<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>PSA Archives - The Passthrough POST</title>
	<atom:link href="/category/PSA/feed/" rel="self" type="application/rss+xml" />
	<link>/category/psa/</link>
	<description>Your baremetal source for virtual news</description>
	<lastBuildDate>Tue, 03 Nov 2020 00:30:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.2</generator>
<site xmlns="com-wordpress:feed-additions:1">140179014</site>	<item>
		<title>PSA: Issues Persist into Kernel 5.2 &#8212; Patches Landing in 5.3</title>
		<link>/psa-issues-persist-into-kernel-5-2-patches-landing-in-5-3/</link>
					<comments>/psa-issues-persist-into-kernel-5-2-patches-landing-in-5-3/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Tyson O'Ham]]></dc:creator>
		<pubDate>Thu, 25 Jul 2019 17:57:54 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Compatibility]]></category>
		<category><![CDATA[Kernel patching]]></category>
		<category><![CDATA[Op-Ed]]></category>
		<category><![CDATA[vfio]]></category>
		<guid isPermaLink="false">/?p=2882</guid>

					<description><![CDATA[<p>As previously reported, many users were having issues with VFIO on the 5.1 kernel series, and those issues have persisted or worsened in kernel 5.2. Users report outright crashes and VMs refusing to boot, usually accompanied by KMODE_EXPECTION_NOT_HANDLED errors. Consider supporting us if you value independent tech news and research. This site will always be  [...]</p>
<p>The post <a rel="nofollow" href="/psa-issues-persist-into-kernel-5-2-patches-landing-in-5-3/">PSA: Issues Persist into Kernel 5.2 &#8212; Patches Landing in 5.3</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/psa-issues-persist-into-kernel-5-2-patches-landing-in-5-3/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2882</post-id>	</item>
		<item>
		<title>Finding a Safe Mac OS GPU for VMs</title>
		<link>/finding-a-safe-mac-os-gpu-for-vms/</link>
					<comments>/finding-a-safe-mac-os-gpu-for-vms/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Tyson O'Ham]]></dc:creator>
		<pubDate>Fri, 19 Jul 2019 18:43:07 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[Hardware reviews]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Hackintosh VM]]></category>
		<category><![CDATA[OSX-KVM]]></category>
		<category><![CDATA[virtualization]]></category>
		<guid isPermaLink="false">/?p=2833</guid>

					<description><![CDATA[<p>One of the most common questions we get is: "what gpu should I use for a Mac OS VM," and it's frankly a hard one to answer. Nvidia is essentially out of the question at this point, assuming you want to use a new release of their operating system, and new AMD cards don't work  [...]</p>
<p>The post <a rel="nofollow" href="/finding-a-safe-mac-os-gpu-for-vms/">Finding a Safe Mac OS GPU for VMs</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/finding-a-safe-mac-os-gpu-for-vms/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2833</post-id>	</item>
		<item>
		<title>HOWTO: Patch Fedora Kernel (feat. AGESA 0.0.7.2+ Fix)</title>
		<link>/agesa_fix_fedora/</link>
					<comments>/agesa_fix_fedora/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Blake Lee]]></dc:creator>
		<pubDate>Sun, 30 Jun 2019 17:14:22 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Software Reviews]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[AGESA]]></category>
		<category><![CDATA[AMD Fix]]></category>
		<category><![CDATA[Fedora]]></category>
		<category><![CDATA[Kernel patching]]></category>
		<guid isPermaLink="false">/?p=2648</guid>

					<description><![CDATA[<p>There are many reasons you might want to patch your kernel. You might need extra security patches. Maybe you need the ACS Override patch to use VFIO, or you have an AMD board with a broken UEFI that you can't downgrade. Consider supporting us if you value independent tech news and research. This site will  [...]</p>
<p>The post <a rel="nofollow" href="/agesa_fix_fedora/">HOWTO: Patch Fedora Kernel (feat. AGESA 0.0.7.2+ Fix)</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/agesa_fix_fedora/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2648</post-id>	</item>
		<item>
		<title>PSA: 5.1 Kernel &#8212; Glitching and Crashes in Passthrough</title>
		<link>/psa-5-1-kernel-glitching-and-crashes-in-passthrough/</link>
					<comments>/psa-5-1-kernel-glitching-and-crashes-in-passthrough/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Tyson O'Ham]]></dc:creator>
		<pubDate>Thu, 27 Jun 2019 15:18:56 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[kvm]]></category>
		<category><![CDATA[Linux kernel]]></category>
		<guid isPermaLink="false">/?p=2573</guid>

					<description><![CDATA[<p>At some point early in the 5.1 branch Linux kernel development cycle, a bug was introduced that caused crashing and graphical glitching in some passthrough systems. No workarounds are currently known without reverting to 5.0 or an LTS kernel branch. Tracking down the bad 5.1 Kernel Commit Consider supporting us if you value independent tech  [...]</p>
<p>The post <a rel="nofollow" href="/psa-5-1-kernel-glitching-and-crashes-in-passthrough/">PSA: 5.1 Kernel &#8212; Glitching and Crashes in Passthrough</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/psa-5-1-kernel-glitching-and-crashes-in-passthrough/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2573</post-id>	</item>
		<item>
		<title>An Open Letter to Linus Tech Tips (and a PSA)</title>
		<link>/an-open-letter-to-linus-tech-tips-and-a-psa/</link>
					<comments>/an-open-letter-to-linus-tech-tips-and-a-psa/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Tyson O'Ham]]></dc:creator>
		<pubDate>Fri, 26 Apr 2019 08:27:36 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Corrections]]></category>
		<category><![CDATA[Journalism]]></category>
		<category><![CDATA[Linus Tech Tips]]></category>
		<category><![CDATA[OSX-KVM]]></category>
		<guid isPermaLink="false">/?p=2086</guid>

					<description><![CDATA[<p>I’d like to start by saying that we appreciate that Linus Tech Tips saw fit to cover (and cite) our work. We appreciate the exposure their recent video gave VFIO and OS X Virtualization, too. We consider any way we can get people involved with our (admittedly niche) community of tech enthusiasts a net positive.  [...]</p>
<p>The post <a rel="nofollow" href="/an-open-letter-to-linus-tech-tips-and-a-psa/">An Open Letter to Linus Tech Tips (and a PSA)</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/an-open-letter-to-linus-tech-tips-and-a-psa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2086</post-id>	</item>
		<item>
		<title>Explaining CSM, efifb=off, and Setting the Boot GPU Manually</title>
		<link>/explaining-csm-efifboff-setting-boot-gpu-manually/</link>
					<comments>/explaining-csm-efifboff-setting-boot-gpu-manually/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Ryan El Kochta]]></dc:creator>
		<pubDate>Sun, 04 Feb 2018 21:42:36 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Software Reviews]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[CSM]]></category>
		<category><![CDATA[host card]]></category>
		<category><![CDATA[ryzen passthrough]]></category>
		<guid isPermaLink="false">/?p=1558</guid>

					<description><![CDATA[<p>Many factors can influence the success of GPU Passthrough. On some newer systems, notably low and mid-end Ryzen platforms, there's a little extra legwork you'll need to do to get your OS to boot with the correct GPU, and the processes that go into making that happen are somewhat complicated. Need help Building your passthrough  [...]</p>
<p>The post <a rel="nofollow" href="/explaining-csm-efifboff-setting-boot-gpu-manually/">Explaining CSM, efifb=off, and Setting the Boot GPU Manually</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/explaining-csm-efifboff-setting-boot-gpu-manually/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1558</post-id>	</item>
		<item>
		<title>Arch Linux Broke OVMF Passthrough, Here&#8217;s How to Fix it</title>
		<link>/arch-linux-broke-ovmf-passthrough-heres-fix/</link>
					<comments>/arch-linux-broke-ovmf-passthrough-heres-fix/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Angelos Kouratzinos]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 21:47:40 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Software Reviews]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[arch]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[OVMF]]></category>
		<guid isPermaLink="false">/?p=1437</guid>

					<description><![CDATA[<p>If you use Arch Linux and OVMF, you may have noticed that a recent update broke compatibility with your passthrough VM(s.) Luckily, we're here to explain why this happened, and (hopefully) how to fix it. While many guides online haven't been tweaked yet to represent the change, this update presents a serious problem. The default  [...]</p>
<p>The post <a rel="nofollow" href="/arch-linux-broke-ovmf-passthrough-heres-fix/">Arch Linux Broke OVMF Passthrough, Here&#8217;s How to Fix it</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/arch-linux-broke-ovmf-passthrough-heres-fix/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1437</post-id>	</item>
		<item>
		<title>Fix for Threadripper PCI Passthrough Submitted to Linux Kernel</title>
		<link>/fix-threadripper-pci-passthrough-submitted-linux-kernel/</link>
					<comments>/fix-threadripper-pci-passthrough-submitted-linux-kernel/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Ryan El Kochta]]></dc:creator>
		<pubDate>Sat, 27 Jan 2018 23:15:30 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[Linux Gaming]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[PSA]]></category>
		<guid isPermaLink="false">/?p=1461</guid>

					<description><![CDATA[<p>AMD's Threadripper platform has proven buggy and problematic for Passthrough VMs. Luckily, Geoffrey McRae, known by his username gnif, recently submitted a fix to the Linux kernel developers for the company's HEDT flagship. When the patch lands downstream, TR will be uniquely poised as a powerful virtualization platform, as the highest-end Threadripper currently available sports  [...]</p>
<p>The post <a rel="nofollow" href="/fix-threadripper-pci-passthrough-submitted-linux-kernel/">Fix for Threadripper PCI Passthrough Submitted to Linux Kernel</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/fix-threadripper-pci-passthrough-submitted-linux-kernel/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1461</post-id>	</item>
		<item>
		<title>Explainer &#8211; Why and When Modprobe and VFIO-PCI Is Needed</title>
		<link>/explainer-modprobe-vfio-pci-needed/</link>
					<comments>/explainer-modprobe-vfio-pci-needed/#disqus_thread</comments>
		
		<dc:creator><![CDATA[D Hanson]]></dc:creator>
		<pubDate>Sun, 14 Jan 2018 16:06:56 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Opinion]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[Software Reviews]]></category>
		<category><![CDATA[driver issues]]></category>
		<category><![CDATA[libvirt]]></category>
		<category><![CDATA[passthrough]]></category>
		<category><![CDATA[qemu]]></category>
		<category><![CDATA[vfio-pci]]></category>
		<guid isPermaLink="false">/?p=1294</guid>

					<description><![CDATA[<p>For quite some time now various guides on the internet have told us to use modprobe rules on most devices when doing PCI and VGA(GPU) pass-through. While in most use cases you will need to pre-bind your device to vfio-pci, or blacklist the kernel module beforehand, due to libvirt not wanting to dynamically re-bind with  [...]</p>
<p>The post <a rel="nofollow" href="/explainer-modprobe-vfio-pci-needed/">Explainer &#8211; Why and When Modprobe and VFIO-PCI Is Needed</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/explainer-modprobe-vfio-pci-needed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1294</post-id>	</item>
		<item>
		<title>Essential Kernel Update for AMD VFIO Users</title>
		<link>/essential-kernel-update-for-amd-vfio-users/</link>
					<comments>/essential-kernel-update-for-amd-vfio-users/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Blake Lee]]></dc:creator>
		<pubDate>Tue, 12 Dec 2017 18:49:20 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[PSA]]></category>
		<category><![CDATA[AGESA]]></category>
		<category><![CDATA[linux fixes]]></category>
		<category><![CDATA[nested page tables]]></category>
		<category><![CDATA[Ryzen]]></category>
		<guid isPermaLink="false">/?p=370</guid>

					<description><![CDATA[<p>If you own, or want to own, an AMD processor and use virtualization with GPU Pass-through you might already know about the NPT bug. Nested Page Tables is a feature that is enabled by default with virtualization in KVM. The aim is for better performance over an emulated page table. Read also: Binding a GPU  [...]</p>
<p>The post <a rel="nofollow" href="/essential-kernel-update-for-amd-vfio-users/">Essential Kernel Update for AMD VFIO Users</a> appeared first on <a rel="nofollow" href="/">The Passthrough POST</a>.</p>
]]></description>
		
					<wfw:commentRss>/essential-kernel-update-for-amd-vfio-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">370</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 91/291 objects using disk
Page Caching using disk 
Minified using disk

Served from: passthroughpo.st @ 2023-05-24 22:09:45 by W3 Total Cache
-->