Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be unavailable on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 1413561 - segment fault occurs when connecting to a spice guest with channel mode settings
Summary: segment fault occurs when connecting to a spice guest with channel mode settings
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: spice-gtk
Version: 6.9
Hardware: x86_64
OS: Unspecified
medium
medium
Target Milestone: rc
: ---
Assignee: Default Assignee for SPICE Bugs
QA Contact: SPICE QE bug list
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-01-16 12:07 UTC by Xiaodai Wang
Modified: 2017-12-06 11:12 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-12-06 11:12:19 UTC
Target Upstream Version:


Attachments (Terms of Use)
gdb log (2.72 KB, text/plain)
2017-01-16 12:08 UTC, Xiaodai Wang
no flags Details
remote-viewer log (13.36 KB, text/x-emacs-lisp)
2017-01-16 12:08 UTC, Xiaodai Wang
no flags Details

Description Xiaodai Wang 2017-01-16 12:07:23 UTC
Description of problem:
segment fault occurs when connecting to a spice guest with channel mode settings

Version-Release number of selected component (if applicable):
spice-gtk-0.26-8.el6.x86_64
virt-viewer-2.0-18.el6.x86_64

How reproducible:
100%

Steps to Reproduce:
1. Prepare a spice guest with spice tls settings and add channel mode settings as below.
    <graphics type='spice' port='5901' tlsPort='5902' autoport='yes' listen='0.0.0.0'>
      <listen type='address' address='0.0.0.0'/>
      <channel name='main' mode='secure'/>
      <channel name='inputs' mode='insecure'/>
    </graphics>
2. Connect the guest by remote-viewer.
# remote-viewer spice://localhost/?tls-port=5902 --spice-host-subject='C=IL,L=Raanana,O=Red Hat,CN=my server' --spice-ca-file='/etc/pki/libvirt-spice/ca-cert.pem'


Actual results:
Segmentation fault (core dumped) occurs.

Expected results:
remote-viewer should open the guest console successfully.


Additional info:

Comment 1 Xiaodai Wang 2017-01-16 12:08:23 UTC
Created attachment 1241192 [details]
gdb log

Comment 2 Xiaodai Wang 2017-01-16 12:08:48 UTC
Created attachment 1241193 [details]
remote-viewer log

Comment 3 Pavel Grunt 2017-01-16 12:23:19 UTC
The crash is avoided upstream by commit https://cgit.freedesktop.org/spice/spice-gtk/commit/?id=78f68e7b83a6379a18418f1912784db371be8c63

Comment 6 Pavel Grunt 2017-01-16 12:46:51 UTC
(In reply to xiaodwan from comment #0)
> Description of problem:
> segment fault occurs when connecting to a spice guest with channel mode
> settings
> 
> Version-Release number of selected component (if applicable):
> spice-gtk-0.26-8.el6.x86_64
> virt-viewer-2.0-18.el6.x86_64
> 
> How reproducible:
> 100%
> 
> Steps to Reproduce:
> 1. Prepare a spice guest with spice tls settings and add channel mode
> settings as below.
>     <graphics type='spice' port='5901' tlsPort='5902' autoport='yes'
> listen='0.0.0.0'>
>       <listen type='address' address='0.0.0.0'/>
>       <channel name='main' mode='secure'/>
>       <channel name='inputs' mode='insecure'/>

secure & insecure combination

>     </graphics>
> 2. Connect the guest by remote-viewer.
> # remote-viewer spice://localhost/?tls-port=5902

connection to the secure port

> --spice-host-subject='C=IL,L=Raanana,O=Red Hat,CN=my server'
> --spice-ca-file='/etc/pki/libvirt-spice/ca-cert.pem'
> 
> 
> Actual results:
> Segmentation fault (core dumped) occurs.
> 
> Expected results:
> remote-viewer should open the guest console successfully.
> 
> 
> Additional info:

From debug

(remote-viewer:16412): GSpice-WARNING **: inputs-3:0: spice_channel_recv_link_msg: unhandled error 6


Crashing is not nice, but it is not a blocker

Comment 8 Jan Kurik 2017-12-06 11:12:19 UTC
Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available.

The official life cycle policy can be reviewed here:

http://redhat.com/rhel/lifecycle

This issue does not meet the inclusion criteria for the Production 3 Phase and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Note that a strong business justification will be required for re-evaluation. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL:

https://access.redhat.com/


Note You need to log in before you can comment on or make changes to this bug.