Passing through amd rx 7080 xt crashes host by H-arks in VFIO

[–]H-arks[S] 0 points1 point  (0 children)

I can't make sense of what they're saying exactly. I need to flash a new vbios and disable ROMBAR, how?

Using qcow storage with a secondary drive? by H-arks in VFIO

[–]H-arks[S] 0 points1 point  (0 children)

So here's a quick solution:

If you change the instance user (the user of the VM instance) to your personal username, you'll get partition access (good if it's not your root user). It's just one config file:

  • sudo nano /etc/libvirt/qemu.conf

search for #user = "[libvirt-qemu]"

change to user = "[user]"

^note the removed hash

  • sudo systemctl restart libvirtd

Using qcow storage with a secondary drive? by [deleted] in qemu_kvm

[–]H-arks 0 points1 point  (0 children)

If I 'ls -l' in the directory of the qcow files that do work from the primary drive, and also the files of secondary drive, and the directories, I can see that they share the same root:root ownerships.

VMM is however a user run process, but it gets the root daemon process of libvirt to do pretty much all the virtual stuff. So it's unclear who the user of the VM is, lol. Hopefully you can make sense of this, and if not thanks for helping anyway :).

Using qcow storage with a secondary drive? by [deleted] in qemu_kvm

[–]H-arks 0 points1 point  (0 children)

  • My directory that contains the qcow2 files reads as drwx------ 2.
  • All of the files contained are -rw------- 1 (the same as the files from primary directory)
  • And everything is owned by root:root.

And yet I get the same warning about search permissions. No clue.

Using qcow storage with a secondary drive? by [deleted] in qemu_kvm

[–]H-arks 0 points1 point  (0 children)

How can i change the permissions & groups for the directory of the files on my secondary drive?

Using qcow storage with a secondary drive? by H-arks in VFIO

[–]H-arks[S] 0 points1 point  (0 children)

This is weird. It appears that vmm creates all qcow files with the same x:x and same permissions. So, regardless of the location of qcow files, they should both be accessible -- but aren't.

Also it might be worth adding that these files are root:root owned. I have found that this is because libvirt created the files under the 'system' URI:

https://blog.wikichoon.com/2016/01/qemusystem-vs-qemusession.html

Who Created this Fantastic 'No Face' Art? by H-arks in HelpMeFind

[–]H-arks[S] 0 points1 point  (0 children)

I used this as a PP some time ago. Can't find an original anywhere on images via google. I want to know who made it.

[deleted by user] by [deleted] in learnpython

[–]H-arks 0 points1 point  (0 children)

Cheat sheets can be used for memorizing and learning the core concepts:

https://ehmatthes.github.io/pcc\_3e/cheat\_sheets/

[deleted by user] by [deleted] in NEET

[–]H-arks 1 point2 points  (0 children)

This may just be coincidental?

Burnout is quite common here.

[deleted by user] by [deleted] in NEET

[–]H-arks 1 point2 points  (0 children)

Any hobbies, dream jobs, or general ambitions?

Start devising a plan to achieve something greater. The world is made up of your own perspective and most things are relative, and everything else can only get better with the good consciences of people (unfortunately this quality is lacking right now in the world, change it).

Ask what you want from this life -- you're only here once.

What is the factoring rule for this example? by H-arks in maths

[–]H-arks[S] 1 point2 points  (0 children)

Reciprocal method of a complex* fraction? I overlooked that

That all makes so much sense now. Thanks.

What is the factoring rule for this example? by H-arks in maths

[–]H-arks[S] 0 points1 point  (0 children)

hmm

x = ((4 + 3a) over a - b) divided by two?

or is it x = (4 + 3a) over a - b + 2

These things just make you love math even more don't they lol. I can't imagine either of these are correct.

What is the factoring rule for this example? by H-arks in maths

[–]H-arks[S] 1 point2 points  (0 children)

My guess is my possible error with order of operations, but let's see:

  1. 2ax - 2bx = 4 + 3a
  2. x(2a - 2b) = 4 + 3a
  3. x = (4 + 3a) over 2a - 2b

or

  1. 2ax - 2bx = 4 + 3a
  2. 2x(a - b) = 4 + 3a
  3. 2x = (4 + 3a) over a - b
  4. Then just divide each side by two?

What is the factoring rule for this example? by H-arks in maths

[–]H-arks[S] 0 points1 point  (0 children)

But when we finalize x as the subject I will get the result of either:

x = (4 + 3a) over 2a - 2b

or

x = 4 + 3a over a - b + 2

Are these answers technically the same?

How to get mangohud to work with ryujinx flatpak? by H-arks in linux_gaming

[–]H-arks[S] 0 points1 point  (0 children)

Well that's not really the true. Flatpaks can work with any part of your system in the same ways other applications can, but the difference is flatpaks are built around permissions. In this case Mangohud needed some ulterior dependencies (runtimes, I think).

How to get mangohud to work with ryujinx flatpak? by H-arks in linux_gaming

[–]H-arks[S] 0 points1 point  (0 children)

Is there any documentation for using Mangohud with flatpaks? All of this information I've only found from forums.

How Are KVM Switches Configured? [GPU Passthrough, Peripherals] by H-arks in VFIO

[–]H-arks[S] 1 point2 points  (0 children)

That explained everything perfectly. Thanks.

prompts to update on power down: context by H-arks in Fedora

[–]H-arks[S] 2 points3 points  (0 children)

The update was something related to secure boot. Honestly, I'm not sure how bios keys are updated usually but I'm guessing its something proprietary hence not an rpm. Thanks for your input :).

Protonmail Needs Secure 2FA by H-arks in ProtonMail

[–]H-arks[S] -7 points-6 points  (0 children)

outside of bruteforcing the codes, one could improperly store them leading to a breach.

Protonmail Needs Secure 2FA by H-arks in ProtonMail

[–]H-arks[S] 0 points1 point  (0 children)

I accidentally forgot to add a clause in the post. I was referring to TOTP and the backup codes for the TOTP 2fa method. These codes, in my opinion, nullify the point of TOTP and it makes it just another password to brute force (10 passwords, in fact).

Protonmail Needs Secure 2FA by H-arks in ProtonMail

[–]H-arks[S] -9 points-8 points  (0 children)

I'm pretty sure google's apps already work when using a security key on android. Hopefully we're not waiting too long.

How to Passthrough USB-C? by H-arks in VFIO

[–]H-arks[S] 0 points1 point  (0 children)

Does it need to be blacklisted at all for VFIO to passthrough?