[04:15] good morning to all [04:33] https://www.vice.com/en_us/article/8xzj45/someone-is-spamming-and-breaking-a-core-component-of-pgps-ecosystem [04:33] i don't understand it... [04:34] who cares who signed my key? if i already shared it with my friend and he knows it belongs to me, everything else doesn't matter [04:37] https://access.redhat.com/articles/4264021 [06:15] Good morning [06:16] hey lordievader [06:16] Morning lotuspsychje , how are you doing? [06:16] all good lordievader tnx [06:17] good morning [06:17] we had an interesting issue in main, tsimonq asking about spam signed gpg key [06:17] Fun keyserver-related question that probably belongs here. [06:17] My GPG key was signed by some spammers, and I would like to remove the spam signatures. [06:17] I currently hold my GPG private key, so I hope this is still possible [06:19] Interesting. Why would spammers sign keys though, what is in it for them to do so? [06:21] lordievader: this seemed interesting: https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f [06:30] Oh, that is quite bad. [06:31] not sure i understand the spammers reasons yet [06:37] Reading the sks post you just gave, this might be a way to DoS a lot of things... the whole debian/ubuntu package infra comes to mind... [06:38] yeah this really doesnt sound good.. [06:54] wait, what does this mean really, that the KSK infra is effectively blown out, public keys can no longer be trusted? [06:55] *SKS [06:56] yeup.... boom. "stop retrieving data from the SKS keyserver network" [06:56] They can still be trusted, they just might break the implementation you are running. [07:00] I'd call that very much untrusted :) [07:07] besides, from reading about it in detail, there's no way of knowing which signatures are legitimate and which are poisoned, so yeah, no go. [07:35] lotuspsychje: wow @ Simon's GPG key! [07:35] RikMills: yeah its nuts [07:46] After re-installing 18.04.2. from scratch, I forgot to disable STUPID, MORONIC, IDIOTIC unattended upgrades that just upgraded Firefox behind my back and the thing crashed while I was trying to send an email via webmail. [07:46] "A system designed for idiots is only usable by idiots" [07:49] Hey [07:50] guys?! [07:51] 👋 [07:51] the software I am coding has the GUI showing okay on 18.04, but on versions above the panel gadget becomes bigger and the gadgets inside it go a few pixels below [07:51] :) [07:51] should I check for Linux version or GTK version to fix it [07:52] for example, in Ubuntu 18.10+ I want to add more pixels to the panel gadget to compensate it takes more space [07:52] ? [07:56] Which package do I file a bug against, that pertains to default installed packages? [07:56] what kind of bug are you encountering blackflow [07:58] unattended-upgrade being installed and enabled by default [07:58] A bug in a default package? Or you disagree with the default choice? [07:58] Oh, that [07:58] wishlist against linux perhaps? [07:59] the kernel? [08:00] blackflow: or against unattended-upgrades itself? [08:00] That fact that it is installed, would be a seed issue. So probably file against Ubuntu desktop meta package (though that change is likely in platform/core) [08:01] ah [08:01] The fact that it's enabled by default, could be against the package itself, of perhaps a default settings package [08:01] lotuspsychje: problem is unattended-upgraes is not tracked by launchpad [08:01] !info unattended-upgrades [08:01] RikMills: yeah it can be installed by default, just not enabled. [08:02] unattended-upgrades (source: unattended-upgrades): automatic installation of security upgrades. In component main, is optional. Version 1.1ubuntu1.18.04.11 (bionic), package size 40 kB, installed size 384 kB [08:02] blackflow: is this wish for server? [08:02] blackflow: huh? https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades [08:02] RikMills: Now add /+filebug to that URL and hit enter [08:02] "unattended-upgrades does not use Launchpad as its bug tracker. " [08:03] ah, must file against the source package [08:03] https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+filebug [08:03] blackflow: yep [08:08] bug 1836328 please mark if you agree [08:08] bug 1836328 in unattended-upgrades (Ubuntu) "unattended-upgrades should not be enabled by default" [Undecided,New] https://launchpad.net/bugs/1836328 [08:09] Listening to this weeks episode now: http://ubuntupodcast.org/2019/07/11/s12e14-sega-rally-championship/ [08:13] Changing/modifying software without direct user intervention used to be called Malware. Back in the day only compromised systems modified its own software unexpectedly. And then Ubuntu came... [08:16] blackflow: affected & added to -discuss team [08:16] much obliged. [09:35] blackflow: someone set your bug to wontfix [09:35] oO [09:36] of course :) [09:37] Wasn't this a somewhat recent change? [09:37] As in the enablement by default. [10:05] I think it is yes, but I can't pinpoint it. I usually install via debootstrap and never include that thing. [10:05] It's now also a default in debian Buster it seems. [10:24] someone = member of foundations team [11:26] Hey folks [11:32] BluesKaj!!!! [11:32] Hello!!! [11:32] hi marcoagpinto [11:32] I was doing some exercises [13:39] * lotuspsychje sighs [13:43] jelly: so wich Os would that be? [13:43] lotuspsychje, sorry, apparently I had reached the join channel limit and had to choose which channels to give up, to join here [13:43] lotuspsychje, debian [13:43] jelly: so you advice to eolupgrade debian to the next version, without warning the security part? [13:44] lotuspsychje, absolutely [13:44] hehe, reached the channel limit, that's already tough on freenode. [13:44] lotuspsychje: what warning? [13:44] it's set to low 120 channels. [13:44] :) [13:45] blackflow: if the eol system has been taken over [13:45] lotuspsychje: I don't follow you [13:45] lotuspsychje, the security issue is exactly the same whether you have, say, left an unpatched bionic for a year, or left an unpatched artful for a year [13:46] lets take 17.10 as example, alot of usn came out since, the system could be compromized [13:46] would you still trust that system? [13:46] that applies to 18.04 as well. [13:46] "could" yes... but how likely is it. [13:46] blackflow: but how can one be sure? [13:47] your running LTS "could" be compromised right now with a zero day nobody knows about but the attacker. [13:47] lotuspsychje, would you trust it LESS than an unpatched 16.04 or 18.04? [13:47] you can't be sure here either. [13:47] I'd just hate to jump to conclusions. [13:47] jelly: this is not about lts or non-lts [13:47] its about eol versions [13:48] lotuspsychje, I'm not suggesting the user to keep running an unsupported release. [13:48] jelly: i know, but you cant be sure its hacked or not [13:48] so why take the risk? [13:48] lotuspsychje, you can't know if your xenial has been hacked, EITHER [13:48] there's no functional difference. [13:49] thats true, but thats why we advice users to keep system up to date [13:49] jelly: plus, this user didnt want to update [13:50] lotuspsychje, does "please go from 17.10 to 18.04" not count as "keep system up to date"? [13:50] not much we can advice anymore [13:50] volunteers adviced him to eolupgrade [13:51] okay. I misunderstood you as "don't eolupgrade" [13:51] no i did not [13:53] jelly: when someone comes to #ubuntu with an eol'd version we almost always use the !eol factoid , which also points to !eolupgrade - and we often trigger that, too. [13:54] sometimes these cement heads just want to troll, they know they're eol, but afraid to admit it so they become aggressive [13:54] and sometimes, if the user seeks to upgrade, we also help them do so. [13:55] or they are pentesters but have no idea about what they're doing. [13:55] lol.. this discusion is to teh contrary -- not recommending eolupgrade to "such old systems". [13:56] 60 pages of !usn since ubuntu 17.10 do i need to say more? [13:57] i think it's perfectly fine to recommend a fresh installation over an unsupported release upgrade path [13:57] lotuspsychje: and how many unfixed for Bionic? https://people.canonical.com/~ubuntu-security/cve/main.html [13:57] blackflow: i never claimed a fully updated system isnt a risk neither :p [13:58] but that doesnt mean we cant warn users about risks [13:59] like tomreyn said, the !eolupgrade factoid also needs a rework [14:01] !eolupgrade [14:01] End-Of-Life is when security updates and support for an Ubuntu release stop, see https://help.ubuntu.com/community/EOL for more info. Looking to upgrade from an EOL release? See https://help.ubuntu.com/community/EOLUpgrades [15:02] launchpad is partially down. this is not a bug - at least not one you can currently file on launchpad. :-P [15:04] * RikMills blames swift [15:05] tomreyn: aww, you defanged some nice jokes now :) [15:05] surely you mean the bank transfer system [15:06] ColdFusion(tm) [15:06] maybe there'll be updates on https://twitter.com/launchpadstatus if it'll last some hours. [15:07] or here https://lists.ubuntu.com/archives/launchpad-announce/2019-July/thread.html [15:10] they upgraded the underlying os from Stretch to Buster? :) [15:14] rather from 12.04-PATCHED to 14.04-PATCHED [15:17] oof! [15:20] i made this up, really. but i did see 12.04 version numbers on at least one of those servers while 12.04 ESM was active - which can be fine. [15:21] it's certainly not an easily maintained infrastructure. [15:22] best opportunity for Canonical to dogfood their products ;) [15:26] it's already back [15:46] ohh https://store.steampowered.com/app/226840/Age_of_Wonders_III/ free to keep if you get it before the 15th [16:13] People need to stop reporting bugs against PPA packages. [16:13] !bug is If you find a bug in Ubuntu or any of its official !flavors, please report it using the command « ubuntu-bug » - Please do not use this to report bugs against packages acquired from PPAs, contact that !ppa owner. See https://help.ubuntu.com/community/ReportingBugs for other ways to report bugs. [16:14] bug reporting against a snap is also fun [16:14] Heh [16:15] At least once a day I"m getting bug reports for GIMP when someone either 1) installed from a PPA, or 2) attempted to compile it themself, it fails to compile, and they file it against the version in the repo. >.< [16:19] Eickmeyer: I thought launchpad was trying to become central place for more than just ubuntu main repo packages. [16:19] now (how) will they know whether their package is from a PPA, this is yet to be explained, i guess? [16:19] apt policy packagename, but it wont fit into this factoid [16:20] I don't get it. Why not report bugs to LP for PPA packages? [16:20] blackflow: Yeah, but only if the PPA maintainer sets it up themselves. 'ubuntu-bug {package}' simply files it against the package in the repo, nowhere else. [16:21] Not sure I follow [16:21] tomreyn: Most people add PPAs themselves for newer versions of software, so they would know they installed it from a PPA. If they don't, then they shouldn't be messing with PPAs to begin with. [16:22] for example if I wanted to file a bug against nvidia-driver-430 from the graphics PPA... what would I do? [16:22] blackflow: using 'ubuntu-bug {package}' files it against lp:ubuntu/+source/{package}. That doesn't apply to PPAs at all. [16:22] blackflow: Contact the PPA owner. [16:45] We have looked at adapting apport type programs for snaps, for sure. [16:46] blackflow: yes, the sequence is adjust apport so that it is able to deal with snap-specific BTS (at _least_ point to the user where to go) [16:46] popey_: heh [16:46] I'm telling you , nobody is gonna bother registering and filing bugs against dozens of different trackers. NOBODY. [16:46] As I said, that's already the case. [16:47] Statistically speaking, nobody files bugs. We know this already. What's the news here? [16:47] it's also the case that users who would otherwise file a bug, won't. like me. I file whenever I find an issue, at LP. will I do the same for snaps? with no central place? nah. I won't bother. [16:47] Your loss. [16:47] I agree the major risk on snaps (or flatpaks, for that matter) is publish & forget [16:48] popey_: I doubt that. I just won't use the snap. it's not as if I can't get software outside of it. [16:48] (in context where the snap doesn't work or something) [16:48] Great! [16:48] hggdh: as years of docker has shown. [16:49] let's move a bit, and compare with IOS/Android. Where do you file bugs for a third-party application (i.e., *not* Apple or Google)? [16:49] popey_: I hope you realize that attitude toward users who would like to contrib with bug reports, is really just gonna result with the whole ecosystm becoming like windows, degrading into an unusable mess. PPAs redux. [16:49] Or windows apps, or mac apps? [16:49] ^ [16:49] blackflow: which attitude? [16:50] the one you're showing here. [16:50] I'm showing indifference because it's a monumental waste of time trying to convince you of anything, that's very clear. [16:50] So why should I bother? [16:50] what can snapcraft do: if an application is misbehaving badly, remove if from the store. If an application does NOT provide a BTS link, warn the user, clearly, that there is NO support [16:51] I'm not asking you to convince _me_. Im just telling you that without a central place for us users to file bug reports, even us who otherwise would, will NOT because nobody is gonna bother with dozens of different accounts at dozens of different trackers. [16:51] I completely understand your perspective, and politely disagree. [16:51] I think you're exaggerating for hyperbole sake. [16:51] Nobody signs up to "dozens of different trackers". Nobody. [16:52] well that's my point. [16:52] People sign up to one or two here and there for specific issues that annoy them [16:52] Right, my point is that's already the status quo! [16:53] so the takeway here is that snap store won't bother with a central place to report issues because nobody is filing them anyway, and upstreams mostly have their own? [16:54] No. [16:54] The takeaway is that developers have their own trackers, so why not use them. [16:54] no, this is not it. a distribution centre is NOT the same as development. You distribute, you do not support [16:55] I think we're going in circles here.... [16:55] The vast majority of users already do not file bugs. Enthusiasts do. You might not. This is not the end of the world. [16:56] e.g., you go to (say) Best Buy and buy a laptop; if, later on, the laptop mishehaves (or -- say -- Windows misbehaves) you go to the manufacturer, not Best Buy. And yes, I know this is sort of contrived [16:56] hggdh: uhhh no. Here in EU I take it to the store where I bought it as I've got warranty.... [16:56] blackflow: yes, we are sort of going in circles. We do not agree with you, and we are trying to show why [16:57] in fact, if I tried to call the manufacturer, they would just tell me to contact the store where I bought it. [16:57] blackflow: so you return your laptop to the store cuz it is BSOD-ing. What will the store do? [16:57] hggdh: the stores here take it for diagnostics and repair. [16:58] blackflow: so let's keep on. The disgostics come back saying it is a software failure. Then what? [16:59] let's not. this is now strawman and outside of scope of the example you were trying to make. [16:59] ok [17:00] We have written blog posts, and spoken directly to developers telling them how to optimise their store page. [17:00] Part of that is linking to bug trackers. [17:00] If we had a central tracker, we'd be middle men where their bugs go to die [17:00] Hello launchpad :D [17:02] And now, hello "Even less people are gonna bother reporting bugs". [17:02] We'll see :) [17:04] hggdh: the part about strawman... a snap is a whole product. there's no hardware-software dychotomy. it's all software.... there's no parts the user can install into the snap and break the warranty. [17:06] ie. if you "take back the snap to the store, for repairs", the vendor can't shrug. Eithre the software in the snap is broken (vendor's responsibility), or teh snap framework is broken. [17:06] blackflow: who is the warrantor? [17:06] Who is the best person to tell, when the software is broken? The person who made it. [17:06] ergo, their bug tracker [17:07] just like with real hw laptops from teh orig example: the vendor is. vendors have agreements with distributors who have agreements with stores, to cover the warranty. [17:07] Ooh, it's the weekend. Time for beer [17:07] Cheerio! [17:07] enjoy, sir \o [17:07] popey_: cheers [17:09] I never said that bugs should not be reported to vendors. I merely questioned the _place_ where such reports -- to vendors -- are made. [17:10] if you're gonna force users to hunt down upstream trackers (which'd require registering and whatnot) -- good luck with people wanting to do that. I don't think I'm being unreasonalbe or hyperbolic with that statement. [17:12] TJ-: wb, happy Friday \o [17:14] TJ-: ready for weekend support? [17:17] blackflow: no, not forcing users to hunt down. The sore could (as said before) enforce developers to clearly indicate where to get support [17:19] s/sore/store/ [17:21] do any of you folks have contact with debian for bug reporting an upstream bug? apcupsd has a bad default parameter in the shipping .conf that causes IRQ error spamming [17:21] i just installed buster in a VM to confirm - this stems from bug 1781016 [17:22] bug 1781016 in linux (Ubuntu) "Slow flood of do_IRQ: No irq for vector" [Medium,Incomplete] https://launchpad.net/bugs/1781016 [17:22] you don't stricrly need 'contact with debian' for this, other than be able to send mail to bugs.debian.org [17:22] well yeah i just figured it'd be a nice shortcut [17:22] making them send that e-mail? ;) [17:23] https://www.debian.org/Bugs/Reporting [17:23] yes i'm on that page right now, which is what had me thinking email was an incorrect choice to begin with [17:23] there is no other way than e-mail AFAIK [17:23] reportbug also uses email [17:24] use an e-mail address you have good spam filters on [17:24] nope i'm just not going to bother, then [17:25] or that ;) [17:25] just seen how many are sat open against the package as it stands... [17:25] daftykins: you can file for Ubuntu too, there's a section in the bug tracker for Debian as a distro for the package [17:26] are you sure there'd be any point, given it just comes from upstream and a considering reply 23 on the above? https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1781016/comments/23 [17:26] daftykins: whta is the work around? I'd love to remove those! [17:26] -a [17:26] Ubuntu bug 1781016 in linux (Ubuntu) "Slow flood of do_IRQ: No irq for vector" [Medium,Incomplete] [17:26] remove what? [17:27] it's already described on the above bug, commenting out the serial device line [17:27] so essentially the default shipping config has USB and serial enabled out of the box, which isn't too smart [17:27] comment 23 is what's to be expected whenever you file a bug against a package imported from debian (which is not in main / restricted) [17:28] yes but that doesn't answer to me whether there's anything to be gained by what blackflow suggested :) [17:28] true. in my experience such bug reports will just sit there. [17:30] mine got resolved in a few hours today. both for ubuntu AND debian. [17:30] though there can be exceptions. such as when it's a security bug and the security team has some time to handle it beyond handling main + restricted (which does happen). [17:30] they're very fast when the solution is EWONTFIX. [17:31] that's why i'm very demoralised on bug reporting in general, pretty much everything i've ever had a hand in has sat for years [17:32] can't say this for myself. [17:32] I've had widely varying experiences on that front. [17:32] well i'm sure you've done a lot more than me [17:32] from less than a day to never [17:33] ^ that's my experience, too. [17:33] There's also the intermediate "someone came by and set priority, area, bug type, etc" and then nothing [17:35] I've had mixed results too. [17:35] if i'm honest about the above i was embarrassed not to have spotted it myself, mind you [17:35] less than a day is really rare obviously. never is not uncommon. what's in main or restricted is usually handled sooner or later, though, depending (not only) on criticality + impact [17:35] Ah, I was talking about bugs in general, not Ubuntu or whatever specifically [17:57] btw.... weird that default LTS ISO installer would install you non-LTS kernel.... just occured to me. [17:59] which one's that? [18:00] and which kernel did it install? [18:02] yeah what do you mean? the 18.04.2 image will install 4.15 unless you specifically select HWE from the boot menu [18:02] blackflow, on vbox .. [18:02] tomreyn: I got the HWE 4.18 one, fresh new installation of 18.04.2 [18:02] OerHeks: yeah, saw that lol [18:03] daftykins: I did not select anything special [18:04] blackflow: so you got linux-image-generic-hwe-18.04 - which will track the latest HWE kernel image until 18.04 EOL [18:05] the kernel version + abi will change though, yes [18:05] yup [18:05] I was just surprised to see it installed by default. That and nvidia-driver. [18:10] i thought you had to specifically pick HWE from both legacy and EFI boot methods, ah well [18:11] bionic has now default 4.18 kernel on iso from downloads [18:11] i think you have to on a d-i installation, not on ubiquity, not sure about subiquity [18:11] the one that boosted my ssd's :p [18:12] https://wiki.ubuntu.com/Kernel/Support?action=AttachFile&do=get&target=18.04.x+Ubuntu+Kernel+Support+Schedule.svg [18:13] handy tomreyn tnx [18:14] even more so, showing how things changed twice since 14.04 https://wiki.ubuntu.com/Kernel/Support#A14.04.x_Ubuntu_Kernel_Support [18:14] actually they changed once only :) [18:17] lotuspsychje: oh btw... I saw no difference with my boot times aftre reinstalling .2 from scratch. [18:23] * daftykins installs from 18.04.1 media and sticks to the stock kernel if newer hardware support isn't needed [18:23] * blackflow is a sucker for latest and greatest. [18:24] confessed version number chaser eh? :) [18:25] yeppers. [18:29] two days ago, but i missed this update: https://twitter.com/ubuntu_sec/status/1149150094836396032 [18:34] blackflow: in a meeting.. more in a bit [18:34] sarnold: np [18:40] tomreyn: this about ZFS on 5.x kernels is what's worrying me wiht HWE... I'd rather stay with 4.15 then until 20.04 and 0.8.x ZFS which I think has the , or will have, regressions fixed. [18:41] If I don't run the latest of everything, how am I supposed to know everything I can by the time it's prod-ready? XD [18:57] blackflow: so.. I'm personally afraid that the kernel devs removed the fpu symbols to set a lawsuit trap [18:58] blackflow: one of the other distros put together a patch to reexport those symbols and it's my own opinion that canonical is too much of a lightning rod to use that patch [18:59] sarnold: gentoo is for example, yes. [18:59] thanks, yes, that's the patch :) I couldn't recall who did it [18:59] but I doubt the kernel devs are doing this as lawsuit bait. afaik they're very vehemently against involving courts in GPL violations. [19:00] I've seen enough comments over the years in support of harald welte's lawsuit that I have drawn a different conclusion there :) [19:00] That the VMWare lawsuit? [19:01] huh no, that's some other lawsuit. [19:03] but anways, both GHK and Linus are against GPL lawsuits. I think this is just to mess with commerical vendors that'd use ZFS as they probably wouldn't want to risk anything. Methinks the devs hate ZFS. [19:04] but I think ZFS is just gonna reinvent those functions through SPL. For now, as a quick patch, they just made ZFS buildable under 5.x, but I haven't been following the dev so close in the past month or two, so I don't know what's new there. [19:05] oh I *know* the devs hate zfs :) [19:08] shame. it's really the best FS in the whole ecosystem, for now. btrfs is barely a shadow to zfs, and bcachefs is a joke that'll take at least 10 year to reach ZFS grade maturity, if at all. [19:09] btrfs has, afaik, exactly two advantages over ZFS. Firstly, it's easier to install to a btrfs root than a ZFS root, but that's more a matter of distro support. Secondly, it deals well with mismatched drive sizes. [19:09] a few weeks ago I saw a comment like, "if you want zfs to work fast, reimplement it with a clean license, and use our framework for snapshots, raid, etc" and .. the whole point of zfs is that it's just so much *better* [19:09] lordcirth: those are advantages yes, but it's instability and buggyness drowns those out [19:10] *its [19:12] sarnold: that's never gonna happen. OpenZFS still wants it to be cross platform which demands it not depend on any kernel features (too much). [19:12] which also shows how alien ZFS is in Linux. but eh... [19:12] blackflow: heh, yeah. [19:13] I *really* hope we can sort out something good before 20.04. It'd be a real shame if that's 20% the speed of 18.04 zfs and five times the CPU use.. [19:13] sarnold: back to DKMS and patching out GPL symbols :) [19:14] that does not violate GPL. [19:15] blackflow: yeah, that's true. that ought to be good. it's also more complicated and brittle :( [19:17] hmmm, dunno, I've got a few debian machines with root on ZFS on LUKS too and those work flawlessly. In fact, I upgraded just today one of them to Buster, it went smooth and glitchless. [19:19] I'm glad to hear that :) for my new laptop I've done the root on zfs on luks route and omg I'm glad for rlaager's excellent guide [19:20] I made two typos in crypttab I think that took me *hours* to track down. [19:20] and the whole time I was thinking "I should just do this over with ext4 like a normal person and not hate this choice in two years" :) [19:20] heh. I got one step further, custom initramfs script for remote unlocking via SSH which also does optional rollback for rpool, should an upgrade bust boot. [19:24] wow :) === guiverc2 is now known as guiverc [22:07] Is ZoL really that stable? 110 open defects currently [22:11] and benchmarks are not that great either https://www.phoronix.com/scan.php?page=article&item=freebsd-zol-april&num=1 [22:44] doing good benchmarks is hard; there's so many conflicting results there that don't make sense to me that I'm inclined to write off the entire article as not very informative [22:45] all those results showing ext4 *slower* than zfs are a cause for concern: I would want to know what about the workload lets that make sense. [22:46] copy-on-write possibly [22:59] some folks will waste precious time of volunteers on a definition saying it's misleading and cause havoc as if world war 3 broke out cause of a wrong definition, maybe you should read more, here have fun https://unix.stackexchange.com/questions/346425/what-is-the-difference-between-a-hard-link-and-a-file/346575#346575 "This leads to the statement that every directory entry is actually a hardlink, and that hardlinking a file just means to create a seco [22:59] nd (or third, or fourth...) hardlink. In fact, each inode stores a counter for the number of hardlinks to that inode." enjoy blackflow but please refrain from EVER speaking to me the way you did today or in any manner what so EVER. i wont tolerate your actions and you've taken stuff too far for too long. be warned [22:59] tfeh [23:44] https://www.gamingonlinux.com/articles/ubuntu-lts-releases-and-so-derivatives-too-to-get-updated-nvidia-drivers-without-ppas.14557