [stderr] | [INFO] [stderr] 474 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 496 | / stack_mat!( [INFO] [stderr] 497 | | [16, 16], [INFO] [stderr] 498 | | temp_rhs, [INFO] [stderr] 499 | | n, [INFO] [stderr] ... | [INFO] [stderr] 503 | | E [INFO] [stderr] 504 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:474:5 [INFO] [stderr] | [INFO] [stderr] 474 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 487 | / stack_mat!( [INFO] [stderr] 488 | | [16, 16], [INFO] [stderr] 489 | | temp_lhs, [INFO] [stderr] 490 | | n, [INFO] [stderr] ... | [INFO] [stderr] 494 | | E [INFO] [stderr] 495 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:474:5 [INFO] [stderr] | [INFO] [stderr] 474 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 496 | / stack_mat!( [INFO] [stderr] 497 | | [16, 16], [INFO] [stderr] 498 | | temp_rhs, [INFO] [stderr] 499 | | n, [INFO] [stderr] ... | [INFO] [stderr] 503 | | E [INFO] [stderr] 504 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:623:5 [INFO] [stderr] | [INFO] [stderr] 623 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 636 | / stack_mat!( [INFO] [stderr] 637 | | [16, 16], [INFO] [stderr] 638 | | temp_dst, [INFO] [stderr] 639 | | n, [INFO] [stderr] ... | [INFO] [stderr] 643 | | E [INFO] [stderr] 644 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:623:5 [INFO] [stderr] | [INFO] [stderr] 623 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 645 | / stack_mat!( [INFO] [stderr] 646 | | [16, 16], [INFO] [stderr] 647 | | temp_lhs, [INFO] [stderr] 648 | | n, [INFO] [stderr] ... | [INFO] [stderr] 652 | | E [INFO] [stderr] 653 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:623:5 [INFO] [stderr] | [INFO] [stderr] 623 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 654 | / stack_mat!( [INFO] [stderr] 655 | | [16, 16], [INFO] [stderr] 656 | | temp_rhs, [INFO] [stderr] 657 | | n, [INFO] [stderr] ... | [INFO] [stderr] 661 | | E [INFO] [stderr] 662 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:623:5 [INFO] [stderr] | [INFO] [stderr] 623 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 636 | / stack_mat!( [INFO] [stderr] 637 | | [16, 16], [INFO] [stderr] 638 | | temp_dst, [INFO] [stderr] 639 | | n, [INFO] [stderr] ... | [INFO] [stderr] 643 | | E [INFO] [stderr] 644 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:623:5 [INFO] [stderr] | [INFO] [stderr] 623 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 645 | / stack_mat!( [INFO] [stderr] 646 | | [16, 16], [INFO] [stderr] 647 | | temp_lhs, [INFO] [stderr] 648 | | n, [INFO] [stderr] ... | [INFO] [stderr] 652 | | E [INFO] [stderr] 653 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:623:5 [INFO] [stderr] | [INFO] [stderr] 623 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 654 | / stack_mat!( [INFO] [stderr] 655 | | [16, 16], [INFO] [stderr] 656 | | temp_rhs, [INFO] [stderr] 657 | | n, [INFO] [stderr] ... | [INFO] [stderr] 661 | | E [INFO] [stderr] 662 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:219:22 [INFO] [stderr] | [INFO] [stderr] 219 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:763:5 [INFO] [stderr] | [INFO] [stderr] 763 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 782 | / stack_mat!( [INFO] [stderr] 783 | | [16, 16], [INFO] [stderr] 784 | | temp_dst, [INFO] [stderr] 785 | | n, [INFO] [stderr] ... | [INFO] [stderr] 789 | | E [INFO] [stderr] 790 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:249:25 [INFO] [stderr] | [INFO] [stderr] 249 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/linalg/matmul/triangular.rs:763:5 [INFO] [stderr] | [INFO] [stderr] 763 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 782 | / stack_mat!( [INFO] [stderr] 783 | | [16, 16], [INFO] [stderr] 784 | | temp_dst, [INFO] [stderr] 785 | | n, [INFO] [stderr] ... | [INFO] [stderr] 789 | | E [INFO] [stderr] 790 | | ); [INFO] [stderr] | |_________________- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/col/colmut.rs:268:9 [INFO] [stderr] | [INFO] [stderr] 266 | pub unsafe fn split_at_mut_unchecked(self, row: usize) -> (Self, Self) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] 267 | let (top, bot) = self.into_const().split_at_unchecked(row); [INFO] [stderr] 268 | unsafe { (top.const_cast(), bot.const_cast()) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/row/rowmut.rs:246:9 [INFO] [stderr] | [INFO] [stderr] 244 | pub unsafe fn split_at_mut_unchecked(self, col: usize) -> (Self, Self) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] 245 | let (left, right) = self.into_const().split_at_unchecked(col); [INFO] [stderr] 246 | unsafe { (left.const_cast(), right.const_cast()) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:337:9 [INFO] [stderr] | [INFO] [stderr] 325 | ) -> bool { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 337 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:444:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 444 | let mut r = unsafe { l.add(v_len) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:509:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 509 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:542:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 542 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:586:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 586 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:615:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 615 | l = unsafe { l.add(block_l) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:624:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 624 | r = unsafe { r.sub(block_r) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:652:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 652 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:665:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 665 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:698:48 [INFO] [stderr] | [INFO] [stderr] 686 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 698 | let tmp = core::mem::ManuallyDrop::new(unsafe { P::read(pivot) }); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:715:9 [INFO] [stderr] | [INFO] [stderr] 686 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 715 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:761:44 [INFO] [stderr] | [INFO] [stderr] 751 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 761 | let tmp = core::mem::ManuallyDrop::new(unsafe { P::read(pivot) }); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:783:9 [INFO] [stderr] | [INFO] [stderr] 751 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 783 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:891:56 [INFO] [stderr] | [INFO] [stderr] 866 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 891 | let mut sort2 = |a: &mut usize, b: &mut usize| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 21 previous errors; 40 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/matmul/mod.rs:2855:39 [INFO] [stdout] | [INFO] [stdout] 2855 | vector_1.push(rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/matmul/mod.rs:2856:39 [INFO] [stdout] | [INFO] [stdout] 2856 | vector_2.push(rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:322:40 [INFO] [stdout] | [INFO] [stdout] 322 | fn test_solve(mut gen: impl FnMut() -> E, epsilon: E::Real) { [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:325:51 [INFO] [stdout] | [INFO] [stdout] 325 | let a = Mat::from_fn(n, n, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:331:53 [INFO] [stdout] | [INFO] [stdout] 331 | let rhs = Mat::from_fn(n, k, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:396:50 [INFO] [stdout] | [INFO] [stdout] 396 | fn test_solve_transpose(mut gen: impl FnMut() -> E, epsilon: E::Real) { [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:399:51 [INFO] [stdout] | [INFO] [stdout] 399 | let a = Mat::from_fn(n, n, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:405:53 [INFO] [stdout] | [INFO] [stdout] 405 | let rhs = Mat::from_fn(n, k, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:478:17 [INFO] [stdout] | [INFO] [stdout] 478 | rng.gen() [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/full_pivoting/solve.rs:485:17 [INFO] [stdout] | [INFO] [stdout] 485 | rng.gen() [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:307:40 [INFO] [stdout] | [INFO] [stdout] 307 | fn test_solve(mut gen: impl FnMut() -> E, epsilon: E::Real) { [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:310:51 [INFO] [stdout] | [INFO] [stdout] 310 | let a = Mat::from_fn(n, n, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:316:53 [INFO] [stdout] | [INFO] [stdout] 316 | let rhs = Mat::from_fn(n, k, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:376:50 [INFO] [stdout] | [INFO] [stdout] 376 | fn test_solve_transpose(mut gen: impl FnMut() -> E, epsilon: E::Real) { [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:379:51 [INFO] [stdout] | [INFO] [stdout] 379 | let a = Mat::from_fn(n, n, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:385:53 [INFO] [stdout] | [INFO] [stdout] 385 | let rhs = Mat::from_fn(n, k, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:453:17 [INFO] [stdout] | [INFO] [stdout] 453 | rng.gen() [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/lu/partial_pivoting/solve.rs:460:17 [INFO] [stdout] | [INFO] [stdout] 460 | rng.gen() [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/col_pivoting/inverse.rs:163:24 [INFO] [stdout] | [INFO] [stdout] 163 | E::new(rng.gen(), rng.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/col_pivoting/inverse.rs:163:35 [INFO] [stdout] | [INFO] [stdout] 163 | E::new(rng.gen(), rng.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/col_pivoting/reconstruct.rs:156:24 [INFO] [stdout] | [INFO] [stdout] 156 | E::new(rng.gen(), rng.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/col_pivoting/reconstruct.rs:156:35 [INFO] [stdout] | [INFO] [stdout] 156 | E::new(rng.gen(), rng.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/no_pivoting/compute.rs:441:25 [INFO] [stdout] | [INFO] [stdout] 441 | re: rng.gen(), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/no_pivoting/compute.rs:442:25 [INFO] [stdout] | [INFO] [stdout] 442 | im: rng.gen(), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/no_pivoting/inverse.rs:151:25 [INFO] [stdout] | [INFO] [stdout] 151 | re: rng.gen(), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/no_pivoting/inverse.rs:152:25 [INFO] [stdout] | [INFO] [stdout] 152 | im: rng.gen(), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/no_pivoting/reconstruct.rs:145:25 [INFO] [stdout] | [INFO] [stdout] 145 | re: rng.gen(), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/linalg/qr/no_pivoting/reconstruct.rs:146:25 [INFO] [stdout] | [INFO] [stdout] 146 | im: rng.gen(), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5566:17 [INFO] [stdout] | [INFO] [stdout] 5566 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5570:56 [INFO] [stdout] | [INFO] [stdout] 5570 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5570:60 [INFO] [stdout] | [INFO] [stdout] 5570 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5665:17 [INFO] [stdout] | [INFO] [stdout] 5665 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5669:65 [INFO] [stdout] | [INFO] [stdout] 5669 | e.faer_add(i.faer_mul(E::faer_from_f64(2000.0 * gen.gen::()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5669:69 [INFO] [stdout] | [INFO] [stdout] 5669 | e.faer_add(i.faer_mul(E::faer_from_f64(2000.0 * gen.gen::()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5670:57 [INFO] [stdout] | [INFO] [stdout] 5670 | .faer_add(E::faer_from_f64(2000.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5670:61 [INFO] [stdout] | [INFO] [stdout] 5670 | .faer_add(E::faer_from_f64(2000.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5672:53 [INFO] [stdout] | [INFO] [stdout] 5672 | e.faer_add(E::faer_from_f64(100.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5672:57 [INFO] [stdout] | [INFO] [stdout] 5672 | e.faer_add(E::faer_from_f64(100.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5749:34 [INFO] [stdout] | [INFO] [stdout] 5749 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5749:38 [INFO] [stdout] | [INFO] [stdout] 5749 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5749:82 [INFO] [stdout] | [INFO] [stdout] 5749 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5749:86 [INFO] [stdout] | [INFO] [stdout] 5749 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5789:17 [INFO] [stdout] | [INFO] [stdout] 5789 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5800:65 [INFO] [stdout] | [INFO] [stdout] 5800 | e.faer_add(i.faer_mul(E::faer_from_f64(1000.0 * gen.gen::()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5800:69 [INFO] [stdout] | [INFO] [stdout] 5800 | e.faer_add(i.faer_mul(E::faer_from_f64(1000.0 * gen.gen::()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5802:54 [INFO] [stdout] | [INFO] [stdout] 5802 | e.faer_add(E::faer_from_f64(1000.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5802:58 [INFO] [stdout] | [INFO] [stdout] 5802 | e.faer_add(E::faer_from_f64(1000.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5881:34 [INFO] [stdout] | [INFO] [stdout] 5881 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5881:38 [INFO] [stdout] | [INFO] [stdout] 5881 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5881:82 [INFO] [stdout] | [INFO] [stdout] 5881 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5881:86 [INFO] [stdout] | [INFO] [stdout] 5881 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:5940:17 [INFO] [stdout] | [INFO] [stdout] 5940 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6022:34 [INFO] [stdout] | [INFO] [stdout] 6022 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6022:38 [INFO] [stdout] | [INFO] [stdout] 6022 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6022:82 [INFO] [stdout] | [INFO] [stdout] 6022 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6022:86 [INFO] [stdout] | [INFO] [stdout] 6022 | E::faer_from_f64(gen.gen()).faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6081:17 [INFO] [stdout] | [INFO] [stdout] 6081 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6085:56 [INFO] [stdout] | [INFO] [stdout] 6085 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6085:60 [INFO] [stdout] | [INFO] [stdout] 6085 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6160:21 [INFO] [stdout] | [INFO] [stdout] 6160 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6164:60 [INFO] [stdout] | [INFO] [stdout] 6164 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6164:64 [INFO] [stdout] | [INFO] [stdout] 6164 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6282:42 [INFO] [stdout] | [INFO] [stdout] 6282 | E::faer_from_f64(gen.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6282:46 [INFO] [stdout] | [INFO] [stdout] 6282 | E::faer_from_f64(gen.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6283:67 [INFO] [stdout] | [INFO] [stdout] 6283 | ... .faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6283:71 [INFO] [stdout] | [INFO] [stdout] 6283 | ... .faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6324:21 [INFO] [stdout] | [INFO] [stdout] 6324 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6328:60 [INFO] [stdout] | [INFO] [stdout] 6328 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6328:64 [INFO] [stdout] | [INFO] [stdout] 6328 | e.faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6443:42 [INFO] [stdout] | [INFO] [stdout] 6443 | E::faer_from_f64(gen.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6443:46 [INFO] [stdout] | [INFO] [stdout] 6443 | E::faer_from_f64(gen.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6444:67 [INFO] [stdout] | [INFO] [stdout] 6444 | ... .faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6444:71 [INFO] [stdout] | [INFO] [stdout] 6444 | ... .faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6485:21 [INFO] [stdout] | [INFO] [stdout] 6485 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6489:69 [INFO] [stdout] | [INFO] [stdout] 6489 | e.faer_add(i.faer_mul(E::faer_from_f64(2000.0 * gen.gen::()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6489:73 [INFO] [stdout] | [INFO] [stdout] 6489 | e.faer_add(i.faer_mul(E::faer_from_f64(2000.0 * gen.gen::()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6490:61 [INFO] [stdout] | [INFO] [stdout] 6490 | .faer_add(E::faer_from_f64(2000.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6490:65 [INFO] [stdout] | [INFO] [stdout] 6490 | .faer_add(E::faer_from_f64(2000.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6492:57 [INFO] [stdout] | [INFO] [stdout] 6492 | e.faer_add(E::faer_from_f64(100.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6492:61 [INFO] [stdout] | [INFO] [stdout] 6492 | e.faer_add(E::faer_from_f64(100.0 * gen.gen::())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6588:42 [INFO] [stdout] | [INFO] [stdout] 6588 | E::faer_from_f64(gen.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6588:46 [INFO] [stdout] | [INFO] [stdout] 6588 | E::faer_from_f64(gen.gen()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6589:67 [INFO] [stdout] | [INFO] [stdout] 6589 | ... .faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/cholesky.rs:6589:71 [INFO] [stdout] | [INFO] [stdout] 6589 | ... .faer_add(i.faer_mul(E::faer_from_f64(gen.gen()))) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2464:17 [INFO] [stdout] | [INFO] [stdout] 2464 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2464:37 [INFO] [stdout] | [INFO] [stdout] 2464 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2464:55 [INFO] [stdout] | [INFO] [stdout] 2464 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2466:38 [INFO] [stdout] | [INFO] [stdout] 2466 | let val = val.iter().map(|_| gen()).collect::>(); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2557:45 [INFO] [stdout] | [INFO] [stdout] 2557 | let rhs = Mat::from_fn(n, k, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2625:17 [INFO] [stdout] | [INFO] [stdout] 2625 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2625:37 [INFO] [stdout] | [INFO] [stdout] 2625 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2625:55 [INFO] [stdout] | [INFO] [stdout] 2625 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2627:38 [INFO] [stdout] | [INFO] [stdout] 2627 | let val = val.iter().map(|_| gen()).collect::>(); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2656:45 [INFO] [stdout] | [INFO] [stdout] 2656 | let rhs = Mat::from_fn(n, k, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2725:17 [INFO] [stdout] | [INFO] [stdout] 2725 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2725:37 [INFO] [stdout] | [INFO] [stdout] 2725 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2725:55 [INFO] [stdout] | [INFO] [stdout] 2725 | let mut gen = || E::new(rng.gen::(), rng.gen::()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2727:38 [INFO] [stdout] | [INFO] [stdout] 2727 | let val = val.iter().map(|_| gen()).collect::>(); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/lu.rs:2733:50 [INFO] [stdout] | [INFO] [stdout] 2733 | let rhs = Mat::::from_fn(m, 6, |_, _| gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2827:17 [INFO] [stdout] | [INFO] [stdout] 2827 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2833:35 [INFO] [stdout] | [INFO] [stdout] 2833 | .map(|&x| c64::new(x, gen.gen())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2833:39 [INFO] [stdout] | [INFO] [stdout] 2833 | .map(|&x| c64::new(x, gen.gen())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2952:63 [INFO] [stdout] | [INFO] [stdout] 2952 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2952:67 [INFO] [stdout] | [INFO] [stdout] 2952 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2952:74 [INFO] [stdout] | [INFO] [stdout] 2952 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2952:78 [INFO] [stdout] | [INFO] [stdout] 2952 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2985:17 [INFO] [stdout] | [INFO] [stdout] 2985 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2991:35 [INFO] [stdout] | [INFO] [stdout] 2991 | .map(|&x| c64::new(x, gen.gen())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:2991:39 [INFO] [stdout] | [INFO] [stdout] 2991 | .map(|&x| c64::new(x, gen.gen())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3083:63 [INFO] [stdout] | [INFO] [stdout] 3083 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3083:67 [INFO] [stdout] | [INFO] [stdout] 3083 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3083:74 [INFO] [stdout] | [INFO] [stdout] 3083 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3083:78 [INFO] [stdout] | [INFO] [stdout] 3083 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3137:17 [INFO] [stdout] | [INFO] [stdout] 3137 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3143:35 [INFO] [stdout] | [INFO] [stdout] 3143 | .map(|&x| c64::new(x, gen.gen())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3143:39 [INFO] [stdout] | [INFO] [stdout] 3143 | .map(|&x| c64::new(x, gen.gen())) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3168:59 [INFO] [stdout] | [INFO] [stdout] 3168 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3168:63 [INFO] [stdout] | [INFO] [stdout] 3168 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3168:70 [INFO] [stdout] | [INFO] [stdout] 3168 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3168:74 [INFO] [stdout] | [INFO] [stdout] 3168 | let rhs = Mat::::from_fn(m, 2, |_, _| c64::new(gen.gen(), gen.gen())); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3241:17 [INFO] [stdout] | [INFO] [stdout] 3241 | let mut gen = rand::rngs::StdRng::seed_from_u64(0); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3250:22 [INFO] [stdout] | [INFO] [stdout] 3250 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3250:26 [INFO] [stdout] | [INFO] [stdout] 3250 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3250:33 [INFO] [stdout] | [INFO] [stdout] 3250 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3250:37 [INFO] [stdout] | [INFO] [stdout] 3250 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3251:22 [INFO] [stdout] | [INFO] [stdout] 3251 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3251:26 [INFO] [stdout] | [INFO] [stdout] 3251 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3251:33 [INFO] [stdout] | [INFO] [stdout] 3251 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sparse/linalg/qr.rs:3251:37 [INFO] [stdout] | [INFO] [stdout] 3251 | c64::new(gen.gen(), gen.gen()), [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sort.rs:1203:43 [INFO] [stdout] | [INFO] [stdout] 1203 | let mut a = (0..1000).map(|_| rng.gen::()).collect::>(); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sort.rs:1204:43 [INFO] [stdout] | [INFO] [stdout] 1204 | let mut b = (0..1000).map(|_| rng.gen::()).collect::>(); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:180:19 [INFO] [stdout] | [INFO] [stdout] 180 | ($E: ty, $val:expr $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 180 | ($E: ty, $val:expr_2021 $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:196:21 [INFO] [stdout] | [INFO] [stdout] 196 | ($E: ty, $($val:expr),+ $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 196 | ($E: ty, $($val:expr_2021),+ $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:206:19 [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr_2021, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:206:37 [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:206:71 [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:206:85 [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr_2021, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:206:96 [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr_2021, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:206:107 [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 206 | ([$max_nrows: expr, $max_ncols: expr$(,)?], $name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr_2021, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/linalg/matmul/mod.rs:1642:25 [INFO] [stdout] | [INFO] [stdout] 1642 | ($term: expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1642 | ($term: expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:371:13 [INFO] [stdout] | [INFO] [stdout] 371 | ($head: expr $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 371 | ($head: expr_2021 $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:375:13 [INFO] [stdout] | [INFO] [stdout] 375 | ($head: expr, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 375 | ($head: expr_2021, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:375:28 [INFO] [stdout] | [INFO] [stdout] 375 | ($head: expr, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 375 | ($head: expr, $($tail: expr_2021),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:425:17 [INFO] [stdout] | [INFO] [stdout] 425 | ([$([$($col:expr),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 425 | ([$([$($col:expr_2021),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:425:34 [INFO] [stdout] | [INFO] [stdout] 425 | ([$([$($col:expr),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 425 | ([$([$($col:expr),*])*] $($v:expr_2021;)* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:428:17 [INFO] [stdout] | [INFO] [stdout] 428 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 428 | ([$([$($col:expr_2021),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:428:35 [INFO] [stdout] | [INFO] [stdout] 428 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 428 | ([$([$($col:expr),*])*] $($v0:expr_2021, $($v:expr),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:428:46 [INFO] [stdout] | [INFO] [stdout] 428 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 428 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr_2021),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:468:14 [INFO] [stdout] | [INFO] [stdout] 468 | ($([$($v:expr),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 468 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:596:14 [INFO] [stdout] | [INFO] [stdout] 596 | ($([$($v:expr),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 596 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:621:11 [INFO] [stdout] | [INFO] [stdout] 621 | ($($v:expr),+ $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 621 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:650:11 [INFO] [stdout] | [INFO] [stdout] 650 | ($($v:expr),+ $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 650 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MaybeContiguous::get_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:594:14 [INFO] [stdout] | [INFO] [stdout] 594 | Last(self.0.get_slice_unchecked(idx, n_elems)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:593:5 [INFO] [stdout] | [INFO] [stdout] 593 | unsafe fn get_slice_unchecked(&mut self, idx: Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:609:14 [INFO] [stdout] | [INFO] [stdout] 609 | Last(self.0.get_unchecked(index)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:608:5 [INFO] [stdout] | [INFO] [stdout] 608 | unsafe fn get_unchecked(&'a mut self, index: Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MatIndex::get_from_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:614:14 [INFO] [stdout] | [INFO] [stdout] 614 | Last(Mat::get_from_slice_unchecked(&mut slice.0, idx)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:613:5 [INFO] [stdout] | [INFO] [stdout] 613 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MaybeContiguous::get_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:649:13 [INFO] [stdout] | [INFO] [stdout] 649 | self.0.get_slice_unchecked(idx, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:647:5 [INFO] [stdout] | [INFO] [stdout] 647 | unsafe fn get_slice_unchecked(&mut self, idx: Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MaybeContiguous::get_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:650:13 [INFO] [stdout] | [INFO] [stdout] 650 | self.1.get_slice_unchecked(idx, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:673:13 [INFO] [stdout] | [INFO] [stdout] 673 | Zip(self.0.get_unchecked(index), self.1.get_unchecked(index)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:672:5 [INFO] [stdout] | [INFO] [stdout] 672 | unsafe fn get_unchecked(&'a mut self, index: Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:673:42 [INFO] [stdout] | [INFO] [stdout] 673 | Zip(self.0.get_unchecked(index), self.1.get_unchecked(index)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MatIndex::get_from_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:679:13 [INFO] [stdout] | [INFO] [stdout] 679 | Head::get_from_slice_unchecked(&mut slice.0, idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:677:5 [INFO] [stdout] | [INFO] [stdout] 677 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::zip::MatIndex::get_from_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:680:13 [INFO] [stdout] | [INFO] [stdout] 680 | Tail::get_from_slice_unchecked(&mut slice.1, idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:708:19 [INFO] [stdout] | [INFO] [stdout] 708 | |ptr| core::slice::from_raw_parts(ptr as *const MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:704:5 [INFO] [stdout] | [INFO] [stdout] 704 | unsafe fn get_slice_unchecked(&mut self, (i, _): Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:719:17 [INFO] [stdout] | [INFO] [stdout] 719 | self.rb().ptr_inbounds_at(i), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:716:5 [INFO] [stdout] | [INFO] [stdout] 716 | unsafe fn get_unchecked(&'a mut self, (i, _): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:721:24 [INFO] [stdout] | [INFO] [stdout] 721 | |ptr| &*(ptr as *const MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:733:25 [INFO] [stdout] | [INFO] [stdout] 733 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:727:5 [INFO] [stdout] | [INFO] [stdout] 727 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:773:19 [INFO] [stdout] | [INFO] [stdout] 773 | |ptr| core::slice::from_raw_parts_mut(ptr as *mut MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:769:5 [INFO] [stdout] | [INFO] [stdout] 769 | unsafe fn get_slice_unchecked(&mut self, (i, _): Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:784:17 [INFO] [stdout] | [INFO] [stdout] 784 | self.rb_mut().ptr_inbounds_at_mut(i), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:781:5 [INFO] [stdout] | [INFO] [stdout] 781 | unsafe fn get_unchecked(&'a mut self, (i, _): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:786:28 [INFO] [stdout] | [INFO] [stdout] 786 | |ptr| &mut *(ptr as *mut MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:798:25 [INFO] [stdout] | [INFO] [stdout] 798 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:792:5 [INFO] [stdout] | [INFO] [stdout] 792 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:838:19 [INFO] [stdout] | [INFO] [stdout] 838 | |ptr| core::slice::from_raw_parts(ptr as *const MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:834:5 [INFO] [stdout] | [INFO] [stdout] 834 | unsafe fn get_slice_unchecked(&mut self, (_, j): Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:849:17 [INFO] [stdout] | [INFO] [stdout] 849 | self.rb().ptr_inbounds_at(j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:846:5 [INFO] [stdout] | [INFO] [stdout] 846 | unsafe fn get_unchecked(&'a mut self, (_, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:851:24 [INFO] [stdout] | [INFO] [stdout] 851 | |ptr| &*(ptr as *const MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:863:25 [INFO] [stdout] | [INFO] [stdout] 863 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:857:5 [INFO] [stdout] | [INFO] [stdout] 857 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:903:19 [INFO] [stdout] | [INFO] [stdout] 903 | |ptr| core::slice::from_raw_parts_mut(ptr as *mut MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:899:5 [INFO] [stdout] | [INFO] [stdout] 899 | unsafe fn get_slice_unchecked(&mut self, (_, j): Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:914:17 [INFO] [stdout] | [INFO] [stdout] 914 | self.rb_mut().ptr_inbounds_at_mut(j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:911:5 [INFO] [stdout] | [INFO] [stdout] 911 | unsafe fn get_unchecked(&'a mut self, (_, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:916:28 [INFO] [stdout] | [INFO] [stdout] 916 | |ptr| &mut *(ptr as *mut MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:928:25 [INFO] [stdout] | [INFO] [stdout] 928 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:922:5 [INFO] [stdout] | [INFO] [stdout] 922 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:966:13 [INFO] [stdout] | [INFO] [stdout] 966 | (*self).rb().overflowing_ptr_at(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:964:5 [INFO] [stdout] | [INFO] [stdout] 964 | unsafe fn get_slice_unchecked(&mut self, (i, j): Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:968:19 [INFO] [stdout] | [INFO] [stdout] 968 | |ptr| core::slice::from_raw_parts(ptr as *const MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:979:17 [INFO] [stdout] | [INFO] [stdout] 979 | self.rb().ptr_inbounds_at(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:976:5 [INFO] [stdout] | [INFO] [stdout] 976 | unsafe fn get_unchecked(&'a mut self, (i, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:981:24 [INFO] [stdout] | [INFO] [stdout] 981 | |ptr| &*(ptr as *const MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:993:25 [INFO] [stdout] | [INFO] [stdout] 993 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:987:5 [INFO] [stdout] | [INFO] [stdout] 987 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:1038:13 [INFO] [stdout] | [INFO] [stdout] 1038 | (*self).rb().overflowing_ptr_at(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:1036:5 [INFO] [stdout] | [INFO] [stdout] 1036 | unsafe fn get_slice_unchecked(&mut self, (i, j): Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:1040:19 [INFO] [stdout] | [INFO] [stdout] 1040 | |ptr| core::slice::from_raw_parts_mut(ptr as *mut MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:1052:17 [INFO] [stdout] | [INFO] [stdout] 1052 | self.rb_mut().ptr_inbounds_at_mut(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:1049:5 [INFO] [stdout] | [INFO] [stdout] 1049 | unsafe fn get_unchecked(&'a mut self, (i, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:1054:28 [INFO] [stdout] | [INFO] [stdout] 1054 | |ptr| &mut *(ptr as *mut MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/zip.rs:1066:25 [INFO] [stdout] | [INFO] [stdout] 1066 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/zip.rs:1060:5 [INFO] [stdout] | [INFO] [stdout] 1060 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:25:13 [INFO] [stdout] | [INFO] [stdout] 25 | dst.write_unchecked(i, j, E::faer_zero()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / unsafe fn copy_lower( [INFO] [stdout] 13 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 14 | | src: MatRef<'_, E>, [INFO] [stdout] 15 | | src_diag: DiagonalKind, [INFO] [stdout] 16 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:28:35 [INFO] [stdout] | [INFO] [stdout] 28 | DiagonalKind::Zero => dst.write_unchecked(j, j, E::faer_zero()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:29:35 [INFO] [stdout] | [INFO] [stdout] 29 | DiagonalKind::Unit => dst.write_unchecked(j, j, E::faer_one()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:30:38 [INFO] [stdout] | [INFO] [stdout] 30 | DiagonalKind::Generic => dst.write_unchecked(j, j, src.read(j, j)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:33:13 [INFO] [stdout] | [INFO] [stdout] 33 | dst.write_unchecked(i, j, src.read_unchecked(i, j)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:33:39 [INFO] [stdout] | [INFO] [stdout] 33 | dst.write_unchecked(i, j, src.read_unchecked(i, j)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | copy_lower(dst.transpose_mut(), src.transpose(), src_diag) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:69:1 [INFO] [stdout] | [INFO] [stdout] 69 | / unsafe fn copy_upper( [INFO] [stdout] 70 | | dst: MatMut<'_, E>, [INFO] [stdout] 71 | | src: MatRef<'_, E>, [INFO] [stdout] 72 | | src_diag: DiagonalKind, [INFO] [stdout] 73 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:134:17 [INFO] [stdout] | [INFO] [stdout] 134 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / unsafe fn mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 92 | | dst: MatMut<'_, E>, [INFO] [stdout] 93 | | skip_diag: bool, [INFO] [stdout] 94 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 101 | | parallelism: Parallelism, [INFO] [stdout] 102 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:135:17 [INFO] [stdout] | [INFO] [stdout] 135 | / mul( [INFO] [stdout] 136 | | temp_dst.rb_mut(), [INFO] [stdout] 137 | | lhs, [INFO] [stdout] 138 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 143 | | parallelism, [INFO] [stdout] 144 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:145:17 [INFO] [stdout] | [INFO] [stdout] 145 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:163:9 [INFO] [stdout] | [INFO] [stdout] 163 | / mul( [INFO] [stdout] 164 | | dst_bot_left.rb_mut(), [INFO] [stdout] 165 | | lhs_bot_right, [INFO] [stdout] 166 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 171 | | parallelism, [INFO] [stdout] 172 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:91:1 [INFO] [stdout] | [INFO] [stdout] 91 | / unsafe fn mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 92 | | dst: MatMut<'_, E>, [INFO] [stdout] 93 | | skip_diag: bool, [INFO] [stdout] 94 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 101 | | parallelism: Parallelism, [INFO] [stdout] 102 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 174 | | dst_bot_right, [INFO] [stdout] 175 | | skip_diag, [INFO] [stdout] 176 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 183 | | parallelism, [INFO] [stdout] 184 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:186:9 [INFO] [stdout] | [INFO] [stdout] 186 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 187 | | dst_top_left.rb_mut(), [INFO] [stdout] 188 | | skip_diag, [INFO] [stdout] 189 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 196 | | parallelism, [INFO] [stdout] 197 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:198:9 [INFO] [stdout] | [INFO] [stdout] 198 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 199 | | dst_top_left, [INFO] [stdout] 200 | | skip_diag, [INFO] [stdout] 201 | | lhs_top_right, [INFO] [stdout] ... | [INFO] [stdout] 207 | | parallelism, [INFO] [stdout] 208 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:209:9 [INFO] [stdout] | [INFO] [stdout] 209 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 210 | | dst_bot_left, [INFO] [stdout] 211 | | lhs_bot_left, [INFO] [stdout] 212 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 218 | | parallelism, [INFO] [stdout] 219 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:263:17 [INFO] [stdout] | [INFO] [stdout] 263 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 224 | | dst: MatMut<'_, E>, [INFO] [stdout] 225 | | lhs: MatRef<'_, E>, [INFO] [stdout] 226 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 232 | | parallelism: Parallelism, [INFO] [stdout] 233 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:265:17 [INFO] [stdout] | [INFO] [stdout] 265 | / mul( [INFO] [stdout] 266 | | dst, [INFO] [stdout] 267 | | lhs, [INFO] [stdout] 268 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 273 | | parallelism, [INFO] [stdout] 274 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:290:17 [INFO] [stdout] | [INFO] [stdout] 290 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 291 | | dst_left.rb_mut(), [INFO] [stdout] 292 | | lhs_left, [INFO] [stdout] 293 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 299 | | parallelism, [INFO] [stdout] 300 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 224 | | dst: MatMut<'_, E>, [INFO] [stdout] 225 | | lhs: MatRef<'_, E>, [INFO] [stdout] 226 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 232 | | parallelism: Parallelism, [INFO] [stdout] 233 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:303:17 [INFO] [stdout] | [INFO] [stdout] 303 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 304 | | dst_right.rb_mut(), [INFO] [stdout] 305 | | lhs_right, [INFO] [stdout] 306 | | rhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 312 | | parallelism, [INFO] [stdout] 313 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 224 | | dst: MatMut<'_, E>, [INFO] [stdout] 225 | | lhs: MatRef<'_, E>, [INFO] [stdout] 226 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 232 | | parallelism: Parallelism, [INFO] [stdout] 233 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:317:9 [INFO] [stdout] | [INFO] [stdout] 317 | / mul( [INFO] [stdout] 318 | | dst_left, [INFO] [stdout] 319 | | lhs_right, [INFO] [stdout] 320 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 325 | | parallelism, [INFO] [stdout] 326 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 224 | | dst: MatMut<'_, E>, [INFO] [stdout] 225 | | lhs: MatRef<'_, E>, [INFO] [stdout] 226 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 232 | | parallelism: Parallelism, [INFO] [stdout] 233 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:383:17 [INFO] [stdout] | [INFO] [stdout] 383 | copy_lower(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:330:1 [INFO] [stdout] | [INFO] [stdout] 330 | / unsafe fn lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 331 | | dst: MatMut<'_, E>, [INFO] [stdout] 332 | | skip_diag: bool, [INFO] [stdout] 333 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 341 | | parallelism: Parallelism, [INFO] [stdout] 342 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:384:17 [INFO] [stdout] | [INFO] [stdout] 384 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:386:17 [INFO] [stdout] | [INFO] [stdout] 386 | / mul( [INFO] [stdout] 387 | | temp_dst.rb_mut(), [INFO] [stdout] 388 | | temp_lhs.rb(), [INFO] [stdout] 389 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 394 | | parallelism, [INFO] [stdout] 395 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:396:17 [INFO] [stdout] | [INFO] [stdout] 396 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:412:9 [INFO] [stdout] | [INFO] [stdout] 412 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 413 | | dst_top_left, [INFO] [stdout] 414 | | skip_diag, [INFO] [stdout] 415 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 423 | | parallelism, [INFO] [stdout] 424 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:330:1 [INFO] [stdout] | [INFO] [stdout] 330 | / unsafe fn lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 331 | | dst: MatMut<'_, E>, [INFO] [stdout] 332 | | skip_diag: bool, [INFO] [stdout] 333 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 341 | | parallelism: Parallelism, [INFO] [stdout] 342 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:425:9 [INFO] [stdout] | [INFO] [stdout] 425 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 426 | | dst_bot_left.rb_mut(), [INFO] [stdout] 427 | | lhs_bot_left, [INFO] [stdout] 428 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 434 | | parallelism, [INFO] [stdout] 435 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:436:9 [INFO] [stdout] | [INFO] [stdout] 436 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 437 | | dst_bot_left.reverse_rows_and_cols_mut().transpose_mut(), [INFO] [stdout] 438 | | rhs_bot_left.reverse_rows_and_cols().transpose(), [INFO] [stdout] 439 | | lhs_bot_right.reverse_rows_and_cols().transpose(), [INFO] [stdout] ... | [INFO] [stdout] 445 | | parallelism, [INFO] [stdout] 446 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:447:9 [INFO] [stdout] | [INFO] [stdout] 447 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 448 | | dst_bot_right, [INFO] [stdout] 449 | | skip_diag, [INFO] [stdout] 450 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 458 | | parallelism, [INFO] [stdout] 459 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_upper` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:506:17 [INFO] [stdout] | [INFO] [stdout] 506 | copy_upper(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:463:1 [INFO] [stdout] | [INFO] [stdout] 463 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 464 | | dst: MatMut<'_, E>, [INFO] [stdout] 465 | | lhs: MatRef<'_, E>, [INFO] [stdout] 466 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 473 | | parallelism: Parallelism, [INFO] [stdout] 474 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:507:17 [INFO] [stdout] | [INFO] [stdout] 507 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:509:17 [INFO] [stdout] | [INFO] [stdout] 509 | / mul( [INFO] [stdout] 510 | | dst, [INFO] [stdout] 511 | | temp_lhs.rb(), [INFO] [stdout] 512 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 517 | | parallelism, [INFO] [stdout] 518 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:539:17 [INFO] [stdout] | [INFO] [stdout] 539 | / mul( [INFO] [stdout] 540 | | dst_top_left.rb_mut(), [INFO] [stdout] 541 | | lhs_top_right, [INFO] [stdout] 542 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 547 | | parallelism, [INFO] [stdout] 548 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:463:1 [INFO] [stdout] | [INFO] [stdout] 463 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 464 | | dst: MatMut<'_, E>, [INFO] [stdout] 465 | | lhs: MatRef<'_, E>, [INFO] [stdout] 466 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 473 | | parallelism: Parallelism, [INFO] [stdout] 474 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:549:17 [INFO] [stdout] | [INFO] [stdout] 549 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 550 | | dst_top_left, [INFO] [stdout] 551 | | lhs_top_left, [INFO] [stdout] 552 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 559 | | parallelism, [INFO] [stdout] 560 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:565:25 [INFO] [stdout] | [INFO] [stdout] 565 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 566 | | dst_top_right, [INFO] [stdout] 567 | | lhs_top_right, [INFO] [stdout] 568 | | rhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 574 | | parallelism, [INFO] [stdout] 575 | | ) [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:463:1 [INFO] [stdout] | [INFO] [stdout] 463 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 464 | | dst: MatMut<'_, E>, [INFO] [stdout] 465 | | lhs: MatRef<'_, E>, [INFO] [stdout] 466 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 473 | | parallelism: Parallelism, [INFO] [stdout] 474 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:578:25 [INFO] [stdout] | [INFO] [stdout] 578 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 579 | | dst_bot_left.transpose_mut(), [INFO] [stdout] 580 | | rhs_bot_left.transpose(), [INFO] [stdout] 581 | | lhs_bot_right.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 587 | | parallelism, [INFO] [stdout] 588 | | ) [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:463:1 [INFO] [stdout] | [INFO] [stdout] 463 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 464 | | dst: MatMut<'_, E>, [INFO] [stdout] 465 | | lhs: MatRef<'_, E>, [INFO] [stdout] 466 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 473 | | parallelism: Parallelism, [INFO] [stdout] 474 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:593:17 [INFO] [stdout] | [INFO] [stdout] 593 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 594 | | dst_bot_right, [INFO] [stdout] 595 | | lhs_bot_right, [INFO] [stdout] 596 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 603 | | parallelism, [INFO] [stdout] 604 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:463:1 [INFO] [stdout] | [INFO] [stdout] 463 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 464 | | dst: MatMut<'_, E>, [INFO] [stdout] 465 | | lhs: MatRef<'_, E>, [INFO] [stdout] 466 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 473 | | parallelism: Parallelism, [INFO] [stdout] 474 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_upper` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:664:17 [INFO] [stdout] | [INFO] [stdout] 664 | copy_upper(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 612 | | dst: MatMut<'_, E>, [INFO] [stdout] 613 | | skip_diag: bool, [INFO] [stdout] 614 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 622 | | parallelism: Parallelism, [INFO] [stdout] 623 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:665:17 [INFO] [stdout] | [INFO] [stdout] 665 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:667:17 [INFO] [stdout] | [INFO] [stdout] 667 | / mul( [INFO] [stdout] 668 | | temp_dst.rb_mut(), [INFO] [stdout] 669 | | temp_lhs.rb(), [INFO] [stdout] 670 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 675 | | parallelism, [INFO] [stdout] 676 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:678:17 [INFO] [stdout] | [INFO] [stdout] 678 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:697:17 [INFO] [stdout] | [INFO] [stdout] 697 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 698 | | dst_top_left.rb_mut(), [INFO] [stdout] 699 | | skip_diag, [INFO] [stdout] 700 | | lhs_top_right, [INFO] [stdout] ... | [INFO] [stdout] 706 | | parallelism, [INFO] [stdout] 707 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 612 | | dst: MatMut<'_, E>, [INFO] [stdout] 613 | | skip_diag: bool, [INFO] [stdout] 614 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 622 | | parallelism: Parallelism, [INFO] [stdout] 623 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:708:17 [INFO] [stdout] | [INFO] [stdout] 708 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 709 | | dst_top_left, [INFO] [stdout] 710 | | skip_diag, [INFO] [stdout] 711 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 719 | | parallelism, [INFO] [stdout] 720 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:723:17 [INFO] [stdout] | [INFO] [stdout] 723 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 724 | | dst_bot_left.transpose_mut(), [INFO] [stdout] 725 | | rhs_bot_left.transpose(), [INFO] [stdout] 726 | | lhs_bot_right.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 732 | | parallelism, [INFO] [stdout] 733 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 612 | | dst: MatMut<'_, E>, [INFO] [stdout] 613 | | skip_diag: bool, [INFO] [stdout] 614 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 622 | | parallelism: Parallelism, [INFO] [stdout] 623 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:734:17 [INFO] [stdout] | [INFO] [stdout] 734 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 735 | | dst_bot_right, [INFO] [stdout] 736 | | skip_diag, [INFO] [stdout] 737 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 745 | | parallelism, [INFO] [stdout] 746 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:792:17 [INFO] [stdout] | [INFO] [stdout] 792 | / mul( [INFO] [stdout] 793 | | temp_dst.rb_mut(), [INFO] [stdout] 794 | | lhs, [INFO] [stdout] 795 | | rhs, [INFO] [stdout] ... | [INFO] [stdout] 800 | | parallelism, [INFO] [stdout] 801 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:753:1 [INFO] [stdout] | [INFO] [stdout] 753 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 754 | | dst: MatMut<'_, E>, [INFO] [stdout] 755 | | skip_diag: bool, [INFO] [stdout] 756 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 762 | | parallelism: Parallelism, [INFO] [stdout] 763 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:802:17 [INFO] [stdout] | [INFO] [stdout] 802 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:814:17 [INFO] [stdout] | [INFO] [stdout] 814 | / mul( [INFO] [stdout] 815 | | dst_bot_left, [INFO] [stdout] 816 | | lhs_bot, [INFO] [stdout] 817 | | rhs_left, [INFO] [stdout] ... | [INFO] [stdout] 822 | | parallelism, [INFO] [stdout] 823 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:753:1 [INFO] [stdout] | [INFO] [stdout] 753 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 754 | | dst: MatMut<'_, E>, [INFO] [stdout] 755 | | skip_diag: bool, [INFO] [stdout] 756 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 762 | | parallelism: Parallelism, [INFO] [stdout] 763 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:828:25 [INFO] [stdout] | [INFO] [stdout] 828 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 829 | | dst_top_left, [INFO] [stdout] 830 | | skip_diag, [INFO] [stdout] 831 | | lhs_top, [INFO] [stdout] ... | [INFO] [stdout] 837 | | parallelism, [INFO] [stdout] 838 | | ) [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:753:1 [INFO] [stdout] | [INFO] [stdout] 753 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 754 | | dst: MatMut<'_, E>, [INFO] [stdout] 755 | | skip_diag: bool, [INFO] [stdout] 756 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 762 | | parallelism: Parallelism, [INFO] [stdout] 763 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:841:25 [INFO] [stdout] | [INFO] [stdout] 841 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 842 | | dst_bot_right, [INFO] [stdout] 843 | | skip_diag, [INFO] [stdout] 844 | | lhs_bot, [INFO] [stdout] ... | [INFO] [stdout] 850 | | parallelism, [INFO] [stdout] 851 | | ) [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:753:1 [INFO] [stdout] | [INFO] [stdout] 753 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 754 | | dst: MatMut<'_, E>, [INFO] [stdout] 755 | | skip_diag: bool, [INFO] [stdout] 756 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 762 | | parallelism: Parallelism, [INFO] [stdout] 763 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1263:13 [INFO] [stdout] | [INFO] [stdout] 1263 | mul(acc, lhs, rhs, alpha, beta, conj_lhs, conj_rhs, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1165:1 [INFO] [stdout] | [INFO] [stdout] 1165 | / unsafe fn matmul_unchecked( [INFO] [stdout] 1166 | | acc: MatMut<'_, E>, [INFO] [stdout] 1167 | | acc_structure: BlockStructure, [INFO] [stdout] 1168 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 1176 | | parallelism: Parallelism, [INFO] [stdout] 1177 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1268:17 [INFO] [stdout] | [INFO] [stdout] 1268 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 1269 | | acc, [INFO] [stdout] 1270 | | lhs, [INFO] [stdout] 1271 | | rhs, [INFO] [stdout] ... | [INFO] [stdout] 1277 | | parallelism, [INFO] [stdout] 1278 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1281:17 [INFO] [stdout] | [INFO] [stdout] 1281 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 1282 | | acc, [INFO] [stdout] 1283 | | false, [INFO] [stdout] 1284 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 1292 | | parallelism, [INFO] [stdout] 1293 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1296:17 [INFO] [stdout] | [INFO] [stdout] 1296 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 1297 | | acc, [INFO] [stdout] 1298 | | lhs, [INFO] [stdout] 1299 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 1306 | | parallelism, [INFO] [stdout] 1307 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1312:13 [INFO] [stdout] | [INFO] [stdout] 1312 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 1313 | | acc, [INFO] [stdout] 1314 | | skip_diag, [INFO] [stdout] 1315 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 1321 | | parallelism, [INFO] [stdout] 1322 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1326:17 [INFO] [stdout] | [INFO] [stdout] 1326 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 1327 | | acc, [INFO] [stdout] 1328 | | skip_diag, [INFO] [stdout] 1329 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 1336 | | parallelism, [INFO] [stdout] 1337 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1339:17 [INFO] [stdout] | [INFO] [stdout] 1339 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 1340 | | acc, [INFO] [stdout] 1341 | | skip_diag, [INFO] [stdout] 1342 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 1350 | | parallelism, [INFO] [stdout] 1351 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1353:17 [INFO] [stdout] | [INFO] [stdout] 1353 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 1354 | | acc, [INFO] [stdout] 1355 | | skip_diag, [INFO] [stdout] 1356 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 1364 | | parallelism, [INFO] [stdout] 1365 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1369:9 [INFO] [stdout] | [INFO] [stdout] 1369 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 1370 | | acc.transpose_mut(), [INFO] [stdout] 1371 | | skip_diag, [INFO] [stdout] 1372 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 1378 | | parallelism, [INFO] [stdout] 1379 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1384:13 [INFO] [stdout] | [INFO] [stdout] 1384 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 1385 | | acc.transpose_mut(), [INFO] [stdout] 1386 | | skip_diag, [INFO] [stdout] 1387 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 1395 | | parallelism, [INFO] [stdout] 1396 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::matmul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/matmul/triangular.rs:1428:13 [INFO] [stdout] | [INFO] [stdout] 1428 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 1429 | | acc.transpose_mut(), [INFO] [stdout] 1430 | | skip_diag, [INFO] [stdout] 1431 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 1439 | | parallelism, [INFO] [stdout] 1440 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:21:30 [INFO] [stdout] | [INFO] [stdout] 21 | |i: usize, j: usize| src.read_unchecked(i, j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_inverse.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | / unsafe fn invert_lower_triangular_impl_small( [INFO] [stdout] 15 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 16 | | src: MatRef<'_, E>, [INFO] [stdout] 17 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:25:14 [INFO] [stdout] | [INFO] [stdout] 25 | 1 => dst.write_unchecked(0, 0, src(0, 0).faer_inv()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_inverse.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | / unsafe fn invert_lower_triangular_impl_small( [INFO] [stdout] 15 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 16 | | src: MatRef<'_, E>, [INFO] [stdout] 17 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | dst.write_unchecked(0, 0, dst00); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:32:13 [INFO] [stdout] | [INFO] [stdout] 32 | dst.write_unchecked(1, 1, dst11); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:33:13 [INFO] [stdout] | [INFO] [stdout] 33 | dst.write_unchecked(1, 0, dst10); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:44:36 [INFO] [stdout] | [INFO] [stdout] 44 | let src = |i: usize, j: usize| src.read_unchecked(i, j); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_inverse.rs:39:1 [INFO] [stdout] | [INFO] [stdout] 39 | / unsafe fn invert_unit_lower_triangular_impl_small( [INFO] [stdout] 40 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 41 | | src: MatRef<'_, E>, [INFO] [stdout] 42 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:48:13 [INFO] [stdout] | [INFO] [stdout] 48 | dst.write_unchecked(1, 0, src(1, 0).faer_neg()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_inverse.rs:39:1 [INFO] [stdout] | [INFO] [stdout] 39 | / unsafe fn invert_unit_lower_triangular_impl_small( [INFO] [stdout] 40 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 41 | | src: MatRef<'_, E>, [INFO] [stdout] 42 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_inverse::invert_lower_triangular_impl_small` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:64:9 [INFO] [stdout] | [INFO] [stdout] 64 | invert_lower_triangular_impl_small(dst, src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_inverse.rs:54:1 [INFO] [stdout] | [INFO] [stdout] 54 | / unsafe fn invert_lower_triangular_impl( [INFO] [stdout] 55 | | dst: MatMut<'_, E>, [INFO] [stdout] 56 | | src: MatRef<'_, E>, [INFO] [stdout] 57 | | parallelism: Parallelism, [INFO] [stdout] 58 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_inverse::invert_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:75:23 [INFO] [stdout] | [INFO] [stdout] 75 | |parallelism| invert_lower_triangular_impl(dst_tl.rb_mut(), src_tl, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_inverse::invert_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:76:23 [INFO] [stdout] | [INFO] [stdout] 76 | |parallelism| invert_lower_triangular_impl(dst_br.rb_mut(), src_br, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_inverse::invert_unit_lower_triangular_impl_small` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:104:9 [INFO] [stdout] | [INFO] [stdout] 104 | invert_unit_lower_triangular_impl_small(dst, src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_inverse.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | / unsafe fn invert_unit_lower_triangular_impl( [INFO] [stdout] 95 | | dst: MatMut<'_, E>, [INFO] [stdout] 96 | | src: MatRef<'_, E>, [INFO] [stdout] 97 | | parallelism: Parallelism, [INFO] [stdout] 98 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_inverse::invert_unit_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:115:23 [INFO] [stdout] | [INFO] [stdout] 115 | |parallelism| invert_unit_lower_triangular_impl(dst_tl.rb_mut(), src_tl, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_inverse::invert_unit_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_inverse.rs:116:23 [INFO] [stdout] | [INFO] [stdout] 116 | |parallelism| invert_unit_lower_triangular_impl(dst_br.rb_mut(), src_br, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:30:47 [INFO] [stdout] | [INFO] [stdout] 30 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / unsafe fn solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] 22 | | tril: MatRef<'_, E>, [INFO] [stdout] 23 | | rhs: MatMut<'_, E>, [INFO] [stdout] 24 | | maybe_conj_lhs: impl Fn(E) -> E, [INFO] [stdout] 25 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:41:47 [INFO] [stdout] | [INFO] [stdout] 41 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:42:47 [INFO] [stdout] | [INFO] [stdout] 42 | let nl20_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:43:47 [INFO] [stdout] | [INFO] [stdout] 43 | let nl21_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:65:47 [INFO] [stdout] | [INFO] [stdout] 65 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:66:47 [INFO] [stdout] | [INFO] [stdout] 66 | let nl20_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:67:47 [INFO] [stdout] | [INFO] [stdout] 67 | let nl21_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:68:47 [INFO] [stdout] | [INFO] [stdout] 68 | let nl30_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:69:47 [INFO] [stdout] | [INFO] [stdout] 69 | let nl31_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:70:47 [INFO] [stdout] | [INFO] [stdout] 70 | let nl32_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 2)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:116:38 [INFO] [stdout] | [INFO] [stdout] 116 | let inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:107:1 [INFO] [stdout] | [INFO] [stdout] 107 | / unsafe fn solve_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] 108 | | tril: MatRef<'_, E>, [INFO] [stdout] 109 | | rhs: MatMut<'_, E>, [INFO] [stdout] 110 | | maybe_conj_lhs: impl Fn(E) -> E, [INFO] [stdout] 111 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:121:42 [INFO] [stdout] | [INFO] [stdout] 121 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:122:42 [INFO] [stdout] | [INFO] [stdout] 122 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:124:33 [INFO] [stdout] | [INFO] [stdout] 124 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:140:42 [INFO] [stdout] | [INFO] [stdout] 140 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:141:42 [INFO] [stdout] | [INFO] [stdout] 141 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:142:42 [INFO] [stdout] | [INFO] [stdout] 142 | let l22_inv = maybe_conj_lhs(tril.read_unchecked(2, 2)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:144:33 [INFO] [stdout] | [INFO] [stdout] 144 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:146:33 [INFO] [stdout] | [INFO] [stdout] 146 | (maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:148:33 [INFO] [stdout] | [INFO] [stdout] 148 | (maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:172:42 [INFO] [stdout] | [INFO] [stdout] 172 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:173:42 [INFO] [stdout] | [INFO] [stdout] 173 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:174:42 [INFO] [stdout] | [INFO] [stdout] 174 | let l22_inv = maybe_conj_lhs(tril.read_unchecked(2, 2)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:175:42 [INFO] [stdout] | [INFO] [stdout] 175 | let l33_inv = maybe_conj_lhs(tril.read_unchecked(3, 3)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:177:33 [INFO] [stdout] | [INFO] [stdout] 177 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:179:33 [INFO] [stdout] | [INFO] [stdout] 179 | (maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:181:33 [INFO] [stdout] | [INFO] [stdout] 181 | (maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:183:33 [INFO] [stdout] | [INFO] [stdout] 183 | (maybe_conj_lhs(tril.read_unchecked(3, 0)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:185:33 [INFO] [stdout] | [INFO] [stdout] 185 | (maybe_conj_lhs(tril.read_unchecked(3, 1)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:187:33 [INFO] [stdout] | [INFO] [stdout] 187 | (maybe_conj_lhs(tril.read_unchecked(3, 2)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:617:17 [INFO] [stdout] | [INFO] [stdout] 617 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 618 | | tril, [INFO] [stdout] 619 | | conj_lhs, [INFO] [stdout] 620 | | rhs_left, [INFO] [stdout] 621 | | parallelism, [INFO] [stdout] 622 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:604:1 [INFO] [stdout] | [INFO] [stdout] 604 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 605 | | tril: MatRef<'_, E>, [INFO] [stdout] 606 | | conj_lhs: Conj, [INFO] [stdout] 607 | | rhs: MatMut<'_, E>, [INFO] [stdout] 608 | | parallelism: Parallelism, [INFO] [stdout] 609 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:625:17 [INFO] [stdout] | [INFO] [stdout] 625 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 626 | | tril, [INFO] [stdout] 627 | | conj_lhs, [INFO] [stdout] 628 | | rhs_right, [INFO] [stdout] 629 | | parallelism, [INFO] [stdout] 630 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:604:1 [INFO] [stdout] | [INFO] [stdout] 604 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 605 | | tril: MatRef<'_, E>, [INFO] [stdout] 606 | | conj_lhs: Conj, [INFO] [stdout] 607 | | rhs: MatMut<'_, E>, [INFO] [stdout] 608 | | parallelism: Parallelism, [INFO] [stdout] 609 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:646:30 [INFO] [stdout] | [INFO] [stdout] 646 | Conj::Yes => solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 647 | | tril, rhs, conj, [INFO] [stdout] 648 | | ), [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:604:1 [INFO] [stdout] | [INFO] [stdout] 604 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 605 | | tril: MatRef<'_, E>, [INFO] [stdout] 606 | | conj_lhs: Conj, [INFO] [stdout] 607 | | rhs: MatMut<'_, E>, [INFO] [stdout] 608 | | parallelism: Parallelism, [INFO] [stdout] 609 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:649:29 [INFO] [stdout] | [INFO] [stdout] 649 | Conj::No => solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 650 | | tril, rhs, identity, [INFO] [stdout] 651 | | ), [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:671:5 [INFO] [stdout] | [INFO] [stdout] 671 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 672 | | tril_top_left, [INFO] [stdout] 673 | | conj_lhs, [INFO] [stdout] 674 | | rhs_top.rb_mut(), [INFO] [stdout] 675 | | parallelism, [INFO] [stdout] 676 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:604:1 [INFO] [stdout] | [INFO] [stdout] 604 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 605 | | tril: MatRef<'_, E>, [INFO] [stdout] 606 | | conj_lhs: Conj, [INFO] [stdout] 607 | | rhs: MatMut<'_, E>, [INFO] [stdout] 608 | | parallelism: Parallelism, [INFO] [stdout] 609 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:689:5 [INFO] [stdout] | [INFO] [stdout] 689 | solve_unit_lower_triangular_in_place_unchecked(tril_bot_right, conj_lhs, rhs_bot, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:706:5 [INFO] [stdout] | [INFO] [stdout] 706 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 707 | | triu.reverse_rows_and_cols(), [INFO] [stdout] 708 | | conj_lhs, [INFO] [stdout] 709 | | rhs.reverse_rows_mut(), [INFO] [stdout] 710 | | parallelism, [INFO] [stdout] 711 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:700:1 [INFO] [stdout] | [INFO] [stdout] 700 | / unsafe fn solve_unit_upper_triangular_in_place_unchecked( [INFO] [stdout] 701 | | triu: MatRef<'_, E>, [INFO] [stdout] 702 | | conj_lhs: Conj, [INFO] [stdout] 703 | | rhs: MatMut<'_, E>, [INFO] [stdout] 704 | | parallelism: Parallelism, [INFO] [stdout] 705 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:733:17 [INFO] [stdout] | [INFO] [stdout] 733 | |_| solve_lower_triangular_in_place_unchecked(tril, conj_lhs, rhs_left, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:721:1 [INFO] [stdout] | [INFO] [stdout] 721 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 722 | | tril: MatRef<'_, E>, [INFO] [stdout] 723 | | conj_lhs: Conj, [INFO] [stdout] 724 | | rhs: MatMut<'_, E>, [INFO] [stdout] 725 | | parallelism: Parallelism, [INFO] [stdout] 726 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:734:17 [INFO] [stdout] | [INFO] [stdout] 734 | |_| solve_lower_triangular_in_place_unchecked(tril, conj_lhs, rhs_right, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:721:1 [INFO] [stdout] | [INFO] [stdout] 721 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 722 | | tril: MatRef<'_, E>, [INFO] [stdout] 723 | | conj_lhs: Conj, [INFO] [stdout] 724 | | rhs: MatMut<'_, E>, [INFO] [stdout] 725 | | parallelism: Parallelism, [INFO] [stdout] 726 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:752:21 [INFO] [stdout] | [INFO] [stdout] 752 | solve_lower_triangular_in_place_base_case_generic_unchecked(tril, rhs, conj) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:721:1 [INFO] [stdout] | [INFO] [stdout] 721 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 722 | | tril: MatRef<'_, E>, [INFO] [stdout] 723 | | conj_lhs: Conj, [INFO] [stdout] 724 | | rhs: MatMut<'_, E>, [INFO] [stdout] 725 | | parallelism: Parallelism, [INFO] [stdout] 726 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:755:21 [INFO] [stdout] | [INFO] [stdout] 755 | solve_lower_triangular_in_place_base_case_generic_unchecked(tril, rhs, identity) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:767:5 [INFO] [stdout] | [INFO] [stdout] 767 | / solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 768 | | tril_top_left, [INFO] [stdout] 769 | | conj_lhs, [INFO] [stdout] 770 | | rhs_top.rb_mut(), [INFO] [stdout] 771 | | parallelism, [INFO] [stdout] 772 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:721:1 [INFO] [stdout] | [INFO] [stdout] 721 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 722 | | tril: MatRef<'_, E>, [INFO] [stdout] 723 | | conj_lhs: Conj, [INFO] [stdout] 724 | | rhs: MatMut<'_, E>, [INFO] [stdout] 725 | | parallelism: Parallelism, [INFO] [stdout] 726 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:785:5 [INFO] [stdout] | [INFO] [stdout] 785 | solve_lower_triangular_in_place_unchecked(tril_bot_right, conj_lhs, rhs_bot, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `linalg::triangular_solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/triangular_solve.rs:802:5 [INFO] [stdout] | [INFO] [stdout] 802 | / solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 803 | | triu.reverse_rows_and_cols(), [INFO] [stdout] 804 | | conj_lhs, [INFO] [stdout] 805 | | rhs.reverse_rows_mut(), [INFO] [stdout] 806 | | parallelism, [INFO] [stdout] 807 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/triangular_solve.rs:796:1 [INFO] [stdout] | [INFO] [stdout] 796 | / unsafe fn solve_upper_triangular_in_place_unchecked( [INFO] [stdout] 797 | | triu: MatRef<'_, E>, [INFO] [stdout] 798 | | conj_lhs: Conj, [INFO] [stdout] 799 | | rhs: MatMut<'_, E>, [INFO] [stdout] 800 | | parallelism: Parallelism, [INFO] [stdout] 801 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::subslice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:238:33 [INFO] [stdout] | [INFO] [stdout] 238 | ... slice.rb_mut().subslice_unchecked(stride - 4..stride * n); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:217:17 [INFO] [stdout] | [INFO] [stdout] 217 | / unsafe fn in_place_cholesky>( [INFO] [stdout] 218 | | simd: S, [INFO] [stdout] 219 | | n: usize, [INFO] [stdout] 220 | | stride: usize, [INFO] [stdout] ... | [INFO] [stdout] 223 | | process: (&P::This, bool), [INFO] [stdout] 224 | | ) -> Result { [INFO] [stdout] | |____________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:240:43 [INFO] [stdout] | [INFO] [stdout] 240 | ... let mut Aj0 = slice.rb().get_unchecked(stride * j + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:241:43 [INFO] [stdout] | [INFO] [stdout] 241 | ... let mut Aj1 = slice.rb().get_unchecked(stride * j + 1).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:242:43 [INFO] [stdout] | [INFO] [stdout] 242 | ... let mut Aj2 = slice.rb().get_unchecked(stride * j + 2).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:243:43 [INFO] [stdout] | [INFO] [stdout] 243 | ... let mut Aj3 = slice.rb().get_unchecked(stride * j + 3).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:246:43 [INFO] [stdout] | [INFO] [stdout] 246 | ... let Ak0 = slice.rb().get_unchecked(stride * k + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:247:43 [INFO] [stdout] | [INFO] [stdout] 247 | ... let Ak1 = slice.rb().get_unchecked(stride * k + 1).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:248:43 [INFO] [stdout] | [INFO] [stdout] 248 | ... let Ak2 = slice.rb().get_unchecked(stride * k + 2).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:249:43 [INFO] [stdout] | [INFO] [stdout] 249 | ... let Ak3 = slice.rb().get_unchecked(stride * k + 3).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:253:38 [INFO] [stdout] | [INFO] [stdout] 253 | ... *diag_slice.get_unchecked(k), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:266:30 [INFO] [stdout] | [INFO] [stdout] 266 | ... *diag_slice.get_unchecked_mut(j) = diag; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:275:29 [INFO] [stdout] | [INFO] [stdout] 275 | ... slice.rb_mut().get_unchecked_mut(stride * j + 0).set(Aj0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:276:29 [INFO] [stdout] | [INFO] [stdout] 276 | ... slice.rb_mut().get_unchecked_mut(stride * j + 1).set(Aj1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:277:29 [INFO] [stdout] | [INFO] [stdout] 277 | ... slice.rb_mut().get_unchecked_mut(stride * j + 2).set(Aj2); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:278:29 [INFO] [stdout] | [INFO] [stdout] 278 | ... slice.rb_mut().get_unchecked_mut(stride * j + 3).set(Aj3); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::subslice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:286:33 [INFO] [stdout] | [INFO] [stdout] 286 | ... slice.rb_mut().subslice_unchecked(stride - 3..stride * n); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:288:43 [INFO] [stdout] | [INFO] [stdout] 288 | ... let mut Aj0 = slice.rb().get_unchecked(stride * j + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:289:43 [INFO] [stdout] | [INFO] [stdout] 289 | ... let mut Aj1 = slice.rb().get_unchecked(stride * j + 1).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:290:43 [INFO] [stdout] | [INFO] [stdout] 290 | ... let mut Aj2 = slice.rb().get_unchecked(stride * j + 2).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:293:43 [INFO] [stdout] | [INFO] [stdout] 293 | ... let Ak0 = slice.rb().get_unchecked(stride * k + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:294:43 [INFO] [stdout] | [INFO] [stdout] 294 | ... let Ak1 = slice.rb().get_unchecked(stride * k + 1).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:295:43 [INFO] [stdout] | [INFO] [stdout] 295 | ... let Ak2 = slice.rb().get_unchecked(stride * k + 2).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:299:38 [INFO] [stdout] | [INFO] [stdout] 299 | ... *diag_slice.get_unchecked(k), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:311:30 [INFO] [stdout] | [INFO] [stdout] 311 | ... *diag_slice.get_unchecked_mut(j) = diag; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:319:29 [INFO] [stdout] | [INFO] [stdout] 319 | ... slice.rb_mut().get_unchecked_mut(stride * j + 0).set(Aj0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:320:29 [INFO] [stdout] | [INFO] [stdout] 320 | ... slice.rb_mut().get_unchecked_mut(stride * j + 1).set(Aj1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:321:29 [INFO] [stdout] | [INFO] [stdout] 321 | ... slice.rb_mut().get_unchecked_mut(stride * j + 2).set(Aj2); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::subslice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:329:33 [INFO] [stdout] | [INFO] [stdout] 329 | ... slice.rb_mut().subslice_unchecked(stride - 2..stride * n); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:331:43 [INFO] [stdout] | [INFO] [stdout] 331 | ... let mut Aj0 = slice.rb().get_unchecked(stride * j + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:332:43 [INFO] [stdout] | [INFO] [stdout] 332 | ... let mut Aj1 = slice.rb().get_unchecked(stride * j + 1).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:335:43 [INFO] [stdout] | [INFO] [stdout] 335 | ... let Ak0 = slice.rb().get_unchecked(stride * k + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:336:43 [INFO] [stdout] | [INFO] [stdout] 336 | ... let Ak1 = slice.rb().get_unchecked(stride * k + 1).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:340:38 [INFO] [stdout] | [INFO] [stdout] 340 | ... *diag_slice.get_unchecked(k), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:351:30 [INFO] [stdout] | [INFO] [stdout] 351 | ... *diag_slice.get_unchecked_mut(j) = diag; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:358:29 [INFO] [stdout] | [INFO] [stdout] 358 | ... slice.rb_mut().get_unchecked_mut(stride * j + 0).set(Aj0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:359:29 [INFO] [stdout] | [INFO] [stdout] 359 | ... slice.rb_mut().get_unchecked_mut(stride * j + 1).set(Aj1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::subslice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:367:41 [INFO] [stdout] | [INFO] [stdout] 367 | let mut slice = slice.rb_mut().subslice_unchecked(stride - 1..stride * n); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:369:39 [INFO] [stdout] | [INFO] [stdout] 369 | let mut Aj0 = slice.rb().get_unchecked(stride * j + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:371:39 [INFO] [stdout] | [INFO] [stdout] 371 | ... let Ak0 = slice.rb().get_unchecked(stride * k + 0).get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:375:34 [INFO] [stdout] | [INFO] [stdout] 375 | ... *diag_slice.get_unchecked(k), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:385:26 [INFO] [stdout] | [INFO] [stdout] 385 | *diag_slice.get_unchecked_mut(j) = diag; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroupMut::<'a, E, T>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/linalg/cholesky/ldlt_diagonal/compute.rs:391:25 [INFO] [stdout] | [INFO] [stdout] 391 | slice.rb_mut().get_unchecked_mut(stride * j + 0).set(Aj0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::hint::unreachable_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/mod.rs:5:9 [INFO] [stdout] | [INFO] [stdout] 5 | core::hint::unreachable_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/mod.rs:2:1 [INFO] [stdout] | [INFO] [stdout] 2 | pub(crate) unsafe fn unchecked_mul(a: usize, b: isize) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::hint::unreachable_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/mod.rs:14:9 [INFO] [stdout] | [INFO] [stdout] 14 | core::hint::unreachable_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/mod.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | pub(crate) unsafe fn unchecked_add(a: isize, b: isize) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:432:22 [INFO] [stdout] | [INFO] [stdout] 432 | |slice| *slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:427:5 [INFO] [stdout] | [INFO] [stdout] 427 | pub unsafe fn read_unchecked(&self, idx: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:456:21 [INFO] [stdout] | [INFO] [stdout] 456 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:451:5 [INFO] [stdout] | [INFO] [stdout] 451 | pub unsafe fn get_unchecked(self, idx: usize) -> RefGroup<'a, E, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:511:21 [INFO] [stdout] | [INFO] [stdout] 511 | |slice| slice.get_unchecked(range.start..range.end), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:506:5 [INFO] [stdout] | [INFO] [stdout] 506 | pub unsafe fn subslice_unchecked(self, range: Range) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:562:9 [INFO] [stdout] | [INFO] [stdout] 562 | self.rb().read_unchecked(idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:561:5 [INFO] [stdout] | [INFO] [stdout] 561 | pub unsafe fn read_unchecked(&self, idx: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:584:31 [INFO] [stdout] | [INFO] [stdout] 584 | |(slice, value)| *slice.get_unchecked_mut(idx) = value, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:579:5 [INFO] [stdout] | [INFO] [stdout] 579 | pub unsafe fn write_unchecked(&mut self, idx: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:618:21 [INFO] [stdout] | [INFO] [stdout] 618 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:613:5 [INFO] [stdout] | [INFO] [stdout] 613 | pub unsafe fn get_unchecked_mut(self, idx: usize) -> RefGroupMut<'a, E, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::slice::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:636:9 [INFO] [stdout] | [INFO] [stdout] 636 | self.into_const().get_unchecked(idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:635:5 [INFO] [stdout] | [INFO] [stdout] 635 | pub unsafe fn get_unchecked(self, idx: usize) -> RefGroup<'a, E, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/utils/slice.rs:671:21 [INFO] [stdout] | [INFO] [stdout] 671 | |slice| slice.get_unchecked_mut(range.start..range.end), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/utils/slice.rs:666:5 [INFO] [stdout] | [INFO] [stdout] 666 | pub unsafe fn subslice_unchecked(self, range: Range) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:74:27 [INFO] [stdout] | [INFO] [stdout] 74 | |ptr| NonNull::new_unchecked(ptr as *mut E::Unit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colref.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | / pub(crate) unsafe fn __from_raw_parts( [INFO] [stdout] 65 | | ptr: GroupFor, [INFO] [stdout] 66 | | nrows: usize, [INFO] [stdout] 67 | | row_stride: isize, [INFO] [stdout] 68 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:146:22 [INFO] [stdout] | [INFO] [stdout] 146 | let offset = crate::utils::unchecked_mul(row, self.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colref.rs:145:5 [INFO] [stdout] | [INFO] [stdout] 145 | pub unsafe fn ptr_at_unchecked(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:150:19 [INFO] [stdout] | [INFO] [stdout] 150 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:179:9 [INFO] [stdout] | [INFO] [stdout] 179 | self.ptr_at_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colref.rs:177:5 [INFO] [stdout] | [INFO] [stdout] 177 | pub unsafe fn ptr_inbounds_at(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::ColIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:244:9 [INFO] [stdout] | [INFO] [stdout] 244 | >::get_unchecked(self, row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colref.rs:237:5 [INFO] [stdout] | [INFO] [stdout] 237 | / pub unsafe fn get_unchecked( [INFO] [stdout] 238 | | self, [INFO] [stdout] 239 | | row: RowRange, [INFO] [stdout] 240 | | ) -> >::Target [INFO] [stdout] 241 | | where [INFO] [stdout] 242 | | Self: ColIndex, [INFO] [stdout] | |_________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:275:13 [INFO] [stdout] | [INFO] [stdout] 275 | self.get_unchecked(row), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colref.rs:273:5 [INFO] [stdout] | [INFO] [stdout] 273 | pub unsafe fn read_unchecked(&self, row: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::__from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colref.rs:659:5 [INFO] [stdout] | [INFO] [stdout] 659 | ColRef::__from_raw_parts(ptr, nrows, row_stride) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colref.rs:654:1 [INFO] [stdout] | [INFO] [stdout] 654 | / pub unsafe fn from_raw_parts<'a, E: Entity>( [INFO] [stdout] 655 | | ptr: GroupFor, [INFO] [stdout] 656 | | nrows: usize, [INFO] [stdout] 657 | | row_stride: isize, [INFO] [stdout] 658 | | ) -> ColRef<'a, E> { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:85:27 [INFO] [stdout] | [INFO] [stdout] 85 | |ptr| NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:75:5 [INFO] [stdout] | [INFO] [stdout] 75 | / pub(crate) unsafe fn __from_raw_parts( [INFO] [stdout] 76 | | ptr: GroupFor, [INFO] [stdout] 77 | | nrows: usize, [INFO] [stdout] 78 | | row_stride: isize, [INFO] [stdout] 79 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | self.into_const().ptr_at_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:181:5 [INFO] [stdout] | [INFO] [stdout] 181 | pub unsafe fn ptr_at_unchecked(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:188:22 [INFO] [stdout] | [INFO] [stdout] 188 | let offset = crate::utils::unchecked_mul(row, self.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:187:5 [INFO] [stdout] | [INFO] [stdout] 187 | pub unsafe fn ptr_at_mut_unchecked(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:192:19 [INFO] [stdout] | [INFO] [stdout] 192 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:199:9 [INFO] [stdout] | [INFO] [stdout] 199 | self.into_const().overflowing_ptr_at(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:198:5 [INFO] [stdout] | [INFO] [stdout] 198 | pub unsafe fn overflowing_ptr_at(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:226:9 [INFO] [stdout] | [INFO] [stdout] 226 | self.into_const().ptr_inbounds_at(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:225:5 [INFO] [stdout] | [INFO] [stdout] 225 | pub unsafe fn ptr_inbounds_at(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:239:9 [INFO] [stdout] | [INFO] [stdout] 239 | self.ptr_at_mut_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:237:5 [INFO] [stdout] | [INFO] [stdout] 237 | pub unsafe fn ptr_inbounds_at_mut(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:253:9 [INFO] [stdout] | [INFO] [stdout] 253 | self.into_const().split_at_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:252:5 [INFO] [stdout] | [INFO] [stdout] 252 | pub unsafe fn split_at_unchecked(self, row: usize) -> (ColRef<'a, E>, ColRef<'a, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:267:26 [INFO] [stdout] | [INFO] [stdout] 267 | let (top, bot) = self.into_const().split_at_unchecked(row); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | pub unsafe fn split_at_mut_unchecked(self, row: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:319:9 [INFO] [stdout] | [INFO] [stdout] 319 | self.into_const().get_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:312:5 [INFO] [stdout] | [INFO] [stdout] 312 | / pub unsafe fn get_unchecked( [INFO] [stdout] 313 | | self, [INFO] [stdout] 314 | | row: RowRange, [INFO] [stdout] 315 | | ) -> as ColIndex>::Target [INFO] [stdout] 316 | | where [INFO] [stdout] 317 | | ColRef<'a, E>: ColIndex, [INFO] [stdout] | |__________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::ColIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:341:9 [INFO] [stdout] | [INFO] [stdout] 341 | >::get_unchecked(self, row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:334:5 [INFO] [stdout] | [INFO] [stdout] 334 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 335 | | self, [INFO] [stdout] 336 | | row: RowRange, [INFO] [stdout] 337 | | ) -> >::Target [INFO] [stdout] 338 | | where [INFO] [stdout] 339 | | Self: ColIndex, [INFO] [stdout] | |_________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:390:9 [INFO] [stdout] | [INFO] [stdout] 390 | self.rb().read_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:389:5 [INFO] [stdout] | [INFO] [stdout] 389 | pub unsafe fn read_unchecked(&self, row: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:413:41 [INFO] [stdout] | [INFO] [stdout] 413 | let zipped = E::faer_zip(units, (*self).rb_mut().ptr_inbounds_at_mut(row)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:411:5 [INFO] [stdout] | [INFO] [stdout] 411 | pub unsafe fn write_unchecked(&mut self, row: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:417:27 [INFO] [stdout] | [INFO] [stdout] 417 | |(unit, ptr)| *ptr = unit, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:571:9 [INFO] [stdout] | [INFO] [stdout] 571 | self.into_const().subrows_unchecked(row_start, nrows) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:570:5 [INFO] [stdout] | [INFO] [stdout] 570 | pub unsafe fn subrows_unchecked(self, row_start: usize, nrows: usize) -> ColRef<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:584:9 [INFO] [stdout] | [INFO] [stdout] 584 | / self.into_const() [INFO] [stdout] 585 | | .subrows_unchecked(row_start, nrows) [INFO] [stdout] 586 | | .const_cast() [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:583:5 [INFO] [stdout] | [INFO] [stdout] 583 | pub unsafe fn subrows_mut_unchecked(self, row_start: usize, nrows: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:584:9 [INFO] [stdout] | [INFO] [stdout] 584 | / self.into_const() [INFO] [stdout] 585 | | .subrows_unchecked(row_start, nrows) [INFO] [stdout] | |________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::__from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colmut.rs:962:5 [INFO] [stdout] | [INFO] [stdout] 962 | ColMut::__from_raw_parts(ptr, nrows, row_stride) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colmut.rs:957:1 [INFO] [stdout] | [INFO] [stdout] 957 | / pub unsafe fn from_raw_parts_mut<'a, E: Entity>( [INFO] [stdout] 958 | | ptr: GroupFor, [INFO] [stdout] 959 | | nrows: usize, [INFO] [stdout] 960 | | row_stride: isize, [INFO] [stdout] 961 | | ) -> ColMut<'a, E> { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:191:9 [INFO] [stdout] | [INFO] [stdout] 191 | self.as_ref().ptr_at_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | pub unsafe fn ptr_at_unchecked(&self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:197:9 [INFO] [stdout] | [INFO] [stdout] 197 | self.as_mut().ptr_at_mut_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | pub unsafe fn ptr_at_mut_unchecked(&mut self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:203:9 [INFO] [stdout] | [INFO] [stdout] 203 | self.as_ref().overflowing_ptr_at(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:202:5 [INFO] [stdout] | [INFO] [stdout] 202 | pub unsafe fn overflowing_ptr_at(&self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::overflowing_ptr_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:209:9 [INFO] [stdout] | [INFO] [stdout] 209 | self.as_mut().overflowing_ptr_at_mut(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:208:5 [INFO] [stdout] | [INFO] [stdout] 208 | pub unsafe fn overflowing_ptr_at_mut(&mut self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | self.as_ref().ptr_inbounds_at(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:220:5 [INFO] [stdout] | [INFO] [stdout] 220 | pub unsafe fn ptr_inbounds_at(&self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:233:9 [INFO] [stdout] | [INFO] [stdout] 233 | self.as_mut().ptr_inbounds_at_mut(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:232:5 [INFO] [stdout] | [INFO] [stdout] 232 | pub unsafe fn ptr_inbounds_at_mut(&mut self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:247:9 [INFO] [stdout] | [INFO] [stdout] 247 | self.as_ref().split_at_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:246:5 [INFO] [stdout] | [INFO] [stdout] 246 | pub unsafe fn split_at_unchecked(&self, row: usize) -> (ColRef<'_, E>, ColRef<'_, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::split_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:261:9 [INFO] [stdout] | [INFO] [stdout] 261 | self.as_mut().split_at_mut_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:260:5 [INFO] [stdout] | [INFO] [stdout] 260 | pub unsafe fn split_at_mut_unchecked(&mut self, row: usize) -> (ColMut<'_, E>, ColMut<'_, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:374:64 [INFO] [stdout] | [INFO] [stdout] 374 | let ptr_ij = E::faer_map(E::faer_copy(&ptr), |ptr| ptr.add(i)); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:358:5 [INFO] [stdout] | [INFO] [stdout] 358 | / unsafe fn insert_block_with E>( [INFO] [stdout] 359 | | &mut self, [INFO] [stdout] 360 | | f: &mut F, [INFO] [stdout] 361 | | row_start: usize, [INFO] [stdout] 362 | | row_end: usize, [INFO] [stdout] 363 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:378:17 [INFO] [stdout] | [INFO] [stdout] 378 | core::ptr::write(ptr_ij, value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:358:5 [INFO] [stdout] | [INFO] [stdout] 358 | / unsafe fn insert_block_with E>( [INFO] [stdout] 359 | | &mut self, [INFO] [stdout] 360 | | f: &mut F, [INFO] [stdout] 361 | | row_start: usize, [INFO] [stdout] 362 | | row_end: usize, [INFO] [stdout] 363 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colown::Col::::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:394:9 [INFO] [stdout] | [INFO] [stdout] 394 | self.insert_block_with(f, old_nrows, new_nrows); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:389:5 [INFO] [stdout] | [INFO] [stdout] 389 | unsafe fn insert_last_rows_with E>(&mut self, f: &mut F, new_nrows: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:497:9 [INFO] [stdout] | [INFO] [stdout] 497 | self.as_ref().get_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:490:5 [INFO] [stdout] | [INFO] [stdout] 490 | / pub unsafe fn get_unchecked( [INFO] [stdout] 491 | | &self, [INFO] [stdout] 492 | | row: RowRange, [INFO] [stdout] 493 | | ) -> as ColIndex>::Target [INFO] [stdout] 494 | | where [INFO] [stdout] 495 | | for<'a> ColRef<'a, E>: ColIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::get_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:536:9 [INFO] [stdout] | [INFO] [stdout] 536 | self.as_mut().get_mut_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:529:5 [INFO] [stdout] | [INFO] [stdout] 529 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 530 | | &mut self, [INFO] [stdout] 531 | | row: RowRange, [INFO] [stdout] 532 | | ) -> as ColIndex>::Target [INFO] [stdout] 533 | | where [INFO] [stdout] 534 | | for<'a> ColMut<'a, E>: ColIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:568:9 [INFO] [stdout] | [INFO] [stdout] 568 | self.as_ref().read_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:567:5 [INFO] [stdout] | [INFO] [stdout] 567 | pub unsafe fn read_unchecked(&self, row: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:590:9 [INFO] [stdout] | [INFO] [stdout] 590 | self.as_mut().write_unchecked(row, value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:589:5 [INFO] [stdout] | [INFO] [stdout] 589 | pub unsafe fn write_unchecked(&mut self, row: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:734:9 [INFO] [stdout] | [INFO] [stdout] 734 | self.as_ref().subrows_unchecked(row_start, nrows) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:733:5 [INFO] [stdout] | [INFO] [stdout] 733 | pub unsafe fn subrows_unchecked(&self, row_start: usize, nrows: usize) -> ColRef<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::subrows_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:751:9 [INFO] [stdout] | [INFO] [stdout] 751 | self.as_mut().subrows_mut_unchecked(row_start, nrows) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:746:5 [INFO] [stdout] | [INFO] [stdout] 746 | / pub unsafe fn subrows_mut_unchecked( [INFO] [stdout] 747 | | &mut self, [INFO] [stdout] 748 | | row_start: usize, [INFO] [stdout] 749 | | nrows: usize, [INFO] [stdout] 750 | | ) -> ColMut<'_, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colmut::ColMut::<'a, E>::try_as_uninit_slice_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:903:9 [INFO] [stdout] | [INFO] [stdout] 903 | self.as_mut().try_as_uninit_slice_mut() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:900:5 [INFO] [stdout] | [INFO] [stdout] 900 | / pub unsafe fn try_as_uninit_slice_mut( [INFO] [stdout] 901 | | &mut self, [INFO] [stdout] 902 | | ) -> Option]>> { [INFO] [stdout] | |_________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/col/colown.rs:1054:9 [INFO] [stdout] | [INFO] [stdout] 1054 | self.as_ref().const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/col/colown.rs:1053:5 [INFO] [stdout] | [INFO] [stdout] 1053 | pub unsafe fn const_cast(&self) -> ColMut<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:78:27 [INFO] [stdout] | [INFO] [stdout] 78 | |ptr| NonNull::new_unchecked(ptr as *mut E::Unit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matref.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | / pub(crate) unsafe fn __from_raw_parts( [INFO] [stdout] 67 | | ptr: GroupFor, [INFO] [stdout] 68 | | nrows: usize, [INFO] [stdout] 69 | | ncols: usize, [INFO] [stdout] 70 | | row_stride: isize, [INFO] [stdout] 71 | | col_stride: isize, [INFO] [stdout] 72 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_add` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:167:22 [INFO] [stdout] | [INFO] [stdout] 167 | let offset = crate::utils::unchecked_add( [INFO] [stdout] | ______________________^ [INFO] [stdout] 168 | | crate::utils::unchecked_mul(row, self.inner.row_stride), [INFO] [stdout] 169 | | crate::utils::unchecked_mul(col, self.inner.col_stride), [INFO] [stdout] 170 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matref.rs:166:5 [INFO] [stdout] | [INFO] [stdout] 166 | pub unsafe fn ptr_at_unchecked(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:168:13 [INFO] [stdout] | [INFO] [stdout] 168 | crate::utils::unchecked_mul(row, self.inner.row_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | crate::utils::unchecked_mul(col, self.inner.col_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:174:19 [INFO] [stdout] | [INFO] [stdout] 174 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:207:9 [INFO] [stdout] | [INFO] [stdout] 207 | self.ptr_at_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matref.rs:205:5 [INFO] [stdout] | [INFO] [stdout] 205 | pub unsafe fn ptr_inbounds_at(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:376:9 [INFO] [stdout] | [INFO] [stdout] 376 | >::get_unchecked(self, row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matref.rs:368:5 [INFO] [stdout] | [INFO] [stdout] 368 | / pub unsafe fn get_unchecked( [INFO] [stdout] 369 | | self, [INFO] [stdout] 370 | | row: RowRange, [INFO] [stdout] 371 | | col: ColRange, [INFO] [stdout] 372 | | ) -> >::Target [INFO] [stdout] 373 | | where [INFO] [stdout] 374 | | Self: MatIndex, [INFO] [stdout] | |___________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:413:13 [INFO] [stdout] | [INFO] [stdout] 413 | self.get_unchecked(row, col), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matref.rs:411:5 [INFO] [stdout] | [INFO] [stdout] 411 | pub unsafe fn read_unchecked(&self, row: usize, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::__from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matref.rs:1307:5 [INFO] [stdout] | [INFO] [stdout] 1307 | MatRef::__from_raw_parts(ptr, nrows, ncols, row_stride, col_stride) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matref.rs:1300:1 [INFO] [stdout] | [INFO] [stdout] 1300 | / pub unsafe fn from_raw_parts<'a, E: Entity>( [INFO] [stdout] 1301 | | ptr: GroupFor, [INFO] [stdout] 1302 | | nrows: usize, [INFO] [stdout] 1303 | | ncols: usize, [INFO] [stdout] 1304 | | row_stride: isize, [INFO] [stdout] 1305 | | col_stride: isize, [INFO] [stdout] 1306 | | ) -> MatRef<'a, E> { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:122:27 [INFO] [stdout] | [INFO] [stdout] 122 | |ptr| NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:110:5 [INFO] [stdout] | [INFO] [stdout] 110 | / pub(crate) unsafe fn __from_raw_parts( [INFO] [stdout] 111 | | ptr: GroupFor, [INFO] [stdout] 112 | | nrows: usize, [INFO] [stdout] 113 | | ncols: usize, [INFO] [stdout] 114 | | row_stride: isize, [INFO] [stdout] 115 | | col_stride: isize, [INFO] [stdout] 116 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:228:9 [INFO] [stdout] | [INFO] [stdout] 228 | self.into_const().ptr_at_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn ptr_at_unchecked(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_add` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:234:22 [INFO] [stdout] | [INFO] [stdout] 234 | let offset = crate::utils::unchecked_add( [INFO] [stdout] | ______________________^ [INFO] [stdout] 235 | | crate::utils::unchecked_mul(row, self.inner.row_stride), [INFO] [stdout] 236 | | crate::utils::unchecked_mul(col, self.inner.col_stride), [INFO] [stdout] 237 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:233:5 [INFO] [stdout] | [INFO] [stdout] 233 | pub unsafe fn ptr_at_mut_unchecked(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:235:13 [INFO] [stdout] | [INFO] [stdout] 235 | crate::utils::unchecked_mul(row, self.inner.row_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:236:13 [INFO] [stdout] | [INFO] [stdout] 236 | crate::utils::unchecked_mul(col, self.inner.col_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:241:19 [INFO] [stdout] | [INFO] [stdout] 241 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:248:9 [INFO] [stdout] | [INFO] [stdout] 248 | self.into_const().overflowing_ptr_at(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:247:5 [INFO] [stdout] | [INFO] [stdout] 247 | pub unsafe fn overflowing_ptr_at(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:283:9 [INFO] [stdout] | [INFO] [stdout] 283 | self.into_const().ptr_inbounds_at(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:282:5 [INFO] [stdout] | [INFO] [stdout] 282 | pub unsafe fn ptr_inbounds_at(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 297 | self.ptr_at_mut_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:295:5 [INFO] [stdout] | [INFO] [stdout] 295 | pub unsafe fn ptr_inbounds_at_mut(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:318:9 [INFO] [stdout] | [INFO] [stdout] 318 | self.into_const().split_at_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:313:5 [INFO] [stdout] | [INFO] [stdout] 313 | / pub unsafe fn split_at_unchecked( [INFO] [stdout] 314 | | self, [INFO] [stdout] 315 | | row: usize, [INFO] [stdout] 316 | | col: usize, [INFO] [stdout] 317 | | ) -> (MatRef<'a, E>, MatRef<'a, E>, MatRef<'a, E>, MatRef<'a, E>) { [INFO] [stdout] | |_____________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:357:13 [INFO] [stdout] | [INFO] [stdout] 357 | self.into_const().split_at_unchecked(row, col); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:355:5 [INFO] [stdout] | [INFO] [stdout] 355 | pub unsafe fn split_at_mut_unchecked(self, row: usize, col: usize) -> (Self, Self, Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:359:13 [INFO] [stdout] | [INFO] [stdout] 359 | top_left.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:360:13 [INFO] [stdout] | [INFO] [stdout] 360 | top_right.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:361:13 [INFO] [stdout] | [INFO] [stdout] 361 | bot_left.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:362:13 [INFO] [stdout] | [INFO] [stdout] 362 | bot_right.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:402:9 [INFO] [stdout] | [INFO] [stdout] 402 | self.into_const().split_at_row_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:401:5 [INFO] [stdout] | [INFO] [stdout] 401 | pub unsafe fn split_at_row_unchecked(self, row: usize) -> (MatRef<'a, E>, MatRef<'a, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:430:26 [INFO] [stdout] | [INFO] [stdout] 430 | let (top, bot) = self.into_const().split_at_row_unchecked(row); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:429:5 [INFO] [stdout] | [INFO] [stdout] 429 | pub unsafe fn split_at_row_mut_unchecked(self, row: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:431:10 [INFO] [stdout] | [INFO] [stdout] 431 | (top.const_cast(), bot.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:431:28 [INFO] [stdout] | [INFO] [stdout] 431 | (top.const_cast(), bot.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:460:9 [INFO] [stdout] | [INFO] [stdout] 460 | self.into_const().split_at_col_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:459:5 [INFO] [stdout] | [INFO] [stdout] 459 | pub unsafe fn split_at_col_unchecked(self, col: usize) -> (MatRef<'a, E>, MatRef<'a, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:488:29 [INFO] [stdout] | [INFO] [stdout] 488 | let (left, right) = self.into_const().split_at_col_unchecked(col); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:487:5 [INFO] [stdout] | [INFO] [stdout] 487 | pub unsafe fn split_at_col_mut_unchecked(self, col: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:489:10 [INFO] [stdout] | [INFO] [stdout] 489 | (left.const_cast(), right.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:489:29 [INFO] [stdout] | [INFO] [stdout] 489 | (left.const_cast(), right.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:528:9 [INFO] [stdout] | [INFO] [stdout] 528 | self.into_const().get_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:520:5 [INFO] [stdout] | [INFO] [stdout] 520 | / pub unsafe fn get_unchecked( [INFO] [stdout] 521 | | self, [INFO] [stdout] 522 | | row: RowRange, [INFO] [stdout] 523 | | col: ColRange, [INFO] [stdout] 524 | | ) -> as MatIndex>::Target [INFO] [stdout] 525 | | where [INFO] [stdout] 526 | | MatRef<'a, E>: MatIndex, [INFO] [stdout] | |____________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:576:9 [INFO] [stdout] | [INFO] [stdout] 576 | >::get_unchecked(self, row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:568:5 [INFO] [stdout] | [INFO] [stdout] 568 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 569 | | self, [INFO] [stdout] 570 | | row: RowRange, [INFO] [stdout] 571 | | col: ColRange, [INFO] [stdout] 572 | | ) -> >::Target [INFO] [stdout] 573 | | where [INFO] [stdout] 574 | | Self: MatIndex, [INFO] [stdout] | |___________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:612:9 [INFO] [stdout] | [INFO] [stdout] 612 | self.rb().read_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:611:5 [INFO] [stdout] | [INFO] [stdout] 611 | pub unsafe fn read_unchecked(&self, row: usize, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:637:41 [INFO] [stdout] | [INFO] [stdout] 637 | let zipped = E::faer_zip(units, (*self).rb_mut().ptr_inbounds_at_mut(row, col)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:635:5 [INFO] [stdout] | [INFO] [stdout] 635 | pub unsafe fn write_unchecked(&mut self, row: usize, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:641:27 [INFO] [stdout] | [INFO] [stdout] 641 | |(unit, ptr)| *ptr = unit, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::submatrix_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1040:9 [INFO] [stdout] | [INFO] [stdout] 1040 | / self.into_const() [INFO] [stdout] 1041 | | .submatrix_unchecked(row_start, col_start, nrows, ncols) [INFO] [stdout] | |____________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1033:5 [INFO] [stdout] | [INFO] [stdout] 1033 | / pub unsafe fn submatrix_unchecked( [INFO] [stdout] 1034 | | self, [INFO] [stdout] 1035 | | row_start: usize, [INFO] [stdout] 1036 | | col_start: usize, [INFO] [stdout] 1037 | | nrows: usize, [INFO] [stdout] 1038 | | ncols: usize, [INFO] [stdout] 1039 | | ) -> MatRef<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1062:9 [INFO] [stdout] | [INFO] [stdout] 1062 | / self.into_const() [INFO] [stdout] 1063 | | .submatrix_unchecked(row_start, col_start, nrows, ncols) [INFO] [stdout] 1064 | | .const_cast() [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1055:5 [INFO] [stdout] | [INFO] [stdout] 1055 | / pub unsafe fn submatrix_mut_unchecked( [INFO] [stdout] 1056 | | self, [INFO] [stdout] 1057 | | row_start: usize, [INFO] [stdout] 1058 | | col_start: usize, [INFO] [stdout] 1059 | | nrows: usize, [INFO] [stdout] 1060 | | ncols: usize, [INFO] [stdout] 1061 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::submatrix_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1062:9 [INFO] [stdout] | [INFO] [stdout] 1062 | / self.into_const() [INFO] [stdout] 1063 | | .submatrix_unchecked(row_start, col_start, nrows, ncols) [INFO] [stdout] | |____________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1160:9 [INFO] [stdout] | [INFO] [stdout] 1160 | self.into_const().subrows_unchecked(row_start, nrows) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1159:5 [INFO] [stdout] | [INFO] [stdout] 1159 | pub unsafe fn subrows_unchecked(self, row_start: usize, nrows: usize) -> MatRef<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1173:9 [INFO] [stdout] | [INFO] [stdout] 1173 | / self.into_const() [INFO] [stdout] 1174 | | .subrows_unchecked(row_start, nrows) [INFO] [stdout] 1175 | | .const_cast() [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1172:5 [INFO] [stdout] | [INFO] [stdout] 1172 | pub unsafe fn subrows_mut_unchecked(self, row_start: usize, nrows: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1173:9 [INFO] [stdout] | [INFO] [stdout] 1173 | / self.into_const() [INFO] [stdout] 1174 | | .subrows_unchecked(row_start, nrows) [INFO] [stdout] | |________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1250:9 [INFO] [stdout] | [INFO] [stdout] 1250 | self.into_const().subcols_unchecked(col_start, ncols) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1249:5 [INFO] [stdout] | [INFO] [stdout] 1249 | pub unsafe fn subcols_unchecked(self, col_start: usize, ncols: usize) -> MatRef<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1263:9 [INFO] [stdout] | [INFO] [stdout] 1263 | / self.into_const() [INFO] [stdout] 1264 | | .subcols_unchecked(col_start, ncols) [INFO] [stdout] 1265 | | .const_cast() [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1262:5 [INFO] [stdout] | [INFO] [stdout] 1262 | pub unsafe fn subcols_mut_unchecked(self, col_start: usize, ncols: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1263:9 [INFO] [stdout] | [INFO] [stdout] 1263 | / self.into_const() [INFO] [stdout] 1264 | | .subcols_unchecked(col_start, ncols) [INFO] [stdout] | |________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1338:9 [INFO] [stdout] | [INFO] [stdout] 1338 | self.into_const().row_unchecked(row_idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1337:5 [INFO] [stdout] | [INFO] [stdout] 1337 | pub unsafe fn row_unchecked(self, row_idx: usize) -> RowRef<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1349:9 [INFO] [stdout] | [INFO] [stdout] 1349 | self.into_const().row_unchecked(row_idx).const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1348:5 [INFO] [stdout] | [INFO] [stdout] 1348 | pub unsafe fn row_mut_unchecked(self, row_idx: usize) -> RowMut<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1349:9 [INFO] [stdout] | [INFO] [stdout] 1349 | self.into_const().row_unchecked(row_idx).const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1402:9 [INFO] [stdout] | [INFO] [stdout] 1402 | self.into_const().col_unchecked(col_idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1401:5 [INFO] [stdout] | [INFO] [stdout] 1401 | pub unsafe fn col_unchecked(self, col_idx: usize) -> ColRef<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `col::colref::ColRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1413:9 [INFO] [stdout] | [INFO] [stdout] 1413 | self.into_const().col_unchecked(col_idx).const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:1412:5 [INFO] [stdout] | [INFO] [stdout] 1412 | pub unsafe fn col_mut_unchecked(self, col_idx: usize) -> ColMut<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:1413:9 [INFO] [stdout] | [INFO] [stdout] 1413 | self.into_const().col_unchecked(col_idx).const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::__from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matmut.rs:2067:5 [INFO] [stdout] | [INFO] [stdout] 2067 | MatMut::__from_raw_parts(ptr, nrows, ncols, row_stride, col_stride) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matmut.rs:2060:1 [INFO] [stdout] | [INFO] [stdout] 2060 | / pub unsafe fn from_raw_parts_mut<'a, E: Entity>( [INFO] [stdout] 2061 | | ptr: GroupFor, [INFO] [stdout] 2062 | | nrows: usize, [INFO] [stdout] 2063 | | ncols: usize, [INFO] [stdout] 2064 | | row_stride: isize, [INFO] [stdout] 2065 | | col_stride: isize, [INFO] [stdout] 2066 | | ) -> MatMut<'a, E> { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:245:9 [INFO] [stdout] | [INFO] [stdout] 245 | self.as_ref().ptr_at_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:244:5 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe fn ptr_at_unchecked(&self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:255:9 [INFO] [stdout] | [INFO] [stdout] 255 | self.as_mut().ptr_at_mut_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:250:5 [INFO] [stdout] | [INFO] [stdout] 250 | / pub unsafe fn ptr_at_mut_unchecked( [INFO] [stdout] 251 | | &mut self, [INFO] [stdout] 252 | | row: usize, [INFO] [stdout] 253 | | col: usize, [INFO] [stdout] 254 | | ) -> GroupFor { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:261:9 [INFO] [stdout] | [INFO] [stdout] 261 | self.as_ref().overflowing_ptr_at(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:260:5 [INFO] [stdout] | [INFO] [stdout] 260 | pub unsafe fn overflowing_ptr_at(&self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::overflowing_ptr_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:271:9 [INFO] [stdout] | [INFO] [stdout] 271 | self.as_mut().overflowing_ptr_at_mut(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / pub unsafe fn overflowing_ptr_at_mut( [INFO] [stdout] 267 | | &mut self, [INFO] [stdout] 268 | | row: usize, [INFO] [stdout] 269 | | col: usize, [INFO] [stdout] 270 | | ) -> GroupFor { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:284:9 [INFO] [stdout] | [INFO] [stdout] 284 | self.as_ref().ptr_inbounds_at(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:283:5 [INFO] [stdout] | [INFO] [stdout] 283 | pub unsafe fn ptr_inbounds_at(&self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:301:9 [INFO] [stdout] | [INFO] [stdout] 301 | self.as_mut().ptr_inbounds_at_mut(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:296:5 [INFO] [stdout] | [INFO] [stdout] 296 | / pub unsafe fn ptr_inbounds_at_mut( [INFO] [stdout] 297 | | &mut self, [INFO] [stdout] 298 | | row: usize, [INFO] [stdout] 299 | | col: usize, [INFO] [stdout] 300 | | ) -> GroupFor { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:383:72 [INFO] [stdout] | [INFO] [stdout] 383 | let ptr_ij = E::faer_map(E::faer_copy(&ptr_j), |ptr_j| ptr_j.add(i)); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:360:5 [INFO] [stdout] | [INFO] [stdout] 360 | / unsafe fn insert_block_with E>( [INFO] [stdout] 361 | | &mut self, [INFO] [stdout] 362 | | f: &mut F, [INFO] [stdout] 363 | | row_start: usize, [INFO] [stdout] ... | [INFO] [stdout] 366 | | col_end: usize, [INFO] [stdout] 367 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:387:21 [INFO] [stdout] | [INFO] [stdout] 387 | core::ptr::write(ptr_ij, value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:360:5 [INFO] [stdout] | [INFO] [stdout] 360 | / unsafe fn insert_block_with E>( [INFO] [stdout] 361 | | &mut self, [INFO] [stdout] 362 | | f: &mut F, [INFO] [stdout] 363 | | row_start: usize, [INFO] [stdout] ... | [INFO] [stdout] 366 | | col_end: usize, [INFO] [stdout] 367 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matown::Mat::::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:414:9 [INFO] [stdout] | [INFO] [stdout] 414 | self.insert_block_with(f, 0, self.nrows(), old_ncols, new_ncols); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:405:5 [INFO] [stdout] | [INFO] [stdout] 405 | / unsafe fn insert_last_cols_with E>( [INFO] [stdout] 406 | | &mut self, [INFO] [stdout] 407 | | f: &mut F, [INFO] [stdout] 408 | | new_ncols: usize, [INFO] [stdout] 409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matown::Mat::::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:427:9 [INFO] [stdout] | [INFO] [stdout] 427 | self.insert_block_with(f, old_nrows, new_nrows, 0, self.ncols()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:418:5 [INFO] [stdout] | [INFO] [stdout] 418 | / unsafe fn insert_last_rows_with E>( [INFO] [stdout] 419 | | &mut self, [INFO] [stdout] 420 | | f: &mut F, [INFO] [stdout] 421 | | new_nrows: usize, [INFO] [stdout] 422 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:622:9 [INFO] [stdout] | [INFO] [stdout] 622 | self.as_ref().const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:621:5 [INFO] [stdout] | [INFO] [stdout] 621 | pub unsafe fn const_cast(&self) -> MatMut<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:643:9 [INFO] [stdout] | [INFO] [stdout] 643 | self.as_ref().split_at_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:638:5 [INFO] [stdout] | [INFO] [stdout] 638 | / pub unsafe fn split_at_unchecked( [INFO] [stdout] 639 | | &self, [INFO] [stdout] 640 | | row: usize, [INFO] [stdout] 641 | | col: usize, [INFO] [stdout] 642 | | ) -> (MatRef<'_, E>, MatRef<'_, E>, MatRef<'_, E>, MatRef<'_, E>) { [INFO] [stdout] | |_____________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::split_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:685:9 [INFO] [stdout] | [INFO] [stdout] 685 | self.as_mut().split_at_mut_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:680:5 [INFO] [stdout] | [INFO] [stdout] 680 | / pub unsafe fn split_at_mut_unchecked( [INFO] [stdout] 681 | | &mut self, [INFO] [stdout] 682 | | row: usize, [INFO] [stdout] 683 | | col: usize, [INFO] [stdout] 684 | | ) -> (MatMut<'_, E>, MatMut<'_, E>, MatMut<'_, E>, MatMut<'_, E>) { [INFO] [stdout] | |_____________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:720:9 [INFO] [stdout] | [INFO] [stdout] 720 | self.as_ref().split_at_row_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:719:5 [INFO] [stdout] | [INFO] [stdout] 719 | pub unsafe fn split_at_row_unchecked(&self, row: usize) -> (MatRef<'_, E>, MatRef<'_, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::split_at_row_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:751:9 [INFO] [stdout] | [INFO] [stdout] 751 | self.as_mut().split_at_row_mut_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:747:5 [INFO] [stdout] | [INFO] [stdout] 747 | / pub unsafe fn split_at_row_mut_unchecked( [INFO] [stdout] 748 | | &mut self, [INFO] [stdout] 749 | | row: usize, [INFO] [stdout] 750 | | ) -> (MatMut<'_, E>, MatMut<'_, E>) { [INFO] [stdout] | |_______________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::split_at_col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:779:9 [INFO] [stdout] | [INFO] [stdout] 779 | self.as_ref().split_at_col_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:778:5 [INFO] [stdout] | [INFO] [stdout] 778 | pub unsafe fn split_at_col_unchecked(&self, col: usize) -> (MatRef<'_, E>, MatRef<'_, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::split_at_col_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:810:9 [INFO] [stdout] | [INFO] [stdout] 810 | self.as_mut().split_at_col_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:806:5 [INFO] [stdout] | [INFO] [stdout] 806 | / pub unsafe fn split_at_col_mut_unchecked( [INFO] [stdout] 807 | | &mut self, [INFO] [stdout] 808 | | col: usize, [INFO] [stdout] 809 | | ) -> (MatMut<'_, E>, MatMut<'_, E>) { [INFO] [stdout] | |_______________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:848:9 [INFO] [stdout] | [INFO] [stdout] 848 | self.as_ref().get_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:840:5 [INFO] [stdout] | [INFO] [stdout] 840 | / pub unsafe fn get_unchecked( [INFO] [stdout] 841 | | &self, [INFO] [stdout] 842 | | row: RowRange, [INFO] [stdout] 843 | | col: ColRange, [INFO] [stdout] 844 | | ) -> as MatIndex>::Target [INFO] [stdout] 845 | | where [INFO] [stdout] 846 | | for<'a> MatRef<'a, E>: MatIndex, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::get_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:896:9 [INFO] [stdout] | [INFO] [stdout] 896 | self.as_mut().get_mut_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:888:5 [INFO] [stdout] | [INFO] [stdout] 888 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 889 | | &mut self, [INFO] [stdout] 890 | | row: RowRange, [INFO] [stdout] 891 | | col: ColRange, [INFO] [stdout] 892 | | ) -> as MatIndex>::Target [INFO] [stdout] 893 | | where [INFO] [stdout] 894 | | for<'a> MatMut<'a, E>: MatIndex, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:932:9 [INFO] [stdout] | [INFO] [stdout] 932 | self.as_ref().read_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:931:5 [INFO] [stdout] | [INFO] [stdout] 931 | pub unsafe fn read_unchecked(&self, row: usize, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:956:9 [INFO] [stdout] | [INFO] [stdout] 956 | self.as_mut().write_unchecked(row, col, value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:955:5 [INFO] [stdout] | [INFO] [stdout] 955 | pub unsafe fn write_unchecked(&mut self, row: usize, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::submatrix_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1284:9 [INFO] [stdout] | [INFO] [stdout] 1284 | / self.as_ref() [INFO] [stdout] 1285 | | .submatrix_unchecked(row_start, col_start, nrows, ncols) [INFO] [stdout] | |____________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1277:5 [INFO] [stdout] | [INFO] [stdout] 1277 | / pub unsafe fn submatrix_unchecked( [INFO] [stdout] 1278 | | &self, [INFO] [stdout] 1279 | | row_start: usize, [INFO] [stdout] 1280 | | col_start: usize, [INFO] [stdout] 1281 | | nrows: usize, [INFO] [stdout] 1282 | | ncols: usize, [INFO] [stdout] 1283 | | ) -> MatRef<'_, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::submatrix_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1306:9 [INFO] [stdout] | [INFO] [stdout] 1306 | / self.as_mut() [INFO] [stdout] 1307 | | .submatrix_mut_unchecked(row_start, col_start, nrows, ncols) [INFO] [stdout] | |________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1299:5 [INFO] [stdout] | [INFO] [stdout] 1299 | / pub unsafe fn submatrix_mut_unchecked( [INFO] [stdout] 1300 | | &mut self, [INFO] [stdout] 1301 | | row_start: usize, [INFO] [stdout] 1302 | | col_start: usize, [INFO] [stdout] 1303 | | nrows: usize, [INFO] [stdout] 1304 | | ncols: usize, [INFO] [stdout] 1305 | | ) -> MatMut<'_, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1399:9 [INFO] [stdout] | [INFO] [stdout] 1399 | self.as_ref().subrows_unchecked(row_start, nrows) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1398:5 [INFO] [stdout] | [INFO] [stdout] 1398 | pub unsafe fn subrows_unchecked(&self, row_start: usize, nrows: usize) -> MatRef<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::subrows_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1416:9 [INFO] [stdout] | [INFO] [stdout] 1416 | self.as_mut().subrows_mut_unchecked(row_start, nrows) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1411:5 [INFO] [stdout] | [INFO] [stdout] 1411 | / pub unsafe fn subrows_mut_unchecked( [INFO] [stdout] 1412 | | &mut self, [INFO] [stdout] 1413 | | row_start: usize, [INFO] [stdout] 1414 | | nrows: usize, [INFO] [stdout] 1415 | | ) -> MatMut<'_, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1491:9 [INFO] [stdout] | [INFO] [stdout] 1491 | self.as_ref().subcols_unchecked(col_start, ncols) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1490:5 [INFO] [stdout] | [INFO] [stdout] 1490 | pub unsafe fn subcols_unchecked(&self, col_start: usize, ncols: usize) -> MatRef<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::subcols_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1508:9 [INFO] [stdout] | [INFO] [stdout] 1508 | self.as_mut().subcols_mut_unchecked(col_start, ncols) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1503:5 [INFO] [stdout] | [INFO] [stdout] 1503 | / pub unsafe fn subcols_mut_unchecked( [INFO] [stdout] 1504 | | &mut self, [INFO] [stdout] 1505 | | col_start: usize, [INFO] [stdout] 1506 | | ncols: usize, [INFO] [stdout] 1507 | | ) -> MatMut<'_, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1581:9 [INFO] [stdout] | [INFO] [stdout] 1581 | self.as_ref().row_unchecked(row_idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1580:5 [INFO] [stdout] | [INFO] [stdout] 1580 | pub unsafe fn row_unchecked(&self, row_idx: usize) -> RowRef<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::row_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1592:9 [INFO] [stdout] | [INFO] [stdout] 1592 | self.as_mut().row_mut_unchecked(row_idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1591:5 [INFO] [stdout] | [INFO] [stdout] 1591 | pub unsafe fn row_mut_unchecked(&mut self, row_idx: usize) -> RowMut<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matref::MatRef::<'a, E>::col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1642:9 [INFO] [stdout] | [INFO] [stdout] 1642 | self.as_ref().col_unchecked(col_idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1641:5 [INFO] [stdout] | [INFO] [stdout] 1641 | pub unsafe fn col_unchecked(&self, col_idx: usize) -> ColRef<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mat::matmut::MatMut::<'a, E>::col_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mat/matown.rs:1653:9 [INFO] [stdout] | [INFO] [stdout] 1653 | self.as_mut().col_mut_unchecked(col_idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mat/matown.rs:1652:5 [INFO] [stdout] | [INFO] [stdout] 1652 | pub unsafe fn col_mut_unchecked(&mut self, col_idx: usize) -> ColMut<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:73:27 [INFO] [stdout] | [INFO] [stdout] 73 | |ptr| NonNull::new_unchecked(ptr as *mut E::Unit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowref.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | / pub(crate) unsafe fn __from_raw_parts( [INFO] [stdout] 64 | | ptr: GroupFor, [INFO] [stdout] 65 | | ncols: usize, [INFO] [stdout] 66 | | col_stride: isize, [INFO] [stdout] 67 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:132:22 [INFO] [stdout] | [INFO] [stdout] 132 | let offset = crate::utils::unchecked_mul(col, self.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowref.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | pub unsafe fn ptr_at_unchecked(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:136:19 [INFO] [stdout] | [INFO] [stdout] 136 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:165:9 [INFO] [stdout] | [INFO] [stdout] 165 | self.ptr_at_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowref.rs:163:5 [INFO] [stdout] | [INFO] [stdout] 163 | pub unsafe fn ptr_inbounds_at(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::RowIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:230:9 [INFO] [stdout] | [INFO] [stdout] 230 | >::get_unchecked(self, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowref.rs:223:5 [INFO] [stdout] | [INFO] [stdout] 223 | / pub unsafe fn get_unchecked( [INFO] [stdout] 224 | | self, [INFO] [stdout] 225 | | col: ColRange, [INFO] [stdout] 226 | | ) -> >::Target [INFO] [stdout] 227 | | where [INFO] [stdout] 228 | | Self: RowIndex, [INFO] [stdout] | |_________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:261:13 [INFO] [stdout] | [INFO] [stdout] 261 | self.get_unchecked(col), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowref.rs:259:5 [INFO] [stdout] | [INFO] [stdout] 259 | pub unsafe fn read_unchecked(&self, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::__from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowref.rs:636:5 [INFO] [stdout] | [INFO] [stdout] 636 | RowRef::__from_raw_parts(ptr, ncols, col_stride) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowref.rs:631:1 [INFO] [stdout] | [INFO] [stdout] 631 | / pub unsafe fn from_raw_parts<'a, E: Entity>( [INFO] [stdout] 632 | | ptr: GroupFor, [INFO] [stdout] 633 | | ncols: usize, [INFO] [stdout] 634 | | col_stride: isize, [INFO] [stdout] 635 | | ) -> RowRef<'a, E> { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:84:27 [INFO] [stdout] | [INFO] [stdout] 84 | |ptr| NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | / pub(crate) unsafe fn __from_raw_parts( [INFO] [stdout] 75 | | ptr: GroupFor, [INFO] [stdout] 76 | | ncols: usize, [INFO] [stdout] 77 | | col_stride: isize, [INFO] [stdout] 78 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:160:9 [INFO] [stdout] | [INFO] [stdout] 160 | self.into_const().ptr_at_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | pub unsafe fn ptr_at_unchecked(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `utils::unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:166:22 [INFO] [stdout] | [INFO] [stdout] 166 | let offset = crate::utils::unchecked_mul(col, self.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | pub unsafe fn ptr_at_mut_unchecked(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:170:19 [INFO] [stdout] | [INFO] [stdout] 170 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:177:9 [INFO] [stdout] | [INFO] [stdout] 177 | self.into_const().overflowing_ptr_at(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:176:5 [INFO] [stdout] | [INFO] [stdout] 176 | pub unsafe fn overflowing_ptr_at(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:204:9 [INFO] [stdout] | [INFO] [stdout] 204 | self.into_const().ptr_inbounds_at(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | pub unsafe fn ptr_inbounds_at(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:217:9 [INFO] [stdout] | [INFO] [stdout] 217 | self.ptr_at_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:215:5 [INFO] [stdout] | [INFO] [stdout] 215 | pub unsafe fn ptr_inbounds_at_mut(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:231:9 [INFO] [stdout] | [INFO] [stdout] 231 | self.into_const().split_at_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:230:5 [INFO] [stdout] | [INFO] [stdout] 230 | pub unsafe fn split_at_unchecked(self, col: usize) -> (RowRef<'a, E>, RowRef<'a, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:245:29 [INFO] [stdout] | [INFO] [stdout] 245 | let (left, right) = self.into_const().split_at_unchecked(col); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:244:5 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe fn split_at_mut_unchecked(self, col: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 297 | self.into_const().get_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:290:5 [INFO] [stdout] | [INFO] [stdout] 290 | / pub unsafe fn get_unchecked( [INFO] [stdout] 291 | | self, [INFO] [stdout] 292 | | col: ColRange, [INFO] [stdout] 293 | | ) -> as RowIndex>::Target [INFO] [stdout] 294 | | where [INFO] [stdout] 295 | | RowRef<'a, E>: RowIndex, [INFO] [stdout] | |__________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::RowIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:338:9 [INFO] [stdout] | [INFO] [stdout] 338 | >::get_unchecked(self, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:331:5 [INFO] [stdout] | [INFO] [stdout] 331 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 332 | | self, [INFO] [stdout] 333 | | col: ColRange, [INFO] [stdout] 334 | | ) -> >::Target [INFO] [stdout] 335 | | where [INFO] [stdout] 336 | | Self: RowIndex, [INFO] [stdout] | |_________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:368:9 [INFO] [stdout] | [INFO] [stdout] 368 | self.rb().read_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:367:5 [INFO] [stdout] | [INFO] [stdout] 367 | pub unsafe fn read_unchecked(&self, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:391:41 [INFO] [stdout] | [INFO] [stdout] 391 | let zipped = E::faer_zip(units, (*self).rb_mut().ptr_inbounds_at_mut(col)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:389:5 [INFO] [stdout] | [INFO] [stdout] 389 | pub unsafe fn write_unchecked(&mut self, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:395:27 [INFO] [stdout] | [INFO] [stdout] 395 | |(unit, ptr)| *ptr = unit, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:548:9 [INFO] [stdout] | [INFO] [stdout] 548 | self.into_const().subcols_unchecked(col_start, ncols) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:547:5 [INFO] [stdout] | [INFO] [stdout] 547 | pub unsafe fn subcols_unchecked(self, col_start: usize, ncols: usize) -> RowRef<'a, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:574:9 [INFO] [stdout] | [INFO] [stdout] 574 | / self.into_const() [INFO] [stdout] 575 | | .subcols_unchecked(col_start, ncols) [INFO] [stdout] 576 | | .const_cast() [INFO] [stdout] | |_________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:573:5 [INFO] [stdout] | [INFO] [stdout] 573 | pub unsafe fn subcols_mut_unchecked(self, col_start: usize, ncols: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:574:9 [INFO] [stdout] | [INFO] [stdout] 574 | / self.into_const() [INFO] [stdout] 575 | | .subcols_unchecked(col_start, ncols) [INFO] [stdout] | |________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::__from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowmut.rs:926:5 [INFO] [stdout] | [INFO] [stdout] 926 | RowMut::__from_raw_parts(ptr, ncols, col_stride) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowmut.rs:921:1 [INFO] [stdout] | [INFO] [stdout] 921 | / pub unsafe fn from_raw_parts_mut<'a, E: Entity>( [INFO] [stdout] 922 | | ptr: GroupFor, [INFO] [stdout] 923 | | ncols: usize, [INFO] [stdout] 924 | | col_stride: isize, [INFO] [stdout] 925 | | ) -> RowMut<'a, E> { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::ptr_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:189:9 [INFO] [stdout] | [INFO] [stdout] 189 | self.as_ref().ptr_at_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:188:5 [INFO] [stdout] | [INFO] [stdout] 188 | pub unsafe fn ptr_at_unchecked(&self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:195:9 [INFO] [stdout] | [INFO] [stdout] 195 | self.as_mut().ptr_at_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | pub unsafe fn ptr_at_mut_unchecked(&mut self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:201:9 [INFO] [stdout] | [INFO] [stdout] 201 | self.as_ref().overflowing_ptr_at(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:200:5 [INFO] [stdout] | [INFO] [stdout] 200 | pub unsafe fn overflowing_ptr_at(&self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::overflowing_ptr_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:207:9 [INFO] [stdout] | [INFO] [stdout] 207 | self.as_mut().overflowing_ptr_at_mut(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:206:5 [INFO] [stdout] | [INFO] [stdout] 206 | pub unsafe fn overflowing_ptr_at_mut(&mut self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:219:9 [INFO] [stdout] | [INFO] [stdout] 219 | self.as_ref().ptr_inbounds_at(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:218:5 [INFO] [stdout] | [INFO] [stdout] 218 | pub unsafe fn ptr_inbounds_at(&self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:231:9 [INFO] [stdout] | [INFO] [stdout] 231 | self.as_mut().ptr_inbounds_at_mut(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:230:5 [INFO] [stdout] | [INFO] [stdout] 230 | pub unsafe fn ptr_inbounds_at_mut(&mut self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:245:9 [INFO] [stdout] | [INFO] [stdout] 245 | self.as_ref().split_at_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:244:5 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe fn split_at_unchecked(&self, col: usize) -> (RowRef<'_, E>, RowRef<'_, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::split_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:259:9 [INFO] [stdout] | [INFO] [stdout] 259 | self.as_mut().split_at_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:258:5 [INFO] [stdout] | [INFO] [stdout] 258 | pub unsafe fn split_at_mut_unchecked(&mut self, col: usize) -> (RowMut<'_, E>, RowMut<'_, E>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:358:64 [INFO] [stdout] | [INFO] [stdout] 358 | let ptr_ij = E::faer_map(E::faer_copy(&ptr), |ptr| ptr.add(j)); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:342:5 [INFO] [stdout] | [INFO] [stdout] 342 | / unsafe fn insert_block_with E>( [INFO] [stdout] 343 | | &mut self, [INFO] [stdout] 344 | | f: &mut F, [INFO] [stdout] 345 | | col_start: usize, [INFO] [stdout] 346 | | col_end: usize, [INFO] [stdout] 347 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:362:17 [INFO] [stdout] | [INFO] [stdout] 362 | core::ptr::write(ptr_ij, value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:342:5 [INFO] [stdout] | [INFO] [stdout] 342 | / unsafe fn insert_block_with E>( [INFO] [stdout] 343 | | &mut self, [INFO] [stdout] 344 | | f: &mut F, [INFO] [stdout] 345 | | col_start: usize, [INFO] [stdout] 346 | | col_end: usize, [INFO] [stdout] 347 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowown::Row::::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | self.insert_block_with(f, old_ncols, new_ncols); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:373:5 [INFO] [stdout] | [INFO] [stdout] 373 | unsafe fn insert_last_cols_with E>(&mut self, f: &mut F, new_ncols: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowown::Row::::as_uninit_slice_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:465:14 [INFO] [stdout] | [INFO] [stdout] 465 | Some(self.as_uninit_slice_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:462:5 [INFO] [stdout] | [INFO] [stdout] 462 | / pub unsafe fn try_as_uninit_slice_mut( [INFO] [stdout] 463 | | &mut self, [INFO] [stdout] 464 | | ) -> Option]>> { [INFO] [stdout] | |_________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:493:9 [INFO] [stdout] | [INFO] [stdout] 493 | self.as_ref().subcols_unchecked(col_start, ncols) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:492:5 [INFO] [stdout] | [INFO] [stdout] 492 | pub unsafe fn subcols_unchecked(&self, col_start: usize, ncols: usize) -> RowRef<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::subcols_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:523:9 [INFO] [stdout] | [INFO] [stdout] 523 | self.as_mut().subcols_mut_unchecked(col_start, ncols) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:518:5 [INFO] [stdout] | [INFO] [stdout] 518 | / pub unsafe fn subcols_mut_unchecked( [INFO] [stdout] 519 | | &mut self, [INFO] [stdout] 520 | | col_start: usize, [INFO] [stdout] 521 | | ncols: usize, [INFO] [stdout] 522 | | ) -> RowMut<'_, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:568:9 [INFO] [stdout] | [INFO] [stdout] 568 | self.as_ref().get_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:561:5 [INFO] [stdout] | [INFO] [stdout] 561 | / pub unsafe fn get_unchecked( [INFO] [stdout] 562 | | &self, [INFO] [stdout] 563 | | col: ColRange, [INFO] [stdout] 564 | | ) -> as RowIndex>::Target [INFO] [stdout] 565 | | where [INFO] [stdout] 566 | | for<'a> RowRef<'a, E>: RowIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::get_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:607:9 [INFO] [stdout] | [INFO] [stdout] 607 | self.as_mut().get_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:600:5 [INFO] [stdout] | [INFO] [stdout] 600 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 601 | | &mut self, [INFO] [stdout] 602 | | col: ColRange, [INFO] [stdout] 603 | | ) -> as RowIndex>::Target [INFO] [stdout] 604 | | where [INFO] [stdout] 605 | | for<'a> RowMut<'a, E>: RowIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:639:9 [INFO] [stdout] | [INFO] [stdout] 639 | self.as_ref().read_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:638:5 [INFO] [stdout] | [INFO] [stdout] 638 | pub unsafe fn read_unchecked(&self, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowmut::RowMut::<'a, E>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:661:9 [INFO] [stdout] | [INFO] [stdout] 661 | self.as_mut().write_unchecked(col, value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:660:5 [INFO] [stdout] | [INFO] [stdout] 660 | pub unsafe fn write_unchecked(&mut self, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `row::rowref::RowRef::<'a, E>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/row/rowown.rs:1014:9 [INFO] [stdout] | [INFO] [stdout] 1014 | self.as_ref().const_cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/row/rowown.rs:1013:5 [INFO] [stdout] | [INFO] [stdout] 1013 | pub unsafe fn const_cast(&self) -> RowMut<'_, E> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csc::symbolic_ref::SymbolicSparseColMatRef::<'a, I>::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/symbolic_own.rs:115:9 [INFO] [stdout] | [INFO] [stdout] 115 | / SymbolicSparseColMatRef::new_unchecked( [INFO] [stdout] 116 | | nrows, [INFO] [stdout] 117 | | ncols, [INFO] [stdout] 118 | | &col_ptrs, [INFO] [stdout] 119 | | nnz_per_col.as_deref(), [INFO] [stdout] 120 | | &row_indices, [INFO] [stdout] 121 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csc/symbolic_own.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | / pub unsafe fn new_unchecked( [INFO] [stdout] 109 | | nrows: usize, [INFO] [stdout] 110 | | ncols: usize, [INFO] [stdout] 111 | | col_ptrs: alloc::vec::Vec, [INFO] [stdout] 112 | | nnz_per_col: Option>, [INFO] [stdout] 113 | | row_indices: alloc::vec::Vec, [INFO] [stdout] 114 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csc::symbolic_ref::SymbolicSparseColMatRef::<'a, I>::col_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/symbolic_own.rs:293:9 [INFO] [stdout] | [INFO] [stdout] 293 | self.as_ref().col_range_unchecked(j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csc/symbolic_own.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/symbolic_ref.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | let start = __get_unchecked(self.col_ptr, j).zx(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csc/symbolic_ref.rs:377:5 [INFO] [stdout] | [INFO] [stdout] 377 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/symbolic_ref.rs:381:29 [INFO] [stdout] | [INFO] [stdout] 381 | .map(|col_nnz| (__get_unchecked(col_nnz, j).zx() + start)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/symbolic_ref.rs:382:24 [INFO] [stdout] | [INFO] [stdout] 382 | .unwrap_or(__get_unchecked(self.col_ptr, j + 1).zx()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csc::symbolic_ref::SymbolicSparseColMatRef::<'a, I>::col_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/matmut.rs:394:9 [INFO] [stdout] | [INFO] [stdout] 394 | self.symbolic.col_range_unchecked(j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csc/matmut.rs:393:5 [INFO] [stdout] | [INFO] [stdout] 393 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csc::symbolic_own::SymbolicSparseColMat::::col_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/matown.rs:411:9 [INFO] [stdout] | [INFO] [stdout] 411 | self.symbolic.col_range_unchecked(j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csc/matown.rs:410:5 [INFO] [stdout] | [INFO] [stdout] 410 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csc::symbolic_ref::SymbolicSparseColMatRef::<'a, I>::col_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csc/matref.rs:399:9 [INFO] [stdout] | [INFO] [stdout] 399 | self.symbolic.col_range_unchecked(j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csc/matref.rs:398:5 [INFO] [stdout] | [INFO] [stdout] 398 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csr::symbolic_ref::SymbolicSparseRowMatRef::<'a, I>::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/symbolic_own.rs:115:9 [INFO] [stdout] | [INFO] [stdout] 115 | / SymbolicSparseRowMatRef::new_unchecked( [INFO] [stdout] 116 | | nrows, [INFO] [stdout] 117 | | ncols, [INFO] [stdout] 118 | | &row_ptrs, [INFO] [stdout] 119 | | nnz_per_row.as_deref(), [INFO] [stdout] 120 | | &col_indices, [INFO] [stdout] 121 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csr/symbolic_own.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | / pub unsafe fn new_unchecked( [INFO] [stdout] 109 | | nrows: usize, [INFO] [stdout] 110 | | ncols: usize, [INFO] [stdout] 111 | | row_ptrs: alloc::vec::Vec, [INFO] [stdout] 112 | | nnz_per_row: Option>, [INFO] [stdout] 113 | | col_indices: alloc::vec::Vec, [INFO] [stdout] 114 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csr::symbolic_ref::SymbolicSparseRowMatRef::<'a, I>::row_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/symbolic_own.rs:293:9 [INFO] [stdout] | [INFO] [stdout] 293 | self.as_ref().row_range_unchecked(i) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csr/symbolic_own.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/symbolic_ref.rs:344:21 [INFO] [stdout] | [INFO] [stdout] 344 | let start = __get_unchecked(self.row_ptr, i).zx(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csr/symbolic_ref.rs:343:5 [INFO] [stdout] | [INFO] [stdout] 343 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/symbolic_ref.rs:347:29 [INFO] [stdout] | [INFO] [stdout] 347 | .map(|row_nnz| (__get_unchecked(row_nnz, i).zx() + start)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/symbolic_ref.rs:348:24 [INFO] [stdout] | [INFO] [stdout] 348 | .unwrap_or(__get_unchecked(self.row_ptr, i + 1).zx()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csr::symbolic_ref::SymbolicSparseRowMatRef::<'a, I>::row_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/matmut.rs:394:9 [INFO] [stdout] | [INFO] [stdout] 394 | self.symbolic.row_range_unchecked(i) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csr/matmut.rs:393:5 [INFO] [stdout] | [INFO] [stdout] 393 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csr::symbolic_own::SymbolicSparseRowMat::::row_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/matown.rs:413:9 [INFO] [stdout] | [INFO] [stdout] 413 | self.symbolic.row_range_unchecked(i) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csr/matown.rs:412:5 [INFO] [stdout] | [INFO] [stdout] 412 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::csr::symbolic_ref::SymbolicSparseRowMatRef::<'a, I>::row_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/csr/matref.rs:339:9 [INFO] [stdout] | [INFO] [stdout] 339 | self.symbolic.row_range_unchecked(i) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/csr/matref.rs:338:5 [INFO] [stdout] | [INFO] [stdout] 338 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::utils::ghost_permute_hermitian_unsorted` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/mod.rs:587:10 [INFO] [stdout] | [INFO] [stdout] 587 | *ghost_permute_hermitian_unsorted( [INFO] [stdout] | __________^ [INFO] [stdout] 588 | | SliceGroupMut::<'_, Symbolic>::new(new_values), [INFO] [stdout] 589 | | new_col_ptrs, [INFO] [stdout] 590 | | new_row_indices, [INFO] [stdout] ... | [INFO] [stdout] 600 | | stack, [INFO] [stdout] 601 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/mod.rs:576:5 [INFO] [stdout] | [INFO] [stdout] 576 | / pub unsafe fn ghost_permute_hermitian_unsorted_symbolic<'n, 'out, I: Index>( [INFO] [stdout] 577 | | new_col_ptrs: &'out mut [I], [INFO] [stdout] 578 | | new_row_indices: &'out mut [I], [INFO] [stdout] 579 | | A: ghost::SymbolicSparseColMatRef<'n, 'n, '_, I>, [INFO] [stdout] ... | [INFO] [stdout] 583 | | stack: PodStack<'_>, [INFO] [stdout] 584 | | ) -> ghost::SymbolicSparseColMatRef<'n, 'n, 'out, I> { [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::utils::ghost_permute_hermitian_unsorted` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse/mod.rs:621:13 [INFO] [stdout] | [INFO] [stdout] 621 | / ghost_permute_hermitian_unsorted( [INFO] [stdout] 622 | | SliceGroupMut::new(new_values), [INFO] [stdout] 623 | | new_col_ptrs, [INFO] [stdout] 624 | | new_row_indices, [INFO] [stdout] ... | [INFO] [stdout] 630 | | stack, [INFO] [stdout] 631 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse/mod.rs:609:5 [INFO] [stdout] | [INFO] [stdout] 609 | / pub unsafe fn permute_hermitian_unsorted<'out, I: Index, E: ComplexField>( [INFO] [stdout] 610 | | new_values: GroupFor, [INFO] [stdout] 611 | | new_col_ptrs: &'out mut [I], [INFO] [stdout] 612 | | new_row_indices: &'out mut [I], [INFO] [stdout] ... | [INFO] [stdout] 617 | | stack: PodStack<'_>, [INFO] [stdout] 618 | | ) -> SparseColMatMut<'out, I, E> { [INFO] [stdout] | |____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:25:22 [INFO] [stdout] | [INFO] [stdout] 25 | let a_item = a.read(); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | unsafe fn swap(a: Self, b: Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:26:22 [INFO] [stdout] | [INFO] [stdout] 26 | let b_item = b.read(); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 28 | a.write(b_item); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | b.write(a_item); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 32 | unsafe fn swap_idx(self, i: usize, j: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:20 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:33 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:52:9 [INFO] [stdout] | [INFO] [stdout] 52 | self.offset_from(origin) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:51:5 [INFO] [stdout] | [INFO] [stdout] 51 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:57:9 [INFO] [stdout] | [INFO] [stdout] 57 | self.add(offset) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:56:5 [INFO] [stdout] | [INFO] [stdout] 56 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | self.sub(offset) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:61:5 [INFO] [stdout] | [INFO] [stdout] 61 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:67:9 [INFO] [stdout] | [INFO] [stdout] 67 | *self [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | *self = item; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:71:5 [INFO] [stdout] | [INFO] [stdout] 71 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | core::ptr::copy_nonoverlapping(src, dst, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:76:5 [INFO] [stdout] | [INFO] [stdout] 76 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:82:9 [INFO] [stdout] | [INFO] [stdout] 82 | core::slice::from_raw_parts_mut(ptr, len).reverse() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.0.offset_from(origin.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:105:5 [INFO] [stdout] | [INFO] [stdout] 105 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:111:10 [INFO] [stdout] | [INFO] [stdout] 111 | (self.0.add(offset), self.1.add(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:110:5 [INFO] [stdout] | [INFO] [stdout] 110 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:111:30 [INFO] [stdout] | [INFO] [stdout] 111 | (self.0.add(offset), self.1.add(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:116:10 [INFO] [stdout] | [INFO] [stdout] 116 | (self.0.sub(offset), self.1.sub(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:116:30 [INFO] [stdout] | [INFO] [stdout] 116 | (self.0.sub(offset), self.1.sub(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:121:10 [INFO] [stdout] | [INFO] [stdout] 121 | (self.0.read(), self.1.read()) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:121:25 [INFO] [stdout] | [INFO] [stdout] 121 | (self.0.read(), self.1.read()) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:126:9 [INFO] [stdout] | [INFO] [stdout] 126 | self.0.write(item.0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:125:5 [INFO] [stdout] | [INFO] [stdout] 125 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:127:9 [INFO] [stdout] | [INFO] [stdout] 127 | self.1.write(item.1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:132:9 [INFO] [stdout] | [INFO] [stdout] 132 | P::copy_nonoverlapping(src.0, dst.0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | Q::copy_nonoverlapping(src.1, dst.1, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:138:9 [INFO] [stdout] | [INFO] [stdout] 138 | P::reverse(ptr.0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:139:9 [INFO] [stdout] | [INFO] [stdout] 139 | Q::reverse(ptr.1, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:355:9 [INFO] [stdout] | [INFO] [stdout] 355 | v.swap_idx(i - 1, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:321:1 [INFO] [stdout] | [INFO] [stdout] 321 | / unsafe fn partial_insertion_sort bool>( [INFO] [stdout] 322 | | v: P, [INFO] [stdout] 323 | | v_len: usize, [INFO] [stdout] 324 | | is_less: &mut F, [INFO] [stdout] 325 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:386:34 [INFO] [stdout] | [INFO] [stdout] 386 | child += is_less(v.add(child), v.add(child + 1)) as usize; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:371:1 [INFO] [stdout] | [INFO] [stdout] 371 | pub unsafe fn heapsort bool>(v: P, v_len: usize, mut is_less: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:386:48 [INFO] [stdout] | [INFO] [stdout] 386 | child += is_less(v.add(child), v.add(child + 1)) as usize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:390:25 [INFO] [stdout] | [INFO] [stdout] 390 | if !is_less(v.add(node), v.add(child)) { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:390:38 [INFO] [stdout] | [INFO] [stdout] 390 | if !is_less(v.add(node), v.add(child)) { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:395:13 [INFO] [stdout] | [INFO] [stdout] 395 | v.swap_idx(node, child); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:407:9 [INFO] [stdout] | [INFO] [stdout] 407 | v.swap_idx(0, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:371:1 [INFO] [stdout] | [INFO] [stdout] 371 | pub unsafe fn heapsort bool>(v: P, v_len: usize, mut is_less: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:461:23 [INFO] [stdout] | [INFO] [stdout] 461 | let is_done = width(l, r) <= 2 * BLOCK; [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:412:1 [INFO] [stdout] | [INFO] [stdout] 412 | / unsafe fn partition_in_blocks bool>( [INFO] [stdout] 413 | | v: P, [INFO] [stdout] 414 | | v_len: usize, [INFO] [stdout] 415 | | pivot: P, [INFO] [stdout] 416 | | is_less: &mut F, [INFO] [stdout] 417 | | ) -> usize { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:465:27 [INFO] [stdout] | [INFO] [stdout] 465 | let mut rem = width(l, r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:484:27 [INFO] [stdout] | [INFO] [stdout] 484 | debug_assert!(width(l, r) == block_l + block_r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:552:30 [INFO] [stdout] | [INFO] [stdout] 552 | let count = Ord::min(width(start_l, end_l), width(start_r, end_r)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:552:53 [INFO] [stdout] | [INFO] [stdout] 552 | let count = Ord::min(width(start_l, end_l), width(start_r, end_r)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:639:26 [INFO] [stdout] | [INFO] [stdout] 639 | debug_assert_eq!(width(l, r), block_l); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:658:9 [INFO] [stdout] | [INFO] [stdout] 658 | width(v, r) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:662:26 [INFO] [stdout] | [INFO] [stdout] 662 | debug_assert_eq!(width(l, r), block_r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:671:9 [INFO] [stdout] | [INFO] [stdout] 671 | width(v, l) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:674:9 [INFO] [stdout] | [INFO] [stdout] 674 | width(v, l) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:455:9 [INFO] [stdout] | [INFO] [stdout] 455 | r.offset_from(l) as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:454:5 [INFO] [stdout] | [INFO] [stdout] 454 | unsafe fn width(l: P, r: P) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:689:9 [INFO] [stdout] | [INFO] [stdout] 689 | v.swap_idx(0, pivot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:678:1 [INFO] [stdout] | [INFO] [stdout] 678 | / pub(super) unsafe fn partition( [INFO] [stdout] 679 | | v: P, [INFO] [stdout] 680 | | v_len: usize, [INFO] [stdout] 681 | | pivot: usize, [INFO] [stdout] ... | [INFO] [stdout] 684 | | where [INFO] [stdout] 685 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:691:17 [INFO] [stdout] | [INFO] [stdout] 691 | let v = v.add(1); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:728:17 [INFO] [stdout] | [INFO] [stdout] 728 | l + partition_in_blocks(v.add(l), r - l, pivot, is_less), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:728:37 [INFO] [stdout] | [INFO] [stdout] 728 | l + partition_in_blocks(v.add(l), r - l, pivot, is_less), [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:738:5 [INFO] [stdout] | [INFO] [stdout] 738 | v.swap_idx(0, mid); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:753:5 [INFO] [stdout] | [INFO] [stdout] 753 | v.swap_idx(0, pivot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:743:1 [INFO] [stdout] | [INFO] [stdout] 743 | / pub(super) unsafe fn partition_equal( [INFO] [stdout] 744 | | v: P, [INFO] [stdout] 745 | | v_len: usize, [INFO] [stdout] 746 | | pivot: usize, [INFO] [stdout] ... | [INFO] [stdout] 749 | | where [INFO] [stdout] 750 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:755:13 [INFO] [stdout] | [INFO] [stdout] 755 | let v = v.add(1); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:858:13 [INFO] [stdout] | [INFO] [stdout] 858 | v.swap_idx(pos - 1 + i, other); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:817:1 [INFO] [stdout] | [INFO] [stdout] 817 | pub(super) unsafe fn break_patterns(v: P, v_len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:927:9 [INFO] [stdout] | [INFO] [stdout] 927 | P::reverse(v, v_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:863:1 [INFO] [stdout] | [INFO] [stdout] 863 | / pub(super) unsafe fn choose_pivot(v: P, v_len: usize, is_less: &mut F) -> (usize, bool) [INFO] [stdout] 864 | | where [INFO] [stdout] 865 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::recurse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:945:5 [INFO] [stdout] | [INFO] [stdout] 945 | recurse(v, v_len, &mut is_less, None, limit); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:933:1 [INFO] [stdout] | [INFO] [stdout] 933 | / pub unsafe fn quicksort(v: P, v_len: usize, mut is_less: F) [INFO] [stdout] 934 | | where [INFO] [stdout] 935 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::heapsort` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:977:13 [INFO] [stdout] | [INFO] [stdout] 977 | heapsort(v, v_len, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:948:1 [INFO] [stdout] | [INFO] [stdout] 948 | / unsafe fn recurse bool>( [INFO] [stdout] 949 | | mut v: P, [INFO] [stdout] 950 | | mut v_len: usize, [INFO] [stdout] 951 | | is_less: &mut F, [INFO] [stdout] 952 | | mut pred: Option

, [INFO] [stdout] 953 | | mut limit: u32, [INFO] [stdout] 954 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::break_patterns` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:984:13 [INFO] [stdout] | [INFO] [stdout] 984 | break_patterns(v, v_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::choose_pivot` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:989:38 [INFO] [stdout] | [INFO] [stdout] 989 | let (pivot, likely_sorted) = choose_pivot(v, v_len, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partial_insertion_sort` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:996:16 [INFO] [stdout] | [INFO] [stdout] 996 | if partial_insertion_sort(v, v_len, is_less) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1005:28 [INFO] [stdout] | [INFO] [stdout] 1005 | if !is_less(p, v.add(pivot)) { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_equal` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1006:27 [INFO] [stdout] | [INFO] [stdout] 1006 | let mid = partition_equal(v, v_len, pivot, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1009:21 [INFO] [stdout] | [INFO] [stdout] 1009 | v = v.add(mid); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1016:28 [INFO] [stdout] | [INFO] [stdout] 1016 | let (mid, was_p) = partition(v, v_len, pivot, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1023:21 [INFO] [stdout] | [INFO] [stdout] 1023 | let right = v.add(mid); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1026:21 [INFO] [stdout] | [INFO] [stdout] 1026 | let right = right.add(1); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::recurse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1033:13 [INFO] [stdout] | [INFO] [stdout] 1033 | recurse(left, left_len, is_less, pred, limit); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::recurse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1038:13 [INFO] [stdout] | [INFO] [stdout] 1038 | recurse(right, right_len, is_less, Some(pivot), limit); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::quicksort` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1051:5 [INFO] [stdout] | [INFO] [stdout] 1051 | / quicksort( [INFO] [stdout] 1052 | | ptr, [INFO] [stdout] 1053 | | len, [INFO] [stdout] 1054 | | #[inline(always)] [INFO] [stdout] 1055 | | |a, b| compare(a, b) == core::cmp::Ordering::Less, [INFO] [stdout] 1056 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1045:1 [INFO] [stdout] | [INFO] [stdout] 1045 | / pub unsafe fn sort_unstable_by( [INFO] [stdout] 1046 | | ptr: P, [INFO] [stdout] 1047 | | len: usize, [INFO] [stdout] 1048 | | compare: impl FnMut(P, P) -> core::cmp::Ordering, [INFO] [stdout] 1049 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::sort_unstable_by` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1167:5 [INFO] [stdout] | [INFO] [stdout] 1167 | / sort_unstable_by( [INFO] [stdout] 1168 | | ( [INFO] [stdout] 1169 | | indices.as_mut_ptr(), [INFO] [stdout] 1170 | | Wrap::(into_copy::(E::faer_map( [INFO] [stdout] ... | [INFO] [stdout] 1176 | | |(i, _), (j, _)| (*i).cmp(&*j), [INFO] [stdout] 1177 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1059:1 [INFO] [stdout] | [INFO] [stdout] 1059 | / pub unsafe fn sort_indices( [INFO] [stdout] 1060 | | indices: &mut [I], [INFO] [stdout] 1061 | | values: crate::utils::slice::SliceGroupMut, [INFO] [stdout] 1062 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1176:26 [INFO] [stdout] | [INFO] [stdout] 1176 | |(i, _), (j, _)| (*i).cmp(&*j), [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1176:36 [INFO] [stdout] | [INFO] [stdout] 1176 | |(i, _), (j, _)| (*i).cmp(&*j), [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1108:13 [INFO] [stdout] | [INFO] [stdout] 1108 | / E::faer_first(from_copy::(self.0)) [INFO] [stdout] 1109 | | .offset_from(E::faer_first(from_copy::(origin.0)) as *const _) [INFO] [stdout] | |____________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1107:9 [INFO] [stdout] | [INFO] [stdout] 1107 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1117:23 [INFO] [stdout] | [INFO] [stdout] 1117 | |ptr| ptr.add(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1113:9 [INFO] [stdout] | [INFO] [stdout] 1113 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1125:23 [INFO] [stdout] | [INFO] [stdout] 1125 | |ptr| ptr.sub(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1121:9 [INFO] [stdout] | [INFO] [stdout] 1121 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1134:23 [INFO] [stdout] | [INFO] [stdout] 1134 | |ptr| ptr.read(), [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1130:9 [INFO] [stdout] | [INFO] [stdout] 1130 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1142:31 [INFO] [stdout] | [INFO] [stdout] 1142 | |(ptr, item)| *ptr = item, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1138:9 [INFO] [stdout] | [INFO] [stdout] 1138 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1151:30 [INFO] [stdout] | [INFO] [stdout] 1151 | |(src, dst)| core::ptr::copy_nonoverlapping(src, dst, len), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1147:9 [INFO] [stdout] | [INFO] [stdout] 1147 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1159:23 [INFO] [stdout] | [INFO] [stdout] 1159 | |ptr| core::slice::from_raw_parts_mut(ptr, len).reverse(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1155:9 [INFO] [stdout] | [INFO] [stdout] 1155 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator> + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/utils/constrained/sparse.rs:86:10 [INFO] [stdout] | [INFO] [stdout] 86 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/utils/constrained/sparse.rs:23:14 [INFO] [stdout] | [INFO] [stdout] 23 | impl<'nrows, 'ncols, 'a, I: Index> SymbolicSparseColMatRef<'nrows, 'ncols, 'a, I> { [INFO] [stdout] | ^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 84 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] = note: `--force-warn impl-trait-overcaptures` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 86 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator> + use<'a, 'nrows, I> { [INFO] [stdout] | ++++++++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse/csc/symbolic_ref.rs:346:10 [INFO] [stdout] | [INFO] [stdout] 346 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse/csc/symbolic_ref.rs:344:9 [INFO] [stdout] | [INFO] [stdout] 344 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 346 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I> { [INFO] [stdout] | ++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse/csc/matmut.rs:371:10 [INFO] [stdout] | [INFO] [stdout] 371 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse/csc/matmut.rs:369:9 [INFO] [stdout] | [INFO] [stdout] 369 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 371 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I, E> { [INFO] [stdout] | +++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse/csc/matref.rs:376:10 [INFO] [stdout] | [INFO] [stdout] 376 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse/csc/matref.rs:374:9 [INFO] [stdout] | [INFO] [stdout] 374 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 376 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I, E> { [INFO] [stdout] | +++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse/csr/symbolic_ref.rs:312:10 [INFO] [stdout] | [INFO] [stdout] 312 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse/csr/symbolic_ref.rs:310:9 [INFO] [stdout] | [INFO] [stdout] 310 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 312 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I> { [INFO] [stdout] | ++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse/csr/matmut.rs:371:10 [INFO] [stdout] | [INFO] [stdout] 371 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse/csr/matmut.rs:369:9 [INFO] [stdout] | [INFO] [stdout] 369 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 371 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I, E> { [INFO] [stdout] | +++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse/csr/matref.rs:316:10 [INFO] [stdout] | [INFO] [stdout] 316 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse/csr/matref.rs:314:9 [INFO] [stdout] | [INFO] [stdout] 314 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 316 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I, E> { [INFO] [stdout] | +++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/serde/mat.rs:177:39 [INFO] [stdout] | [INFO] [stdout] 177 | ... while let Some(_) = seq.next_element::()? { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/serde/mat.rs:179:33 [INFO] [stdout] | [INFO] [stdout] 179 | ... } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/serde/mat.rs:190:39 [INFO] [stdout] | [INFO] [stdout] 190 | ... while let Some(el) = seq.next_element::()? { [INFO] [stdout] | ^^^^^^^^^^^^^^^------------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/serde/mat.rs:192:33 [INFO] [stdout] | [INFO] [stdout] 192 | ... } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/serde/mat.rs:201:23 [INFO] [stdout] | [INFO] [stdout] 201 | while let Some(key) = map.next_key()? { [INFO] [stdout] | ^^^^^^^^^^^^^^^^--------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/serde/mat.rs:227:17 [INFO] [stdout] | [INFO] [stdout] 227 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 634 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating benches/bench_aggregate.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `faer` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/col/colmut.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/linalg/evd/hessenberg.rs [INFO] [stderr] * src/linalg/evd/hessenberg_cplx_evd.rs [INFO] [stderr] * src/linalg/evd/hessenberg_real_evd.rs [INFO] [stderr] * src/linalg/evd/mod.rs [INFO] [stderr] * src/linalg/evd/tridiag.rs [INFO] [stderr] * src/linalg/evd/tridiag_real_evd.rs [INFO] [stderr] * src/linalg/lu/full_pivoting/compute.rs [INFO] [stderr] * src/linalg/lu/full_pivoting/inverse.rs [INFO] [stderr] * src/linalg/lu/full_pivoting/solve.rs [INFO] [stderr] * src/linalg/lu/partial_pivoting/compute.rs [INFO] [stderr] * src/linalg/lu/partial_pivoting/inverse.rs [INFO] [stderr] * src/linalg/lu/partial_pivoting/solve.rs [INFO] [stderr] * src/linalg/matmul/mod.rs [INFO] [stderr] * src/linalg/matmul/triangular.rs [INFO] [stderr] * src/linalg/qr/col_pivoting/compute.rs [INFO] [stderr] * src/linalg/qr/col_pivoting/inverse.rs [INFO] [stderr] * src/linalg/qr/col_pivoting/reconstruct.rs [INFO] [stderr] * src/linalg/qr/col_pivoting/solve.rs [INFO] [stderr] * src/linalg/qr/no_pivoting/compute.rs [INFO] [stderr] * src/linalg/qr/no_pivoting/inverse.rs [INFO] [stderr] * src/linalg/qr/no_pivoting/reconstruct.rs [INFO] [stderr] * src/linalg/qr/no_pivoting/solve.rs [INFO] [stderr] * src/linalg/svd/bidiag.rs [INFO] [stderr] * src/linalg/svd/bidiag_real_svd.rs [INFO] [stderr] * src/linalg/svd/mod.rs [INFO] [stderr] * src/row/rowmut.rs [INFO] [stderr] * src/sort.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:180:14 [INFO] [stderr] | [INFO] [stderr] 180 | ($E: ty, $val:expr_2021 $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:196:16 [INFO] [stderr] | [INFO] [stderr] 196 | ($E: ty, $($val:expr_2021),+ $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:7 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:30 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:73 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:92 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:111 [INFO] [stderr] | [INFO] [stderr] 206 | ([$max_nrows: expr_2021, $max_ncols: expr_2021$(,)?], $name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2... [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:206:127 [INFO] [stderr] | [INFO] [stderr] 206 | ...dent, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/matmul/mod.rs:1642:18 [INFO] [stderr] | [INFO] [stderr] 1642 | ($term: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/lu/full_pivoting/compute.rs:1608:10 [INFO] [stderr] | [INFO] [stderr] 1608 | ($req: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/lu/full_pivoting/inverse.rs:199:10 [INFO] [stderr] | [INFO] [stderr] 199 | ($req: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/lu/full_pivoting/solve.rs:317:10 [INFO] [stderr] | [INFO] [stderr] 317 | ($req: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/lu/partial_pivoting/compute.rs:444:10 [INFO] [stderr] | [INFO] [stderr] 444 | ($req: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/lu/partial_pivoting/inverse.rs:152:10 [INFO] [stderr] | [INFO] [stderr] 152 | ($req: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/linalg/lu/partial_pivoting/solve.rs:302:10 [INFO] [stderr] | [INFO] [stderr] 302 | ($req: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [WARN] too many lines in the log, truncating it