bug#15571: -su: 31: export: : bad variable name
I tried entering into my chroot from acer c7 chromebook using the command line shell sudo startunity then, I got the error I made the subject. Is there any way to solve this. Am a beginner, and I use ubuntu 12.04 on a 32 bit.
bug#15571: -su: 31: export: : bad variable name
tag 15571 needinfo thanks On 10/09/2013 06:28 AM, rufai mustapha wrote: I tried entering into my chroot from acer c7 chromebook using the command line shell sudo startunity then, I got the error I made the subject. Is there any way to solve this. Am a beginner, and I use ubuntu 12.04 on a 32 bit. For starters, are you even sure that you are using coreutils' su? Newer versions of coreutils no longer ship su. This may be a question better directed to your distro, if we can't determine enough details to pinpoint a coreutils problem. -- Eric Blake eblake redhat com+1-919-301-3266 Libvirt virtualization library http://libvirt.org signature.asc Description: OpenPGP digital signature
bug#15571: -su: 31: export: : bad variable name
Eric Blake ebl...@redhat.com writes: On 10/09/2013 06:28 AM, rufai mustapha wrote: I tried entering into my chroot from acer c7 chromebook using the command line shell sudo startunity then, I got the error I made the subject. Is there any way to solve this. Am a beginner, and I use ubuntu 12.04 on a 32 bit. For starters, are you even sure that you are using coreutils' su? More likely this is bash being called as -su. Andreas. -- Andreas Schwab, sch...@linux-m68k.org GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5 And now for something completely different.
bug#15571: -su: 31: export: : bad variable name
rufai mustapha wrote: I tried entering into my chroot from acer c7 chromebook using the command line shell sudo startunity The above is rather ambiguous. It could describe many things. I can't tell what. All I can see is a startunity command of some sort. What is startunity? What package is it in? What is on line 31 of that script? Inquiring minds want to know. :-) then, I got the error I made the subject. Is there any way to solve this. Am a beginner, and I use ubuntu 12.04 on a 32 bit. I think your problem seems to be something to do with the startunity script which is producing the error message. That isn't part of coreutils. Ubuntu's documentation on filing bugs can be found here: https://help.ubuntu.com/community/ReportingBugs Good luck! Bob
bug#15579: Bug in documentation on cp
Dear Team, I think I might have found the following bug in info cp [documentation] The option --preserve= offers: `links' Preserve in the destination files any links between corresponding source files. Note that with `-L' or `-H', this option can convert symbolic links to hard links… I've played around a bit, but got different results on Note that with `-L' or `-H', this option can convert symbolic links to hard links Using --preserve=links with[out] the option -H or -L I get hardlinked files. This happend with GNU coreutils 8.12.197-032bb. I work on Crunchbang Linux [Debian 7], where uname -a - 3.2.0-4-amd64 #1 SMP Debian 3.2.46-1+deb7u1 x86_64 GNU/Linux I've posted two screenshots of this online: with(out) the -H option: http://i.stack.imgur.com/eb8rf.png with(out) the -L option: http://i.stack.imgur.com/U4OUV.png In both cases, I get hard linked files - which is nice, but doesn't accord to the documentation. I didn't wanted to post the images as attachment because I don't know if this is appreciated, but can transmit them if this is helpful. I hope this helped and all the best with a hearfelt thank you for all the good work! A satisfied GNU/Linux user P.S.: A short reply if this was just a misunderstanding from my side or a real bug would be very appreciated. Thank you in advance for all your efforts!
bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?
Please consider the attached gzipped patch file. It provides additional parameters for cat. The additional parameter allows cat to open files and read content without storing the content in the kernel's block cache. coreutils-8.21-O_DIRECT-cat.patch.gz Description: GNU Zip compressed data
bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?
On 10/10/2013 12:18 AM, Kyle Sallee wrote: Please consider the attached gzipped patch file. It provides additional parameters for cat. The additional parameter allows cat to open files and read content without storing the content in the kernel's block cache. dd supports this already and is more sorted to lower level setting like this. Could you describe _why_ you would like this in cat particularly. thanks, Pádraig.
bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?
tag 15578 notabug thanks On 10/09/2013 05:18 PM, Kyle Sallee wrote: Please consider the attached gzipped patch file. Thanks for the patch. Unless the patch is huger than 100k, it's best to post it inline rather than forcing readers to go through extra hoops to unpack it. It provides additional parameters for cat. The additional parameter allows cat to open files and read content without storing the content in the kernel's block cache. However, adding an option to 'cat' is probably not the best option. We already have 'dd' that can request O_DIRECT on operating systems where that is defined, so you are probably better off converting your scripts to use dd than to try and retrofit cat and wait for the patches to percolate into your distro. Look for 'dd iflag=direct'. I'm closing this bug as we probably aren't going to change cat, but do feel free to add additional comments on this thread as appropriate. Who knows - maybe it's worth reopening and repurposing this bug report into a documentation patch. -- Eric Blake eblake redhat com+1-919-301-3266 Libvirt virtualization library http://libvirt.org signature.asc Description: OpenPGP digital signature
bug#15578: Parameter -d or --direct to open files with flag O_DIRECT?
Please forgive the inconvenience. Attaching a gzipped patch file ensures the integrity of patch file content. I should have presented only the idea rather than a patch for the implementation. I concur dd is already suited to the task. Please consider | sed 's/^/if=/' | xargs -r --max-lines=1 dd iflag=direct # in contrast with | xargs -r --max-lines=4096 cat -d -- Invoking dd 466059 times costs only a slight performance decrease as compared with invoking cat 114 times. However, this example probably represents rare usage for cat. Thanks for granting the time and consideration.