bugzilla-daemon at bugzilla.mindrot.org
2019-May-28 19:37 UTC
[Bug 3014] New: [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Bug ID: 3014 Summary: [Enhancement] Tokens for RemoteForward - for unix sockets Product: Portable OpenSSH Version: 8.0p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee: unassigned-bugs at mindrot.org Reporter: jirib79 at gmail.com It would be great if tokens would work for RemoteForward keyword so one could use them to define "dynamically" unix socket paths, for example when running borg backup sw via unix sockets. Example: ---%>--- Host *.example.com User backup Compression no Ciphers aes128-ctr MACs umac-64-etm at openssh.com IdentitiesOnly yes IdentityFile ~/.ssh/id_ed25519.%r%-example.com ExitOnForwardFailure yes StreamLocalBindUnlink yes RemoteForward /home/%r/tmp/borg.sock ~/tmp/%h-borg.sock # here! PermitLocalCommand yes LocalCommand socat UNIX-LISTEN:$HOME/tmp/%h-borg.sock "EXEC:borg serve --append-only --restrict-to-path /borgbackup/example.com/%h --umask 0007 --verbose" & ---%<--- And ssh command... ---%>--- export BACKUP_CLIENT=foo.example.com export BACKUP_DOMAIN=$(echo ${BACKUP_CLIENT} | rev | cut -d'.' -f1-2 | rev) ssh -q ${BACKUP_CLIENT} "./bin/borgwrapper create --list -s --exclude-caches ssh://localhost/borgbackup/${BACKUP_DOMAIN}/${BACKUP_CLIENT}::'{now:%Y-%m-%dT%H:%M:%S}' /" ; pkill -f "socat .*${BACKUP_CLIENT}" ---%<--- -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2019-Dec-03 19:46 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Jan Palus <jpalus at fastmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jpalus at fastmail.com --- Comment #1 from Jan Palus <jpalus at fastmail.com> --- *** Bug 3104 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2019-Dec-12 22:23 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Luke <lukenbutters at gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 |P4 CC| |lukenbutters at gmail.com -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Mar-26 16:52 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 --- Comment #2 from Daniel Kahn Gillmor <dkg at fifthhorseman.net> --- *** Bug 3104 has been marked as a duplicate of this bug. *** -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Mar-26 17:32 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Daniel Kahn Gillmor <dkg at fifthhorseman.net> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dkg at fifthhorseman.net --- Comment #3 from Daniel Kahn Gillmor <dkg at fifthhorseman.net> --- see also #3140 -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Mar-26 17:32 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Daniel Kahn Gillmor <dkg at fifthhorseman.net> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |3140 Referenced Bugs: https://bugzilla.mindrot.org/show_bug.cgi?id=3140 [Bug 3140] support a token for XDG_RUNTIME_DIR -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Apr-03 04:39 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Darren Tucker <dtucker at dtucker.net> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dtucker at dtucker.net --- Comment #4 from Darren Tucker <dtucker at dtucker.net> --- Created attachment 3371 --> https://bugzilla.mindrot.org/attachment.cgi?id=3371&action=edit Add percent expansion to LocalForward and RemoteForward The patch implements this on OpenBSD. Unfortunately it relies on some recent changes only in HEAD so it won't apply directly to any current releases. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Apr-03 04:39 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Darren Tucker <dtucker at dtucker.net> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |3117 Referenced Bugs: https://bugzilla.mindrot.org/show_bug.cgi?id=3117 [Bug 3117] Tracking bug for 8.3 release -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Apr-10 01:48 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Darren Tucker <dtucker at dtucker.net> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #5 from Darren Tucker <dtucker at dtucker.net> --- This has been added and will be in the next major release. Thanks. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2021-Apr-23 05:02 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #6 from Damien Miller <djm at mindrot.org> --- closing resolved bugs as of 8.6p1 release -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2021-Oct-13 14:40 UTC
[Bug 3014] [Enhancement] Tokens for RemoteForward - for unix sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3014 Ahmed Sayeed <ahmedsayeed1982 at yahoo.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |ahmedsayeed1982 at yahoo.com --- Comment #7 from Ahmed Sayeed <ahmedsayeed1982 at yahoo.com> --- In collect_register() function of arc-linux-tdep.c, the "eret" http://www-look-4.com/travel/london/ (exception return) register value is not being reported correctly. Background: https://komiya-dental.com/shopping/buy-android/ When asked for the "pc" value, we have to update the "eret" register with GDB's STOP_PC. The "eret" instructs the kernel code where to jump back http://www.iu-bloomington.com/shopping/hatchback-cars/ when an instruction has stopped due to a breakpoint. This is how collect_register() is doing so: https://waytowhatsnext.com/shopping/xbox-release-date/ --------------8<-------------- if (regnum == gdbarch_pc_regnum (gdbarch)) http://www.wearelondonmade.com/travel/london/ regnum = ARC_ERET_REGNUM; regcache->raw_collect (regnum, buf + arc_linux_core_reg_offsets[regnum]); -------------->8-------------- http://www.jopspeech.com/travel/london/ Root cause: Although this is using the correct offset (ERET register's), it is also http://joerg.li/travel/london/ changing the REGNUM itself. Therefore, raw_collect (regnum, ...) is not reading from "pc" anymore. http://connstr.net/travel/london/ Consequence: This bug affects the "native ARC gdb" badly and causes kernel code to jump to addresses after the breakpoint and not executing the "breakpoint"ed http://embermanchester.uk/travel/london/ instructions at all. That "native ARC gdb" feature is not upstream yet and is in review at the time of writing [1]. http://www.slipstone.co.uk/travel/london/ In collect_register() function of arc-linux-tdep.c, the "eret" (exception return) register value is not being reported correctly. http://www.logoarts.co.uk/travel/london/ Background: When asked for the "pc" value, we have to update the "eret" register with GDB's STOP_PC. http://www.acpirateradio.co.uk/travel/good/ The "eret" instructs the kernel code where to jump back when an instruction has stopped due to a breakpoint. This is how collect_register() is doing so: http://www.compilatori.com/travel/london/ --------------8<-------------- if (regnum == gdbarch_pc_regnum (gdbarch)) regnum = ARC_ERET_REGNUM; regcache->raw_collect (regnum, buf + arc_linux_core_reg_offsets[regnum]); -------------->8-------------- Root cause: https://www.webb-dev.co.uk/shopping/shopping-during-corona/ Although this is using the correct offset (ERET register's), it is also changing the REGNUM itself. Therefore, raw_collect (regnum, ...) is not reading from "pc" anymore. Consequence: This bug affects the "native ARC gdb" badly and causes kernel code to jump to addresses after the breakpoint and not executing the "breakpoint"ed instructions at all. That "native ARC gdb" feature is not upstream yet and is in review at the time of writing [1]. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.