Skip to main content

64位ubuntu下32位程序的输入法问题

我是64bit的ubuntu,有时会用到32bit的程序,如flock和qq,然后输入法就成了问题。

定义32位程序输入法加载模块的文件应该是/etc/gtk-2.0/gtk.immodules.32,默认安装情况下,里面只有scim没有scim-bridge。不过里面scim指向的模块/usr/lib32/gtk-2.0/2.10.0/immodules/im-scim.so并不存在。这样如果在程序用右键选择输入法为SCIM Input Method,会报找不到模块。

整个解决流程我参考了http://forum.ubuntu.org.cn/viewtopic.php?t=139907&start=0&postdays=0&postorder=asc&highlight

一开始我是想弄通im-scim.so,于是从源里下了32位的scim-gtk2-immodule, libscim8c2a等包,手工解压,之后虽然32位程序里能调出scim输入法了,但是没有中文输入法。在gtk.immodules.32中在scim对应行加"zh"也没用。

后来想想,我系统默认输入法是scim-bridge而不是scim,于是把目光转向了im-scim-bridge,从源里下来32位scim-gtk2-immodule,把im-scim-bridge.so放到/usr/lib32/gtk-2.0/2.10.0/immodules/,然后在/etc/gtk-2.0/gtk.immodules.32最后添加两行:

/usr/lib/gtk-2.0/2.10.0/immodules/im-scim-bridge.so"
"scim-bridge" "SCIM Bridge Input Method" "" "" ""

(链接里说的方法是用/usr/bin/gtk-query-immodules-2.0 > gtk.immodules.32,然后把/usr/lib都改成/usr/lib32,似乎是更佳的方法)

这样32位程序里就能输入中文了,之后发现把32位的scim那些文件删去也可以正常工作,因此看来只需要im-scim-bridge.so一个文件。

Comments

Popular posts from this blog

Determine Perspective Lines With Off-page Vanishing Point

In perspective drawing, a vanishing point represents a group of parallel lines, in other words, a direction. For any point on the paper, if we want a line towards the same direction (in the 3d space), we simply draw a line through it and the vanishing point. But sometimes the vanishing point is too far away, such that it is outside the paper/canvas. In this example, we have a point P and two perspective lines L1 and L2. The vanishing point VP is naturally the intersection of L1 and L2. The task is to draw a line through P and VP, without having VP on the paper. I am aware of a few traditional solutions: 1. Use extra pieces of paper such that we can extend L1 and L2 until we see VP. 2. Draw everything in a smaller scale, such that we can see both P and VP on the paper. Draw the line and scale everything back. 3. Draw a perspective grid using the Brewer Method. #1 and #2 might be quite practical. #3 may not guarantee a solution, unless we can measure distances/p...

Qubes OS: First Impressions

A few days ago, while browsing security topics online, Qubes OS surfaced—whether via YouTube recommendations or search results, I can't recall precisely. Intrigued by its unique approach to security through compartmentalization, I delved into the documentation and watched some demos. My interest was piqued enough that I felt compelled to install it and give it a try firsthand. My overall first impression of Qubes OS is highly positive. Had I discovered it earlier, I might have reconsidered starting my hardware password manager project. Conceptually, Qubes OS is not much different from running a bunch of virtual machines simultaneously. However, its brilliance lies in the seamless desktop integration and the well-designed template system, making it far more user-friendly than a manual VM setup. I was particularly impressed by the concept of disposable VMs for temporary tasks and the clear separation of critical functions like networking (sys-net) and USB handling (sys-usb) into the...

Exploring Immutable Distros and Declarative Management

My current server setup, based on Debian Stable and Docker, has served me reliably for years. It's stable, familiar, and gets the job done. However, an intriguing article I revisited recently about Fedora CoreOS, rpm-ostree, and OSTree native containers sparked my curiosity and sent me down a rabbit hole exploring alternative approaches to system management. Could there be a better way? Core Goals & Requirements Before diving into new technologies, I wanted to define what "better" means for my use case: The base operating system must update automatically and reliably. Hosted services (applications) should be updatable either automatically or manually, depending on the service. Configuration and data files need to be easy to modify, and crucially, automatically tracked and backed up. Current Setup: Debian Stable + Docker My current infrastructure consists of several servers, all running Debian Stable. System Updates are andled automatically via unattended-upgrades. Se...