[INFO] fetching crate faer-core 0.17.1... [INFO] checking faer-core-0.17.1 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate faer-core 0.17.1 into /workspace/builds/worker-3-tc2/source [INFO] validating manifest of crates.io crate faer-core 0.17.1 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate faer-core 0.17.1 [INFO] finished tweaking crates.io crate faer-core 0.17.1 [INFO] tweaked toml for crates.io crate faer-core 0.17.1 written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 121 packages to latest compatible versions [INFO] [stderr] Adding anes v0.1.6 (available: v0.2.0) [INFO] [stderr] Adding bitflags v1.3.2 (available: v2.6.0) [INFO] [stderr] Adding equator v0.1.10 (available: v0.4.1) [INFO] [stderr] Adding equator-macro v0.1.9 (available: v0.4.1) [INFO] [stderr] Adding faer-entity v0.17.0 (available: v0.19.2) [INFO] [stderr] Adding gemm v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding gemm-c32 v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding gemm-c64 v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding gemm-common v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding gemm-f16 v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding gemm-f32 v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding gemm-f64 v0.17.1 (available: v0.18.0) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding nalgebra v0.32.6 (available: v0.33.0) [INFO] [stderr] Adding raw-cpuid v10.7.0 (available: v11.1.0) [INFO] [stderr] Adding simba v0.8.1 (available: v0.9.0) [INFO] [stderr] Adding sysctl v0.5.5 (available: v0.6.0) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 60649c78a7c85c56f02be09ad44d95fb4f3c73a8e798528320b388ee595221ff [INFO] running `Command { std: "docker" "start" "-a" "60649c78a7c85c56f02be09ad44d95fb4f3c73a8e798528320b388ee595221ff", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "60649c78a7c85c56f02be09ad44d95fb4f3c73a8e798528320b388ee595221ff", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "60649c78a7c85c56f02be09ad44d95fb4f3c73a8e798528320b388ee595221ff", kill_on_drop: false }` [INFO] [stdout] 60649c78a7c85c56f02be09ad44d95fb4f3c73a8e798528320b388ee595221ff [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 33027bd9b5b49b5ff3d260863cdb2a5d4011154f0b94398b841481816697e0c5 [INFO] running `Command { std: "docker" "start" "-a" "33027bd9b5b49b5ff3d260863cdb2a5d4011154f0b94398b841481816697e0c5", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (3 fixes) [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Checking bytemuck v1.18.0 [INFO] [stderr] Compiling crossbeam-utils v0.8.20 [INFO] [stderr] Checking either v1.13.0 [INFO] [stderr] Compiling paste v1.0.15 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking reborrow v0.5.5 [INFO] [stderr] Checking bitflags v1.3.2 [INFO] [stderr] Compiling libc v0.2.159 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Compiling serde v1.0.210 [INFO] [stderr] Compiling seq-macro v0.3.5 [INFO] [stderr] Compiling serde_json v1.0.128 [INFO] [stderr] Checking half v2.4.1 [INFO] [stderr] Compiling matrixmultiply v0.3.9 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Checking raw-cpuid v10.7.0 [INFO] [stderr] Checking regex-syntax v0.8.4 [INFO] [stderr] Checking anstyle v1.0.8 [INFO] [stderr] Checking clap_lex v0.7.2 [INFO] [stderr] Compiling typenum v1.17.0 [INFO] [stderr] Checking dyn-stack v0.10.0 [INFO] [stderr] Checking safe_arch v0.7.2 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Checking ryu v1.0.18 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking plotters-backend v0.3.7 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking clap_builder v4.5.18 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking coe-rs v0.1.2 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking plotters-svg v0.3.7 [INFO] [stderr] Checking rawpointer v0.2.1 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking wide v0.7.28 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking matrixcompare-core v0.1.0 [INFO] [stderr] Checking oorandom v11.1.4 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking dbgf v0.1.2 [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Checking assert_approx_eq v1.1.0 [INFO] [stderr] Checking crossbeam-deque v0.8.5 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Checking is-terminal v0.4.13 [INFO] [stderr] Checking num-complex v0.4.6 [INFO] [stderr] Checking approx v0.5.1 [INFO] [stderr] Checking num-integer v0.1.46 [INFO] [stderr] Checking plotters v0.3.7 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking num-rational v0.4.2 [INFO] [stderr] Checking pulp v0.18.22 [INFO] [stderr] Checking clap v4.5.18 [INFO] [stderr] Checking criterion-plot v0.5.0 [INFO] [stderr] Checking simba v0.8.1 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking faer-entity v0.17.0 [INFO] [stderr] Compiling serde_derive v1.0.210 [INFO] [stderr] Compiling zerocopy-derive v0.7.35 [INFO] [stderr] Compiling equator-macro v0.1.9 [INFO] [stderr] Compiling nalgebra-macros v0.2.2 [INFO] [stderr] Checking gemm-common v0.17.1 [INFO] [stderr] Checking equator v0.1.10 [INFO] [stderr] Checking zerocopy v0.7.35 [INFO] [stderr] Checking gemm-f32 v0.17.1 [INFO] [stderr] Checking gemm-c32 v0.17.1 [INFO] [stderr] Checking gemm-c64 v0.17.1 [INFO] [stderr] Checking gemm-f64 v0.17.1 [INFO] [stderr] Checking ppv-lite86 v0.2.20 [INFO] [stderr] Checking gemm v0.17.1 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking nalgebra v0.32.6 [INFO] [stderr] Checking ciborium v0.2.2 [INFO] [stderr] Checking serde_test v1.0.177 [INFO] [stderr] Checking faer-core v0.17.1 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Checking tinytemplate v1.2.1 [INFO] [stderr] Checking criterion v0.5.1 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `faer_core` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/mul.rs [INFO] [stderr] * src/permutation.rs [INFO] [stderr] * src/sort.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1303:18 [INFO] [stderr] | [INFO] [stderr] 1303 | ($term: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:20 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:39 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:58 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:74 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9979:12 [INFO] [stderr] | [INFO] [stderr] 9979 | ([$([$($col:expr_2021),*])*] $($v:expr_2021;)* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9979:36 [INFO] [stderr] | [INFO] [stderr] 9979 | ([$([$($col:expr_2021),*])*] $($v:expr_2021;)* ) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9982:12 [INFO] [stderr] | [INFO] [stderr] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9982:36 [INFO] [stderr] | [INFO] [stderr] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9982:53 [INFO] [stderr] | [INFO] [stderr] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10022:11 [INFO] [stderr] | [INFO] [stderr] 10022 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10052:11 [INFO] [stderr] | [INFO] [stderr] 10052 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10077:8 [INFO] [stderr] | [INFO] [stderr] 10077 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10106:8 [INFO] [stderr] | [INFO] [stderr] 10106 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10420:6 [INFO] [stderr] | [INFO] [stderr] 10420 | ($head: expr_2021 $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10424:6 [INFO] [stderr] | [INFO] [stderr] 10424 | ($head: expr_2021, $($tail: expr_2021),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10424:26 [INFO] [stderr] | [INFO] [stderr] 10424 | ($head: expr_2021, $($tail: expr_2021),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:138:5 [INFO] [stderr] | [INFO] [stderr] 138 | target_pointer_width = "128", [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:144:40 [INFO] [stderr] | [INFO] [stderr] 144 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:149:7 [INFO] [stderr] | [INFO] [stderr] 149 | #[cfg(target_pointer_width = "128")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:169:5 [INFO] [stderr] | [INFO] [stderr] 169 | target_pointer_width = "128", [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:194:40 [INFO] [stderr] | [INFO] [stderr] 194 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:218:7 [INFO] [stderr] | [INFO] [stderr] 218 | #[cfg(target_pointer_width = "128")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:160:11 [INFO] [stderr] | [INFO] [stderr] 160 | #[cfg(target_pointer_width = "128")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2098 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2099 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2098 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2099 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2200 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2220 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2200 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2220 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2314 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2315 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2316 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2314 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2315 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2316 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2422 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2423 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2422 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2423 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2555 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2556 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2557 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2555 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2556 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2557 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2658 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2677 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2658 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2677 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:337:9 [INFO] [stderr] | [INFO] [stderr] 325 | ) -> bool { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 337 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:444:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 444 | let mut r = unsafe { l.add(v_len) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:509:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 509 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:542:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 542 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:586:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 586 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:615:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 615 | l = unsafe { l.add(block_l) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:624:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 624 | r = unsafe { r.sub(block_r) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:652:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 652 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:665:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 665 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:698:48 [INFO] [stderr] | [INFO] [stderr] 686 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 698 | let tmp = core::mem::ManuallyDrop::new(unsafe { P::read(pivot) }); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:715:9 [INFO] [stderr] | [INFO] [stderr] 686 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 715 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:761:44 [INFO] [stderr] | [INFO] [stderr] 751 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 761 | let tmp = core::mem::ManuallyDrop::new(unsafe { P::read(pivot) }); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:783:9 [INFO] [stderr] | [INFO] [stderr] 751 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 783 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:891:56 [INFO] [stderr] | [INFO] [stderr] 866 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 891 | let mut sort2 = |a: &mut usize, b: &mut usize| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:4709:13 [INFO] [stderr] | [INFO] [stderr] 4707 | pub unsafe fn split_at_mut_unchecked(self, row: usize) -> (Self, Self) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] 4708 | let (top, bot) = self.into_const().split_at_unchecked(row); [INFO] [stderr] 4709 | unsafe { (top.const_cast(), bot.const_cast()) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:5539:13 [INFO] [stderr] | [INFO] [stderr] 5537 | pub unsafe fn split_at_mut_unchecked(self, col: usize) -> (Self, Self) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] 5538 | let (left, right) = self.into_const().split_at_unchecked(col); [INFO] [stderr] 5539 | unsafe { (left.const_cast(), right.const_cast()) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 17 previous errors; 47 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sort.rs:1205:26 [INFO] [stdout] | [INFO] [stdout] 1205 | .map(|_| rng.gen::()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sort.rs:1209:26 [INFO] [stdout] | [INFO] [stdout] 1209 | .map(|_| rng.gen::()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1303:25 [INFO] [stdout] | [INFO] [stdout] 1303 | ($term: expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1303 | ($term: expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:28 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:42 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr_2021, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:53 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr_2021, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:64 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr_2021, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:138:5 [INFO] [stdout] | [INFO] [stdout] 138 | target_pointer_width = "128", [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:144:40 [INFO] [stdout] | [INFO] [stdout] 144 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:149:7 [INFO] [stdout] | [INFO] [stdout] 149 | #[cfg(target_pointer_width = "128")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | target_pointer_width = "128", [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:194:40 [INFO] [stdout] | [INFO] [stdout] 194 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:218:7 [INFO] [stdout] | [INFO] [stdout] 218 | #[cfg(target_pointer_width = "128")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:160:11 [INFO] [stdout] | [INFO] [stdout] 160 | #[cfg(target_pointer_width = "128")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9979:17 [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr_2021),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9979:34 [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr),*])*] $($v:expr_2021;)* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9982:17 [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9982:35 [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr_2021, $($v:expr),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9982:46 [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr_2021),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10022:14 [INFO] [stdout] | [INFO] [stdout] 10022 | ($([$($v:expr),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10022 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10052:14 [INFO] [stdout] | [INFO] [stdout] 10052 | ($([$($v:expr),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10052 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10077:11 [INFO] [stdout] | [INFO] [stdout] 10077 | ($($v:expr),+ $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10077 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10106:11 [INFO] [stdout] | [INFO] [stdout] 10106 | ($($v:expr),+ $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10106 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10420:13 [INFO] [stdout] | [INFO] [stdout] 10420 | ($head: expr $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10420 | ($head: expr_2021 $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10424:13 [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr_2021, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10424:28 [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr, $($tail: expr_2021),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:17:30 [INFO] [stdout] | [INFO] [stdout] 17 | |i: usize, j: usize| src.read_unchecked(i, j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / unsafe fn invert_lower_triangular_impl_small( [INFO] [stdout] 11 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 12 | | src: MatRef<'_, E>, [INFO] [stdout] 13 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:21:14 [INFO] [stdout] | [INFO] [stdout] 21 | 1 => dst.write_unchecked(0, 0, src(0, 0).faer_inv()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / unsafe fn invert_lower_triangular_impl_small( [INFO] [stdout] 11 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 12 | | src: MatRef<'_, E>, [INFO] [stdout] 13 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:27:13 [INFO] [stdout] | [INFO] [stdout] 27 | dst.write_unchecked(0, 0, dst00); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:28:13 [INFO] [stdout] | [INFO] [stdout] 28 | dst.write_unchecked(1, 1, dst11); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:29:13 [INFO] [stdout] | [INFO] [stdout] 29 | dst.write_unchecked(1, 0, dst10); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:40:36 [INFO] [stdout] | [INFO] [stdout] 40 | let src = |i: usize, j: usize| src.read_unchecked(i, j); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / unsafe fn invert_unit_lower_triangular_impl_small( [INFO] [stdout] 36 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 37 | | src: MatRef<'_, E>, [INFO] [stdout] 38 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:44:13 [INFO] [stdout] | [INFO] [stdout] 44 | dst.write_unchecked(1, 0, src(1, 0).faer_neg()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / unsafe fn invert_unit_lower_triangular_impl_small( [INFO] [stdout] 36 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 37 | | src: MatRef<'_, E>, [INFO] [stdout] 38 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_lower_triangular_impl_small` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | invert_lower_triangular_impl_small(dst, src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:50:1 [INFO] [stdout] | [INFO] [stdout] 50 | / unsafe fn invert_lower_triangular_impl( [INFO] [stdout] 51 | | dst: MatMut<'_, E>, [INFO] [stdout] 52 | | src: MatRef<'_, E>, [INFO] [stdout] 53 | | parallelism: Parallelism, [INFO] [stdout] 54 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:71:23 [INFO] [stdout] | [INFO] [stdout] 71 | |parallelism| invert_lower_triangular_impl(dst_tl.rb_mut(), src_tl, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:72:23 [INFO] [stdout] | [INFO] [stdout] 72 | |parallelism| invert_lower_triangular_impl(dst_br.rb_mut(), src_br, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_unit_lower_triangular_impl_small` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:100:9 [INFO] [stdout] | [INFO] [stdout] 100 | invert_unit_lower_triangular_impl_small(dst, src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:90:1 [INFO] [stdout] | [INFO] [stdout] 90 | / unsafe fn invert_unit_lower_triangular_impl( [INFO] [stdout] 91 | | dst: MatMut<'_, E>, [INFO] [stdout] 92 | | src: MatRef<'_, E>, [INFO] [stdout] 93 | | parallelism: Parallelism, [INFO] [stdout] 94 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_unit_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:111:23 [INFO] [stdout] | [INFO] [stdout] 111 | |parallelism| invert_unit_lower_triangular_impl(dst_tl.rb_mut(), src_tl, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_unit_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:112:23 [INFO] [stdout] | [INFO] [stdout] 112 | |parallelism| invert_unit_lower_triangular_impl(dst_br.rb_mut(), src_br, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2000:21 [INFO] [stdout] | [INFO] [stdout] 2000 | dst.write_unchecked(j, j, E::faer_zero()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:1986:5 [INFO] [stdout] | [INFO] [stdout] 1986 | / unsafe fn copy_lower( [INFO] [stdout] 1987 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 1988 | | src: MatRef<'_, E>, [INFO] [stdout] 1989 | | src_diag: DiagonalKind, [INFO] [stdout] 1990 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2006:21 [INFO] [stdout] | [INFO] [stdout] 2006 | dst.write_unchecked(j, j, E::faer_one()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2057:9 [INFO] [stdout] | [INFO] [stdout] 2057 | copy_lower(dst.transpose_mut(), src.transpose(), src_diag) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2052:5 [INFO] [stdout] | [INFO] [stdout] 2052 | / unsafe fn copy_upper( [INFO] [stdout] 2053 | | dst: MatMut<'_, E>, [INFO] [stdout] 2054 | | src: MatRef<'_, E>, [INFO] [stdout] 2055 | | src_diag: DiagonalKind, [INFO] [stdout] 2056 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2101:21 [INFO] [stdout] | [INFO] [stdout] 2101 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2074:5 [INFO] [stdout] | [INFO] [stdout] 2074 | / unsafe fn mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2075 | | dst: MatMut<'_, E>, [INFO] [stdout] 2076 | | skip_diag: bool, [INFO] [stdout] 2077 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2084 | | parallelism: Parallelism, [INFO] [stdout] 2085 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2102:21 [INFO] [stdout] | [INFO] [stdout] 2102 | / mul( [INFO] [stdout] 2103 | | temp_dst.rb_mut(), [INFO] [stdout] 2104 | | lhs, [INFO] [stdout] 2105 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2110 | | parallelism, [INFO] [stdout] 2111 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2112:21 [INFO] [stdout] | [INFO] [stdout] 2112 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2130:13 [INFO] [stdout] | [INFO] [stdout] 2130 | / mul( [INFO] [stdout] 2131 | | dst_bot_left.rb_mut(), [INFO] [stdout] 2132 | | lhs_bot_right, [INFO] [stdout] 2133 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 2138 | | parallelism, [INFO] [stdout] 2139 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2074:5 [INFO] [stdout] | [INFO] [stdout] 2074 | / unsafe fn mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2075 | | dst: MatMut<'_, E>, [INFO] [stdout] 2076 | | skip_diag: bool, [INFO] [stdout] 2077 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2084 | | parallelism: Parallelism, [INFO] [stdout] 2085 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2140:13 [INFO] [stdout] | [INFO] [stdout] 2140 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2141 | | dst_bot_right, [INFO] [stdout] 2142 | | skip_diag, [INFO] [stdout] 2143 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2150 | | parallelism, [INFO] [stdout] 2151 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2153:13 [INFO] [stdout] | [INFO] [stdout] 2153 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2154 | | dst_top_left.rb_mut(), [INFO] [stdout] 2155 | | skip_diag, [INFO] [stdout] 2156 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2163 | | parallelism, [INFO] [stdout] 2164 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2165:13 [INFO] [stdout] | [INFO] [stdout] 2165 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2166 | | dst_top_left, [INFO] [stdout] 2167 | | skip_diag, [INFO] [stdout] 2168 | | lhs_top_right, [INFO] [stdout] ... | [INFO] [stdout] 2174 | | parallelism, [INFO] [stdout] 2175 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2176:13 [INFO] [stdout] | [INFO] [stdout] 2176 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2177 | | dst_bot_left, [INFO] [stdout] 2178 | | lhs_bot_left, [INFO] [stdout] 2179 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2185 | | parallelism, [INFO] [stdout] 2186 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2222:21 [INFO] [stdout] | [INFO] [stdout] 2222 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2224:21 [INFO] [stdout] | [INFO] [stdout] 2224 | / mul( [INFO] [stdout] 2225 | | dst, [INFO] [stdout] 2226 | | lhs, [INFO] [stdout] 2227 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2232 | | parallelism, [INFO] [stdout] 2233 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2249:21 [INFO] [stdout] | [INFO] [stdout] 2249 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2250 | | dst_left.rb_mut(), [INFO] [stdout] 2251 | | lhs_left, [INFO] [stdout] 2252 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2258 | | parallelism, [INFO] [stdout] 2259 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2262:21 [INFO] [stdout] | [INFO] [stdout] 2262 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2263 | | dst_right.rb_mut(), [INFO] [stdout] 2264 | | lhs_right, [INFO] [stdout] 2265 | | rhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2271 | | parallelism, [INFO] [stdout] 2272 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2276:13 [INFO] [stdout] | [INFO] [stdout] 2276 | / mul( [INFO] [stdout] 2277 | | dst_left, [INFO] [stdout] 2278 | | lhs_right, [INFO] [stdout] 2279 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 2284 | | parallelism, [INFO] [stdout] 2285 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2318:21 [INFO] [stdout] | [INFO] [stdout] 2318 | copy_lower(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2289:5 [INFO] [stdout] | [INFO] [stdout] 2289 | / unsafe fn lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2290 | | dst: MatMut<'_, E>, [INFO] [stdout] 2291 | | skip_diag: bool, [INFO] [stdout] 2292 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2300 | | parallelism: Parallelism, [INFO] [stdout] 2301 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2319:21 [INFO] [stdout] | [INFO] [stdout] 2319 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2321:21 [INFO] [stdout] | [INFO] [stdout] 2321 | / mul( [INFO] [stdout] 2322 | | temp_dst.rb_mut(), [INFO] [stdout] 2323 | | temp_lhs.rb(), [INFO] [stdout] 2324 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2329 | | parallelism, [INFO] [stdout] 2330 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2331:21 [INFO] [stdout] | [INFO] [stdout] 2331 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2347:13 [INFO] [stdout] | [INFO] [stdout] 2347 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2348 | | dst_top_left, [INFO] [stdout] 2349 | | skip_diag, [INFO] [stdout] 2350 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2358 | | parallelism, [INFO] [stdout] 2359 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2289:5 [INFO] [stdout] | [INFO] [stdout] 2289 | / unsafe fn lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2290 | | dst: MatMut<'_, E>, [INFO] [stdout] 2291 | | skip_diag: bool, [INFO] [stdout] 2292 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2300 | | parallelism: Parallelism, [INFO] [stdout] 2301 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2360:13 [INFO] [stdout] | [INFO] [stdout] 2360 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2361 | | dst_bot_left.rb_mut(), [INFO] [stdout] 2362 | | lhs_bot_left, [INFO] [stdout] 2363 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2369 | | parallelism, [INFO] [stdout] 2370 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2371:13 [INFO] [stdout] | [INFO] [stdout] 2371 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2372 | | dst_bot_left.reverse_rows_and_cols_mut().transpose_mut(), [INFO] [stdout] 2373 | | rhs_bot_left.reverse_rows_and_cols().transpose(), [INFO] [stdout] 2374 | | lhs_bot_right.reverse_rows_and_cols().transpose(), [INFO] [stdout] ... | [INFO] [stdout] 2380 | | parallelism, [INFO] [stdout] 2381 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2382:13 [INFO] [stdout] | [INFO] [stdout] 2382 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2383 | | dst_bot_right, [INFO] [stdout] 2384 | | skip_diag, [INFO] [stdout] 2385 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2393 | | parallelism, [INFO] [stdout] 2394 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_upper` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2425:21 [INFO] [stdout] | [INFO] [stdout] 2425 | copy_upper(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2426:21 [INFO] [stdout] | [INFO] [stdout] 2426 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2428:21 [INFO] [stdout] | [INFO] [stdout] 2428 | / mul( [INFO] [stdout] 2429 | | dst, [INFO] [stdout] 2430 | | temp_lhs.rb(), [INFO] [stdout] 2431 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2436 | | parallelism, [INFO] [stdout] 2437 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2458:21 [INFO] [stdout] | [INFO] [stdout] 2458 | / mul( [INFO] [stdout] 2459 | | dst_top_left.rb_mut(), [INFO] [stdout] 2460 | | lhs_top_right, [INFO] [stdout] 2461 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 2466 | | parallelism, [INFO] [stdout] 2467 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2468:21 [INFO] [stdout] | [INFO] [stdout] 2468 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 2469 | | dst_top_left, [INFO] [stdout] 2470 | | lhs_top_left, [INFO] [stdout] 2471 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 2478 | | parallelism, [INFO] [stdout] 2479 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2484:29 [INFO] [stdout] | [INFO] [stdout] 2484 | / ... mat_x_lower_impl_unchecked( [INFO] [stdout] 2485 | | ... dst_top_right, [INFO] [stdout] 2486 | | ... lhs_top_right, [INFO] [stdout] 2487 | | ... rhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2493 | | ... parallelism, [INFO] [stdout] 2494 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2497:29 [INFO] [stdout] | [INFO] [stdout] 2497 | / ... mat_x_lower_impl_unchecked( [INFO] [stdout] 2498 | | ... dst_bot_left.transpose_mut(), [INFO] [stdout] 2499 | | ... rhs_bot_left.transpose(), [INFO] [stdout] 2500 | | ... lhs_bot_right.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 2506 | | ... parallelism, [INFO] [stdout] 2507 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2512:21 [INFO] [stdout] | [INFO] [stdout] 2512 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 2513 | | dst_bot_right, [INFO] [stdout] 2514 | | lhs_bot_right, [INFO] [stdout] 2515 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 2522 | | parallelism, [INFO] [stdout] 2523 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_upper` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2559:21 [INFO] [stdout] | [INFO] [stdout] 2559 | copy_upper(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2530:5 [INFO] [stdout] | [INFO] [stdout] 2530 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2531 | | dst: MatMut<'_, E>, [INFO] [stdout] 2532 | | skip_diag: bool, [INFO] [stdout] 2533 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2541 | | parallelism: Parallelism, [INFO] [stdout] 2542 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2560:21 [INFO] [stdout] | [INFO] [stdout] 2560 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2562:21 [INFO] [stdout] | [INFO] [stdout] 2562 | / mul( [INFO] [stdout] 2563 | | temp_dst.rb_mut(), [INFO] [stdout] 2564 | | temp_lhs.rb(), [INFO] [stdout] 2565 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2570 | | parallelism, [INFO] [stdout] 2571 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2573:21 [INFO] [stdout] | [INFO] [stdout] 2573 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2592:21 [INFO] [stdout] | [INFO] [stdout] 2592 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2593 | | dst_top_left.rb_mut(), [INFO] [stdout] 2594 | | skip_diag, [INFO] [stdout] 2595 | | lhs_top_right, [INFO] [stdout] ... | [INFO] [stdout] 2601 | | parallelism, [INFO] [stdout] 2602 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2530:5 [INFO] [stdout] | [INFO] [stdout] 2530 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2531 | | dst: MatMut<'_, E>, [INFO] [stdout] 2532 | | skip_diag: bool, [INFO] [stdout] 2533 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2541 | | parallelism: Parallelism, [INFO] [stdout] 2542 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2603:21 [INFO] [stdout] | [INFO] [stdout] 2603 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2604 | | dst_top_left, [INFO] [stdout] 2605 | | skip_diag, [INFO] [stdout] 2606 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2614 | | parallelism, [INFO] [stdout] 2615 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2618:21 [INFO] [stdout] | [INFO] [stdout] 2618 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2619 | | dst_bot_left.transpose_mut(), [INFO] [stdout] 2620 | | rhs_bot_left.transpose(), [INFO] [stdout] 2621 | | lhs_bot_right.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 2627 | | parallelism, [INFO] [stdout] 2628 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2530:5 [INFO] [stdout] | [INFO] [stdout] 2530 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2531 | | dst: MatMut<'_, E>, [INFO] [stdout] 2532 | | skip_diag: bool, [INFO] [stdout] 2533 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2541 | | parallelism: Parallelism, [INFO] [stdout] 2542 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2629:21 [INFO] [stdout] | [INFO] [stdout] 2629 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2630 | | dst_bot_right, [INFO] [stdout] 2631 | | skip_diag, [INFO] [stdout] 2632 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2640 | | parallelism, [INFO] [stdout] 2641 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2679:21 [INFO] [stdout] | [INFO] [stdout] 2679 | / mul( [INFO] [stdout] 2680 | | temp_dst.rb_mut(), [INFO] [stdout] 2681 | | lhs, [INFO] [stdout] 2682 | | rhs, [INFO] [stdout] ... | [INFO] [stdout] 2687 | | parallelism, [INFO] [stdout] 2688 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2689:21 [INFO] [stdout] | [INFO] [stdout] 2689 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2701:21 [INFO] [stdout] | [INFO] [stdout] 2701 | / mul( [INFO] [stdout] 2702 | | dst_bot_left, [INFO] [stdout] 2703 | | lhs_bot, [INFO] [stdout] 2704 | | rhs_left, [INFO] [stdout] ... | [INFO] [stdout] 2709 | | parallelism, [INFO] [stdout] 2710 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2715:29 [INFO] [stdout] | [INFO] [stdout] 2715 | / ... mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2716 | | ... dst_top_left, [INFO] [stdout] 2717 | | ... skip_diag, [INFO] [stdout] 2718 | | ... lhs_top, [INFO] [stdout] ... | [INFO] [stdout] 2724 | | ... parallelism, [INFO] [stdout] 2725 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2728:29 [INFO] [stdout] | [INFO] [stdout] 2728 | / ... mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2729 | | ... dst_bot_right, [INFO] [stdout] 2730 | | ... skip_diag, [INFO] [stdout] 2731 | | ... lhs_bot, [INFO] [stdout] ... | [INFO] [stdout] 2737 | | ... parallelism, [INFO] [stdout] 2738 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3146:17 [INFO] [stdout] | [INFO] [stdout] 3146 | mul(acc, lhs, rhs, alpha, beta, conj_lhs, conj_rhs, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:3048:5 [INFO] [stdout] | [INFO] [stdout] 3048 | / unsafe fn matmul_unchecked( [INFO] [stdout] 3049 | | acc: MatMut<'_, E>, [INFO] [stdout] 3050 | | acc_structure: BlockStructure, [INFO] [stdout] 3051 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 3059 | | parallelism: Parallelism, [INFO] [stdout] 3060 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3151:21 [INFO] [stdout] | [INFO] [stdout] 3151 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 3152 | | acc, [INFO] [stdout] 3153 | | lhs, [INFO] [stdout] 3154 | | rhs, [INFO] [stdout] ... | [INFO] [stdout] 3160 | | parallelism, [INFO] [stdout] 3161 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3164:21 [INFO] [stdout] | [INFO] [stdout] 3164 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3165 | | acc, [INFO] [stdout] 3166 | | false, [INFO] [stdout] 3167 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3175 | | parallelism, [INFO] [stdout] 3176 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3179:21 [INFO] [stdout] | [INFO] [stdout] 3179 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 3180 | | acc, [INFO] [stdout] 3181 | | lhs, [INFO] [stdout] 3182 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 3189 | | parallelism, [INFO] [stdout] 3190 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3195:17 [INFO] [stdout] | [INFO] [stdout] 3195 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 3196 | | acc, [INFO] [stdout] 3197 | | skip_diag, [INFO] [stdout] 3198 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3204 | | parallelism, [INFO] [stdout] 3205 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3209:21 [INFO] [stdout] | [INFO] [stdout] 3209 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3210 | | acc, [INFO] [stdout] 3211 | | skip_diag, [INFO] [stdout] 3212 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3219 | | parallelism, [INFO] [stdout] 3220 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3222:21 [INFO] [stdout] | [INFO] [stdout] 3222 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3223 | | acc, [INFO] [stdout] 3224 | | skip_diag, [INFO] [stdout] 3225 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3233 | | parallelism, [INFO] [stdout] 3234 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3236:21 [INFO] [stdout] | [INFO] [stdout] 3236 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3237 | | acc, [INFO] [stdout] 3238 | | skip_diag, [INFO] [stdout] 3239 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3247 | | parallelism, [INFO] [stdout] 3248 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3252:13 [INFO] [stdout] | [INFO] [stdout] 3252 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 3253 | | acc.transpose_mut(), [INFO] [stdout] 3254 | | skip_diag, [INFO] [stdout] 3255 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 3261 | | parallelism, [INFO] [stdout] 3262 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3267:17 [INFO] [stdout] | [INFO] [stdout] 3267 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3268 | | acc.transpose_mut(), [INFO] [stdout] 3269 | | skip_diag, [INFO] [stdout] 3270 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 3278 | | parallelism, [INFO] [stdout] 3279 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3316:17 [INFO] [stdout] | [INFO] [stdout] 3316 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3317 | | acc.transpose_mut(), [INFO] [stdout] 3318 | | skip_diag, [INFO] [stdout] 3319 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 3327 | | parallelism, [INFO] [stdout] 3328 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:30:47 [INFO] [stdout] | [INFO] [stdout] 30 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / unsafe fn solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] 22 | | tril: MatRef<'_, E>, [INFO] [stdout] 23 | | rhs: MatMut<'_, E>, [INFO] [stdout] 24 | | maybe_conj_lhs: impl Fn(E) -> E, [INFO] [stdout] 25 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:41:47 [INFO] [stdout] | [INFO] [stdout] 41 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:42:47 [INFO] [stdout] | [INFO] [stdout] 42 | let nl20_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:43:47 [INFO] [stdout] | [INFO] [stdout] 43 | let nl21_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:65:47 [INFO] [stdout] | [INFO] [stdout] 65 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:66:47 [INFO] [stdout] | [INFO] [stdout] 66 | let nl20_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:67:47 [INFO] [stdout] | [INFO] [stdout] 67 | let nl21_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:68:47 [INFO] [stdout] | [INFO] [stdout] 68 | let nl30_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:69:47 [INFO] [stdout] | [INFO] [stdout] 69 | let nl31_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:70:47 [INFO] [stdout] | [INFO] [stdout] 70 | let nl32_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 2)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:116:38 [INFO] [stdout] | [INFO] [stdout] 116 | let inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:107:1 [INFO] [stdout] | [INFO] [stdout] 107 | / unsafe fn solve_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] 108 | | tril: MatRef<'_, E>, [INFO] [stdout] 109 | | rhs: MatMut<'_, E>, [INFO] [stdout] 110 | | maybe_conj_lhs: impl Fn(E) -> E, [INFO] [stdout] 111 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:121:42 [INFO] [stdout] | [INFO] [stdout] 121 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:122:42 [INFO] [stdout] | [INFO] [stdout] 122 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:124:33 [INFO] [stdout] | [INFO] [stdout] 124 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:140:42 [INFO] [stdout] | [INFO] [stdout] 140 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:141:42 [INFO] [stdout] | [INFO] [stdout] 141 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:142:42 [INFO] [stdout] | [INFO] [stdout] 142 | let l22_inv = maybe_conj_lhs(tril.read_unchecked(2, 2)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:144:33 [INFO] [stdout] | [INFO] [stdout] 144 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:146:33 [INFO] [stdout] | [INFO] [stdout] 146 | (maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:148:33 [INFO] [stdout] | [INFO] [stdout] 148 | (maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:172:42 [INFO] [stdout] | [INFO] [stdout] 172 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:173:42 [INFO] [stdout] | [INFO] [stdout] 173 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:174:42 [INFO] [stdout] | [INFO] [stdout] 174 | let l22_inv = maybe_conj_lhs(tril.read_unchecked(2, 2)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:175:42 [INFO] [stdout] | [INFO] [stdout] 175 | let l33_inv = maybe_conj_lhs(tril.read_unchecked(3, 3)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:177:33 [INFO] [stdout] | [INFO] [stdout] 177 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:179:33 [INFO] [stdout] | [INFO] [stdout] 179 | (maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:181:33 [INFO] [stdout] | [INFO] [stdout] 181 | (maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:183:33 [INFO] [stdout] | [INFO] [stdout] 183 | (maybe_conj_lhs(tril.read_unchecked(3, 0)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:185:33 [INFO] [stdout] | [INFO] [stdout] 185 | (maybe_conj_lhs(tril.read_unchecked(3, 1)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:187:33 [INFO] [stdout] | [INFO] [stdout] 187 | (maybe_conj_lhs(tril.read_unchecked(3, 2)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:613:17 [INFO] [stdout] | [INFO] [stdout] 613 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 614 | | tril, [INFO] [stdout] 615 | | conj_lhs, [INFO] [stdout] 616 | | rhs_left, [INFO] [stdout] 617 | | parallelism, [INFO] [stdout] 618 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:621:17 [INFO] [stdout] | [INFO] [stdout] 621 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 622 | | tril, [INFO] [stdout] 623 | | conj_lhs, [INFO] [stdout] 624 | | rhs_right, [INFO] [stdout] 625 | | parallelism, [INFO] [stdout] 626 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:642:30 [INFO] [stdout] | [INFO] [stdout] 642 | Conj::Yes => solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 643 | | tril, rhs, conj, [INFO] [stdout] 644 | | ), [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:645:29 [INFO] [stdout] | [INFO] [stdout] 645 | Conj::No => solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 646 | | tril, rhs, identity, [INFO] [stdout] 647 | | ), [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:667:5 [INFO] [stdout] | [INFO] [stdout] 667 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 668 | | tril_top_left, [INFO] [stdout] 669 | | conj_lhs, [INFO] [stdout] 670 | | rhs_top.rb_mut(), [INFO] [stdout] 671 | | parallelism, [INFO] [stdout] 672 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:685:5 [INFO] [stdout] | [INFO] [stdout] 685 | solve_unit_lower_triangular_in_place_unchecked(tril_bot_right, conj_lhs, rhs_bot, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:702:5 [INFO] [stdout] | [INFO] [stdout] 702 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 703 | | triu.reverse_rows_and_cols(), [INFO] [stdout] 704 | | conj_lhs, [INFO] [stdout] 705 | | rhs.reverse_rows_mut(), [INFO] [stdout] 706 | | parallelism, [INFO] [stdout] 707 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:696:1 [INFO] [stdout] | [INFO] [stdout] 696 | / unsafe fn solve_unit_upper_triangular_in_place_unchecked( [INFO] [stdout] 697 | | triu: MatRef<'_, E>, [INFO] [stdout] 698 | | conj_lhs: Conj, [INFO] [stdout] 699 | | rhs: MatMut<'_, E>, [INFO] [stdout] 700 | | parallelism: Parallelism, [INFO] [stdout] 701 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:729:17 [INFO] [stdout] | [INFO] [stdout] 729 | |_| solve_lower_triangular_in_place_unchecked(tril, conj_lhs, rhs_left, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:730:17 [INFO] [stdout] | [INFO] [stdout] 730 | |_| solve_lower_triangular_in_place_unchecked(tril, conj_lhs, rhs_right, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:748:21 [INFO] [stdout] | [INFO] [stdout] 748 | solve_lower_triangular_in_place_base_case_generic_unchecked(tril, rhs, conj) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:751:21 [INFO] [stdout] | [INFO] [stdout] 751 | solve_lower_triangular_in_place_base_case_generic_unchecked(tril, rhs, identity) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:763:5 [INFO] [stdout] | [INFO] [stdout] 763 | / solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 764 | | tril_top_left, [INFO] [stdout] 765 | | conj_lhs, [INFO] [stdout] 766 | | rhs_top.rb_mut(), [INFO] [stdout] 767 | | parallelism, [INFO] [stdout] 768 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:781:5 [INFO] [stdout] | [INFO] [stdout] 781 | solve_lower_triangular_in_place_unchecked(tril_bot_right, conj_lhs, rhs_bot, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:798:5 [INFO] [stdout] | [INFO] [stdout] 798 | / solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 799 | | triu.reverse_rows_and_cols(), [INFO] [stdout] 800 | | conj_lhs, [INFO] [stdout] 801 | | rhs.reverse_rows_mut(), [INFO] [stdout] 802 | | parallelism, [INFO] [stdout] 803 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:792:1 [INFO] [stdout] | [INFO] [stdout] 792 | / unsafe fn solve_upper_triangular_in_place_unchecked( [INFO] [stdout] 793 | | triu: MatRef<'_, E>, [INFO] [stdout] 794 | | conj_lhs: Conj, [INFO] [stdout] 795 | | rhs: MatMut<'_, E>, [INFO] [stdout] 796 | | parallelism: Parallelism, [INFO] [stdout] 797 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseRowMatRef::<'a, I>::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:299:9 [INFO] [stdout] | [INFO] [stdout] 299 | / SymbolicSparseRowMatRef::new_unchecked( [INFO] [stdout] 300 | | nrows, [INFO] [stdout] 301 | | ncols, [INFO] [stdout] 302 | | &row_ptrs, [INFO] [stdout] 303 | | nnz_per_row.as_deref(), [INFO] [stdout] 304 | | &col_indices, [INFO] [stdout] 305 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | / pub unsafe fn new_unchecked( [INFO] [stdout] 293 | | nrows: usize, [INFO] [stdout] 294 | | ncols: usize, [INFO] [stdout] 295 | | row_ptrs: Vec, [INFO] [stdout] 296 | | nnz_per_row: Option>, [INFO] [stdout] 297 | | col_indices: Vec, [INFO] [stdout] 298 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseRowMatRef::<'a, I>::row_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:463:9 [INFO] [stdout] | [INFO] [stdout] 463 | self.as_ref().row_range_unchecked(i) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:462:5 [INFO] [stdout] | [INFO] [stdout] 462 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseRowMatRef::<'a, I>::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:545:9 [INFO] [stdout] | [INFO] [stdout] 545 | / SymbolicSparseRowMatRef::new_unchecked( [INFO] [stdout] 546 | | nrows, [INFO] [stdout] 547 | | ncols, [INFO] [stdout] 548 | | &col_ptrs, [INFO] [stdout] 549 | | nnz_per_col.as_deref(), [INFO] [stdout] 550 | | &row_indices, [INFO] [stdout] 551 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:538:5 [INFO] [stdout] | [INFO] [stdout] 538 | / pub unsafe fn new_unchecked( [INFO] [stdout] 539 | | nrows: usize, [INFO] [stdout] 540 | | ncols: usize, [INFO] [stdout] 541 | | col_ptrs: Vec, [INFO] [stdout] 542 | | nnz_per_col: Option>, [INFO] [stdout] 543 | | row_indices: Vec, [INFO] [stdout] 544 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseColMatRef::<'a, I>::col_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:709:9 [INFO] [stdout] | [INFO] [stdout] 709 | self.as_ref().col_range_unchecked(j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:708:5 [INFO] [stdout] | [INFO] [stdout] 708 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:981:21 [INFO] [stdout] | [INFO] [stdout] 981 | let start = __get_unchecked(self.row_ptr, i).zx(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:980:5 [INFO] [stdout] | [INFO] [stdout] 980 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:984:29 [INFO] [stdout] | [INFO] [stdout] 984 | .map(|row_nnz| (__get_unchecked(row_nnz, i).zx() + start)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:985:24 [INFO] [stdout] | [INFO] [stdout] 985 | .unwrap_or(__get_unchecked(self.row_ptr, i + 1).zx()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:1288:21 [INFO] [stdout] | [INFO] [stdout] 1288 | let start = __get_unchecked(self.col_ptr, j).zx(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:1287:5 [INFO] [stdout] | [INFO] [stdout] 1287 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:1291:29 [INFO] [stdout] | [INFO] [stdout] 1291 | .map(|col_nnz| (__get_unchecked(col_nnz, j).zx() + start)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:1292:24 [INFO] [stdout] | [INFO] [stdout] 1292 | .unwrap_or(__get_unchecked(self.col_ptr, j + 1).zx()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::util::ghost_permute_hermitian_unsorted` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:3619:10 [INFO] [stdout] | [INFO] [stdout] 3619 | *ghost_permute_hermitian_unsorted( [INFO] [stdout] | __________^ [INFO] [stdout] 3620 | | SliceGroupMut::<'_, Symbolic>::new(new_values), [INFO] [stdout] 3621 | | new_col_ptrs, [INFO] [stdout] 3622 | | new_row_indices, [INFO] [stdout] ... | [INFO] [stdout] 3632 | | stack, [INFO] [stdout] 3633 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:3608:5 [INFO] [stdout] | [INFO] [stdout] 3608 | / pub unsafe fn ghost_permute_hermitian_unsorted_symbolic<'n, 'out, I: Index>( [INFO] [stdout] 3609 | | new_col_ptrs: &'out mut [I], [INFO] [stdout] 3610 | | new_row_indices: &'out mut [I], [INFO] [stdout] 3611 | | A: ghost::SymbolicSparseColMatRef<'n, 'n, '_, I>, [INFO] [stdout] ... | [INFO] [stdout] 3615 | | stack: PodStack<'_>, [INFO] [stdout] 3616 | | ) -> ghost::SymbolicSparseColMatRef<'n, 'n, 'out, I> { [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::util::ghost_permute_hermitian_unsorted` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:3653:13 [INFO] [stdout] | [INFO] [stdout] 3653 | / ghost_permute_hermitian_unsorted( [INFO] [stdout] 3654 | | SliceGroupMut::new(new_values), [INFO] [stdout] 3655 | | new_col_ptrs, [INFO] [stdout] 3656 | | new_row_indices, [INFO] [stdout] ... | [INFO] [stdout] 3662 | | stack, [INFO] [stdout] 3663 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:3641:5 [INFO] [stdout] | [INFO] [stdout] 3641 | / pub unsafe fn permute_hermitian_unsorted<'out, I: Index, E: ComplexField>( [INFO] [stdout] 3642 | | new_values: GroupFor, [INFO] [stdout] 3643 | | new_col_ptrs: &'out mut [I], [INFO] [stdout] 3644 | | new_row_indices: &'out mut [I], [INFO] [stdout] ... | [INFO] [stdout] 3649 | | stack: PodStack<'_>, [INFO] [stdout] 3650 | | ) -> SparseColMatMut<'out, I, E> { [INFO] [stdout] | |____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:25:22 [INFO] [stdout] | [INFO] [stdout] 25 | let a_item = a.read(); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | unsafe fn swap(a: Self, b: Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:26:22 [INFO] [stdout] | [INFO] [stdout] 26 | let b_item = b.read(); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 28 | a.write(b_item); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | b.write(a_item); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 32 | unsafe fn swap_idx(self, i: usize, j: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:20 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:33 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:52:9 [INFO] [stdout] | [INFO] [stdout] 52 | self.offset_from(origin) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:51:5 [INFO] [stdout] | [INFO] [stdout] 51 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:57:9 [INFO] [stdout] | [INFO] [stdout] 57 | self.add(offset) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:56:5 [INFO] [stdout] | [INFO] [stdout] 56 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | self.sub(offset) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:61:5 [INFO] [stdout] | [INFO] [stdout] 61 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:67:9 [INFO] [stdout] | [INFO] [stdout] 67 | *self [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | *self = item; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:71:5 [INFO] [stdout] | [INFO] [stdout] 71 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | core::ptr::copy_nonoverlapping(src, dst, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:76:5 [INFO] [stdout] | [INFO] [stdout] 76 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:82:9 [INFO] [stdout] | [INFO] [stdout] 82 | core::slice::from_raw_parts_mut(ptr, len).reverse() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.0.offset_from(origin.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:105:5 [INFO] [stdout] | [INFO] [stdout] 105 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:111:10 [INFO] [stdout] | [INFO] [stdout] 111 | (self.0.add(offset), self.1.add(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:110:5 [INFO] [stdout] | [INFO] [stdout] 110 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:111:30 [INFO] [stdout] | [INFO] [stdout] 111 | (self.0.add(offset), self.1.add(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:116:10 [INFO] [stdout] | [INFO] [stdout] 116 | (self.0.sub(offset), self.1.sub(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:116:30 [INFO] [stdout] | [INFO] [stdout] 116 | (self.0.sub(offset), self.1.sub(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:121:10 [INFO] [stdout] | [INFO] [stdout] 121 | (self.0.read(), self.1.read()) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:121:25 [INFO] [stdout] | [INFO] [stdout] 121 | (self.0.read(), self.1.read()) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:126:9 [INFO] [stdout] | [INFO] [stdout] 126 | self.0.write(item.0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:125:5 [INFO] [stdout] | [INFO] [stdout] 125 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:127:9 [INFO] [stdout] | [INFO] [stdout] 127 | self.1.write(item.1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:132:9 [INFO] [stdout] | [INFO] [stdout] 132 | P::copy_nonoverlapping(src.0, dst.0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | Q::copy_nonoverlapping(src.1, dst.1, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:138:9 [INFO] [stdout] | [INFO] [stdout] 138 | P::reverse(ptr.0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:139:9 [INFO] [stdout] | [INFO] [stdout] 139 | Q::reverse(ptr.1, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:355:9 [INFO] [stdout] | [INFO] [stdout] 355 | v.swap_idx(i - 1, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:321:1 [INFO] [stdout] | [INFO] [stdout] 321 | / unsafe fn partial_insertion_sort bool>( [INFO] [stdout] 322 | | v: P, [INFO] [stdout] 323 | | v_len: usize, [INFO] [stdout] 324 | | is_less: &mut F, [INFO] [stdout] 325 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:386:34 [INFO] [stdout] | [INFO] [stdout] 386 | child += is_less(v.add(child), v.add(child + 1)) as usize; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:371:1 [INFO] [stdout] | [INFO] [stdout] 371 | pub unsafe fn heapsort bool>(v: P, v_len: usize, mut is_less: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:386:48 [INFO] [stdout] | [INFO] [stdout] 386 | child += is_less(v.add(child), v.add(child + 1)) as usize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:390:25 [INFO] [stdout] | [INFO] [stdout] 390 | if !is_less(v.add(node), v.add(child)) { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:390:38 [INFO] [stdout] | [INFO] [stdout] 390 | if !is_less(v.add(node), v.add(child)) { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:395:13 [INFO] [stdout] | [INFO] [stdout] 395 | v.swap_idx(node, child); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:407:9 [INFO] [stdout] | [INFO] [stdout] 407 | v.swap_idx(0, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:371:1 [INFO] [stdout] | [INFO] [stdout] 371 | pub unsafe fn heapsort bool>(v: P, v_len: usize, mut is_less: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:461:23 [INFO] [stdout] | [INFO] [stdout] 461 | let is_done = width(l, r) <= 2 * BLOCK; [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:412:1 [INFO] [stdout] | [INFO] [stdout] 412 | / unsafe fn partition_in_blocks bool>( [INFO] [stdout] 413 | | v: P, [INFO] [stdout] 414 | | v_len: usize, [INFO] [stdout] 415 | | pivot: P, [INFO] [stdout] 416 | | is_less: &mut F, [INFO] [stdout] 417 | | ) -> usize { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:465:27 [INFO] [stdout] | [INFO] [stdout] 465 | let mut rem = width(l, r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:484:27 [INFO] [stdout] | [INFO] [stdout] 484 | debug_assert!(width(l, r) == block_l + block_r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:552:30 [INFO] [stdout] | [INFO] [stdout] 552 | let count = Ord::min(width(start_l, end_l), width(start_r, end_r)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:552:53 [INFO] [stdout] | [INFO] [stdout] 552 | let count = Ord::min(width(start_l, end_l), width(start_r, end_r)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:639:26 [INFO] [stdout] | [INFO] [stdout] 639 | debug_assert_eq!(width(l, r), block_l); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:658:9 [INFO] [stdout] | [INFO] [stdout] 658 | width(v, r) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:662:26 [INFO] [stdout] | [INFO] [stdout] 662 | debug_assert_eq!(width(l, r), block_r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:671:9 [INFO] [stdout] | [INFO] [stdout] 671 | width(v, l) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:674:9 [INFO] [stdout] | [INFO] [stdout] 674 | width(v, l) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:455:9 [INFO] [stdout] | [INFO] [stdout] 455 | r.offset_from(l) as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:454:5 [INFO] [stdout] | [INFO] [stdout] 454 | unsafe fn width(l: P, r: P) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:689:9 [INFO] [stdout] | [INFO] [stdout] 689 | v.swap_idx(0, pivot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:678:1 [INFO] [stdout] | [INFO] [stdout] 678 | / pub(super) unsafe fn partition( [INFO] [stdout] 679 | | v: P, [INFO] [stdout] 680 | | v_len: usize, [INFO] [stdout] 681 | | pivot: usize, [INFO] [stdout] ... | [INFO] [stdout] 684 | | where [INFO] [stdout] 685 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:691:17 [INFO] [stdout] | [INFO] [stdout] 691 | let v = v.add(1); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:728:17 [INFO] [stdout] | [INFO] [stdout] 728 | l + partition_in_blocks(v.add(l), r - l, pivot, is_less), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:728:37 [INFO] [stdout] | [INFO] [stdout] 728 | l + partition_in_blocks(v.add(l), r - l, pivot, is_less), [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:738:5 [INFO] [stdout] | [INFO] [stdout] 738 | v.swap_idx(0, mid); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:753:5 [INFO] [stdout] | [INFO] [stdout] 753 | v.swap_idx(0, pivot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:743:1 [INFO] [stdout] | [INFO] [stdout] 743 | / pub(super) unsafe fn partition_equal( [INFO] [stdout] 744 | | v: P, [INFO] [stdout] 745 | | v_len: usize, [INFO] [stdout] 746 | | pivot: usize, [INFO] [stdout] ... | [INFO] [stdout] 749 | | where [INFO] [stdout] 750 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:755:13 [INFO] [stdout] | [INFO] [stdout] 755 | let v = v.add(1); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:858:13 [INFO] [stdout] | [INFO] [stdout] 858 | v.swap_idx(pos - 1 + i, other); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:817:1 [INFO] [stdout] | [INFO] [stdout] 817 | pub(super) unsafe fn break_patterns(v: P, v_len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:927:9 [INFO] [stdout] | [INFO] [stdout] 927 | P::reverse(v, v_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:863:1 [INFO] [stdout] | [INFO] [stdout] 863 | / pub(super) unsafe fn choose_pivot(v: P, v_len: usize, is_less: &mut F) -> (usize, bool) [INFO] [stdout] 864 | | where [INFO] [stdout] 865 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::recurse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:945:5 [INFO] [stdout] | [INFO] [stdout] 945 | recurse(v, v_len, &mut is_less, None, limit); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:933:1 [INFO] [stdout] | [INFO] [stdout] 933 | / pub unsafe fn quicksort(v: P, v_len: usize, mut is_less: F) [INFO] [stdout] 934 | | where [INFO] [stdout] 935 | | F: FnMut(P, P) -> bool, [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::heapsort` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:977:13 [INFO] [stdout] | [INFO] [stdout] 977 | heapsort(v, v_len, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:948:1 [INFO] [stdout] | [INFO] [stdout] 948 | / unsafe fn recurse bool>( [INFO] [stdout] 949 | | mut v: P, [INFO] [stdout] 950 | | mut v_len: usize, [INFO] [stdout] 951 | | is_less: &mut F, [INFO] [stdout] 952 | | mut pred: Option

, [INFO] [stdout] 953 | | mut limit: u32, [INFO] [stdout] 954 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::break_patterns` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:984:13 [INFO] [stdout] | [INFO] [stdout] 984 | break_patterns(v, v_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::choose_pivot` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:989:38 [INFO] [stdout] | [INFO] [stdout] 989 | let (pivot, likely_sorted) = choose_pivot(v, v_len, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partial_insertion_sort` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:996:16 [INFO] [stdout] | [INFO] [stdout] 996 | if partial_insertion_sort(v, v_len, is_less) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1005:28 [INFO] [stdout] | [INFO] [stdout] 1005 | if !is_less(p, v.add(pivot)) { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_equal` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1006:27 [INFO] [stdout] | [INFO] [stdout] 1006 | let mid = partition_equal(v, v_len, pivot, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1009:21 [INFO] [stdout] | [INFO] [stdout] 1009 | v = v.add(mid); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1016:28 [INFO] [stdout] | [INFO] [stdout] 1016 | let (mid, was_p) = partition(v, v_len, pivot, is_less); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1023:21 [INFO] [stdout] | [INFO] [stdout] 1023 | let right = v.add(mid); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1026:21 [INFO] [stdout] | [INFO] [stdout] 1026 | let right = right.add(1); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::recurse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1033:13 [INFO] [stdout] | [INFO] [stdout] 1033 | recurse(left, left_len, is_less, pred, limit); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::recurse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1038:13 [INFO] [stdout] | [INFO] [stdout] 1038 | recurse(right, right_len, is_less, Some(pivot), limit); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::quicksort` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1051:5 [INFO] [stdout] | [INFO] [stdout] 1051 | / quicksort( [INFO] [stdout] 1052 | | ptr, [INFO] [stdout] 1053 | | len, [INFO] [stdout] 1054 | | #[inline(always)] [INFO] [stdout] 1055 | | |a, b| compare(a, b) == core::cmp::Ordering::Less, [INFO] [stdout] 1056 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1045:1 [INFO] [stdout] | [INFO] [stdout] 1045 | / pub unsafe fn sort_unstable_by( [INFO] [stdout] 1046 | | ptr: P, [INFO] [stdout] 1047 | | len: usize, [INFO] [stdout] 1048 | | compare: impl FnMut(P, P) -> core::cmp::Ordering, [INFO] [stdout] 1049 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::sort_unstable_by` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1167:5 [INFO] [stdout] | [INFO] [stdout] 1167 | / sort_unstable_by( [INFO] [stdout] 1168 | | ( [INFO] [stdout] 1169 | | indices.as_mut_ptr(), [INFO] [stdout] 1170 | | Wrap::(into_copy::(E::faer_map( [INFO] [stdout] ... | [INFO] [stdout] 1176 | | |(i, _), (j, _)| (&*i).cmp(&*j), [INFO] [stdout] 1177 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1059:1 [INFO] [stdout] | [INFO] [stdout] 1059 | / pub unsafe fn sort_indices( [INFO] [stdout] 1060 | | indices: &mut [I], [INFO] [stdout] 1061 | | values: crate::group_helpers::SliceGroupMut, [INFO] [stdout] 1062 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1176:28 [INFO] [stdout] | [INFO] [stdout] 1176 | |(i, _), (j, _)| (&*i).cmp(&*j), [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1176:37 [INFO] [stdout] | [INFO] [stdout] 1176 | |(i, _), (j, _)| (&*i).cmp(&*j), [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1108:13 [INFO] [stdout] | [INFO] [stdout] 1108 | / E::faer_first(from_copy::(self.0)) [INFO] [stdout] 1109 | | .offset_from(E::faer_first(from_copy::(origin.0)) as *const _) [INFO] [stdout] | |____________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1107:9 [INFO] [stdout] | [INFO] [stdout] 1107 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1117:23 [INFO] [stdout] | [INFO] [stdout] 1117 | |ptr| ptr.add(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1113:9 [INFO] [stdout] | [INFO] [stdout] 1113 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1125:23 [INFO] [stdout] | [INFO] [stdout] 1125 | |ptr| ptr.sub(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1121:9 [INFO] [stdout] | [INFO] [stdout] 1121 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1134:23 [INFO] [stdout] | [INFO] [stdout] 1134 | |ptr| ptr.read(), [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1130:9 [INFO] [stdout] | [INFO] [stdout] 1130 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1142:31 [INFO] [stdout] | [INFO] [stdout] 1142 | |(ptr, item)| *ptr = item, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1138:9 [INFO] [stdout] | [INFO] [stdout] 1138 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1151:30 [INFO] [stdout] | [INFO] [stdout] 1151 | |(src, dst)| core::ptr::copy_nonoverlapping(src, dst, len), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1147:9 [INFO] [stdout] | [INFO] [stdout] 1147 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:1159:23 [INFO] [stdout] | [INFO] [stdout] 1159 | |ptr| core::slice::from_raw_parts_mut(ptr, len).reverse(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:1155:9 [INFO] [stdout] | [INFO] [stdout] 1155 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2354:26 [INFO] [stdout] | [INFO] [stdout] 2354 | |slice| *slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2349:9 [INFO] [stdout] | [INFO] [stdout] 2349 | pub unsafe fn read_unchecked(&self, idx: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2378:25 [INFO] [stdout] | [INFO] [stdout] 2378 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2373:9 [INFO] [stdout] | [INFO] [stdout] 2373 | pub unsafe fn get_unchecked(self, idx: usize) -> RefGroup<'a, E, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2433:25 [INFO] [stdout] | [INFO] [stdout] 2433 | |slice| slice.get_unchecked(range.start..range.end), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2428:9 [INFO] [stdout] | [INFO] [stdout] 2428 | pub unsafe fn subslice_unchecked(self, range: Range) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `group_helpers::SliceGroup::<'a, E>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2484:13 [INFO] [stdout] | [INFO] [stdout] 2484 | self.rb().read_unchecked(idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2483:9 [INFO] [stdout] | [INFO] [stdout] 2483 | pub unsafe fn read_unchecked(&self, idx: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2506:35 [INFO] [stdout] | [INFO] [stdout] 2506 | |(slice, value)| *slice.get_unchecked_mut(idx) = value, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2501:9 [INFO] [stdout] | [INFO] [stdout] 2501 | pub unsafe fn write_unchecked(&mut self, idx: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2540:25 [INFO] [stdout] | [INFO] [stdout] 2540 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2535:9 [INFO] [stdout] | [INFO] [stdout] 2535 | pub unsafe fn get_unchecked_mut(self, idx: usize) -> RefGroupMut<'a, E, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `group_helpers::SliceGroup::<'a, E, T>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2558:13 [INFO] [stdout] | [INFO] [stdout] 2558 | self.into_const().get_unchecked(idx) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2557:9 [INFO] [stdout] | [INFO] [stdout] 2557 | pub unsafe fn get_unchecked(self, idx: usize) -> RefGroup<'a, E, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:2593:25 [INFO] [stdout] | [INFO] [stdout] 2593 | |slice| slice.get_unchecked_mut(range.start..range.end), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:2588:9 [INFO] [stdout] | [INFO] [stdout] 2588 | pub unsafe fn subslice_unchecked(self, range: Range) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::hint::unreachable_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4129:9 [INFO] [stdout] | [INFO] [stdout] 4129 | core::hint::unreachable_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4126:1 [INFO] [stdout] | [INFO] [stdout] 4126 | unsafe fn unchecked_mul(a: usize, b: isize) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::hint::unreachable_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4138:9 [INFO] [stdout] | [INFO] [stdout] 4138 | core::hint::unreachable_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4135:1 [INFO] [stdout] | [INFO] [stdout] 4135 | unsafe fn unchecked_add(a: isize, b: isize) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4208:26 [INFO] [stdout] | [INFO] [stdout] 4208 | let offset = unchecked_mul(row, self.inner.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4207:9 [INFO] [stdout] | [INFO] [stdout] 4207 | unsafe fn unchecked_ptr_at(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4212:23 [INFO] [stdout] | [INFO] [stdout] 4212 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::unchecked_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4240:13 [INFO] [stdout] | [INFO] [stdout] 4240 | self.unchecked_ptr_at(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4238:9 [INFO] [stdout] | [INFO] [stdout] 4238 | pub unsafe fn ptr_inbounds_at(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ColIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4305:13 [INFO] [stdout] | [INFO] [stdout] 4305 | >::get_unchecked(self, row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4298:9 [INFO] [stdout] | [INFO] [stdout] 4298 | / pub unsafe fn get_unchecked( [INFO] [stdout] 4299 | | self, [INFO] [stdout] 4300 | | row: RowRange, [INFO] [stdout] 4301 | | ) -> >::Target [INFO] [stdout] 4302 | | where [INFO] [stdout] 4303 | | Self: ColIndex, [INFO] [stdout] | |_____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4336:17 [INFO] [stdout] | [INFO] [stdout] 4336 | self.get_unchecked(row), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4334:9 [INFO] [stdout] | [INFO] [stdout] 4334 | pub unsafe fn read_unchecked(&self, row: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4676:26 [INFO] [stdout] | [INFO] [stdout] 4676 | let offset = unchecked_mul(row, self.inner.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4675:9 [INFO] [stdout] | [INFO] [stdout] 4675 | unsafe fn ptr_at_mut_unchecked(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4680:23 [INFO] [stdout] | [INFO] [stdout] 4680 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4694:13 [INFO] [stdout] | [INFO] [stdout] 4694 | self.ptr_at_mut_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4692:9 [INFO] [stdout] | [INFO] [stdout] 4692 | pub unsafe fn ptr_inbounds_at_mut(self, row: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4708:30 [INFO] [stdout] | [INFO] [stdout] 4708 | let (top, bot) = self.into_const().split_at_unchecked(row); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4707:9 [INFO] [stdout] | [INFO] [stdout] 4707 | pub unsafe fn split_at_mut_unchecked(self, row: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ColIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4746:13 [INFO] [stdout] | [INFO] [stdout] 4746 | >::get_unchecked(self, row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4739:9 [INFO] [stdout] | [INFO] [stdout] 4739 | / pub unsafe fn get_unchecked_mut( [INFO] [stdout] 4740 | | self, [INFO] [stdout] 4741 | | row: RowRange, [INFO] [stdout] 4742 | | ) -> >::Target [INFO] [stdout] 4743 | | where [INFO] [stdout] 4744 | | Self: ColIndex, [INFO] [stdout] | |_____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4776:13 [INFO] [stdout] | [INFO] [stdout] 4776 | self.rb().read_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4775:9 [INFO] [stdout] | [INFO] [stdout] 4775 | pub unsafe fn read_unchecked(&self, row: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4799:45 [INFO] [stdout] | [INFO] [stdout] 4799 | let zipped = E::faer_zip(units, (*self).rb_mut().ptr_inbounds_at_mut(row)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4797:9 [INFO] [stdout] | [INFO] [stdout] 4797 | pub unsafe fn write_unchecked(&mut self, row: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4803:31 [INFO] [stdout] | [INFO] [stdout] 4803 | |(unit, ptr)| *ptr = unit, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4911:13 [INFO] [stdout] | [INFO] [stdout] 4911 | / self.into_const() [INFO] [stdout] 4912 | | .subrows_unchecked(row_start, nrows) [INFO] [stdout] 4913 | | .const_cast() [INFO] [stdout] | |_____________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:4910:9 [INFO] [stdout] | [INFO] [stdout] 4910 | pub unsafe fn subrows_mut_unchecked(self, row_start: usize, nrows: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::subrows_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:4911:13 [INFO] [stdout] | [INFO] [stdout] 4911 | / self.into_const() [INFO] [stdout] 4912 | | .subrows_unchecked(row_start, nrows) [INFO] [stdout] | |____________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5065:26 [INFO] [stdout] | [INFO] [stdout] 5065 | let offset = unchecked_mul(col, self.inner.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5064:9 [INFO] [stdout] | [INFO] [stdout] 5064 | unsafe fn unchecked_ptr_at(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5069:23 [INFO] [stdout] | [INFO] [stdout] 5069 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::unchecked_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5097:13 [INFO] [stdout] | [INFO] [stdout] 5097 | self.unchecked_ptr_at(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5095:9 [INFO] [stdout] | [INFO] [stdout] 5095 | pub unsafe fn ptr_inbounds_at(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `RowIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5162:13 [INFO] [stdout] | [INFO] [stdout] 5162 | >::get_unchecked(self, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5155:9 [INFO] [stdout] | [INFO] [stdout] 5155 | / pub unsafe fn get_unchecked( [INFO] [stdout] 5156 | | self, [INFO] [stdout] 5157 | | col: ColRange, [INFO] [stdout] 5158 | | ) -> >::Target [INFO] [stdout] 5159 | | where [INFO] [stdout] 5160 | | Self: RowIndex, [INFO] [stdout] | |_____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5193:17 [INFO] [stdout] | [INFO] [stdout] 5193 | self.get_unchecked(col), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5191:9 [INFO] [stdout] | [INFO] [stdout] 5191 | pub unsafe fn read_unchecked(&self, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5506:26 [INFO] [stdout] | [INFO] [stdout] 5506 | let offset = unchecked_mul(col, self.inner.inner.stride); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5505:9 [INFO] [stdout] | [INFO] [stdout] 5505 | unsafe fn ptr_at_mut_unchecked(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5510:23 [INFO] [stdout] | [INFO] [stdout] 5510 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5524:13 [INFO] [stdout] | [INFO] [stdout] 5524 | self.ptr_at_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5522:9 [INFO] [stdout] | [INFO] [stdout] 5522 | pub unsafe fn ptr_inbounds_at_mut(self, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5538:33 [INFO] [stdout] | [INFO] [stdout] 5538 | let (left, right) = self.into_const().split_at_unchecked(col); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5537:9 [INFO] [stdout] | [INFO] [stdout] 5537 | pub unsafe fn split_at_mut_unchecked(self, col: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `RowIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5576:13 [INFO] [stdout] | [INFO] [stdout] 5576 | >::get_unchecked(self, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5569:9 [INFO] [stdout] | [INFO] [stdout] 5569 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 5570 | | self, [INFO] [stdout] 5571 | | col: ColRange, [INFO] [stdout] 5572 | | ) -> >::Target [INFO] [stdout] 5573 | | where [INFO] [stdout] 5574 | | Self: RowIndex, [INFO] [stdout] | |_____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5606:13 [INFO] [stdout] | [INFO] [stdout] 5606 | self.rb().read_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5605:9 [INFO] [stdout] | [INFO] [stdout] 5605 | pub unsafe fn read_unchecked(&self, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5629:45 [INFO] [stdout] | [INFO] [stdout] 5629 | let zipped = E::faer_zip(units, (*self).rb_mut().ptr_inbounds_at_mut(col)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5627:9 [INFO] [stdout] | [INFO] [stdout] 5627 | pub unsafe fn write_unchecked(&mut self, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5633:31 [INFO] [stdout] | [INFO] [stdout] 5633 | |(unit, ptr)| *ptr = unit, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5740:13 [INFO] [stdout] | [INFO] [stdout] 5740 | / self.into_const() [INFO] [stdout] 5741 | | .subcols_unchecked(col_start, ncols) [INFO] [stdout] 5742 | | .const_cast() [INFO] [stdout] | |_____________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5739:9 [INFO] [stdout] | [INFO] [stdout] 5739 | pub unsafe fn subcols_mut_unchecked(self, col_start: usize, ncols: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::subcols_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5740:13 [INFO] [stdout] | [INFO] [stdout] 5740 | / self.into_const() [INFO] [stdout] 5741 | | .subcols_unchecked(col_start, ncols) [INFO] [stdout] | |____________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_add` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5905:26 [INFO] [stdout] | [INFO] [stdout] 5905 | let offset = unchecked_add( [INFO] [stdout] | __________________________^ [INFO] [stdout] 5906 | | unchecked_mul(row, self.inner.inner.row_stride), [INFO] [stdout] 5907 | | unchecked_mul(col, self.inner.inner.col_stride), [INFO] [stdout] 5908 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5904:9 [INFO] [stdout] | [INFO] [stdout] 5904 | unsafe fn unchecked_ptr_at(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5906:17 [INFO] [stdout] | [INFO] [stdout] 5906 | unchecked_mul(row, self.inner.inner.row_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5907:17 [INFO] [stdout] | [INFO] [stdout] 5907 | unchecked_mul(col, self.inner.inner.col_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5912:23 [INFO] [stdout] | [INFO] [stdout] 5912 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::unchecked_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:5944:13 [INFO] [stdout] | [INFO] [stdout] 5944 | self.unchecked_ptr_at(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:5942:9 [INFO] [stdout] | [INFO] [stdout] 5942 | pub unsafe fn ptr_inbounds_at(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6119:13 [INFO] [stdout] | [INFO] [stdout] 6119 | >::get_unchecked(self, row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:6111:9 [INFO] [stdout] | [INFO] [stdout] 6111 | / pub unsafe fn get_unchecked( [INFO] [stdout] 6112 | | self, [INFO] [stdout] 6113 | | row: RowRange, [INFO] [stdout] 6114 | | col: ColRange, [INFO] [stdout] 6115 | | ) -> >::Target [INFO] [stdout] 6116 | | where [INFO] [stdout] 6117 | | Self: MatIndex, [INFO] [stdout] | |_______________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6156:17 [INFO] [stdout] | [INFO] [stdout] 6156 | self.get_unchecked(row, col), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:6154:9 [INFO] [stdout] | [INFO] [stdout] 6154 | pub unsafe fn read_unchecked(&self, row: usize, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_add` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6949:26 [INFO] [stdout] | [INFO] [stdout] 6949 | let offset = unchecked_add( [INFO] [stdout] | __________________________^ [INFO] [stdout] 6950 | | unchecked_mul(row, self.inner.inner.row_stride), [INFO] [stdout] 6951 | | unchecked_mul(col, self.inner.inner.col_stride), [INFO] [stdout] 6952 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:6948:9 [INFO] [stdout] | [INFO] [stdout] 6948 | unsafe fn ptr_at_mut_unchecked(self, row: usize, col: usize) -> GroupFor { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6950:17 [INFO] [stdout] | [INFO] [stdout] 6950 | unchecked_mul(row, self.inner.inner.row_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unchecked_mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6951:17 [INFO] [stdout] | [INFO] [stdout] 6951 | unchecked_mul(col, self.inner.inner.col_stride), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6956:23 [INFO] [stdout] | [INFO] [stdout] 6956 | |ptr| ptr.offset(offset), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_at_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6975:13 [INFO] [stdout] | [INFO] [stdout] 6975 | self.ptr_at_mut_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:6969:9 [INFO] [stdout] | [INFO] [stdout] 6969 | / pub unsafe fn ptr_inbounds_at_mut( [INFO] [stdout] 6970 | | self, [INFO] [stdout] 6971 | | row: usize, [INFO] [stdout] 6972 | | col: usize, [INFO] [stdout] 6973 | | ) -> GroupFor { [INFO] [stdout] | |______________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::split_at_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6997:17 [INFO] [stdout] | [INFO] [stdout] 6997 | self.into_const().split_at_unchecked(row, col); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:6991:9 [INFO] [stdout] | [INFO] [stdout] 6991 | / pub unsafe fn split_at_mut_unchecked( [INFO] [stdout] 6992 | | self, [INFO] [stdout] 6993 | | row: usize, [INFO] [stdout] 6994 | | col: usize, [INFO] [stdout] 6995 | | ) -> (Self, Self, Self, Self) { [INFO] [stdout] | |_____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:6999:17 [INFO] [stdout] | [INFO] [stdout] 6999 | top_left.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7000:17 [INFO] [stdout] | [INFO] [stdout] 7000 | top_right.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7001:17 [INFO] [stdout] | [INFO] [stdout] 7001 | bot_left.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7002:17 [INFO] [stdout] | [INFO] [stdout] 7002 | bot_right.const_cast(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::split_at_row_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7042:30 [INFO] [stdout] | [INFO] [stdout] 7042 | let (top, bot) = self.into_const().split_at_row_unchecked(row); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:7041:9 [INFO] [stdout] | [INFO] [stdout] 7041 | pub unsafe fn split_at_row_mut_unchecked(self, row: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7043:14 [INFO] [stdout] | [INFO] [stdout] 7043 | (top.const_cast(), bot.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7043:32 [INFO] [stdout] | [INFO] [stdout] 7043 | (top.const_cast(), bot.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::split_at_col_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7072:33 [INFO] [stdout] | [INFO] [stdout] 7072 | let (left, right) = self.into_const().split_at_col_unchecked(col); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:7071:9 [INFO] [stdout] | [INFO] [stdout] 7071 | pub unsafe fn split_at_col_mut_unchecked(self, col: usize) -> (Self, Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7073:14 [INFO] [stdout] | [INFO] [stdout] 7073 | (left.const_cast(), right.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::const_cast` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7073:33 [INFO] [stdout] | [INFO] [stdout] 7073 | (left.const_cast(), right.const_cast()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7112:13 [INFO] [stdout] | [INFO] [stdout] 7112 | >::get_unchecked(self, row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:7104:9 [INFO] [stdout] | [INFO] [stdout] 7104 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 7105 | | self, [INFO] [stdout] 7106 | | row: RowRange, [INFO] [stdout] 7107 | | col: ColRange, [INFO] [stdout] 7108 | | ) -> >::Target [INFO] [stdout] 7109 | | where [INFO] [stdout] 7110 | | Self: MatIndex, [INFO] [stdout] | |_______________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7148:13 [INFO] [stdout] | [INFO] [stdout] 7148 | self.rb().read_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:7147:9 [INFO] [stdout] | [INFO] [stdout] 7147 | pub unsafe fn read_unchecked(&self, row: usize, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7173:45 [INFO] [stdout] | [INFO] [stdout] 7173 | let zipped = E::faer_zip(units, (*self).rb_mut().ptr_inbounds_at_mut(row, col)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:7171:9 [INFO] [stdout] | [INFO] [stdout] 7171 | pub unsafe fn write_unchecked(&mut self, row: usize, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:7177:31 [INFO] [stdout] | [INFO] [stdout] 7177 | |(unit, ptr)| *ptr = unit, [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8343:64 [INFO] [stdout] | [INFO] [stdout] 8343 | let ptr_ij = E::faer_map(E::faer_copy(&ptr), |ptr| ptr.add(i)); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8327:5 [INFO] [stdout] | [INFO] [stdout] 8327 | / unsafe fn insert_block_with E>( [INFO] [stdout] 8328 | | &mut self, [INFO] [stdout] 8329 | | f: &mut F, [INFO] [stdout] 8330 | | row_start: usize, [INFO] [stdout] 8331 | | row_end: usize, [INFO] [stdout] 8332 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8347:17 [INFO] [stdout] | [INFO] [stdout] 8347 | core::ptr::write(ptr_ij, value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8327:5 [INFO] [stdout] | [INFO] [stdout] 8327 | / unsafe fn insert_block_with E>( [INFO] [stdout] 8328 | | &mut self, [INFO] [stdout] 8329 | | f: &mut F, [INFO] [stdout] 8330 | | row_start: usize, [INFO] [stdout] 8331 | | row_end: usize, [INFO] [stdout] 8332 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `Matrix::>::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8363:9 [INFO] [stdout] | [INFO] [stdout] 8363 | self.insert_block_with(f, old_nrows, new_nrows); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8358:5 [INFO] [stdout] | [INFO] [stdout] 8358 | unsafe fn insert_last_rows_with E>(&mut self, f: &mut F, new_nrows: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8439:9 [INFO] [stdout] | [INFO] [stdout] 8439 | self.as_ref().get_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8432:5 [INFO] [stdout] | [INFO] [stdout] 8432 | / pub unsafe fn get_unchecked( [INFO] [stdout] 8433 | | &self, [INFO] [stdout] 8434 | | row: RowRange, [INFO] [stdout] 8435 | | ) -> as ColIndex>::Target [INFO] [stdout] 8436 | | where [INFO] [stdout] 8437 | | for<'a> ColRef<'a, E>: ColIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8478:9 [INFO] [stdout] | [INFO] [stdout] 8478 | self.as_mut().get_unchecked_mut(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8471:5 [INFO] [stdout] | [INFO] [stdout] 8471 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 8472 | | &mut self, [INFO] [stdout] 8473 | | row: RowRange, [INFO] [stdout] 8474 | | ) -> as ColIndex>::Target [INFO] [stdout] 8475 | | where [INFO] [stdout] 8476 | | for<'a> ColMut<'a, E>: ColIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8510:9 [INFO] [stdout] | [INFO] [stdout] 8510 | self.as_ref().read_unchecked(row) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8509:5 [INFO] [stdout] | [INFO] [stdout] 8509 | pub unsafe fn read_unchecked(&self, row: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8532:9 [INFO] [stdout] | [INFO] [stdout] 8532 | self.as_mut().write_unchecked(row, value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8531:5 [INFO] [stdout] | [INFO] [stdout] 8531 | pub unsafe fn write_unchecked(&mut self, row: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8852:64 [INFO] [stdout] | [INFO] [stdout] 8852 | let ptr_ij = E::faer_map(E::faer_copy(&ptr), |ptr| ptr.add(j)); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8836:5 [INFO] [stdout] | [INFO] [stdout] 8836 | / unsafe fn insert_block_with E>( [INFO] [stdout] 8837 | | &mut self, [INFO] [stdout] 8838 | | f: &mut F, [INFO] [stdout] 8839 | | col_start: usize, [INFO] [stdout] 8840 | | col_end: usize, [INFO] [stdout] 8841 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8856:17 [INFO] [stdout] | [INFO] [stdout] 8856 | core::ptr::write(ptr_ij, value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8836:5 [INFO] [stdout] | [INFO] [stdout] 8836 | / unsafe fn insert_block_with E>( [INFO] [stdout] 8837 | | &mut self, [INFO] [stdout] 8838 | | f: &mut F, [INFO] [stdout] 8839 | | col_start: usize, [INFO] [stdout] 8840 | | col_end: usize, [INFO] [stdout] 8841 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `Matrix::>::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8872:9 [INFO] [stdout] | [INFO] [stdout] 8872 | self.insert_block_with(f, old_ncols, new_ncols); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8867:5 [INFO] [stdout] | [INFO] [stdout] 8867 | unsafe fn insert_last_cols_with E>(&mut self, f: &mut F, new_ncols: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8948:9 [INFO] [stdout] | [INFO] [stdout] 8948 | self.as_ref().get_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8941:5 [INFO] [stdout] | [INFO] [stdout] 8941 | / pub unsafe fn get_unchecked( [INFO] [stdout] 8942 | | &self, [INFO] [stdout] 8943 | | col: ColRange, [INFO] [stdout] 8944 | | ) -> as RowIndex>::Target [INFO] [stdout] 8945 | | where [INFO] [stdout] 8946 | | for<'a> RowRef<'a, E>: RowIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:8987:9 [INFO] [stdout] | [INFO] [stdout] 8987 | self.as_mut().get_mut_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:8980:5 [INFO] [stdout] | [INFO] [stdout] 8980 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 8981 | | &mut self, [INFO] [stdout] 8982 | | col: ColRange, [INFO] [stdout] 8983 | | ) -> as RowIndex>::Target [INFO] [stdout] 8984 | | where [INFO] [stdout] 8985 | | for<'a> RowMut<'a, E>: RowIndex, [INFO] [stdout] | |__________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9019:9 [INFO] [stdout] | [INFO] [stdout] 9019 | self.as_ref().read_unchecked(col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9018:5 [INFO] [stdout] | [INFO] [stdout] 9018 | pub unsafe fn read_unchecked(&self, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9041:9 [INFO] [stdout] | [INFO] [stdout] 9041 | self.as_mut().write_unchecked(col, value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9040:5 [INFO] [stdout] | [INFO] [stdout] 9040 | pub unsafe fn write_unchecked(&mut self, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9410:72 [INFO] [stdout] | [INFO] [stdout] 9410 | let ptr_ij = E::faer_map(E::faer_copy(&ptr_j), |ptr_j| ptr_j.add(i)); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9387:5 [INFO] [stdout] | [INFO] [stdout] 9387 | / unsafe fn insert_block_with E>( [INFO] [stdout] 9388 | | &mut self, [INFO] [stdout] 9389 | | f: &mut F, [INFO] [stdout] 9390 | | row_start: usize, [INFO] [stdout] ... | [INFO] [stdout] 9393 | | col_end: usize, [INFO] [stdout] 9394 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9414:21 [INFO] [stdout] | [INFO] [stdout] 9414 | core::ptr::write(ptr_ij, value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9387:5 [INFO] [stdout] | [INFO] [stdout] 9387 | / unsafe fn insert_block_with E>( [INFO] [stdout] 9388 | | &mut self, [INFO] [stdout] 9389 | | f: &mut F, [INFO] [stdout] 9390 | | row_start: usize, [INFO] [stdout] ... | [INFO] [stdout] 9393 | | col_end: usize, [INFO] [stdout] 9394 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `Matrix::>::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9441:9 [INFO] [stdout] | [INFO] [stdout] 9441 | self.insert_block_with(f, 0, self.nrows(), old_ncols, new_ncols); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9432:5 [INFO] [stdout] | [INFO] [stdout] 9432 | / unsafe fn insert_last_cols_with E>( [INFO] [stdout] 9433 | | &mut self, [INFO] [stdout] 9434 | | f: &mut F, [INFO] [stdout] 9435 | | new_ncols: usize, [INFO] [stdout] 9436 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `Matrix::>::insert_block_with` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9454:9 [INFO] [stdout] | [INFO] [stdout] 9454 | self.insert_block_with(f, old_nrows, new_nrows, 0, self.ncols()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9445:5 [INFO] [stdout] | [INFO] [stdout] 9445 | / unsafe fn insert_last_rows_with E>( [INFO] [stdout] 9446 | | &mut self, [INFO] [stdout] 9447 | | f: &mut F, [INFO] [stdout] 9448 | | new_nrows: usize, [INFO] [stdout] 9449 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9589:9 [INFO] [stdout] | [INFO] [stdout] 9589 | self.as_ref().get_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9581:5 [INFO] [stdout] | [INFO] [stdout] 9581 | / pub unsafe fn get_unchecked( [INFO] [stdout] 9582 | | &self, [INFO] [stdout] 9583 | | row: RowRange, [INFO] [stdout] 9584 | | col: ColRange, [INFO] [stdout] 9585 | | ) -> as MatIndex>::Target [INFO] [stdout] 9586 | | where [INFO] [stdout] 9587 | | for<'a> MatRef<'a, E>: MatIndex, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::get_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9635:9 [INFO] [stdout] | [INFO] [stdout] 9635 | self.as_mut().get_mut_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9627:5 [INFO] [stdout] | [INFO] [stdout] 9627 | / pub unsafe fn get_mut_unchecked( [INFO] [stdout] 9628 | | &mut self, [INFO] [stdout] 9629 | | row: RowRange, [INFO] [stdout] 9630 | | col: ColRange, [INFO] [stdout] 9631 | | ) -> as MatIndex>::Target [INFO] [stdout] 9632 | | where [INFO] [stdout] 9633 | | for<'a> MatMut<'a, E>: MatIndex, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9670:9 [INFO] [stdout] | [INFO] [stdout] 9670 | self.as_ref().read_unchecked(row, col) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9669:5 [INFO] [stdout] | [INFO] [stdout] 9669 | pub unsafe fn read_unchecked(&self, row: usize, col: usize) -> E { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:9694:9 [INFO] [stdout] | [INFO] [stdout] 9694 | self.as_mut().write_unchecked(row, col, value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:9693:5 [INFO] [stdout] | [INFO] [stdout] 9693 | pub unsafe fn write_unchecked(&mut self, row: usize, col: usize, value: E) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:12601:25 [INFO] [stdout] | [INFO] [stdout] 12601 | NonNull::new_unchecked(ptr as *mut E::Unit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:12590:5 [INFO] [stdout] | [INFO] [stdout] 12590 | / pub unsafe fn from_raw_parts<'a, E: Entity>( [INFO] [stdout] 12591 | | ptr: GroupFor, [INFO] [stdout] 12592 | | nrows: usize, [INFO] [stdout] 12593 | | ncols: usize, [INFO] [stdout] 12594 | | row_stride: isize, [INFO] [stdout] 12595 | | col_stride: isize, [INFO] [stdout] 12596 | | ) -> MatRef<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:12665:25 [INFO] [stdout] | [INFO] [stdout] 12665 | NonNull::new_unchecked(ptr as *mut E::Unit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:12654:5 [INFO] [stdout] | [INFO] [stdout] 12654 | / pub unsafe fn from_raw_parts_mut<'a, E: Entity>( [INFO] [stdout] 12655 | | ptr: GroupFor, [INFO] [stdout] 12656 | | nrows: usize, [INFO] [stdout] 12657 | | ncols: usize, [INFO] [stdout] 12658 | | row_stride: isize, [INFO] [stdout] 12659 | | col_stride: isize, [INFO] [stdout] 12660 | | ) -> MatMut<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:12910:25 [INFO] [stdout] | [INFO] [stdout] 12910 | NonNull::new_unchecked(ptr as *mut E::Unit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:12901:5 [INFO] [stdout] | [INFO] [stdout] 12901 | / pub unsafe fn from_raw_parts<'a, E: Entity>( [INFO] [stdout] 12902 | | ptr: GroupFor, [INFO] [stdout] 12903 | | nrows: usize, [INFO] [stdout] 12904 | | row_stride: isize, [INFO] [stdout] 12905 | | ) -> ColRef<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:12935:25 [INFO] [stdout] | [INFO] [stdout] 12935 | NonNull::new_unchecked(ptr as *mut E::Unit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:12926:5 [INFO] [stdout] | [INFO] [stdout] 12926 | / pub unsafe fn from_raw_parts_mut<'a, E: Entity>( [INFO] [stdout] 12927 | | ptr: GroupFor, [INFO] [stdout] 12928 | | nrows: usize, [INFO] [stdout] 12929 | | row_stride: isize, [INFO] [stdout] 12930 | | ) -> ColMut<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:13004:25 [INFO] [stdout] | [INFO] [stdout] 13004 | NonNull::new_unchecked(ptr as *mut E::Unit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:12995:5 [INFO] [stdout] | [INFO] [stdout] 12995 | / pub unsafe fn from_raw_parts<'a, E: Entity>( [INFO] [stdout] 12996 | | ptr: GroupFor, [INFO] [stdout] 12997 | | ncols: usize, [INFO] [stdout] 12998 | | col_stride: isize, [INFO] [stdout] 12999 | | ) -> RowRef<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:13030:25 [INFO] [stdout] | [INFO] [stdout] 13030 | NonNull::new_unchecked(ptr as *mut E::Unit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:13021:5 [INFO] [stdout] | [INFO] [stdout] 13021 | / pub unsafe fn from_raw_parts_mut<'a, E: Entity>( [INFO] [stdout] 13022 | | ptr: GroupFor, [INFO] [stdout] 13023 | | ncols: usize, [INFO] [stdout] 13024 | | col_stride: isize, [INFO] [stdout] 13025 | | ) -> RowMut<'a, E> { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MaybeContiguous::get_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14445:18 [INFO] [stdout] | [INFO] [stdout] 14445 | Last(self.0.get_slice_unchecked(idx, n_elems)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14444:9 [INFO] [stdout] | [INFO] [stdout] 14444 | unsafe fn get_slice_unchecked(&mut self, idx: Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14456:18 [INFO] [stdout] | [INFO] [stdout] 14456 | Last(self.0.get_unchecked(index)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14455:9 [INFO] [stdout] | [INFO] [stdout] 14455 | unsafe fn get_unchecked(&'a mut self, index: Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MatIndex::get_from_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14461:18 [INFO] [stdout] | [INFO] [stdout] 14461 | Last(Mat::get_from_slice_unchecked(&mut slice.0, idx)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14460:9 [INFO] [stdout] | [INFO] [stdout] 14460 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MaybeContiguous::get_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14496:17 [INFO] [stdout] | [INFO] [stdout] 14496 | self.0.get_slice_unchecked(idx, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14494:9 [INFO] [stdout] | [INFO] [stdout] 14494 | unsafe fn get_slice_unchecked(&mut self, idx: Self::Index, n_elems: usize) -> Self::Slice { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MaybeContiguous::get_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14497:17 [INFO] [stdout] | [INFO] [stdout] 14497 | self.1.get_slice_unchecked(idx, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14520:17 [INFO] [stdout] | [INFO] [stdout] 14520 | Zip(self.0.get_unchecked(index), self.1.get_unchecked(index)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14519:9 [INFO] [stdout] | [INFO] [stdout] 14519 | unsafe fn get_unchecked(&'a mut self, index: Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MatIndex::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14520:46 [INFO] [stdout] | [INFO] [stdout] 14520 | Zip(self.0.get_unchecked(index), self.1.get_unchecked(index)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MatIndex::get_from_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14526:17 [INFO] [stdout] | [INFO] [stdout] 14526 | Head::get_from_slice_unchecked(&mut slice.0, idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14524:9 [INFO] [stdout] | [INFO] [stdout] 14524 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zip::MatIndex::get_from_slice_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14527:17 [INFO] [stdout] | [INFO] [stdout] 14527 | Tail::get_from_slice_unchecked(&mut slice.1, idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14559:23 [INFO] [stdout] | [INFO] [stdout] 14559 | |ptr| core::slice::from_raw_parts(ptr as *const MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14551:9 [INFO] [stdout] | [INFO] [stdout] 14551 | / unsafe fn get_slice_unchecked( [INFO] [stdout] 14552 | | &mut self, [INFO] [stdout] 14553 | | (i, _): Self::Index, [INFO] [stdout] 14554 | | n_elems: usize, [INFO] [stdout] 14555 | | ) -> Self::Slice { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14570:21 [INFO] [stdout] | [INFO] [stdout] 14570 | self.rb().ptr_inbounds_at(i), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14567:9 [INFO] [stdout] | [INFO] [stdout] 14567 | unsafe fn get_unchecked(&'a mut self, (i, _): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14572:28 [INFO] [stdout] | [INFO] [stdout] 14572 | |ptr| &*(ptr as *const MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14584:29 [INFO] [stdout] | [INFO] [stdout] 14584 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14578:9 [INFO] [stdout] | [INFO] [stdout] 14578 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14628:23 [INFO] [stdout] | [INFO] [stdout] 14628 | |ptr| core::slice::from_raw_parts_mut(ptr as *mut MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14620:9 [INFO] [stdout] | [INFO] [stdout] 14620 | / unsafe fn get_slice_unchecked( [INFO] [stdout] 14621 | | &mut self, [INFO] [stdout] 14622 | | (i, _): Self::Index, [INFO] [stdout] 14623 | | n_elems: usize, [INFO] [stdout] 14624 | | ) -> Self::Slice { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14639:21 [INFO] [stdout] | [INFO] [stdout] 14639 | self.rb_mut().ptr_inbounds_at_mut(i), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14636:9 [INFO] [stdout] | [INFO] [stdout] 14636 | unsafe fn get_unchecked(&'a mut self, (i, _): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14641:32 [INFO] [stdout] | [INFO] [stdout] 14641 | |ptr| &mut *(ptr as *mut MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14653:29 [INFO] [stdout] | [INFO] [stdout] 14653 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14647:9 [INFO] [stdout] | [INFO] [stdout] 14647 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14697:23 [INFO] [stdout] | [INFO] [stdout] 14697 | |ptr| core::slice::from_raw_parts(ptr as *const MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14689:9 [INFO] [stdout] | [INFO] [stdout] 14689 | / unsafe fn get_slice_unchecked( [INFO] [stdout] 14690 | | &mut self, [INFO] [stdout] 14691 | | (_, j): Self::Index, [INFO] [stdout] 14692 | | n_elems: usize, [INFO] [stdout] 14693 | | ) -> Self::Slice { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14708:21 [INFO] [stdout] | [INFO] [stdout] 14708 | self.rb().ptr_inbounds_at(j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14705:9 [INFO] [stdout] | [INFO] [stdout] 14705 | unsafe fn get_unchecked(&'a mut self, (_, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14710:28 [INFO] [stdout] | [INFO] [stdout] 14710 | |ptr| &*(ptr as *const MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14722:29 [INFO] [stdout] | [INFO] [stdout] 14722 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14716:9 [INFO] [stdout] | [INFO] [stdout] 14716 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14766:23 [INFO] [stdout] | [INFO] [stdout] 14766 | |ptr| core::slice::from_raw_parts_mut(ptr as *mut MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14758:9 [INFO] [stdout] | [INFO] [stdout] 14758 | / unsafe fn get_slice_unchecked( [INFO] [stdout] 14759 | | &mut self, [INFO] [stdout] 14760 | | (_, j): Self::Index, [INFO] [stdout] 14761 | | n_elems: usize, [INFO] [stdout] 14762 | | ) -> Self::Slice { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14777:21 [INFO] [stdout] | [INFO] [stdout] 14777 | self.rb_mut().ptr_inbounds_at_mut(j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14774:9 [INFO] [stdout] | [INFO] [stdout] 14774 | unsafe fn get_unchecked(&'a mut self, (_, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14779:32 [INFO] [stdout] | [INFO] [stdout] 14779 | |ptr| &mut *(ptr as *mut MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14791:29 [INFO] [stdout] | [INFO] [stdout] 14791 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14785:9 [INFO] [stdout] | [INFO] [stdout] 14785 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14833:17 [INFO] [stdout] | [INFO] [stdout] 14833 | (*self).rb().overflowing_ptr_at(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14827:9 [INFO] [stdout] | [INFO] [stdout] 14827 | / unsafe fn get_slice_unchecked( [INFO] [stdout] 14828 | | &mut self, [INFO] [stdout] 14829 | | (i, j): Self::Index, [INFO] [stdout] 14830 | | n_elems: usize, [INFO] [stdout] 14831 | | ) -> Self::Slice { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14835:23 [INFO] [stdout] | [INFO] [stdout] 14835 | |ptr| core::slice::from_raw_parts(ptr as *const MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14846:21 [INFO] [stdout] | [INFO] [stdout] 14846 | self.rb().ptr_inbounds_at(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14843:9 [INFO] [stdout] | [INFO] [stdout] 14843 | unsafe fn get_unchecked(&'a mut self, (i, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14848:28 [INFO] [stdout] | [INFO] [stdout] 14848 | |ptr| &*(ptr as *const MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14860:29 [INFO] [stdout] | [INFO] [stdout] 14860 | |slice| slice.get_unchecked(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14854:9 [INFO] [stdout] | [INFO] [stdout] 14854 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::overflowing_ptr_at` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14909:17 [INFO] [stdout] | [INFO] [stdout] 14909 | (*self).rb().overflowing_ptr_at(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14903:9 [INFO] [stdout] | [INFO] [stdout] 14903 | / unsafe fn get_slice_unchecked( [INFO] [stdout] 14904 | | &mut self, [INFO] [stdout] 14905 | | (i, j): Self::Index, [INFO] [stdout] 14906 | | n_elems: usize, [INFO] [stdout] 14907 | | ) -> Self::Slice { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14911:23 [INFO] [stdout] | [INFO] [stdout] 14911 | |ptr| core::slice::from_raw_parts_mut(ptr as *mut MaybeUninit, n_elems), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::ptr_inbounds_at_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14923:21 [INFO] [stdout] | [INFO] [stdout] 14923 | self.rb_mut().ptr_inbounds_at_mut(i, j), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14920:9 [INFO] [stdout] | [INFO] [stdout] 14920 | unsafe fn get_unchecked(&'a mut self, (i, j): Self::Index) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14925:32 [INFO] [stdout] | [INFO] [stdout] 14925 | |ptr| &mut *(ptr as *mut MaybeUninit), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:14937:29 [INFO] [stdout] | [INFO] [stdout] 14937 | |slice| slice.get_unchecked_mut(idx), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:14931:9 [INFO] [stdout] | [INFO] [stdout] 14931 | unsafe fn get_from_slice_unchecked(slice: &'a mut Self::Slice, idx: usize) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/serde_impl.rs:153:39 [INFO] [stdout] | [INFO] [stdout] 153 | ... while let Some(_) = seq.next_element::()? { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/serde_impl.rs:155:33 [INFO] [stdout] | [INFO] [stdout] 155 | ... } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/serde_impl.rs:166:39 [INFO] [stdout] | [INFO] [stdout] 166 | ... while let Some(el) = seq.next_element::()? { [INFO] [stdout] | ^^^^^^^^^^^^^^^------------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/serde_impl.rs:168:33 [INFO] [stdout] | [INFO] [stdout] 168 | ... } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/serde_impl.rs:177:23 [INFO] [stdout] | [INFO] [stdout] 177 | while let Some(key) = map.next_key()? { [INFO] [stdout] | ^^^^^^^^^^^^^^^^--------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/serde_impl.rs:203:17 [INFO] [stdout] | [INFO] [stdout] 203 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse.rs:949:10 [INFO] [stdout] | [INFO] [stdout] 949 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse.rs:947:9 [INFO] [stdout] | [INFO] [stdout] 947 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] = note: `--force-warn impl-trait-overcaptures` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 949 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I> { [INFO] [stdout] | ++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/sparse.rs:1256:10 [INFO] [stdout] | [INFO] [stdout] 1256 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/sparse.rs:1254:9 [INFO] [stdout] | [INFO] [stdout] 1254 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 1256 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator + use<'a, I> { [INFO] [stdout] | ++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl ExactSizeIterator + DoubleEndedIterator + Iterator> + 'a` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/lib.rs:10761:18 [INFO] [stdout] | [INFO] [stdout] 10761 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/lib.rs:10698:22 [INFO] [stdout] | [INFO] [stdout] 10698 | impl<'nrows, 'ncols, 'a, I: Index> SymbolicSparseColMatRef<'nrows, 'ncols, 'a, I> { [INFO] [stdout] | ^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 10759 | &self, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 10761 | ) -> impl 'a + ExactSizeIterator + DoubleEndedIterator> + use<'a, 'nrows, I> [INFO] [stdout] | ++++++++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 365 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating benches/bench.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `faer_core` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/mul.rs [INFO] [stderr] * src/permutation.rs [INFO] [stderr] * src/sort.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1303:18 [INFO] [stderr] | [INFO] [stderr] 1303 | ($term: expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:20 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:39 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:58 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/mul.rs:1918:74 [INFO] [stderr] | [INFO] [stderr] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr_2021, $rs: expr_2021, $cs: expr_2021, $ty: ty) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9979:12 [INFO] [stderr] | [INFO] [stderr] 9979 | ([$([$($col:expr_2021),*])*] $($v:expr_2021;)* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9979:36 [INFO] [stderr] | [INFO] [stderr] 9979 | ([$([$($col:expr_2021),*])*] $($v:expr_2021;)* ) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9982:12 [INFO] [stderr] | [INFO] [stderr] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9982:36 [INFO] [stderr] | [INFO] [stderr] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:9982:53 [INFO] [stderr] | [INFO] [stderr] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr_2021, $($v:expr_2021),* ;)*) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10022:11 [INFO] [stderr] | [INFO] [stderr] 10022 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10052:11 [INFO] [stderr] | [INFO] [stderr] 10052 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10077:8 [INFO] [stderr] | [INFO] [stderr] 10077 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10106:8 [INFO] [stderr] | [INFO] [stderr] 10106 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10420:6 [INFO] [stderr] | [INFO] [stderr] 10420 | ($head: expr_2021 $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10424:6 [INFO] [stderr] | [INFO] [stderr] 10424 | ($head: expr_2021, $($tail: expr_2021),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:10424:26 [INFO] [stderr] | [INFO] [stderr] 10424 | ($head: expr_2021, $($tail: expr_2021),* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:138:5 [INFO] [stderr] | [INFO] [stderr] 138 | target_pointer_width = "128", [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:144:40 [INFO] [stderr] | [INFO] [stderr] 144 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:149:7 [INFO] [stderr] | [INFO] [stderr] 149 | #[cfg(target_pointer_width = "128")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:169:5 [INFO] [stderr] | [INFO] [stderr] 169 | target_pointer_width = "128", [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:194:40 [INFO] [stderr] | [INFO] [stderr] 194 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:218:7 [INFO] [stderr] | [INFO] [stderr] 218 | #[cfg(target_pointer_width = "128")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition value: `128` [INFO] [stderr] --> src/permutation.rs:160:11 [INFO] [stderr] | [INFO] [stderr] 160 | #[cfg(target_pointer_width = "128")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2098 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2099 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2098 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2085 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2099 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2200 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2220 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2200 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2220 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2314 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2315 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2316 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2314 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2315 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2301 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2316 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2422 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2423 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2422 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2409 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2423 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2555 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2556 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2557 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2555 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2556 | stack_mat_16x16_begin!(temp_lhs, n, n, lhs.row_stride(), lhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2542 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2557 | stack_mat_16x16_begin!(temp_rhs, n, n, rhs.row_stride(), rhs.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1926:18 [INFO] [stderr] | [INFO] [stderr] 1926 | |()| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2658 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2677 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/mul.rs:1956:25 [INFO] [stderr] | [INFO] [stderr] 1956 | let mut $name = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2658 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 2677 | stack_mat_16x16_begin!(temp_dst, n, n, dst.row_stride(), dst.col_stride(), E); [INFO] [stderr] | ----------------------------------------------------------------------------- in this macro invocation [INFO] [stderr] | [INFO] [stderr] = note: this warning originates in the macro `stack_mat_16x16_begin` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:337:9 [INFO] [stderr] | [INFO] [stderr] 325 | ) -> bool { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 337 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:444:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 444 | let mut r = unsafe { l.add(v_len) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:509:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 509 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:542:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 542 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:586:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 586 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:615:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 615 | l = unsafe { l.add(block_l) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:624:17 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 624 | r = unsafe { r.sub(block_r) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:652:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 652 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:665:13 [INFO] [stderr] | [INFO] [stderr] 417 | ) -> usize { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 665 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:698:48 [INFO] [stderr] | [INFO] [stderr] 686 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 698 | let tmp = core::mem::ManuallyDrop::new(unsafe { P::read(pivot) }); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:715:9 [INFO] [stderr] | [INFO] [stderr] 686 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 715 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:761:44 [INFO] [stderr] | [INFO] [stderr] 751 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 761 | let tmp = core::mem::ManuallyDrop::new(unsafe { P::read(pivot) }); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:783:9 [INFO] [stderr] | [INFO] [stderr] 751 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 783 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sort.rs:891:56 [INFO] [stderr] | [INFO] [stderr] 866 | { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 891 | let mut sort2 = |a: &mut usize, b: &mut usize| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:4709:13 [INFO] [stderr] | [INFO] [stderr] 4707 | pub unsafe fn split_at_mut_unchecked(self, row: usize) -> (Self, Self) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] 4708 | let (top, bot) = self.into_const().split_at_unchecked(row); [INFO] [stderr] 4709 | unsafe { (top.const_cast(), bot.const_cast()) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:5539:13 [INFO] [stderr] | [INFO] [stderr] 5537 | pub unsafe fn split_at_mut_unchecked(self, col: usize) -> (Self, Self) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] 5538 | let (left, right) = self.into_const().split_at_unchecked(col); [INFO] [stderr] 5539 | unsafe { (left.const_cast(), right.const_cast()) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 17 previous errors; 47 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sort.rs:1205:26 [INFO] [stdout] | [INFO] [stdout] 1205 | .map(|_| rng.gen::()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/sort.rs:1209:26 [INFO] [stdout] | [INFO] [stdout] 1209 | .map(|_| rng.gen::()) [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1303:25 [INFO] [stdout] | [INFO] [stdout] 1303 | ($term: expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1303 | ($term: expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:28 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr_2021, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:42 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr_2021, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:53 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr_2021, $cs: expr, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/mul.rs:1918:64 [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr, $ty: ty) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1918 | ($name: ident, $nrows: expr, $ncols: expr, $rs: expr, $cs: expr_2021, $ty: ty) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:138:5 [INFO] [stdout] | [INFO] [stdout] 138 | target_pointer_width = "128", [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:144:40 [INFO] [stdout] | [INFO] [stdout] 144 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:149:7 [INFO] [stdout] | [INFO] [stdout] 149 | #[cfg(target_pointer_width = "128")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | target_pointer_width = "128", [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:194:40 [INFO] [stdout] | [INFO] [stdout] 194 | #[cfg(any(target_pointer_width = "64", target_pointer_width = "128"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:218:7 [INFO] [stdout] | [INFO] [stdout] 218 | #[cfg(target_pointer_width = "128")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `128` [INFO] [stdout] --> src/permutation.rs:160:11 [INFO] [stdout] | [INFO] [stdout] 160 | #[cfg(target_pointer_width = "128")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_pointer_width` are: `16`, `32`, and `64` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9979:17 [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr_2021),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9979:34 [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr),*])*] $($v:expr;)* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9979 | ([$([$($col:expr),*])*] $($v:expr_2021;)* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9982:17 [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr_2021),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9982:35 [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr_2021, $($v:expr),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:9982:46 [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr),* ;)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 9982 | ([$([$($col:expr),*])*] $($v0:expr, $($v:expr_2021),* ;)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10022:14 [INFO] [stdout] | [INFO] [stdout] 10022 | ($([$($v:expr),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10022 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10052:14 [INFO] [stdout] | [INFO] [stdout] 10052 | ($([$($v:expr),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10052 | ($([$($v:expr_2021),* $(,)?] ),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10077:11 [INFO] [stdout] | [INFO] [stdout] 10077 | ($($v:expr),+ $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10077 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10106:11 [INFO] [stdout] | [INFO] [stdout] 10106 | ($($v:expr),+ $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10106 | ($($v:expr_2021),+ $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10420:13 [INFO] [stdout] | [INFO] [stdout] 10420 | ($head: expr $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10420 | ($head: expr_2021 $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10424:13 [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr_2021, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:10424:28 [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr, $($tail: expr),* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 10424 | ($head: expr, $($tail: expr_2021),* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:17:30 [INFO] [stdout] | [INFO] [stdout] 17 | |i: usize, j: usize| src.read_unchecked(i, j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / unsafe fn invert_lower_triangular_impl_small( [INFO] [stdout] 11 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 12 | | src: MatRef<'_, E>, [INFO] [stdout] 13 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:21:14 [INFO] [stdout] | [INFO] [stdout] 21 | 1 => dst.write_unchecked(0, 0, src(0, 0).faer_inv()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / unsafe fn invert_lower_triangular_impl_small( [INFO] [stdout] 11 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 12 | | src: MatRef<'_, E>, [INFO] [stdout] 13 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:27:13 [INFO] [stdout] | [INFO] [stdout] 27 | dst.write_unchecked(0, 0, dst00); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:28:13 [INFO] [stdout] | [INFO] [stdout] 28 | dst.write_unchecked(1, 1, dst11); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:29:13 [INFO] [stdout] | [INFO] [stdout] 29 | dst.write_unchecked(1, 0, dst10); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:40:36 [INFO] [stdout] | [INFO] [stdout] 40 | let src = |i: usize, j: usize| src.read_unchecked(i, j); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / unsafe fn invert_unit_lower_triangular_impl_small( [INFO] [stdout] 36 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 37 | | src: MatRef<'_, E>, [INFO] [stdout] 38 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:44:13 [INFO] [stdout] | [INFO] [stdout] 44 | dst.write_unchecked(1, 0, src(1, 0).faer_neg()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / unsafe fn invert_unit_lower_triangular_impl_small( [INFO] [stdout] 36 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 37 | | src: MatRef<'_, E>, [INFO] [stdout] 38 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_lower_triangular_impl_small` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | invert_lower_triangular_impl_small(dst, src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:50:1 [INFO] [stdout] | [INFO] [stdout] 50 | / unsafe fn invert_lower_triangular_impl( [INFO] [stdout] 51 | | dst: MatMut<'_, E>, [INFO] [stdout] 52 | | src: MatRef<'_, E>, [INFO] [stdout] 53 | | parallelism: Parallelism, [INFO] [stdout] 54 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:71:23 [INFO] [stdout] | [INFO] [stdout] 71 | |parallelism| invert_lower_triangular_impl(dst_tl.rb_mut(), src_tl, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:72:23 [INFO] [stdout] | [INFO] [stdout] 72 | |parallelism| invert_lower_triangular_impl(dst_br.rb_mut(), src_br, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_unit_lower_triangular_impl_small` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:100:9 [INFO] [stdout] | [INFO] [stdout] 100 | invert_unit_lower_triangular_impl_small(dst, src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/inverse.rs:90:1 [INFO] [stdout] | [INFO] [stdout] 90 | / unsafe fn invert_unit_lower_triangular_impl( [INFO] [stdout] 91 | | dst: MatMut<'_, E>, [INFO] [stdout] 92 | | src: MatRef<'_, E>, [INFO] [stdout] 93 | | parallelism: Parallelism, [INFO] [stdout] 94 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_unit_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:111:23 [INFO] [stdout] | [INFO] [stdout] 111 | |parallelism| invert_unit_lower_triangular_impl(dst_tl.rb_mut(), src_tl, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `inverse::invert_unit_lower_triangular_impl` is unsafe and requires unsafe block [INFO] [stdout] --> src/inverse.rs:112:23 [INFO] [stdout] | [INFO] [stdout] 112 | |parallelism| invert_unit_lower_triangular_impl(dst_br.rb_mut(), src_br, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2000:21 [INFO] [stdout] | [INFO] [stdout] 2000 | dst.write_unchecked(j, j, E::faer_zero()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:1986:5 [INFO] [stdout] | [INFO] [stdout] 1986 | / unsafe fn copy_lower( [INFO] [stdout] 1987 | | mut dst: MatMut<'_, E>, [INFO] [stdout] 1988 | | src: MatRef<'_, E>, [INFO] [stdout] 1989 | | src_diag: DiagonalKind, [INFO] [stdout] 1990 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::write_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2006:21 [INFO] [stdout] | [INFO] [stdout] 2006 | dst.write_unchecked(j, j, E::faer_one()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2057:9 [INFO] [stdout] | [INFO] [stdout] 2057 | copy_lower(dst.transpose_mut(), src.transpose(), src_diag) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2052:5 [INFO] [stdout] | [INFO] [stdout] 2052 | / unsafe fn copy_upper( [INFO] [stdout] 2053 | | dst: MatMut<'_, E>, [INFO] [stdout] 2054 | | src: MatRef<'_, E>, [INFO] [stdout] 2055 | | src_diag: DiagonalKind, [INFO] [stdout] 2056 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2101:21 [INFO] [stdout] | [INFO] [stdout] 2101 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2074:5 [INFO] [stdout] | [INFO] [stdout] 2074 | / unsafe fn mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2075 | | dst: MatMut<'_, E>, [INFO] [stdout] 2076 | | skip_diag: bool, [INFO] [stdout] 2077 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2084 | | parallelism: Parallelism, [INFO] [stdout] 2085 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2102:21 [INFO] [stdout] | [INFO] [stdout] 2102 | / mul( [INFO] [stdout] 2103 | | temp_dst.rb_mut(), [INFO] [stdout] 2104 | | lhs, [INFO] [stdout] 2105 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2110 | | parallelism, [INFO] [stdout] 2111 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2112:21 [INFO] [stdout] | [INFO] [stdout] 2112 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2130:13 [INFO] [stdout] | [INFO] [stdout] 2130 | / mul( [INFO] [stdout] 2131 | | dst_bot_left.rb_mut(), [INFO] [stdout] 2132 | | lhs_bot_right, [INFO] [stdout] 2133 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 2138 | | parallelism, [INFO] [stdout] 2139 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2074:5 [INFO] [stdout] | [INFO] [stdout] 2074 | / unsafe fn mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2075 | | dst: MatMut<'_, E>, [INFO] [stdout] 2076 | | skip_diag: bool, [INFO] [stdout] 2077 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2084 | | parallelism: Parallelism, [INFO] [stdout] 2085 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2140:13 [INFO] [stdout] | [INFO] [stdout] 2140 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2141 | | dst_bot_right, [INFO] [stdout] 2142 | | skip_diag, [INFO] [stdout] 2143 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2150 | | parallelism, [INFO] [stdout] 2151 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2153:13 [INFO] [stdout] | [INFO] [stdout] 2153 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2154 | | dst_top_left.rb_mut(), [INFO] [stdout] 2155 | | skip_diag, [INFO] [stdout] 2156 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2163 | | parallelism, [INFO] [stdout] 2164 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2165:13 [INFO] [stdout] | [INFO] [stdout] 2165 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2166 | | dst_top_left, [INFO] [stdout] 2167 | | skip_diag, [INFO] [stdout] 2168 | | lhs_top_right, [INFO] [stdout] ... | [INFO] [stdout] 2174 | | parallelism, [INFO] [stdout] 2175 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2176:13 [INFO] [stdout] | [INFO] [stdout] 2176 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2177 | | dst_bot_left, [INFO] [stdout] 2178 | | lhs_bot_left, [INFO] [stdout] 2179 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2185 | | parallelism, [INFO] [stdout] 2186 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2222:21 [INFO] [stdout] | [INFO] [stdout] 2222 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2224:21 [INFO] [stdout] | [INFO] [stdout] 2224 | / mul( [INFO] [stdout] 2225 | | dst, [INFO] [stdout] 2226 | | lhs, [INFO] [stdout] 2227 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2232 | | parallelism, [INFO] [stdout] 2233 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2249:21 [INFO] [stdout] | [INFO] [stdout] 2249 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2250 | | dst_left.rb_mut(), [INFO] [stdout] 2251 | | lhs_left, [INFO] [stdout] 2252 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2258 | | parallelism, [INFO] [stdout] 2259 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2262:21 [INFO] [stdout] | [INFO] [stdout] 2262 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2263 | | dst_right.rb_mut(), [INFO] [stdout] 2264 | | lhs_right, [INFO] [stdout] 2265 | | rhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2271 | | parallelism, [INFO] [stdout] 2272 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2276:13 [INFO] [stdout] | [INFO] [stdout] 2276 | / mul( [INFO] [stdout] 2277 | | dst_left, [INFO] [stdout] 2278 | | lhs_right, [INFO] [stdout] 2279 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 2284 | | parallelism, [INFO] [stdout] 2285 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2190:5 [INFO] [stdout] | [INFO] [stdout] 2190 | / unsafe fn mat_x_lower_impl_unchecked( [INFO] [stdout] 2191 | | dst: MatMut<'_, E>, [INFO] [stdout] 2192 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2193 | | rhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2199 | | parallelism: Parallelism, [INFO] [stdout] 2200 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2318:21 [INFO] [stdout] | [INFO] [stdout] 2318 | copy_lower(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2289:5 [INFO] [stdout] | [INFO] [stdout] 2289 | / unsafe fn lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2290 | | dst: MatMut<'_, E>, [INFO] [stdout] 2291 | | skip_diag: bool, [INFO] [stdout] 2292 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2300 | | parallelism: Parallelism, [INFO] [stdout] 2301 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2319:21 [INFO] [stdout] | [INFO] [stdout] 2319 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2321:21 [INFO] [stdout] | [INFO] [stdout] 2321 | / mul( [INFO] [stdout] 2322 | | temp_dst.rb_mut(), [INFO] [stdout] 2323 | | temp_lhs.rb(), [INFO] [stdout] 2324 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2329 | | parallelism, [INFO] [stdout] 2330 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2331:21 [INFO] [stdout] | [INFO] [stdout] 2331 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2347:13 [INFO] [stdout] | [INFO] [stdout] 2347 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2348 | | dst_top_left, [INFO] [stdout] 2349 | | skip_diag, [INFO] [stdout] 2350 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2358 | | parallelism, [INFO] [stdout] 2359 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2289:5 [INFO] [stdout] | [INFO] [stdout] 2289 | / unsafe fn lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2290 | | dst: MatMut<'_, E>, [INFO] [stdout] 2291 | | skip_diag: bool, [INFO] [stdout] 2292 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2300 | | parallelism: Parallelism, [INFO] [stdout] 2301 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2360:13 [INFO] [stdout] | [INFO] [stdout] 2360 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2361 | | dst_bot_left.rb_mut(), [INFO] [stdout] 2362 | | lhs_bot_left, [INFO] [stdout] 2363 | | rhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2369 | | parallelism, [INFO] [stdout] 2370 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2371:13 [INFO] [stdout] | [INFO] [stdout] 2371 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2372 | | dst_bot_left.reverse_rows_and_cols_mut().transpose_mut(), [INFO] [stdout] 2373 | | rhs_bot_left.reverse_rows_and_cols().transpose(), [INFO] [stdout] 2374 | | lhs_bot_right.reverse_rows_and_cols().transpose(), [INFO] [stdout] ... | [INFO] [stdout] 2380 | | parallelism, [INFO] [stdout] 2381 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2382:13 [INFO] [stdout] | [INFO] [stdout] 2382 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2383 | | dst_bot_right, [INFO] [stdout] 2384 | | skip_diag, [INFO] [stdout] 2385 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2393 | | parallelism, [INFO] [stdout] 2394 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_upper` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2425:21 [INFO] [stdout] | [INFO] [stdout] 2425 | copy_upper(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2426:21 [INFO] [stdout] | [INFO] [stdout] 2426 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2428:21 [INFO] [stdout] | [INFO] [stdout] 2428 | / mul( [INFO] [stdout] 2429 | | dst, [INFO] [stdout] 2430 | | temp_lhs.rb(), [INFO] [stdout] 2431 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2436 | | parallelism, [INFO] [stdout] 2437 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2458:21 [INFO] [stdout] | [INFO] [stdout] 2458 | / mul( [INFO] [stdout] 2459 | | dst_top_left.rb_mut(), [INFO] [stdout] 2460 | | lhs_top_right, [INFO] [stdout] 2461 | | rhs_bot_left, [INFO] [stdout] ... | [INFO] [stdout] 2466 | | parallelism, [INFO] [stdout] 2467 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2468:21 [INFO] [stdout] | [INFO] [stdout] 2468 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 2469 | | dst_top_left, [INFO] [stdout] 2470 | | lhs_top_left, [INFO] [stdout] 2471 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 2478 | | parallelism, [INFO] [stdout] 2479 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2484:29 [INFO] [stdout] | [INFO] [stdout] 2484 | / ... mat_x_lower_impl_unchecked( [INFO] [stdout] 2485 | | ... dst_top_right, [INFO] [stdout] 2486 | | ... lhs_top_right, [INFO] [stdout] 2487 | | ... rhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2493 | | ... parallelism, [INFO] [stdout] 2494 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2497:29 [INFO] [stdout] | [INFO] [stdout] 2497 | / ... mat_x_lower_impl_unchecked( [INFO] [stdout] 2498 | | ... dst_bot_left.transpose_mut(), [INFO] [stdout] 2499 | | ... rhs_bot_left.transpose(), [INFO] [stdout] 2500 | | ... lhs_bot_right.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 2506 | | ... parallelism, [INFO] [stdout] 2507 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2512:21 [INFO] [stdout] | [INFO] [stdout] 2512 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 2513 | | dst_bot_right, [INFO] [stdout] 2514 | | lhs_bot_right, [INFO] [stdout] 2515 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 2522 | | parallelism, [INFO] [stdout] 2523 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2398:5 [INFO] [stdout] | [INFO] [stdout] 2398 | / unsafe fn upper_x_lower_impl_unchecked( [INFO] [stdout] 2399 | | dst: MatMut<'_, E>, [INFO] [stdout] 2400 | | lhs: MatRef<'_, E>, [INFO] [stdout] 2401 | | lhs_diag: DiagonalKind, [INFO] [stdout] ... | [INFO] [stdout] 2408 | | parallelism: Parallelism, [INFO] [stdout] 2409 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_upper` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2559:21 [INFO] [stdout] | [INFO] [stdout] 2559 | copy_upper(temp_lhs.rb_mut(), lhs, lhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2530:5 [INFO] [stdout] | [INFO] [stdout] 2530 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2531 | | dst: MatMut<'_, E>, [INFO] [stdout] 2532 | | skip_diag: bool, [INFO] [stdout] 2533 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2541 | | parallelism: Parallelism, [INFO] [stdout] 2542 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::copy_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2560:21 [INFO] [stdout] | [INFO] [stdout] 2560 | copy_lower(temp_rhs.rb_mut(), rhs, rhs_diag); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2562:21 [INFO] [stdout] | [INFO] [stdout] 2562 | / mul( [INFO] [stdout] 2563 | | temp_dst.rb_mut(), [INFO] [stdout] 2564 | | temp_lhs.rb(), [INFO] [stdout] 2565 | | temp_rhs.rb(), [INFO] [stdout] ... | [INFO] [stdout] 2570 | | parallelism, [INFO] [stdout] 2571 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2573:21 [INFO] [stdout] | [INFO] [stdout] 2573 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2592:21 [INFO] [stdout] | [INFO] [stdout] 2592 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2593 | | dst_top_left.rb_mut(), [INFO] [stdout] 2594 | | skip_diag, [INFO] [stdout] 2595 | | lhs_top_right, [INFO] [stdout] ... | [INFO] [stdout] 2601 | | parallelism, [INFO] [stdout] 2602 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2530:5 [INFO] [stdout] | [INFO] [stdout] 2530 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2531 | | dst: MatMut<'_, E>, [INFO] [stdout] 2532 | | skip_diag: bool, [INFO] [stdout] 2533 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2541 | | parallelism: Parallelism, [INFO] [stdout] 2542 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2603:21 [INFO] [stdout] | [INFO] [stdout] 2603 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2604 | | dst_top_left, [INFO] [stdout] 2605 | | skip_diag, [INFO] [stdout] 2606 | | lhs_top_left, [INFO] [stdout] ... | [INFO] [stdout] 2614 | | parallelism, [INFO] [stdout] 2615 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2618:21 [INFO] [stdout] | [INFO] [stdout] 2618 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 2619 | | dst_bot_left.transpose_mut(), [INFO] [stdout] 2620 | | rhs_bot_left.transpose(), [INFO] [stdout] 2621 | | lhs_bot_right.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 2627 | | parallelism, [INFO] [stdout] 2628 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2530:5 [INFO] [stdout] | [INFO] [stdout] 2530 | / unsafe fn upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2531 | | dst: MatMut<'_, E>, [INFO] [stdout] 2532 | | skip_diag: bool, [INFO] [stdout] 2533 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2541 | | parallelism: Parallelism, [INFO] [stdout] 2542 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2629:21 [INFO] [stdout] | [INFO] [stdout] 2629 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 2630 | | dst_bot_right, [INFO] [stdout] 2631 | | skip_diag, [INFO] [stdout] 2632 | | lhs_bot_right, [INFO] [stdout] ... | [INFO] [stdout] 2640 | | parallelism, [INFO] [stdout] 2641 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2679:21 [INFO] [stdout] | [INFO] [stdout] 2679 | / mul( [INFO] [stdout] 2680 | | temp_dst.rb_mut(), [INFO] [stdout] 2681 | | lhs, [INFO] [stdout] 2682 | | rhs, [INFO] [stdout] ... | [INFO] [stdout] 2687 | | parallelism, [INFO] [stdout] 2688 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::accum_lower` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2689:21 [INFO] [stdout] | [INFO] [stdout] 2689 | accum_lower(dst, temp_dst.rb(), skip_diag, alpha); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2701:21 [INFO] [stdout] | [INFO] [stdout] 2701 | / mul( [INFO] [stdout] 2702 | | dst_bot_left, [INFO] [stdout] 2703 | | lhs_bot, [INFO] [stdout] 2704 | | rhs_left, [INFO] [stdout] ... | [INFO] [stdout] 2709 | | parallelism, [INFO] [stdout] 2710 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2715:29 [INFO] [stdout] | [INFO] [stdout] 2715 | / ... mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2716 | | ... dst_top_left, [INFO] [stdout] 2717 | | ... skip_diag, [INFO] [stdout] 2718 | | ... lhs_top, [INFO] [stdout] ... | [INFO] [stdout] 2724 | | ... parallelism, [INFO] [stdout] 2725 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:2728:29 [INFO] [stdout] | [INFO] [stdout] 2728 | / ... mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2729 | | ... dst_bot_right, [INFO] [stdout] 2730 | | ... skip_diag, [INFO] [stdout] 2731 | | ... lhs_bot, [INFO] [stdout] ... | [INFO] [stdout] 2737 | | ... parallelism, [INFO] [stdout] 2738 | | ... ) [INFO] [stdout] | |_______________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:2648:5 [INFO] [stdout] | [INFO] [stdout] 2648 | / unsafe fn mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 2649 | | dst: MatMut<'_, E>, [INFO] [stdout] 2650 | | skip_diag: bool, [INFO] [stdout] 2651 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 2657 | | parallelism: Parallelism, [INFO] [stdout] 2658 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mul` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3146:17 [INFO] [stdout] | [INFO] [stdout] 3146 | mul(acc, lhs, rhs, alpha, beta, conj_lhs, conj_rhs, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mul.rs:3048:5 [INFO] [stdout] | [INFO] [stdout] 3048 | / unsafe fn matmul_unchecked( [INFO] [stdout] 3049 | | acc: MatMut<'_, E>, [INFO] [stdout] 3050 | | acc_structure: BlockStructure, [INFO] [stdout] 3051 | | lhs: MatRef<'_, E>, [INFO] [stdout] ... | [INFO] [stdout] 3059 | | parallelism: Parallelism, [INFO] [stdout] 3060 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3151:21 [INFO] [stdout] | [INFO] [stdout] 3151 | / mat_x_lower_impl_unchecked( [INFO] [stdout] 3152 | | acc, [INFO] [stdout] 3153 | | lhs, [INFO] [stdout] 3154 | | rhs, [INFO] [stdout] ... | [INFO] [stdout] 3160 | | parallelism, [INFO] [stdout] 3161 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3164:21 [INFO] [stdout] | [INFO] [stdout] 3164 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3165 | | acc, [INFO] [stdout] 3166 | | false, [INFO] [stdout] 3167 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3175 | | parallelism, [INFO] [stdout] 3176 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3179:21 [INFO] [stdout] | [INFO] [stdout] 3179 | / upper_x_lower_impl_unchecked( [INFO] [stdout] 3180 | | acc, [INFO] [stdout] 3181 | | lhs, [INFO] [stdout] 3182 | | lhs_diag, [INFO] [stdout] ... | [INFO] [stdout] 3189 | | parallelism, [INFO] [stdout] 3190 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3195:17 [INFO] [stdout] | [INFO] [stdout] 3195 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 3196 | | acc, [INFO] [stdout] 3197 | | skip_diag, [INFO] [stdout] 3198 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3204 | | parallelism, [INFO] [stdout] 3205 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3209:21 [INFO] [stdout] | [INFO] [stdout] 3209 | / mat_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3210 | | acc, [INFO] [stdout] 3211 | | skip_diag, [INFO] [stdout] 3212 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3219 | | parallelism, [INFO] [stdout] 3220 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::lower_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3222:21 [INFO] [stdout] | [INFO] [stdout] 3222 | / lower_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3223 | | acc, [INFO] [stdout] 3224 | | skip_diag, [INFO] [stdout] 3225 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3233 | | parallelism, [INFO] [stdout] 3234 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3236:21 [INFO] [stdout] | [INFO] [stdout] 3236 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3237 | | acc, [INFO] [stdout] 3238 | | skip_diag, [INFO] [stdout] 3239 | | lhs, [INFO] [stdout] ... | [INFO] [stdout] 3247 | | parallelism, [INFO] [stdout] 3248 | | ) [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::mat_x_mat_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3252:13 [INFO] [stdout] | [INFO] [stdout] 3252 | / mat_x_mat_into_lower_impl_unchecked( [INFO] [stdout] 3253 | | acc.transpose_mut(), [INFO] [stdout] 3254 | | skip_diag, [INFO] [stdout] 3255 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 3261 | | parallelism, [INFO] [stdout] 3262 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3267:17 [INFO] [stdout] | [INFO] [stdout] 3267 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3268 | | acc.transpose_mut(), [INFO] [stdout] 3269 | | skip_diag, [INFO] [stdout] 3270 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 3278 | | parallelism, [INFO] [stdout] 3279 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mul::triangular::upper_x_lower_into_lower_impl_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mul.rs:3316:17 [INFO] [stdout] | [INFO] [stdout] 3316 | / upper_x_lower_into_lower_impl_unchecked( [INFO] [stdout] 3317 | | acc.transpose_mut(), [INFO] [stdout] 3318 | | skip_diag, [INFO] [stdout] 3319 | | rhs.transpose(), [INFO] [stdout] ... | [INFO] [stdout] 3327 | | parallelism, [INFO] [stdout] 3328 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:30:47 [INFO] [stdout] | [INFO] [stdout] 30 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / unsafe fn solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] 22 | | tril: MatRef<'_, E>, [INFO] [stdout] 23 | | rhs: MatMut<'_, E>, [INFO] [stdout] 24 | | maybe_conj_lhs: impl Fn(E) -> E, [INFO] [stdout] 25 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:41:47 [INFO] [stdout] | [INFO] [stdout] 41 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:42:47 [INFO] [stdout] | [INFO] [stdout] 42 | let nl20_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:43:47 [INFO] [stdout] | [INFO] [stdout] 43 | let nl21_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:65:47 [INFO] [stdout] | [INFO] [stdout] 65 | let nl10_div_l11 = maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:66:47 [INFO] [stdout] | [INFO] [stdout] 66 | let nl20_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:67:47 [INFO] [stdout] | [INFO] [stdout] 67 | let nl21_div_l22 = maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:68:47 [INFO] [stdout] | [INFO] [stdout] 68 | let nl30_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 0)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:69:47 [INFO] [stdout] | [INFO] [stdout] 69 | let nl31_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 1)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:70:47 [INFO] [stdout] | [INFO] [stdout] 70 | let nl32_div_l33 = maybe_conj_lhs(tril.read_unchecked(3, 2)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:116:38 [INFO] [stdout] | [INFO] [stdout] 116 | let inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:107:1 [INFO] [stdout] | [INFO] [stdout] 107 | / unsafe fn solve_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] 108 | | tril: MatRef<'_, E>, [INFO] [stdout] 109 | | rhs: MatMut<'_, E>, [INFO] [stdout] 110 | | maybe_conj_lhs: impl Fn(E) -> E, [INFO] [stdout] 111 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:121:42 [INFO] [stdout] | [INFO] [stdout] 121 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:122:42 [INFO] [stdout] | [INFO] [stdout] 122 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:124:33 [INFO] [stdout] | [INFO] [stdout] 124 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:140:42 [INFO] [stdout] | [INFO] [stdout] 140 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:141:42 [INFO] [stdout] | [INFO] [stdout] 141 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:142:42 [INFO] [stdout] | [INFO] [stdout] 142 | let l22_inv = maybe_conj_lhs(tril.read_unchecked(2, 2)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:144:33 [INFO] [stdout] | [INFO] [stdout] 144 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:146:33 [INFO] [stdout] | [INFO] [stdout] 146 | (maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:148:33 [INFO] [stdout] | [INFO] [stdout] 148 | (maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:172:42 [INFO] [stdout] | [INFO] [stdout] 172 | let l00_inv = maybe_conj_lhs(tril.read_unchecked(0, 0)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:173:42 [INFO] [stdout] | [INFO] [stdout] 173 | let l11_inv = maybe_conj_lhs(tril.read_unchecked(1, 1)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:174:42 [INFO] [stdout] | [INFO] [stdout] 174 | let l22_inv = maybe_conj_lhs(tril.read_unchecked(2, 2)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:175:42 [INFO] [stdout] | [INFO] [stdout] 175 | let l33_inv = maybe_conj_lhs(tril.read_unchecked(3, 3)).faer_inv(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:177:33 [INFO] [stdout] | [INFO] [stdout] 177 | (maybe_conj_lhs(tril.read_unchecked(1, 0)).faer_mul(l11_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:179:33 [INFO] [stdout] | [INFO] [stdout] 179 | (maybe_conj_lhs(tril.read_unchecked(2, 0)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:181:33 [INFO] [stdout] | [INFO] [stdout] 181 | (maybe_conj_lhs(tril.read_unchecked(2, 1)).faer_mul(l22_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:183:33 [INFO] [stdout] | [INFO] [stdout] 183 | (maybe_conj_lhs(tril.read_unchecked(3, 0)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:185:33 [INFO] [stdout] | [INFO] [stdout] 185 | (maybe_conj_lhs(tril.read_unchecked(3, 1)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `_::>>::read_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:187:33 [INFO] [stdout] | [INFO] [stdout] 187 | (maybe_conj_lhs(tril.read_unchecked(3, 2)).faer_mul(l33_inv)).faer_neg(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:613:17 [INFO] [stdout] | [INFO] [stdout] 613 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 614 | | tril, [INFO] [stdout] 615 | | conj_lhs, [INFO] [stdout] 616 | | rhs_left, [INFO] [stdout] 617 | | parallelism, [INFO] [stdout] 618 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:621:17 [INFO] [stdout] | [INFO] [stdout] 621 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 622 | | tril, [INFO] [stdout] 623 | | conj_lhs, [INFO] [stdout] 624 | | rhs_right, [INFO] [stdout] 625 | | parallelism, [INFO] [stdout] 626 | | ) [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:642:30 [INFO] [stdout] | [INFO] [stdout] 642 | Conj::Yes => solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 643 | | tril, rhs, conj, [INFO] [stdout] 644 | | ), [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:645:29 [INFO] [stdout] | [INFO] [stdout] 645 | Conj::No => solve_unit_lower_triangular_in_place_base_case_generic_unchecked( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 646 | | tril, rhs, identity, [INFO] [stdout] 647 | | ), [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:667:5 [INFO] [stdout] | [INFO] [stdout] 667 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 668 | | tril_top_left, [INFO] [stdout] 669 | | conj_lhs, [INFO] [stdout] 670 | | rhs_top.rb_mut(), [INFO] [stdout] 671 | | parallelism, [INFO] [stdout] 672 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / unsafe fn solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 601 | | tril: MatRef<'_, E>, [INFO] [stdout] 602 | | conj_lhs: Conj, [INFO] [stdout] 603 | | rhs: MatMut<'_, E>, [INFO] [stdout] 604 | | parallelism: Parallelism, [INFO] [stdout] 605 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:685:5 [INFO] [stdout] | [INFO] [stdout] 685 | solve_unit_lower_triangular_in_place_unchecked(tril_bot_right, conj_lhs, rhs_bot, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_unit_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:702:5 [INFO] [stdout] | [INFO] [stdout] 702 | / solve_unit_lower_triangular_in_place_unchecked( [INFO] [stdout] 703 | | triu.reverse_rows_and_cols(), [INFO] [stdout] 704 | | conj_lhs, [INFO] [stdout] 705 | | rhs.reverse_rows_mut(), [INFO] [stdout] 706 | | parallelism, [INFO] [stdout] 707 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:696:1 [INFO] [stdout] | [INFO] [stdout] 696 | / unsafe fn solve_unit_upper_triangular_in_place_unchecked( [INFO] [stdout] 697 | | triu: MatRef<'_, E>, [INFO] [stdout] 698 | | conj_lhs: Conj, [INFO] [stdout] 699 | | rhs: MatMut<'_, E>, [INFO] [stdout] 700 | | parallelism: Parallelism, [INFO] [stdout] 701 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:729:17 [INFO] [stdout] | [INFO] [stdout] 729 | |_| solve_lower_triangular_in_place_unchecked(tril, conj_lhs, rhs_left, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:730:17 [INFO] [stdout] | [INFO] [stdout] 730 | |_| solve_lower_triangular_in_place_unchecked(tril, conj_lhs, rhs_right, parallelism), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:748:21 [INFO] [stdout] | [INFO] [stdout] 748 | solve_lower_triangular_in_place_base_case_generic_unchecked(tril, rhs, conj) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_base_case_generic_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:751:21 [INFO] [stdout] | [INFO] [stdout] 751 | solve_lower_triangular_in_place_base_case_generic_unchecked(tril, rhs, identity) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:763:5 [INFO] [stdout] | [INFO] [stdout] 763 | / solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 764 | | tril_top_left, [INFO] [stdout] 765 | | conj_lhs, [INFO] [stdout] 766 | | rhs_top.rb_mut(), [INFO] [stdout] 767 | | parallelism, [INFO] [stdout] 768 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:717:1 [INFO] [stdout] | [INFO] [stdout] 717 | / unsafe fn solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 718 | | tril: MatRef<'_, E>, [INFO] [stdout] 719 | | conj_lhs: Conj, [INFO] [stdout] 720 | | rhs: MatMut<'_, E>, [INFO] [stdout] 721 | | parallelism: Parallelism, [INFO] [stdout] 722 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:781:5 [INFO] [stdout] | [INFO] [stdout] 781 | solve_lower_triangular_in_place_unchecked(tril_bot_right, conj_lhs, rhs_bot, parallelism); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `solve::solve_lower_triangular_in_place_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/solve.rs:798:5 [INFO] [stdout] | [INFO] [stdout] 798 | / solve_lower_triangular_in_place_unchecked( [INFO] [stdout] 799 | | triu.reverse_rows_and_cols(), [INFO] [stdout] 800 | | conj_lhs, [INFO] [stdout] 801 | | rhs.reverse_rows_mut(), [INFO] [stdout] 802 | | parallelism, [INFO] [stdout] 803 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/solve.rs:792:1 [INFO] [stdout] | [INFO] [stdout] 792 | / unsafe fn solve_upper_triangular_in_place_unchecked( [INFO] [stdout] 793 | | triu: MatRef<'_, E>, [INFO] [stdout] 794 | | conj_lhs: Conj, [INFO] [stdout] 795 | | rhs: MatMut<'_, E>, [INFO] [stdout] 796 | | parallelism: Parallelism, [INFO] [stdout] 797 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseRowMatRef::<'a, I>::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:299:9 [INFO] [stdout] | [INFO] [stdout] 299 | / SymbolicSparseRowMatRef::new_unchecked( [INFO] [stdout] 300 | | nrows, [INFO] [stdout] 301 | | ncols, [INFO] [stdout] 302 | | &row_ptrs, [INFO] [stdout] 303 | | nnz_per_row.as_deref(), [INFO] [stdout] 304 | | &col_indices, [INFO] [stdout] 305 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | / pub unsafe fn new_unchecked( [INFO] [stdout] 293 | | nrows: usize, [INFO] [stdout] 294 | | ncols: usize, [INFO] [stdout] 295 | | row_ptrs: Vec, [INFO] [stdout] 296 | | nnz_per_row: Option>, [INFO] [stdout] 297 | | col_indices: Vec, [INFO] [stdout] 298 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseRowMatRef::<'a, I>::row_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:463:9 [INFO] [stdout] | [INFO] [stdout] 463 | self.as_ref().row_range_unchecked(i) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:462:5 [INFO] [stdout] | [INFO] [stdout] 462 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseRowMatRef::<'a, I>::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:545:9 [INFO] [stdout] | [INFO] [stdout] 545 | / SymbolicSparseRowMatRef::new_unchecked( [INFO] [stdout] 546 | | nrows, [INFO] [stdout] 547 | | ncols, [INFO] [stdout] 548 | | &col_ptrs, [INFO] [stdout] 549 | | nnz_per_col.as_deref(), [INFO] [stdout] 550 | | &row_indices, [INFO] [stdout] 551 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:538:5 [INFO] [stdout] | [INFO] [stdout] 538 | / pub unsafe fn new_unchecked( [INFO] [stdout] 539 | | nrows: usize, [INFO] [stdout] 540 | | ncols: usize, [INFO] [stdout] 541 | | col_ptrs: Vec, [INFO] [stdout] 542 | | nnz_per_col: Option>, [INFO] [stdout] 543 | | row_indices: Vec, [INFO] [stdout] 544 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::SymbolicSparseColMatRef::<'a, I>::col_range_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:709:9 [INFO] [stdout] | [INFO] [stdout] 709 | self.as_ref().col_range_unchecked(j) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:708:5 [INFO] [stdout] | [INFO] [stdout] 708 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:981:21 [INFO] [stdout] | [INFO] [stdout] 981 | let start = __get_unchecked(self.row_ptr, i).zx(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:980:5 [INFO] [stdout] | [INFO] [stdout] 980 | pub unsafe fn row_range_unchecked(&self, i: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:984:29 [INFO] [stdout] | [INFO] [stdout] 984 | .map(|row_nnz| (__get_unchecked(row_nnz, i).zx() + start)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:985:24 [INFO] [stdout] | [INFO] [stdout] 985 | .unwrap_or(__get_unchecked(self.row_ptr, i + 1).zx()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:1288:21 [INFO] [stdout] | [INFO] [stdout] 1288 | let start = __get_unchecked(self.col_ptr, j).zx(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:1287:5 [INFO] [stdout] | [INFO] [stdout] 1287 | pub unsafe fn col_range_unchecked(&self, j: usize) -> Range { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:1291:29 [INFO] [stdout] | [INFO] [stdout] 1291 | .map(|col_nnz| (__get_unchecked(col_nnz, j).zx() + start)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::__get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:1292:24 [INFO] [stdout] | [INFO] [stdout] 1292 | .unwrap_or(__get_unchecked(self.col_ptr, j + 1).zx()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::util::ghost_permute_hermitian_unsorted` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:3619:10 [INFO] [stdout] | [INFO] [stdout] 3619 | *ghost_permute_hermitian_unsorted( [INFO] [stdout] | __________^ [INFO] [stdout] 3620 | | SliceGroupMut::<'_, Symbolic>::new(new_values), [INFO] [stdout] 3621 | | new_col_ptrs, [INFO] [stdout] 3622 | | new_row_indices, [INFO] [stdout] ... | [INFO] [stdout] 3632 | | stack, [INFO] [stdout] 3633 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:3608:5 [INFO] [stdout] | [INFO] [stdout] 3608 | / pub unsafe fn ghost_permute_hermitian_unsorted_symbolic<'n, 'out, I: Index>( [INFO] [stdout] 3609 | | new_col_ptrs: &'out mut [I], [INFO] [stdout] 3610 | | new_row_indices: &'out mut [I], [INFO] [stdout] 3611 | | A: ghost::SymbolicSparseColMatRef<'n, 'n, '_, I>, [INFO] [stdout] ... | [INFO] [stdout] 3615 | | stack: PodStack<'_>, [INFO] [stdout] 3616 | | ) -> ghost::SymbolicSparseColMatRef<'n, 'n, 'out, I> { [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sparse::util::ghost_permute_hermitian_unsorted` is unsafe and requires unsafe block [INFO] [stdout] --> src/sparse.rs:3653:13 [INFO] [stdout] | [INFO] [stdout] 3653 | / ghost_permute_hermitian_unsorted( [INFO] [stdout] 3654 | | SliceGroupMut::new(new_values), [INFO] [stdout] 3655 | | new_col_ptrs, [INFO] [stdout] 3656 | | new_row_indices, [INFO] [stdout] ... | [INFO] [stdout] 3662 | | stack, [INFO] [stdout] 3663 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sparse.rs:3641:5 [INFO] [stdout] | [INFO] [stdout] 3641 | / pub unsafe fn permute_hermitian_unsorted<'out, I: Index, E: ComplexField>( [INFO] [stdout] 3642 | | new_values: GroupFor, [INFO] [stdout] 3643 | | new_col_ptrs: &'out mut [I], [INFO] [stdout] 3644 | | new_row_indices: &'out mut [I], [INFO] [stdout] ... | [INFO] [stdout] 3649 | | stack: PodStack<'_>, [INFO] [stdout] 3650 | | ) -> SparseColMatMut<'out, I, E> { [INFO] [stdout] | |____________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:25:22 [INFO] [stdout] | [INFO] [stdout] 25 | let a_item = a.read(); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | unsafe fn swap(a: Self, b: Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:26:22 [INFO] [stdout] | [INFO] [stdout] 26 | let b_item = b.read(); [INFO] [stdout] | ^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 28 | a.write(b_item); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | b.write(a_item); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 32 | unsafe fn swap_idx(self, i: usize, j: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:20 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:33:33 [INFO] [stdout] | [INFO] [stdout] 33 | Self::swap(self.add(i), self.add(j)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:52:9 [INFO] [stdout] | [INFO] [stdout] 52 | self.offset_from(origin) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:51:5 [INFO] [stdout] | [INFO] [stdout] 51 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:57:9 [INFO] [stdout] | [INFO] [stdout] 57 | self.add(offset) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:56:5 [INFO] [stdout] | [INFO] [stdout] 56 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | self.sub(offset) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:61:5 [INFO] [stdout] | [INFO] [stdout] 61 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:67:9 [INFO] [stdout] | [INFO] [stdout] 67 | *self [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | *self = item; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:71:5 [INFO] [stdout] | [INFO] [stdout] 71 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | core::ptr::copy_nonoverlapping(src, dst, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:76:5 [INFO] [stdout] | [INFO] [stdout] 76 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:82:9 [INFO] [stdout] | [INFO] [stdout] 82 | core::slice::from_raw_parts_mut(ptr, len).reverse() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.0.offset_from(origin.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:105:5 [INFO] [stdout] | [INFO] [stdout] 105 | unsafe fn offset_from(self, origin: Self) -> isize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:111:10 [INFO] [stdout] | [INFO] [stdout] 111 | (self.0.add(offset), self.1.add(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:110:5 [INFO] [stdout] | [INFO] [stdout] 110 | unsafe fn add(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:111:30 [INFO] [stdout] | [INFO] [stdout] 111 | (self.0.add(offset), self.1.add(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:116:10 [INFO] [stdout] | [INFO] [stdout] 116 | (self.0.sub(offset), self.1.sub(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | unsafe fn sub(self, offset: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:116:30 [INFO] [stdout] | [INFO] [stdout] 116 | (self.0.sub(offset), self.1.sub(offset)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:121:10 [INFO] [stdout] | [INFO] [stdout] 121 | (self.0.read(), self.1.read()) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | unsafe fn read(self) -> Self::Item { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:121:25 [INFO] [stdout] | [INFO] [stdout] 121 | (self.0.read(), self.1.read()) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:126:9 [INFO] [stdout] | [INFO] [stdout] 126 | self.0.write(item.0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:125:5 [INFO] [stdout] | [INFO] [stdout] 125 | unsafe fn write(self, item: Self::Item) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:127:9 [INFO] [stdout] | [INFO] [stdout] 127 | self.1.write(item.1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:132:9 [INFO] [stdout] | [INFO] [stdout] 132 | P::copy_nonoverlapping(src.0, dst.0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | unsafe fn copy_nonoverlapping(src: Self, dst: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | Q::copy_nonoverlapping(src.1, dst.1, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:138:9 [INFO] [stdout] | [INFO] [stdout] 138 | P::reverse(ptr.0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | unsafe fn reverse(ptr: Self, len: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::reverse` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:139:9 [INFO] [stdout] | [INFO] [stdout] 139 | Q::reverse(ptr.1, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:355:9 [INFO] [stdout] | [INFO] [stdout] 355 | v.swap_idx(i - 1, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:321:1 [INFO] [stdout] | [INFO] [stdout] 321 | / unsafe fn partial_insertion_sort bool>( [INFO] [stdout] 322 | | v: P, [INFO] [stdout] 323 | | v_len: usize, [INFO] [stdout] 324 | | is_less: &mut F, [INFO] [stdout] 325 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:386:34 [INFO] [stdout] | [INFO] [stdout] 386 | child += is_less(v.add(child), v.add(child + 1)) as usize; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:371:1 [INFO] [stdout] | [INFO] [stdout] 371 | pub unsafe fn heapsort bool>(v: P, v_len: usize, mut is_less: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:386:48 [INFO] [stdout] | [INFO] [stdout] 386 | child += is_less(v.add(child), v.add(child + 1)) as usize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:390:25 [INFO] [stdout] | [INFO] [stdout] 390 | if !is_less(v.add(node), v.add(child)) { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:390:38 [INFO] [stdout] | [INFO] [stdout] 390 | if !is_less(v.add(node), v.add(child)) { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:395:13 [INFO] [stdout] | [INFO] [stdout] 395 | v.swap_idx(node, child); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:407:9 [INFO] [stdout] | [INFO] [stdout] 407 | v.swap_idx(0, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:371:1 [INFO] [stdout] | [INFO] [stdout] 371 | pub unsafe fn heapsort bool>(v: P, v_len: usize, mut is_less: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:461:23 [INFO] [stdout] | [INFO] [stdout] 461 | let is_done = width(l, r) <= 2 * BLOCK; [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:412:1 [INFO] [stdout] | [INFO] [stdout] 412 | / unsafe fn partition_in_blocks bool>( [INFO] [stdout] 413 | | v: P, [INFO] [stdout] 414 | | v_len: usize, [INFO] [stdout] 415 | | pivot: P, [INFO] [stdout] 416 | | is_less: &mut F, [INFO] [stdout] 417 | | ) -> usize { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:465:27 [INFO] [stdout] | [INFO] [stdout] 465 | let mut rem = width(l, r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:484:27 [INFO] [stdout] | [INFO] [stdout] 484 | debug_assert!(width(l, r) == block_l + block_r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:552:30 [INFO] [stdout] | [INFO] [stdout] 552 | let count = Ord::min(width(start_l, end_l), width(start_r, end_r)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:552:53 [INFO] [stdout] | [INFO] [stdout] 552 | let count = Ord::min(width(start_l, end_l), width(start_r, end_r)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:639:26 [INFO] [stdout] | [INFO] [stdout] 639 | debug_assert_eq!(width(l, r), block_l); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:658:9 [INFO] [stdout] | [INFO] [stdout] 658 | width(v, r) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:662:26 [INFO] [stdout] | [INFO] [stdout] 662 | debug_assert_eq!(width(l, r), block_r); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:671:9 [INFO] [stdout] | [INFO] [stdout] 671 | width(v, l) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::partition_in_blocks::width` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:674:9 [INFO] [stdout] | [INFO] [stdout] 674 | width(v, l) [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:455:9 [INFO] [stdout] | [INFO] [stdout] 455 | r.offset_from(l) as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:454:5 [INFO] [stdout] | [INFO] [stdout] 454 | unsafe fn width(l: P, r: P) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sort::Ptr::swap_idx` is unsafe and requires unsafe block [INFO] [stdout] --> src/sort.rs:689:9 [INFO] [stdout] | [INFO] [stdout] 689 | v.swap_idx(0, pivot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sort.rs:678:1 [INFO] [stdout] | [INFO] [stdout] 678 | / pub(super) unsafe fn partition( [INFO] [stdout] 679 | | v: P, [WARN] too many lines in the log, truncating it