RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 989389 - Catch the "KeyboardInterrupt" when inputting "Ctrl+c" during configuring KDump SSH
Summary: Catch the "KeyboardInterrupt" when inputting "Ctrl+c" during configuring KDum...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: ovirt-node
Version: 6.5
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Ryan Barry
QA Contact: Virtualization Bugs
URL:
Whiteboard:
Depends On:
Blocks: 1053415
TreeView+ depends on / blocked
 
Reported: 2013-07-29 07:59 UTC by haiyang,dong
Modified: 2014-01-21 19:47 UTC (History)
15 users (show)

Fixed In Version: ovirt-node-3.0.1-5.el6
Doc Type: Bug Fix
Doc Text:
When a user configures kdump over SSH, saving that configuration restarts the kdump service, which attempts to reach the target. In the process, kdump may prompt the user to enter a password to set up authentication. Pressing Ctrl+C to abort entering a password generated an uncaught KeyboardInterrupt to the hypervisor user interface, which brought the user back to a login prompt without finishing kdump configuration. Ctrl+C is now properly caught, and pressing it returns the user to the hypervisor kdump configuration page.
Clone Of:
: 1053415 (view as bug list)
Environment:
Last Closed: 2014-01-21 19:47:16 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2014:0033 0 normal SHIPPED_LIVE ovirt-node bug fix and enhancement update 2014-01-22 00:14:30 UTC
oVirt gerrit 19322 0 None None None Never

Description haiyang,dong 2013-07-29 07:59:19 UTC
Description of problem:
On the Kernel Dump page, select SSH with a valid SSH location.
Giving a wrong password/Not providing password under the command line and enter 'Ctrl+c' and 'exit', 
rhev-h will throw an "KeyboardInterrupt" exception and quit the whole application.
user will be lead to the login page.

Version-Release number of selected component (if applicable):
rhev-hypervisor6-6.5-20130725.0.el6

How reproducible:
Always

Steps to Reproduce:
1. Install rhevh and set network
2. On the Kernel Dump page, select SSH with a valid SSH location.
3. Giving a wrong password/Not providing password under the command line and enter 'Ctrl+c' and 'exit'
  
Actual results:
rhev-h will throw an "KeyboardInterrupt" exception and quit the whole application.
user will be lead to the login page.

Expected results:
Provide a better way to lead user back to the configuration page
SSH should not be set successfully until correct password is provided

Additional info:
No such issue in rhevh-6.4.z, so it is a regression bug.

Comment 5 haiyang,dong 2013-10-26 13:03:28 UTC
Test version:
rhevh-6.5-20131024.1.0.iso
ovirt-node-3.0.1-6.el6.noarch

Test Steps:
1. Install rhevh and set network
2. On the Kernel Dump page, select SSH with a valid SSH location.
3. Giving a wrong password/Not providing password under the command line and enter 'Ctrl+c'

Now it try to catch KeyboardInterrupt and remove kdump configured files
instead of quitting the whole application

so this bug has been fixed, change it into "VERIFIED".

Comment 7 Cheryn Tan 2013-11-08 00:24:34 UTC
This bug is currently attached to errata RHBA-2013:15277. If this change is not to be documented in the text for this errata please either remove it from the errata, set the requires_doc_text flag to minus (-), or leave a "Doc Text" value of "--no tech note required" if you do not have permission to alter the flag.

Otherwise to aid in the development of relevant and accurate release documentation, please fill out the "Doc Text" field above with these four (4) pieces of information:

* Cause: What actions or circumstances cause this bug to present.
* Consequence: What happens when the bug presents.
* Fix: What was done to fix the bug.
* Result: What now happens when the actions or circumstances above occur. (NB: this is not the same as 'the bug doesn't present anymore')

Once filled out, please set the "Doc Type" field to the appropriate value for the type of change made and submit your edits to the bug.

For further details on the Cause, Consequence, Fix, Result format please refer to:

https://bugzilla.redhat.com/page.cgi?id=fields.html#cf_release_notes 

Thanks in advance.

Comment 9 errata-xmlrpc 2014-01-21 19:47:16 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2014-0033.html


Note You need to log in before you can comment on or make changes to this bug.