I did PCI passthrough on Archlinux and Debian with the old PCI-stub method (this was pre-4.0 era). And later I did PCI passthrough on the 4.1+ kernels on Arch and Ubuntu (16.10 I think?).
This is my attempt at doing the same on Nixos.
I did PCI passthrough on Archlinux and Debian with the old PCI-stub method (this was pre-4.0 era). And later I did PCI passthrough on the 4.1+ kernels on Arch and Ubuntu (16.10 I think?).
This is my attempt at doing the same on Nixos.
<!DOCTYPE html> | |
<html lang="pt-BR"> | |
<head> | |
<meta chatset="UTF-8" /> | |
<title>CSS Progress Bar</title> | |
<style> | |
.wrapper { | |
width: 500px; | |
} |
Introduction: I was trying to run some neuroscience image processing commands that uses NVIDIA GPU. The challenge is that most of our computation will be run inside an LXC container running Ubuntu 16.04 (the host runs Ubuntu 16.04 as well). Installing the NVIDIA driver on the host is not so hard, but doing it inside the LXC container is much more challenging.
I already have an unprivileged container running, so I will not repeat the steps to create an LXC container here.
Our graphics card is NVIDIA GeForce GTX 1080 Ti.
Here are the main steps:
I did PCI passthrough on Archlinux and Debian with the old PCI-stub method (this was pre-4.0 era). And later I did PCI passthrough on the 4.1+ kernels on Arch and Ubuntu (16.10 I think?).
This is my attempt at doing the same on Nixos.
@echo off | |
set /p Y=Enter adb.exe folder path: | |
cd /d %Y% | |
adb devices | |
pause | |
for %%X in ( | |
"com.amazon.appmanager" | |
"com.android.browser" | |
"com.android.chrome" | |
"com.android.email" |
Still experimental...
Assume that the unprivileged container test
already exists. We want a privileged container called test2
to have the same rootfs
as test
.
Create a privileged container first. Probably need to be the exact same OS as test1
!
Add on top of default.nix: with import {};
or simply run as nix-build ''
(i. e. for nix-build complaining) or rather nix-build -E 'with import {}; callPackage ./default.nix {}'
(or even import)
{ pkgs ? import <nixpkgs> {} }: | |
let | |
# To use this shell.nix on NixOS your user needs to be configured as such: | |
# users.extraUsers.adisbladis = { | |
# subUidRanges = [{ startUid = 100000; count = 65536; }]; | |
# subGidRanges = [{ startGid = 100000; count = 65536; }]; | |
# }; |