[07:13] <lordievader> Good morning
[07:19] <ducasse> good morning
[10:24] <lotuspsychje> good morning to all
[13:39] <lotuspsychje> #ubuntu , the trivia channel :p
[14:22] <pragmaticenigma> lotuspsychje: a littlee help with kimmy please?
[14:28] <pragmaticenigma> oerheks: which is why I pinged the !ot on them... they do this daily
[14:29] <oerheks> yes, this dude is regular
[14:30] <pragmaticenigma> mm hmm
[14:31] <pragmaticenigma> and they really weren't looking for help... they post links and bait them like that to get people to look at it
[14:31] <oerheks> not clicking bitcoin pdf
[14:31] <oerheks> grinn
[14:33] <pragmaticenigma> Less you want to be co-opted into some bitcoin mining
[14:33] <lotuspsychje> lol
[14:33] <lotuspsychje> we need a !clickbate instead of !danger these days
[14:34] <pragmaticenigma> !danger
[14:34] <oerheks> carefull with URLs given in this channel. paste.ubuntu.com uses no JS.
[14:34] <oerheks> *hips*
[14:34]  * oerheks putting sandwiches/cheese on the grill
[14:35] <lotuspsychje> good idea oerheks
[14:38] <pragmaticenigma> I'm assuming the VPn is because they're setting up a seedbox
[14:39] <pragmaticenigma> Most links I open in Tor browser, if only to avoid someone easily pulling my IP address
[14:39] <pragmaticenigma> and it has JS blocking enabled
[14:39] <pragmaticenigma> Us: Would you like that in Black or Gold Aadam? Aadam: Yes
[14:43] <oerheks> :-P
[14:43] <oerheks> i want to write .. tell me
[14:44] <pragmaticenigma> I'm guessing he's one of those trying to make a quick buck at the ol' link farm types
[14:44] <pragmaticenigma> We need tutorials so we can load the page up with thousands of adverts
[14:44] <ducasse> why create a wiki on something you don't know how to do?
[14:44] <oerheks> cookies!
[14:53] <pragmaticenigma> because they think that somehow everyone will flock to their "no fun" christian proxying service
[14:54] <pragmaticenigma> I'm surprised they allow Ubuntu and Arch... they have demons.. err, I mean daemons in them
[14:54] <oerheks> yeah
[14:54] <oerheks> a system deamon
[14:54] <oerheks> systemd
[14:55] <Ussat> well, look, systemD is pretty evil.....
[14:56] <Ussat> maby not THE devil, but
[14:57] <Ussat> and I am pretty sure Lennart hasd performed a black mass or two
[14:57] <Ussat> has
[17:14] <leftyfb> oerheks: "<oerheks> such upgrade path is not supported" huh? That is the most supported upgrade path there is. LTS -> LTS
[17:21] <pragmaticenigma> leftyfb: I think the comment was based on the failure that occurred during the update, and being able to recover the limbo state?
[17:35] <oerheks> leftyfb, on AWS?
[17:35] <oerheks> just got back from cooking diner
[17:36] <leftyfb> Oh right, that I’m not sure of
[17:36] <leftyfb> They use their AMI images right?
[17:36] <oerheks> yes, also i suggested ##aws
[17:37] <oerheks> vpn and vps upgrades, specialist support
[18:50] <pragmaticenigma> vielfarbig: I am unable to reproduce your seg-fault in an instance of Ubuntu running as a host
[18:52] <pragmaticenigma> vielfarbig: what ever is causing the seg fault... has to do with the environment that you have setup
[18:52] <vielfarbig> pragmaticenigma: Have you tried it with Ubuntu 18.04 as a ltsp 2019 client
[18:52] <vielfarbig> pragmaticenigma: On the Ubuntu 18.04 host I also not get a segfault
[18:53] <pragmaticenigma> right, which would mean that something in the host environment for Ubuntu (ltsp 2019 in your case) is causing the behavior... not ubuntu
[18:55] <vielfarbig> pragmaticenigma: Do you know how i can determine the cause of this segfault? I've tried to debug it with gdb, apport-bug and strace, but I had no success
[18:57] <pragmaticenigma> vielfarbig: I suspect the debugger has to be implemented in the ltsp environment
[19:00] <vielfarbig> pragmaticenigma: So all tools from the host system are basically available, but e. g. "gdb sudo /bin/echo Test" says that the core was not dumped and with "list" inside gdb i says that no symbol table was found
[19:02] <pragmaticenigma> vielfarbig: I'm not an expert in this sort of stuff... There's so much going on with STDOUT, STDIN, STDERR going here... I don't know how things are sent to those I/Os when sudo is requesting passwords
[19:04] <sarnold> sudo should be opening the terminal device directly
[19:06] <vielfarbig> Ok. So I've read that one can see the called syscalls with strace, but with "strace sudo /bin/echo Test" the Segfault did not throw but the exit status is 1
[19:07] <lotuspsychje> !info linux-image-generic eoan
[19:24] <lotuspsychje> interesting facts: https://ubuntu.com/blog/design-and-web-team-summary-14-february-2020
[19:44] <leftyfb> "JordiGH> And let's tell HN about this."   who is HN?
[19:45] <pragmaticenigma> hacker news
[19:45] <leftyfb> :/
[19:45] <leftyfb> lame
[19:45] <pragmaticenigma> y-combinator ... i don't even know who reads that anymore
[19:46] <pragmaticenigma> I took it off my feed lists when all it was doing is repeating everything that came in through slashdot
[19:46] <pragmaticenigma> and ars
[19:46] <leftyfb> oh, found another way of disabling it. sed -i "s/ENABLED=1/ENABLED=0/" /etc/default/motd-news
[19:47] <pragmaticenigma> oh yeah
[19:47] <pragmaticenigma> that works too
[19:48] <sarnold> this is my favourite way to read HN http://n-gate.com/
[19:50] <pragmaticenigma> interesting
[19:50] <pragmaticenigma> looks like a kindergarten home page
[19:51] <sarnold> lol
[23:17] <xln> Quick q. Whats the current situation with grub and luks2
[23:19] <pragmaticenigma> wasn't aware there was a situation
[23:20] <oerheks> As of January 10th 2020, GRUB supports LUKS2 https://git.savannah.gnu.org/cgit/grub.git/commit/?id=365e0cc3e7e44151c14dd29514c2f870b49f9755
[23:29] <xln> Any ideas if that exists in 19.10 ?
[23:31] <oerheks> cryptsetup 2.0in 19.10 ?
[23:31] <oerheks> you can look that up on launchpad
[23:32] <xln> thanks :)