Signal: @timclicks.01
export COMPLETIONS=~/.config/fish/completions
mkdir -p $COMPLETIONS
rustup completions fish >> $COMPLETIONS/rustup
rustup completions fish cargo >> $COMPLETIONS/cargo
export COMPLETIONS=~/.config/fish/completions
mkdir -p $COMPLETIONS
rustup completions fish >> $COMPLETIONS/rustup
rustup completions fish cargo >> $COMPLETIONS/cargo
export COMPLETIONS=$(brew --prefix)/etc/bash_completion.d
mkdir -p $COMPLETIONS
rustup completions bash >> $COMPLETIONS/rustup
rustup completions bash cargo >> $COMPLETIONS/cargo
export COMPLETIONS=$(brew --prefix)/etc/bash_completion.d
mkdir -p $COMPLETIONS
rustup completions bash >> $COMPLETIONS/rustup
rustup completions bash cargo >> $COMPLETIONS/cargo
export COMPLETIONS=~/.local/share/bash-completion/completions
mkdir -p $COMPLETIONS
rustup completions bash >> $COMPLETIONS/rustup
rustup completions bash cargo >> $COMPLETIONS/cargo
export COMPLETIONS=~/.local/share/bash-completion/completions
mkdir -p $COMPLETIONS
rustup completions bash >> $COMPLETIONS/rustup
rustup completions bash cargo >> $COMPLETIONS/cargo
If you have questions, do ask them :)
p.s. If you've discovered the thread through the algorithm, you're welcome to follow me for more info on programming with Rust and more.
If you have questions, do ask them :)
p.s. If you've discovered the thread through the algorithm, you're welcome to follow me for more info on programming with Rust and more.
That's because it's actually safe to create uninitialized values, and to write to them, but not to read from them.
That's because it's actually safe to create uninitialized values, and to write to them, but not to read from them.
Nothing good.
In my testing, the compiler generated code that provoked the CPU to fault due to an illegal instruction.
Nothing good.
In my testing, the compiler generated code that provoked the CPU to fault due to an illegal instruction.
If you make a mistake, Rust will trust you. That's a problem, as it will make decisions about what code to generate based on the assumption that undefined behavior is impossible.
If you make a mistake, Rust will trust you. That's a problem, as it will make decisions about what code to generate based on the assumption that undefined behavior is impossible.
The unsafe keyword shifts responsibility for upholding Rust's rules from the compiler to the programmer.
The unsafe keyword shifts responsibility for upholding Rust's rules from the compiler to the programmer.
The &i32 type is a reference to an integer.
So, when used with &32, MaybeUninit::zeroed() essentially creates a null pointer by design.
The &i32 type is a reference to an integer.
So, when used with &32, MaybeUninit::zeroed() essentially creates a null pointer by design.
MaybeUninit::zeroed() fills that space with zero bits.
For many (most?) types, that's an excellent default. But...
MaybeUninit::zeroed() fills that space with zero bits.
For many (most?) types, that's an excellent default. But...