I hereby claim:
- I am ekg on github.
- I am ekg (https://keybase.io/ekg) on keybase.
- I have a public key ASBqVDBiA6DmXf7cj1k6CHy4DTYQnbAO-C4vZJcFZFwRlAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
foxdot-cli.py in the same directory as the FoxDot installaton (in case you're using virtualenv, otherwise comment from lines 5 to 7)foxdot-mode.el to ~/.emacs.d/lisp(defvar foxdot-cli-path "/path/to/foxdot-cli/") in your ~/.emacs fileM-x load-library and complete with foxdot-modeC-c C-f or M-x foxdot-start to startC-c C-e or M-x foxdot-execute to evaluate a line or a block of code| #!/usr/bin/python | |
| import sys; | |
| import pysam | |
| bamFile = sys.argv[1]; | |
| bamFP = pysam.Samfile(bamFile, "rb"); |
| ⠠ [00:00:14] [############################>-----------] 45/64 (6s) - Chunk 45/64, Loss: NaN | |
| thread 'main' panicked at /home/erikg/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/cubecl-cuda-0.4.0/src/compute/server.rs:115:22: | |
| called `Result::unwrap()` on an `Err` value: DriverError(CUDA_ERROR_ILLEGAL_ADDRESS, "an illegal memory access was encountered") | |
| stack backtrace: | |
| 0: 0x6449b217ba3a - <std::sys::backtrace::BacktraceLock::print::DisplayBacktrace as core::fmt::Display>::fmt::he089f96442833f67 | |
| 1: 0x6449b21a2f43 - core::fmt::write::h2f210ed4c94745cb | |
| 2: 0x6449b2178cb3 - std::io::Write::write_fmt::h7de08171ab770fb2 | |
| 3: 0x6449b217b882 - std::sys::backtrace::BacktraceLock::print::h810fbd31421329e6 | |
| 4: 0x6449b217c8f0 - std::panicking::default_hook::{{closure}}::hbaad47ed9dc6356d | |
| 5: 0x6449b217c6d0 - std::panicking::default_hook::h24e207139139d40a |