Draft: address unsafe pointer operations (segfaults on nightly) #196
+119
−89
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
These changes begin to address the unsafe operations used in this package.
Currently these just deal with the most obvious issues.
Repeatedly running tests on nightly reveal that there are still segfaults. I believe we are leaking pointers to C somewhere. This will also have to be addressed.
Note that tests are failing due to an unrelated issue with complex arrays that also impacts nightly.
Edit: there are some unrelated changes in the first three commits I will excise from this PR.