Re: [arch-general] POWER_SUPPLY_CHARGE_FULL(_DESIGN) semantics

2014-08-16 Thread Jakub Klinkovský
On 15.08.14 at 12:27, Chrisitan Burkard wrote:
> ...
> Another issue I have is that the POWER_SUPPLY_STATUS shows 'Unknown' on
> AC but 'Discharging' on Battery. Do you have any idea why? My guess is
> that i3 uses this property to show the battery/AC state in i3status and
> because of the 'Unkown' value I don't get updates on the state there.

The values for POWER_SUPPLY_STATUS on my laptop are:
  - when running on battery, it is always 'Discharging'
  - when running on AC:
  - 'Full' for 100%
  - 'Unknown' for 95%-99%
  - 'Charging' for <95%
Note that my battery is not getting charged if the level is between 95% and 99%
when I plug in AC.

--
jlk


pgpAJ07ZhvDkC.pgp
Description: PGP signature


Re: [arch-general] POWER_SUPPLY_CHARGE_FULL(_DESIGN) semantics

2014-08-16 Thread Curtis Shimamoto
On 08/15/14 at 12:27pm, Chrisitan Burkard wrote:
> I am asking because I am using i3status to show my battery loading state
> and it shows me 58% which would be (CHARGE_NOW / CHARGE_FULL_DESIGN). If
> I understand correctly this doesn't make any sense if I am not able to
> reach the CHARGE_FULL_DESIGN capacity anyways, today.
> 
> So if anyone with a bit more knowledge about this mechanic could confirm
> my guess I would contact upstream what they think about it. (In my
> opinion they should read CHARGE_FULL to determine the current battery %)
> 

See the i3status man page about this.  It can be used either way, but
the default is to use the stated capacity of the battery's design.

> Another issue I have is that the POWER_SUPPLY_STATUS shows 'Unknown' on
> AC but 'Discharging' on Battery. Do you have any idea why? My guess is
> that i3 uses this property to show the battery/AC state in i3status and
> because of the 'Unkown' value I don't get updates on the state there.

No idea about why it would be telling you 'Unknown' sorry.

-- 
Curtis Shimamoto


pgpymVoTJon7M.pgp
Description: PGP signature


Re: [arch-general] [arch-dev-public] linux 3.16 in [testing]

2014-08-16 Thread Carl Schaefer
> >> If you give me a valid use case for USER_NS, I might reconsider, but
> >> every use case I can imagine is crushed by the limitations of the
> >> implementation.
> > 
> > The use case is that you don't need root access to start a container.
> > I can run Firefox with a limited view to the filesystem for example,
> > as a normal user.
> > Or limited view to the network, for ex. just ipv4, just ipv6, just vpn.
> 
> It's not possible to sandbox an X11 application externally, so Firefox
> isn't a good example. The ability to see the contents of every window,
> draw arbitrary stuff in the windows, capture every input event without
> focus, etc. completely breaks it.

has anybody tried Qubes?

  https://qubes-os.org/

it appears to be designed to address that problem:

Qubes implements a Security by Isolation approach by providing
the user with the ability to easily create many security
domains. These domains are implemented as lightweight Virtual
Machines (VMs) running under the Xen hypervisor. Qubes' main
objective is to provide strong isolation between these domains,
so that even if an attacker compromises one of the domains, the
others are still safe. Qubes, however, does not attempt to
provide any security isolation for applications running within
the same domain. For example, a buggy web browser running in a
Qubes domain could still be compromised just as easily as on a
regular Linux distribution. The difference that Qubes makes is
that now the attacker doesn't have access to all the software
running in the other domains.

Qubes also provides a number of mechanisms that make it easy and
convenient for the user to run multiple domains, such as
seamless GUI integration onto one common desktop, secure
clipboard copy and paste between domains, secure file transfer
between domains, disposable VMs, and much more. Qubes also
provides an advanced networking infrastructure that allows for
the creation of multiple network VMs (which isolate all the
world-facing networking stacks) and proxy VMs which can be used
for advanced VPN and tunnelling over untrusted connections.