bug#15571: -su: 31: export: : bad variable name

2013-10-09 Thread rufai mustapha
I tried entering into my chroot from acer c7 chromebook using the command
line
shell
sudo startunity
then, I got the error I made the subject. Is there any way to solve this.
Am a beginner, and I use ubuntu 12.04 on a 32 bit.


bug#15571: -su: 31: export: : bad variable name

2013-10-09 Thread Eric Blake
tag 15571 needinfo
thanks

On 10/09/2013 06:28 AM, rufai mustapha wrote:
 I tried entering into my chroot from acer c7 chromebook using the command
 line
 shell
 sudo startunity
 then, I got the error I made the subject. Is there any way to solve this.
 Am a beginner, and I use ubuntu 12.04 on a 32 bit.

For starters, are you even sure that you are using coreutils' su?  Newer
versions of coreutils no longer ship su.  This may be a question better
directed to your distro, if we can't determine enough details to
pinpoint a coreutils problem.

-- 
Eric Blake   eblake redhat com+1-919-301-3266
Libvirt virtualization library http://libvirt.org



signature.asc
Description: OpenPGP digital signature


bug#15571: -su: 31: export: : bad variable name

2013-10-09 Thread Andreas Schwab
Eric Blake ebl...@redhat.com writes:

 On 10/09/2013 06:28 AM, rufai mustapha wrote:
 I tried entering into my chroot from acer c7 chromebook using the command
 line
 shell
 sudo startunity
 then, I got the error I made the subject. Is there any way to solve this.
 Am a beginner, and I use ubuntu 12.04 on a 32 bit.

 For starters, are you even sure that you are using coreutils' su?

More likely this is bash being called as -su.

Andreas.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
And now for something completely different.





bug#15571: -su: 31: export: : bad variable name

2013-10-09 Thread Bob Proulx
rufai mustapha wrote:
 I tried entering into my chroot from acer c7 chromebook using the command
 line
 shell
 sudo startunity

The above is rather ambiguous.  It could describe many things.  I
can't tell what.  All I can see is a startunity command of some
sort.  What is startunity?  What package is it in?  What is on line
31 of that script?  Inquiring minds want to know. :-)

 then, I got the error I made the subject. Is there any way to solve this.
 Am a beginner, and I use ubuntu 12.04 on a 32 bit.

I think your problem seems to be something to do with the startunity
script which is producing the error message.  That isn't part of
coreutils.

Ubuntu's documentation on filing bugs can be found here:

  https://help.ubuntu.com/community/ReportingBugs

Good luck!
Bob





bug#15579: Bug in documentation on cp

2013-10-09 Thread hobo pope

Dear Team,


I think I might have found the following bug in info cp [documentation]

The option --preserve= offers:  `links'
Preserve in the destination files any links between
corresponding source files. Note that with `-L' or `-H',
this option can convert symbolic links to hard links…

I've played around a bit, but got different results on Note that with 
`-L' or `-H', this option can convert symbolic links to hard links


Using --preserve=links with[out] the option -H or -L I get hardlinked 
files.


This happend with GNU coreutils 8.12.197-032bb.

I work on Crunchbang Linux [Debian 7], where uname -a - 3.2.0-4-amd64 
#1 SMP Debian 3.2.46-1+deb7u1 x86_64 GNU/Linux




I've posted two screenshots of this online:

with(out) the -H option: http://i.stack.imgur.com/eb8rf.png
with(out) the -L option: http://i.stack.imgur.com/U4OUV.png

In both cases, I get hard linked files - which is nice, but doesn't 
accord to the documentation.


I didn't wanted to post the images as attachment because I don't know if 
this is appreciated, but can transmit them if this is helpful.


I hope this helped and all the best with a hearfelt thank you for all 
the good work!





A satisfied GNU/Linux user

P.S.: A short reply if this was just a misunderstanding from my side or 
a real bug would be very appreciated. Thank you in advance for all your 
efforts!






bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?

2013-10-09 Thread Kyle Sallee
Please consider the attached gzipped patch file.
It provides additional parameters for cat.
The additional parameter allows cat to open files and read content
without storing the content in the kernel's block cache.


coreutils-8.21-O_DIRECT-cat.patch.gz
Description: GNU Zip compressed data


bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?

2013-10-09 Thread Pádraig Brady
On 10/10/2013 12:18 AM, Kyle Sallee wrote:
 Please consider the attached gzipped patch file.
 It provides additional parameters for cat.
 The additional parameter allows cat to open files and read content
 without storing the content in the kernel's block cache.
 

dd supports this already and is more sorted to
lower level setting like this.
Could you describe _why_ you would like this in cat particularly.

thanks,
Pádraig.





bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?

2013-10-09 Thread Eric Blake
tag 15578 notabug
thanks

On 10/09/2013 05:18 PM, Kyle Sallee wrote:
 Please consider the attached gzipped patch file.

Thanks for the patch.

Unless the patch is huger than 100k, it's best to post it inline rather
than forcing readers to go through extra hoops to unpack it.

 It provides additional parameters for cat.
 The additional parameter allows cat to open files and read content
 without storing the content in the kernel's block cache.

However, adding an option to 'cat' is probably not the best option.  We
already have 'dd' that can request O_DIRECT on operating systems where
that is defined, so you are probably better off converting your scripts
to use dd than to try and retrofit cat and wait for the patches to
percolate into your distro.  Look for 'dd iflag=direct'.

I'm closing this bug as we probably aren't going to change cat, but do
feel free to add additional comments on this thread as appropriate.  Who
knows - maybe it's worth reopening and repurposing this bug report into
a documentation patch.

-- 
Eric Blake   eblake redhat com+1-919-301-3266
Libvirt virtualization library http://libvirt.org



signature.asc
Description: OpenPGP digital signature


bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?

2013-10-09 Thread Kyle Sallee
Please forgive the inconvenience.
Attaching a gzipped patch file
ensures the integrity of patch file content.
I should have presented only the idea
rather than a patch for the implementation.

I concur dd is already suited to the task.

Please consider

| sed 's/^/if=/' | xargs -r --max-lines=1 dd iflag=direct  # in contrast
with
   | xargs -r --max-lines=4096 cat -d --

Invoking dd 466059 times costs only a slight performance decrease
as compared with invoking cat 114 times.
However, this example probably represents rare usage for cat.

Thanks for granting the time and consideration.