G'day all.
Quoting Chung-chieh Shan :
Yes. You can even do this portably, using nothing "unsafe", with Dylan
Thurston's technique:
That paper gives you a choice between inefficient and leaky. I think I'll
take unsafeCoerce#. :-)
Cheers,
Andrew Bromage