similar to: Re: passthrough of PCI-device

Displaying 20 results from an estimated 1100 matches similar to: "Re: passthrough of PCI-device"

2014 Oct 13
2
Re: passthrough of PCI-device
Hi Pierre, thanks for your reply. I am using kernel 3.10.0-123.8.1.el7.x86_64. The kernel modul used after nodedev-detach is vfio-pci This is the output of lspci -vv after I did a virsh nodedev-detatch pci_0000_02_00_0 02:00.0 Ethernet controller: PLX Technology, Inc. Device 235e Subsystem: PLX Technology, Inc. Device 235e Control: I/O- Mem- BusMaster- SpecCycle- MemWINV-
2014 Oct 07
0
passthrough of PCI-device
Hello, I try to passthrough a PCI-card to a VM named testvm I want to do that with an xml-file named hga.xml including the following content: <hostdev mode='subsystem' type='pci' managed='yes'> <source> <address domain='0x0' bus='0x1' slot='0x00' function='0x0'/> </source> </hostdev> When I execute
2014 Oct 13
0
Re: passthrough of PCI-device
Dear Michael, Did you activate the Intel IO MMU (or its equivalent for AMD)? Also, did you load the pci_stub module for Linux? It is mandatory (it will replace current driver for your passed through hardware). Cheers, Pierre On 10/13/2014 07:54 AM, Weis, Michael (DWIE) wrote: > Good morning, > > there is a typo in my description; > the line > <address
2014 Oct 13
0
Re: passthrough of PCI-device
And what about IO MMU ? On 10/13/2014 12:02 PM, Weis, Michael (DWIE) wrote: > Hi Pierre, > > thanks for your reply. > > I am using kernel 3.10.0-123.8.1.el7.x86_64. > The kernel modul used after nodedev-detach is vfio-pci > > This is the output of lspci -vv after I did a virsh nodedev-detatch pci_0000_02_00_0 > > 02:00.0 Ethernet controller: PLX Technology, Inc.
2023 Nov 28
1
computer algebra in R
Dear all, I'm currently working on converting mathematica code (https://github.com/ASDSE/thermosimfit/blob/master/Packages/thermoHD-Comp/thermoCacheHD-1Comp.m) to R. The code is related to solve algebraic systems. > eqthermo = {h0 == h + hd + hga, d0 == d + hd, ga0 == ga + hga, kga == > ???? hga / (h * ga), kd == hd / (h * d)}; > > (* IDA HD*) > sthdIDAcacheHD[fkd_, fkga_,
2010 Mar 19
1
cupsaddsmb error: cli_pipe_validate_current_pdu: RPC fault code DCERPC_FAULT_OP_RNG_ERROR received
Hello, when i send the SIGHUP signal to Samba, then Samba won't load the printers from CUPS. I need to shutdown Samba and start it again. Now when i'am running cupsaddsmb i got the following errors(this error occours in 3.5.x but not in 3.2.x): server-p:/# cupsaddsmb -H server-p -v edv01 edv02 edv03 Kennwort f?r root erforderlich, um ?ber SAMBA auf server-p zugreifen zu k?nnen:
2004 Apr 24
5
Modalwert
Hai - kann mir jemand sagen, wie ich den Modalwert in R berechne?! IRgendwie finde ich den Befehl nicht.... greetz und herzlichen Dank Sonja
2016 Apr 18
5
[PATCH RFC 0/3] virtio-pci: iommu support
This is an attempt to allow enabling IOMMU for DMA. Design: - new feature bit IOMMU_PLATFORM which means host won't bypass IOMMU - virtio core uses DMA API if it sees IOMMU_PLATFORM - add quirk for vfio to disable device unless IOMMU_PLATFORM is set or the no-iommu mode is enabled - while I'm not sure how it will be used, it seems like a good idea to also have
2016 Apr 18
5
[PATCH RFC 0/3] virtio-pci: iommu support
This is an attempt to allow enabling IOMMU for DMA. Design: - new feature bit IOMMU_PLATFORM which means host won't bypass IOMMU - virtio core uses DMA API if it sees IOMMU_PLATFORM - add quirk for vfio to disable device unless IOMMU_PLATFORM is set or the no-iommu mode is enabled - while I'm not sure how it will be used, it seems like a good idea to also have
2016 Aug 30
4
[PATCH v2 2/2] vfio: add virtio pci quirk
On Tue, 30 Aug 2016 05:27:17 +0300 "Michael S. Tsirkin" <mst at redhat.com> wrote: > Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM > to signal they are safe to use with an IOMMU. > > Without this bit, exposing the device to userspace is unsafe, so probe > and fail VFIO initialization unless noiommu is enabled. > > Signed-off-by: Michael S.
2016 Aug 30
4
[PATCH v2 2/2] vfio: add virtio pci quirk
On Tue, 30 Aug 2016 05:27:17 +0300 "Michael S. Tsirkin" <mst at redhat.com> wrote: > Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM > to signal they are safe to use with an IOMMU. > > Without this bit, exposing the device to userspace is unsafe, so probe > and fail VFIO initialization unless noiommu is enabled. > > Signed-off-by: Michael S.
2012 Oct 07
1
Why do I get different results for type III anova using the drop1 or Anova command?
Dear experts, I just noticed that I get different results conducting type III anova using drop1 or the Anova command from the car package. I suppose I made a mistake and hope you can offer me some help. I have no idea where I got wrong and would be very grateful for explaination as R is new terrain for me. If I run the commands in line, they produce the same results. But if I run them in
2016 Aug 30
2
[PATCH v2 2/2] vfio: add virtio pci quirk
On Mon, 29 Aug 2016 21:52:20 -0600 Alex Williamson <alex.williamson at redhat.com> wrote: > On Mon, 29 Aug 2016 21:23:25 -0600 > Alex Williamson <alex.williamson at redhat.com> wrote: > > > On Tue, 30 Aug 2016 05:27:17 +0300 > > "Michael S. Tsirkin" <mst at redhat.com> wrote: > > > > > Modern virtio pci devices can set
2016 Aug 30
2
[PATCH v2 2/2] vfio: add virtio pci quirk
On Mon, 29 Aug 2016 21:52:20 -0600 Alex Williamson <alex.williamson at redhat.com> wrote: > On Mon, 29 Aug 2016 21:23:25 -0600 > Alex Williamson <alex.williamson at redhat.com> wrote: > > > On Tue, 30 Aug 2016 05:27:17 +0300 > > "Michael S. Tsirkin" <mst at redhat.com> wrote: > > > > > Modern virtio pci devices can set
2016 Aug 30
6
[PATCH v2 0/2] vfio: blacklist legacy virtio devices
Legacy virtio devices always bypassed an IOMMU, so using them with vfio was never safe. This adds a quirk detecting these and disabling VFIO unless the noiommu mode is used. At the moment, this only applies to virtio-pci devices. The patch might make sense on stable as well. Michael S. Tsirkin (2): vfio: report group noiommu status vfio: add virtio pci quirk
2016 Aug 30
6
[PATCH v2 0/2] vfio: blacklist legacy virtio devices
Legacy virtio devices always bypassed an IOMMU, so using them with vfio was never safe. This adds a quirk detecting these and disabling VFIO unless the noiommu mode is used. At the moment, this only applies to virtio-pci devices. The patch might make sense on stable as well. Michael S. Tsirkin (2): vfio: report group noiommu status vfio: add virtio pci quirk
2023 Dec 04
1
Fit NLE - was: computer algebra in R
Fit NLE - was: [R] computer algebra in R Original post: https://stat.ethz.ch/pipermail/r-help/2023-November/478619.html Dear Kornad, I think I have started to understand what you try to achieve. The problem is to fit a NLE and compute the parameters of the NL-Eq. I have included the R Help-list back in the loop, as I am not an expert in optimization. Goal: y ~ I0 + IHD * hd + ID * d; where: y
2012 Oct 18
1
PCI device not properly reset after VFIO
Hi Alex, I've been playing around with VFIO and megasas (of course). What I did now was switching between VFIO and 'normal' operation, ie emulated access. megasas is happily running under VFIO, but when I do an emergency stop like killing the Qemu session the PCI device is not properly reset. IE when I load 'megaraid_sas' after unbinding the vfio_pci module the driver
2012 Oct 18
1
PCI device not properly reset after VFIO
Hi Alex, I've been playing around with VFIO and megasas (of course). What I did now was switching between VFIO and 'normal' operation, ie emulated access. megasas is happily running under VFIO, but when I do an emergency stop like killing the Qemu session the PCI device is not properly reset. IE when I load 'megaraid_sas' after unbinding the vfio_pci module the driver
2016 Apr 18
1
[PATCH RFC 3/3] vfio: add virtio pci quirk
On Mon, 18 Apr 2016 12:58:28 +0300 "Michael S. Tsirkin" <mst at redhat.com> wrote: > Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM > to signal they are safe to use with an IOMMU. > > Without this bit, exposing the device to userspace is unsafe, so probe > and fail VFIO initialization unless noiommu is enabled. > > Signed-off-by: Michael S.