This is sort of a weird one.

Background is that I have a laptop with a bunch of VMs all running OpenBSD, now 
6.6 (thanks!). The host runs X and one of the VMs runs the window manager which 
can then log into other VMs (or the host) to do whatever. My development 
environment, named void, is one those VMs.

So far so strange. It's my setup and I like it.

To run X apps, XAuthority credentials are banded about. All of the VMs have no 
problem with this except void, on which xauth segfaults.

The login process when forwarding X credetials is essentially:

  var=$(xauth list $DISPLAY)
  ssh $remote xauth add $var
  ssh $remote DISPLAY=$DISPLAY $thing

The strange thing is that with a few identical VMs running on this host, only 
on one of them does xauth segfault. All have today been upgraded to 6.6 and the 
fault was present on 6.5 too (I ignored it because I don't really need X there 
and hoped it would Just Go Away; it didn't).

  OpenBSD 6.6 (GENERIC) #353: Sat Oct 12 10:45:56 MDT 2019
  [ksh]flask@chicken$ xauth list
  drogo.datum:0  MIT-MAGIC-COOKIE-1  86963dd9ee88bbfcc9eb66846b9cf4ce
  [ksh]flask@chicken$ ssh void
  OpenBSD 6.6 (GENERIC) #353: Sat Oct 12 10:45:56 MDT 2019
  [ksh]flask@void$ xauth add drogo.datum:0  MIT-MAGIC-COOKIE-1  
86963dd9ee88bbfcc9eb66846b9cf4ce
  /usr/X11R6/bin/xauth:  file /home/flask/.Xauthority does not exist
  Segmentation fault (core dumped)
  [ksh]flask@void$ ^D
  [ksh]flask@chicken$ ssh shelob
  OpenBSD 6.6 (GENERIC) #353: Sat Oct 12 10:45:56 MDT 2019
  [ksh]flask@shelob$ xauth add drogo.datum:0  MIT-MAGIC-COOKIE-1  
86963dd9ee88bbfcc9eb66846b9cf4ce
  [ksh]flask@shelob$

I don't even know where to begin with this one (well I have some places to 
start looking but the fact that the otherwise-identical VMs react differently 
tells me this might be something deeper than the obvious so I'm waiting).

I *think* this worked once but I can't be sure if I just didn't notice it 
failing. If nothing else I'll get around to figuring out how to build 
individual xenocara components and then step through the process to figure out 
what's broken in xauth but before I get to that I thought I'd see if anyone 
more familiar with these systems has any ideas.

Matthew

Reply via email to