On Saturday 19 December 2020 19:50:34 deloptes via tde-users wrote:
Gene Heskett via tde-users wrote:
This ^^^^^^ is where its discussed? I'll
look into it. Thanks.
I wonder if you can just stop the process like
kill -STOP <pid
and then resume it
after you finish
kill -CONT <pid>
That would likely freeze it all. Not too desirable.
Would the MIT-MAGIC-COOKIE be different for a different user, or is
there a way to cause amanda's ./ICEauthority to be updared with a
valid cookie?
I don't know. Some years ago we were supposed to setup a system by
tunneling X session via SSH. However AFAIR, we could use normal user
to tunnel X and had to execute the command via GUI run by root. For
this we extract the cookie from users session and import it into roots
.Xauthority file. I am really not sure anymore - it is about 7-10y
ago.
I would expect the ICE to work in a similar way.
Something like
iceauth extract iceauth.out protoname=DCOP [whatever]
and in the other user
iceauth merge iceauth.out
Did that, worked but didn't fix it. and had to undo the changes to
sudoers because it was a syntax error. Fortunately I still had root
sessions open or I'd have been up that famous s--- creek.
But with amanda's ICEauthority merged, I straced the command, getting
about 1000 attempts to open
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or
directory)
Then:
open("/lib/x86_64-linux-gnu/libbsd.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\3203\0\0\0\0\0\0"...,
832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=84200, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0)
= 0x7fada6dbe000
mmap(NULL, 2183248, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0)
= 0x7fada11cf000
mprotect(0x7fada11e2000, 2097152, PROT_NONE) = 0
mmap(0x7fada13e2000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|
MAP_DENYWRITE, 3, 0x13000) = 0x7fada13e2000
mmap(0x7fada13e4000, 80, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|
MAP_ANONYMOUS, -1, 0) = 0x7fada13e4000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or
directory)
open("/lib/x86_64-linux-gnu/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\340
\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=31744, ...}) = 0
mmap(NULL, 2128832, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0)
= 0x7fada0fc7000
mprotect(0x7fada0fce000, 2093056, PROT_NONE) = 0
mmap(0x7fada11cd000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|
MAP_DENYWRITE, 3, 0x6000) = 0x7fada11cd000
close(3) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0)
= 0x7fada6dbc000
mmap(NULL, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0)
= 0x7fada6db9000
arch_prctl(ARCH_SET_FS, 0x7fada6db9780) = 0
mprotect(0x7fada5233000, 16384, PROT_READ) = 0
mprotect(0x7fada20a9000, 4096, PROT_READ) = 0
mprotect(0x7fada11cd000, 4096, PROT_READ) = 0
mprotect(0x7fada13e2000, 4096, PROT_READ) = 0
mprotect(0x7fada1e90000, 4096, PROT_READ) = 0
mprotect(0x7fada1c8c000, 4096, PROT_READ) = 0
mprotect(0x7fada4e9c000, 4096, PROT_READ) = 0
mprotect(0x7fada4c74000, 4096, PROT_READ) = 0
mprotect(0x7fada699a000, 4096, PROT_READ) = 0
mprotect(0x7fada15e9000, 4096, PROT_READ) = 0
mprotect(0x7fada185c000, 4096, PROT_READ) = 0
mprotect(0x7fada1a85000, 8192, PROT_READ) = 0
mprotect(0x7fada22c6000, 4096, PROT_READ) = 0
mprotect(0x7fada4a70000, 4096, PROT_READ) = 0
mprotect(0x7fada24d2000, 4096, PROT_READ) = 0
mprotect(0x7fada26e4000, 4096, PROT_READ) = 0
mprotect(0x7fada5756000, 4096, PROT_READ) = 0
mprotect(0x7fada3d0c000, 4096, PROT_READ) = 0
mprotect(0x7fada3f3f000, 4096, PROT_READ) = 0
mprotect(0x7fada298e000, 24576, PROT_READ) = 0
mprotect(0x7fada486a000, 8192, PROT_READ) = 0
mprotect(0x7fada33cc000, 4096, PROT_READ) = 0
mprotect(0x7fada2ba9000, 4096, PROT_READ) = 0
mprotect(0x7fada2dac000, 4096, PROT_READ) = 0
mprotect(0x7fada2fb7000, 4096, PROT_READ) = 0
mprotect(0x7fada31c2000, 4096, PROT_READ) = 0
mprotect(0x7fada35dc000, 4096, PROT_READ) = 0
mprotect(0x7fada3af1000, 4096, PROT_READ) = 0
mprotect(0x7fada37de000, 4096, PROT_READ) = 0
mprotect(0x7fada41aa000, 4096, PROT_READ) = 0
mprotect(0x7fada440e000, 4096, PROT_READ) = 0
mprotect(0x7fada462d000, 4096, PROT_READ) = 0
mprotect(0x7fada5452000, 4096, PROT_READ) = 0
mprotect(0x7fada5aca000, 40960, PROT_READ) = 0
mprotect(0x7fada63e3000, 425984, PROT_READ) = 0
mprotect(0x7fada665e000, 4096, PROT_READ) = 0
mprotect(0x7fada6dfc000, 4096, PROT_READ) = 0
munmap(0x7fada6dcc000, 196147) = 0
set_tid_address(0x7fada6db9a50) = 4421
set_robust_list(0x7fada6db9a60, 24) = 0
rt_sigaction(SIGRTMIN, {sa_handler=0x7fada1e97bd0, sa_mask=[],
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7fada1ea30e0}, NULL, 8) =
0
rt_sigaction(SIGRT_1, {sa_handler=0x7fada1e97c60, sa_mask=[],
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7fada1ea30e0},
NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) =
0
brk(NULL) = 0x5603f7ab6000
brk(0x5603f7ad7000) = 0x5603f7ad7000
futex(0x7fada645aa2c, FUTEX_WAKE_PRIVATE, 2147483647) = 0
access("/usr/lib/tqt3/plugins", F_OK) = 0
access("/usr/lib/tqt3/plugins/codecs/.", F_OK) = -1 ENOENT (No such file
or directory)
fstat(0, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 14), ...}) = 0
lseek(0, 0, SEEK_CUR) = -1 ESPIPE (Illegal seek)
fstat(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 14), ...}) = 0
lseek(1, 0, SEEK_CUR) = -1 ESPIPE (Illegal seek)
fstat(2, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 14), ...}) = 0
lseek(2, 0, SEEK_CUR) = -1 ESPIPE (Illegal seek)
uname({sysname="Linux", nodename="coyote", ...}) = 0
brk(0x5603f7af8000) = 0x5603f7af8000
open("/home/amanda/.DCOPserver_coyote__0", O_RDONLY) = -1 ENOENT (No such
file or directory)
uname({sysname="Linux", nodename="coyote", ...}) = 0
open("/home/amanda/.DCOPserver_coyote__0", O_RDONLY) = -1 ENOENT (No such
file or directory)
write(2, "ERROR: Couldn't attach to DCOP s"..., 38ERROR: Couldn't attach
to DCOP server!) = 38
write(2, "\n", 1
) = 1
exit_group(1) = ?
+++ exited with 1 +++
And of course it does not exist. Next?
Thanks
Cheers, Gene Heskett
--
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
If we desire respect for the law, we must first make the law respectable.
- Louis D. Brandeis
Genes Web page <http://geneslinuxbox.net:6309/gene>