[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-08-21 Thread cyrinux
Le lundi 14 août 2017 00:29:41 UTC+2, Yethal a écrit :
> W dniu niedziela, 13 sierpnia 2017 22:45:01 UTC+2 użytkownik Grzesiek 
> Chodzicki napisał:
> > W dniu niedziela, 13 sierpnia 2017 14:17:33 UTC+2 użytkownik Epitre napisał:
> > > Le dimanche 13 août 2017 09:41:53 UTC+2, Foppe de Haan a écrit :
> > > > On Sunday, August 13, 2017 at 9:38:06 AM UTC+2, Epitre wrote:
> > > > > Le dimanche 13 août 2017 09:19:25 UTC+2, Epitre a écrit :
> > > > > > Le dimanche 13 août 2017 07:24:29 UTC+2, Foppe de Haan a écrit :
> > > > > > > For any newcomers: can you tell me if this covers all the bases? 
> > > > > > > https://github.com/0spinboson/qubes-doc/blob/patch-1/managing-os/compiling-your-own-kernel.md
> > > > > > > (or if not, what's missing?)
> > > > > > 
> > > > > > Hi,
> > > > > > 
> > > > > > It seems right for me. Just a a comment for the version in 
> > > > > > devel-4.11, the last working version (at least for me, and need to 
> > > > > > be confirmed) is 4.11.8:
> > > > > > 
> > > > > > The 4.11.12 has a Xen bug which has to be fixed and prevent Xen to 
> > > > > > work.
> > > > > > The 4.12.5 has also the same bug but need to have also 3 patches 
> > > > > > updated.
> > > > > > 
> > > > > > In both cases, qubes-core status:
> > > > > > 
> > > > > > août 11 21:37:07 dom0 startup-misc.sh[2712]: xenstore-write: 
> > > > > > xs_open: No such file or directory
> > > > > > août 11 21:37:07 dom0 startup-misc.sh[2712]: xenstore-write: 
> > > > > > xs_open: No such file or directory
> > > > > > août 11 21:37:07 dom0 startup-misc.sh[2712]: xc: error: Could not 
> > > > > > obtain handle on privileged command interface (2 = No such file or 
> > > > > > directory): Internal error
> > > > > > août 11 21:37:07 dom0 startup-misc.sh[2712]: libxl: error: 
> > > > > > libxl.c:116:libxl_ctx_alloc: cannot open libxc handle: No such file 
> > > > > > or directory
> > > > > > août 11 21:37:07 dom0 startup-misc.sh[2712]: cannot init xl context
> > > > > > 
> > > > > > I will dig more into the problem in the next week but if someone 
> > > > > > would like to test to confirm or not, it would help.
> > > > > > 
> > > > > > Moreover, for those who have problem with NOUVEAU driver (see my 
> > > > > > first post asking help: 
> > > > > > https://groups.google.com/d/msg/qubes-devel/koDHzHJICEs/M5B19MBgCgAJ)
> > > > > >  and their GTX970 with 4G of VRAM, I patched the qubes kernel 
> > > > > > (https://github.com/fepitre/qubes-linux-kernel) for version 4.9 and 
> > > > > > 4.11. The major problem is in the computation of VRAM which has 
> > > > > > been completely remade and solved in kernel 4.12.
> > > > > 
> > > > > Sorry for the quick updates but writing the message it came to mind 
> > > > > that it would maybe something related to Grub...and yes...I boot the 
> > > > > my dev machine and I don't know why but the grub conf was badly 
> > > > > updated...
> > > > > 
> > > > > I can confirm that the lastest working version is 4.11.12. I will 
> > > > > also update properly my repo for the patches in devel-4.12.
> > > > 
> > > > np. I had a look, but didn't see any error messages akin to yours 
> > > > (running 4.11.12). 4.12.6 indeed only built for me if I disabled 3 
> > > > kernel patches, 1 related to xsa155.
> > > 
> > > Now building and running properly kernel-4.12 is ok. I pushed on my 
> > > devel-4.12 branch the updated 3 kernel patches who failed at first 
> > > instance (rewrite in the kernel sources to obtain properly updated lines).
> > > 
> > > We can now go on the next releases (especially if someone like has Ryzen 
> > > or Kaby Lake CPU or latest NVIDIA cards).
> > 
> > Interestingly enough, your 4.12 branch compiles fine in the AppVM 
> > previously used to (unsuccessfully) compile Reg's 4.11 kernel.
> 
> Just booted into the 4.12 slim kernel. Works great so far.
> I use Reg's slim config as a baseline and then as much stuff I safely could. 
> Final kernel size is 44mb. I can paste the final config here if anybody's 
> interested.

Hi, I'm interested :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2baf3734-c64d-488c-9062-2e47e1decdc3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)

2017-08-20 Thread cyrinux
It is a dock in thunderbolt*

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cdf896e-19c0-46f3-8bed-0372b94ae318%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)

2017-08-20 Thread cyrinux
Hi,

I have successfully install qubes-os 3.2 and 4.0 on this new laptop, I must 
build hid_alps for get the touchpad working.

All was almost good but, the big big problem, is i can't working with the dock.

I don't find how to play correctly with

http://www.dell.com/en-us/shop/dell-dock-wd15-with-180w-adapter/apd/450-aeuo/pc-accessories

* display output are working,
* the network and usb are NOT working, i can't attach them to  the 
sys-usb/sys-net VM,
is see sort of 4 "bridges" in devices list, i suppose for usb and network but 
this is not clear. If I valid the form after enable those bridge, i get an 
error.

Somebody allready get working a such device? Thanks for your help.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a5c568a-8abc-410f-a9f6-4a07f4fd8906%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Lenovo ThinkPad T450s 20BX001LUS

2017-08-14 Thread cyrinux
Le dimanche 13 août 2017 19:49:50 UTC+2, Malin Fylking a écrit :
> Hello, will 
> https://www.amazon.com/Lenovo-ThinkPad-20BX001LUS-14-Inch-Laptop/dp/B00TO8IYV6
> be able to run qubes?
> Best regards Malin

yes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4bdd690c-d824-4af5-b6ba-c46e2279e08c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Xorg and Oom killer, i3

2017-07-15 Thread cyrinux
Sorry, and i use last 3.2 version, fully updated, some debian/fedora/whonix 
qubes.

Le samedi 15 juillet 2017 19:55:16 UTC+2, cyrinux a écrit :
> Hi,
> I have 20gb memory, but I use a lot of VM.
> Sometimes xorg is randomly kill.
> I would like to protect xorg from being killed. I'm trying to play with 
> overcommit but is it a good idea?
> Must I boot dom0 minimal memory?
> 
> Bonus: after a xorg crash, I can't reconnect to guid daemon. How to do? I use 
> i3, is it a i3 problem?
> Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac93bc6b-254f-4e39-b0a5-3f05b6576b38%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Xorg and Oom killer, i3

2017-07-15 Thread cyrinux
Le samedi 15 juillet 2017 20:20:55 UTC+2, Noor Christensen a écrit :
> On Sat, Jul 15, 2017 at 10:55:16AM -0700, cyrinux wrote:
> > Hi,
> > I have 20gb memory, but I use a lot of VM.
> > Sometimes xorg is randomly kill.
> > I would like to protect xorg from being killed. I'm trying to play with 
> > overcommit but is it a good idea?
> > Must I boot dom0 minimal memory?
> > 
> > Bonus: after a xorg crash, I can't reconnect to guid daemon. How to do? I 
> > use i3, is it a i3 problem?
> > Regards
> 
> What version of Qubes are you running on your dom0?
> 
> By "using a lot of VM", do you mean virtual memory or virtual machines?
> For clarity, I will use the term meaning the latter, and "virtual
> memory" when referring to the former.
> 
> Just want to make clear since the topic makes it a bit ambiguous :-)
> 
> Is it your dom0 Xorg process that is being killed, or one that is
> running in a VM?
> 
> You might want to take a look at how your resources are being used by
> dom0 and any running VMs. Run "xentop" in a dom0 terminal for a nice
> realtime summary.
> 
> -- noor
> 
> |_|O|_|
> |_|_|O|  Noor Christensen  
> |O|O|O|  n...@fripost.org ~ 0x401DA1E0

Hi Noor,
By VM, i mean Virtual Machine (we can say Qubes), I have at minimum 15 Qubes 
running.
It is xorg in dom0 which is killed, I type 'dmesg' in dom0 terminal and see it 
is killed.
I will retry to play with xentop. In idle my dom0 use 700MB (and 2200MB 
cache)/~3000MB.
About reconnect to guid, before i use 'qvm-run --all true' to reconnect to 
them, but after this OOM this doesn't work. Do you have an idea?

Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d6ce952-cc22-4efd-9da6-4c78dadc85b8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Xorg and Oom killer, i3

2017-07-15 Thread cyrinux
Hi,
I have 20gb memory, but I use a lot of VM.
Sometimes xorg is randomly kill.
I would like to protect xorg from being killed. I'm trying to play with 
overcommit but is it a good idea?
Must I boot dom0 minimal memory?

Bonus: after a xorg crash, I can't reconnect to guid daemon. How to do? I use 
i3, is it a i3 problem?
Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a964a0d8-4f25-44c4-bef2-e9224e8c0519%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to restart qubes-guid after a OOM?

2017-06-07 Thread cyrinux
Hi,

I'm using i3, and sometimes, after start a lot a VM, oomkiller kill my session, 
I'm redirect to lightdm, when I reconnect me, all vms in qubes-manager are 
yellow, not green.
I tried "qvm-run --all true" but this doesn't help me, openned windows not come 
back.

How can I manage this issue without lose, if I don't want to reboot?

Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7ec9aff-edb7-490c-a6b5-f1a72d16cc93%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Request for feedback: 4.9 Kernel

2017-05-24 Thread cyrinux
Thanks I have done this, i will try next 4.9.29 ;)

Le mercredi 24 mai 2017 20:43:11 UTC+2, Reg Tiangha a écrit :
> On 05/24/2017 12:37 PM, cyrinux wrote:
> > Hi,
> >
> > I have a T450s, and it works well, just this:
> >
> > Seems to have a problem for me, i often miss wireless after suspend.
> > I need to stop firewall and wlan vm to reload iwlwifi driver.
> > No easy to unload iwlwifi, faster to stop and start.
> > I don't remember i have this problem before.
> >
> > No other problems.
> >
> > Thx
> 
> Thanks for the feedback. There should be a work-around in the next
> kernel release, so keep an eye out for a 4.9.29 or higher to appear in
> one of the Qubes repositories and try that one when it comes out. I
> *think* the kernel workaround will work, but it could use some testing
> when it's out.
> 
> In the meantime, you can also work around it locally by blacklisting the
> iwlwifi power management module. In your sys-net, edit
> /rw/config/suspend-module-blacklist and add:
> 
> iwlmvm iwlwifi
> 
> and then reboot the vm. According to other people, that should make the
> wifi stuff work again too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bcae4d8-546d-4ad3-8b5e-a8ee6b53b27b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Request for feedback: 4.9 Kernel

2017-05-24 Thread cyrinux
Hi,

I have a T450s, and it works well, just this:

Seems to have a problem for me, i often miss wireless after suspend.
I need to stop firewall and wlan vm to reload iwlwifi driver.
No easy to unload iwlwifi, faster to stop and start.
I don't remember i have this problem before.

No other problems.

Thx

Le samedi 20 mai 2017 21:42:50 UTC+2, Reg Tiangha a écrit :
> People may not have noticed, but there is now a 4.9 kernel in
> current-testing (4.9.28 to be specific).
> 
> If the release schedule holds, then that should be migrated to stable
> soon, however, before that happens, some feedback on that kernel would
> be useful before it gets pushed to the majority of users.
> 
> Specifically, it'd be nice to know if:
> 
> 1) Hardware that used to work with 4.4 or 4.8 no longer works with 4.9.
> 
> 2) Hardware that didn't work with 4.4 or 4.8 still doesn't work.
> 
> 3) If newer Intel platforms (i.e. Haswell or newer) works with this
> kernel (I took out the Intel ME driver and the newest machine I have
> access to is a Sandy Bridge machine; I have no issues, but I wonder if
> Haswell or newer is tied more strongly to the Intel ME such that it
> actually needs that driver in order t work properly). If there are Intel
> hardware issues with this kernel, then I'll re-enable the driver in my
> next Pull Request.
> 
> 4) General feedback on the 4.9 kernel.
> 
> 4.9.29 was just released today, so before I send in a Pull Request, let
> me know how 4.9.28 performs and if changes to the kernel config may need
> to be made.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d42cb309-f745-4916-9da7-ed97858d9285%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Hardware acceleration in Chrome (or "make google maps great again!")

2016-12-17 Thread cyrinux
Le dimanche 11 décembre 2016 07:52:29 UTC+1, Jean-Philippe Ouellet a écrit :
> Hello,
> 
> Google Chrome disabled the chrome://flags mechanism to disable WebGL
> some time ago, but now it appears that it is back as "Use hardware
> acceleration when available" at the bottom of the Advanced section of
> chrome://settings.
> 
> Disabling this makes google maps not lag/crash for me! :)
> 
> Perhaps everyone has already done this and I'm just late to the party,
> but I don't remember seeing it discussed in a capacity other than
> "yeah... this is a problem", so I figured I'd share.
> 
> Cheers,
> Jean-Philippe

Thanks!!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0430a091-0329-4762-bc60-e4a2487eb431%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Thinkpad T460

2016-12-06 Thread Cyrinux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Le 03/12/2016 à 21:53, Jan Betlach a écrit :
> On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen
> wrote:
>> Hello,
>> 
>> my Question is how i set the charge thresholds for my Lenovo
>> Thinkpad T460.
>> 
>> I have installed the following packages tlp,
>> tlp-rdw,tp-smapi-dkms and acpi-call-dkms in both fedora aind
>> debian template. Afterwards i changed the thresholds in the
>> config file /etc/default/tlp in both templates and in dom0. But
>> it doesn`t work. Do you know a workaround for this. I hope did
>> not forget some useful information for you.
>> 
>> Kind regards
>> 
>> 
>> Bernd Lorenzen
> 
> 
> Has the service been started? # systemctl status tlp
> 

Hi,
If this is like the T450, ensure that you have correctly compile the
acpi_call module.

Do you really have it?

lsmod|grep -q acpi_call && echo "Installed"

Personnaly I have allways trouble with dkms, I have manually build
from /usr/src/akmods/*.src.rpm,
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=qtrp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o24j6d%24mhn%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Qubes network server

2016-11-05 Thread cyrinux
Le mardi 11 octobre 2016 21:31:21 UTC+2, Manuel Amador (Rudd-O) a écrit :
> Folks, it gives me great pleasure to announce the product of over two
> years of work (primarily because I never paid enough attention to this
> project to bring it to completion): Qubes network server.
> 
> The traditional Qubes OS networking model contemplates a client-only use
> case. User VMs (AppVMs or StandaloneVMs) are attached to ProxyVMs, which
> give the user control over outbound connections taking place from user
> VMs. ProxyVMs in turn attach to NetVMs, which provide outbound
> connectivity for ProxyVMs and other user VMs alike.
> 
> Qubes network server changes all that.  With the Qubes network server
> software, it becomes possible to make network servers in user VMs
> available to other machines, be them peer VMs in the same Qubes OS
> system or machines connected to a physical link shared by a NetVM. You
> get actual, full, GUI control over network traffic, both exiting the VM
> and entering the VM, with exactly the same Qubes OS user experience you
> are used to.
> 
> This is all, of course, opt-in, so the standard Qubes OS network
> security model remains in effect until you decide to share network servers.
> 
> Anyway, without further ado:
> 
> https://github.com/Rudd-O/qubes-network-server
> 
> Real easy: clone, build, install, test.  I tested it with Qubes 3.1, but
> it's very likely that it'll work fine in Qubes 3.2.  I recommend you
> test this on a Qubes machine that is not your main Qubes machine, but
> the code does not do anything funky, and uninstalling the program should
> be enough to revert your system back to its original state.
> 
> I hope we can turn this add-on into a core Qubes feature.  As always,
> contributions to the project — reports, code enhancements, pull
> requests, other items — are very much welcome!
> 
> -- 
> Rudd-O
> http://rudd-o.com/
Hi, 
run 'sudo dnf install rpm-build' and try again, you don't have rpm tools

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78773d11-093d-4fe8-8426-0437595a6b3a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: git-remote-qubes: Inter-VM Git for Qubes OS

2016-10-28 Thread cyrinux
Le jeudi 27 octobre 2016 13:47:14 UTC+2, Manuel Amador (Rudd-O) a écrit :
> It gives me great pleasure to announce the inter-VM Git bridge for Qubes
> OS, which allows you to git push and git pull from VMs stored in other
> repos, with no networking involved whatsoever, and observing full
> compliance with Qubes OS qrexec policy.
> 
> This should usher in a new era of software development that allows
> people to segregate their secure Git repos from insecure build VMs and
> other engineering constructs I can't even think of (after doing
> low-level socket programming for a week, which has left my brain utterly
> fried).
> 
> Find the software at https://github.com/Rudd-O/git-remote-qubes
> 
> ---
> 
> # Inter-VM Git for Qubes OS
> 
> This is a very simple Git protocol bridge between Qubes OS VMs.  With it,
> you can `git pull` and `git push` between VMs without having to grant
> any of the VMs any special policy privileges other than access to Git.
> 
> ## Using the software
> 
> These instructions assume you have installed the software.  See the
> *Installing the software* heading below for more information.
> 
> ### Creating a repository
> 
> We'll assume for illustration purposes that you want to access a repository
> stored in `/home/user/xyz` on your VM `servervm`.
> 
> Run the following commands on `servervm`:
> 
> ```
> cd /home/user
> mkdir -p xyz
> cd xyz
> git --bare init
> ```
> 
> That's it.  Your new and empty repository is ready to use.
> 
> ### Adding a remote to a local repository
> 
> For illustration purposes, you'll be pushing and pulling `servervm`'s `xyz`
> repo on your vm `clientvm`.  Run the following commands on `clientvm`:
> 
> ```
> cd /home/user
> git clone qubes://clientvm/home/user/xyz
> ```
> 
> You will get a permission dialog from dom0 asking for `ruddo.Git` access.
> Accept it.  Note that accepting the permission dialog implicitly gives
> Git access to all Git repos stored in `servervm`, but only for that one
> execution (unless you say *Yes to all*, in which case the permission
> is remembered within the policy file that you installed earlier with the
> `dom0` package).
> 
> This should have cloned `xyz` from `servervm` into your `/home/user/xyz`
> directory in `clientvm`.
> 
> From this point on, you can push and pull in `clientvm` from
> `servervm:/home/user/xyz` to your heart's content.
> 
> If, instead of cloning, you have an existing repo, you can add a new remote
> just as easily:
> 
> ```
> cd /home/user/existingxyz
> git remote add qubesremotevm qubes://servervm/home/user/xyz
> ```
> 
> That addition will enable to push and pull from the remote `qubesremotevm`
> which represents the repo `/home/user/xyz` in the remote VM `servervm`.
> 
> ## Installing the software
> 
> There are two components for this software:
> 
> * Component 1 is the VM side of things, which implements the Git protocol
>   across VMs.
> * Component 2 is the dom0 side of things, which is a simple text file
> declaring
>   the initial Git access policy for your VMs.
> 
> First, build the software,  After cloning this repository on a suitable VM,
> run the command:
> 
> ```
> make rpm
> ```
> 
> This will generate two installable packages on the local directory:
> 
> * `git-remote-qubes-.noarch.rpm`, which contains the Git
>   protocol implementation.
> * `git-remote-qubes-dom0-.noarch.rpm`, which contains the
>   default policy.
> 
> Copy the `git-remote-qubes-.noarch.rpm` file to the template VM
> or standalone VM where you plan to pull or push to / from a Git repo
> stored in another Qubes VM.  Install the RPM with
> `dnf install `.  At this point, this VM, as well as
> any VMs using this as a template, have gained the ability to push and pull
> from Git repos stored in other VMs, as well as the ability to listen on
> push / pull requests from different VMs in the same system.
> 
> Now copy the `git-remote-qubes-dom0-.noarch.rpm` file to
> your dom0.  At this point, the default policy (`deny`) is active on
> your Qubes OS system, and you can begin pushing and pulling.
> 
> Those clever among you will have discovered that there is a `Makefile`
> included, and that you can use the `Makefile` to install the software on
> other non-RPM templates.  I welcome pull requests to add support for
> other distro packages and Qubes OS templates.
> 
> ## Troubleshooting and debugging
> 
> If you are experiencing problems communicating with a Git repo in a VM,
> export the variable `QUBES_DEBUG` on the side of your client (where your
> local Git repo is), and look at the debugging output that appears.
> 
> As always, you can file new issues on the repo of this project for help
> with fixing bugs that the programs may have.  Pull requests also welcome.
> 
> -- 
> Rudd-O
> http://rudd-o.com/

I installed it yestarday, no problem, documentation is clear, well done yet :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.

Re: [qubes-users] ANN: Leakproof Qubes VPN

2016-10-27 Thread cyrinux
Le mercredi 26 octobre 2016 14:38:24 UTC+2, Manuel Amador (Rudd-O) a écrit :
> Apologies for the reply to self, but I have received great news.
> 
> The first piece of great news is that a user of Qubes VPN found a bug
> that made it impossible for Qubes VPN to work with tun-style VPN
> providers.  We have fixed that bug thanks to his cooperation, and you
> can see the result of our bug report and conversation here:
> 
> https://www.reddit.com/r/Qubes/comments/57acz8/add_a_leakproof_vpn_to_your_qubes_os_with_this/
> 
> The second piece of great news is that, based on what he reported there,
> ABSOLUTELY NO TRAFFIC ever leaked from his VPN-protected AppVM to any
> sort of network device, as the VPN VM still prevented the traffic from
> going anywhere else except over the VPN.
> 
> That means: even under an environment where a critical bug rendered VPN
> operation impossible, Qubes VPN still managed to prevent leaks 100%.
> 
> I am quite happy to see that the engineering gone into this thing
> actually paid off big time.
> 
> Have you tried Qubes VPN yet?
> 
> -- 
> 
> Rudd-O
> http://rudd-o.com/

Hi Rudd-o, just for say I use Qubes VPN since 2 weeks, with mullad, and no 
problem, this seems perfect ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7cf989a6-91cf-4281-94b5-32701272fa4b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to Install acpi_call on dom0? ( Usefull for lenovo )

2016-10-24 Thread cyrinux
Le lundi 24 octobre 2016 17:42:34 UTC+2, cyrinux a écrit :
> Hi,
> 
> I would like to know if anyone success on install acpi_call, or more 
> globally, how to build a module on dom0?
> 
> For lenovo users, we need acpi_call for manage batteries thresholds with tlp.
> 
> Thanks you

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e03dd42-b2f9-42bc-9eb4-6bbb020436df%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 3.2rc1 installation issues on a Lenovo T550

2016-06-24 Thread Cyrinux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Le 24/06/2016 à 19:23,
nicklausmcclen...@gmail.com a écrit :
> When I run the installer, it loads the initrd.img, gets to the line
> where it says dom0 has maximum 4 vCPUs, and the cuts to black and
> restarts the laptop. I have tried UEFI and BIOS, and have attempted
> using the text installer. Any ideas on how I might get the
> installation up and running?
> 

Hi,
just for say I just get the same error here on my lenovo x1c where 3.1
run without problem.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJXbXUFAAoJEN6tUq35EFbDGF4P/1zztDe6OtpbsgZB4QC/nix5
3R/1R/sfYHJ7bo4M0UjiAS4sNXYV11X4KrKKwagIpvOXMvZAGB6b/du4f/dsjgTw
hTA14OtjpOIiwyBr+dhNBWzzW7dwPG1xmC066E7gURHqiAoy1XiozAkKMCBggo4S
QYlq2atqllgrR2ZshSnNngmD7beSiYpdIk0OqnJjwW6mEak4zLBH+wP+pFRUphaE
jmQ8lNeSkVhJUaLhkumyDul+WridMFdhFBztMu+3T2gUNkSdVr08dKJQJdXx7sx+
dP5hw4lC+DMKl1jS03TMAd2h0DTgoAJzXUAFm6F1NdY79fuiCSAJf9g31P3YXxI5
DruqqtbvH4WVyXgC0nwwXAoMTUhaIueJQ5ZKyYRlwc3som3ylNZvdGNNZFgHto9e
/5N2+GTB3s1srbY9X31HaN2DPB4AeZdNipPanIaD5XW9XDWIrIJRy5JeQ95SkG4C
mZ5c01LKgAruTcm5bKwQHKMtoMI0jw9AsW3S0lKbZWgHlP8wJtpi1WzZwKNAxHIx
H/iQ8HJSzXtVWot62ZREMY/rfiX8hyaaCXr3Sc8r8fW5dKs7qOfbBKfuun6edBCS
3VwgwgCT4VbtL7EyOwJ9m97dT61v+C77WN0b6qIiKP5CraDObAJ6knxQsYOVFRc+
0HoT4OZGirx3+rrdxMwD
=x2BL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nkjsej%24doh%241%40ger.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 3.2 rc1 has been released!

2016-06-18 Thread Cyrinux
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Great!

Thanks!

Le 18/06/2016 à 10:48, Marek Marczykowski-Górecki a écrit :
> Details here: 
> https://www.qubes-os.org/news/2016/06/18/qubes-OS-3-2-rc1-has-been-rel
eased/
>
>
> 
As usual, you can download new image from:
> https://www.qubes-os.org/downloads/
> 
> Keep in mind it is only release candidate, so not recommended for 
> daily use.
> 
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJXZbH9AAoJEN6tUq35EFbDkXAQAJAHMlYYxSGuHTkBIRfmxGsK
zIM1jD8jPdsTCkkVeePvDFdVRDr/r0Kb/8UZu8eqMgyLV6xSvt+F+j+mHvVJMsuw
nUcuG05QzPgqNDDLowyUAfQknApsHt/+TCX5/KzDWQ7GH0yHYftFoRCLxBfvIvvd
mK+fqsV5lR0hCKFxkhS0cM71BNjbAf23XJw6FaxwAtAEpCk1QnM2sd+IimosbnS6
ou+zSlY2zwFp2OBBOsKWBTQXnSzwrrAqei8S9xSZQHUNInEWAR3aTlmmeGxymD0k
P7E1Q2QEXzgcoXVwKdo3JE/amVY385HUzmNcFAp0HZZ8yLcei570Cp8ZOlKNwNaQ
8gDbHUx7E2LpGcVx1pRZ9MwXBAqk8yDdtgGrfnAuP1dIJs8CoNYMNtdBi4wT9F5F
UdahFhJ+uv0jGcj+D4t0cZV0rhesuOjyxugtO8LgjpU+LJtUJwFhV2IpyOcQiR/G
nOg3hEg9F2XAec4Pjo1u5G/zj3T+DUE3/WBsrwQT4SP5iJQ7EnhBJ1djPdbyUFer
bvRjtSMQqN35HHRP+R3q5h8twpQYME3m3HC1N/nCmrZztpBHIz1b88cknf3dOo0D
rwSZZKonIDAJSIVtT/Ti55R6YCbT/zu1WzV5veKfNQwMq2fnpe708WbUv0u5+y14
ETh4fgsPgZsrojIRlwZq
=+YB7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nk4bm9%24me8%241%40ger.gmane.org.
For more options, visit https://groups.google.com/d/optout.