I hereby claim:
- I am ekg on github.
- I am ekg (https://keybase.io/ekg) on keybase.
- I have a public key ASBqVDBiA6DmXf7cj1k6CHy4DTYQnbAO-C4vZJcFZFwRlAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
foxdot-cli.py
in the same directory as the FoxDot installaton (in case you're using virtualenv
, otherwise comment from lines 5 to 7)foxdot-mode.el
to ~/.emacs.d/lisp
(defvar foxdot-cli-path "/path/to/foxdot-cli/")
in your ~/.emacs
fileM-x load-library
and complete with foxdot-mode
C-c C-f
or M-x foxdot-start
to startC-c C-e
or M-x foxdot-execute
to evaluate a line or a block of code#!/usr/bin/python | |
import sys; | |
import pysam | |
bamFile = sys.argv[1]; | |
bamFP = pysam.Samfile(bamFile, "rb"); |
⠠ [00:00:14] [############################>-----------] 45/64 (6s) - Chunk 45/64, Loss: NaN | |
thread 'main' panicked at /home/erikg/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/cubecl-cuda-0.4.0/src/compute/server.rs:115:22: | |
called `Result::unwrap()` on an `Err` value: DriverError(CUDA_ERROR_ILLEGAL_ADDRESS, "an illegal memory access was encountered") | |
stack backtrace: | |
0: 0x6449b217ba3a - <std::sys::backtrace::BacktraceLock::print::DisplayBacktrace as core::fmt::Display>::fmt::he089f96442833f67 | |
1: 0x6449b21a2f43 - core::fmt::write::h2f210ed4c94745cb | |
2: 0x6449b2178cb3 - std::io::Write::write_fmt::h7de08171ab770fb2 | |
3: 0x6449b217b882 - std::sys::backtrace::BacktraceLock::print::h810fbd31421329e6 | |
4: 0x6449b217c8f0 - std::panicking::default_hook::{{closure}}::hbaad47ed9dc6356d | |
5: 0x6449b217c6d0 - std::panicking::default_hook::h24e207139139d40a |