Bug 1447827

Summary: Segmentation fault (core dumped) shows when running "tpm_sealdata" command
Product: Red Hat Enterprise Linux 7 Reporter: Neo Cui <cuilj2>
Component: tpm-toolsAssignee: Jerry Snitselaar <jsnitsel>
Status: CLOSED ERRATA QA Contact: Karel Srot <ksrot>
Severity: medium Docs Contact:
Priority: high    
Version: 7.4CC: bhu, cuilj2, fchen16, hannsj_uhl, hehy1, jkachuck, jshortt, jsnitsel, ksrot, mknutson, vmarsik
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: tpm-tools-1.3.9-2.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-01 23:21:40 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1353018, 1369100, 1446211    
Attachments:
Description Flags
operation record none

Description Neo Cui 2017-05-04 01:26:54 UTC
Created attachment 1276061 [details]
operation record

Description of problem:
There shows "Segmentation fault (core dumped)" when running "tpm_sealdata" command on RHEL 7.4 alpha. But the result of command "tpm_selftest" is passed.

Version-Release number of selected component (if applicable):
tpm-tools-1.3.9-1.el7.x86_64
trousers-0.3.14-2.el7.x86_64

How reproducible:


Steps to Reproduce:
1.Enable the TXT, VT-d, VT-x features in BIOS
2.Fresh install RHEL7.4Alpha with trousers and tpm-tools packages selected on the server.
3.Power on the server and boot to Linux OS.
4.Run tpm_version to check TPM module information.
5.Run tpm_selftest to check subset fuction
6.Run tpm_getpubek to check EK.
7.Take tpm ownership, and createowner password and SRK password.
8.Use tpm_sealdata to encrypt data
9.Use tpm_unsealdata to decrypt data

Actual results:
tpm_sealdata returned the "segmentation fault".

Expected results:
No error message

Comment 2 Neo Cui 2017-05-04 01:27:33 UTC
messages log:

May  3 07:16:33 RHEL7 kernel: tpm_sealdata[5935]: segfault at 0 ip 00007f9244c734dc sp 00007ffde4275870 error 6 in libcrypto.so.1.0.2k[7f9244b49000+234000]
May  3 07:16:33 RHEL7 abrt-hook-ccpp: Process 5935 (tpm_sealdata) of user 0 killed by SIGSEGV - dumping core
May  3 07:16:33 RHEL7 abrt-server: Duplicate: core backtrace
May  3 07:16:33 RHEL7 abrt-server: DUP_OF_DIR: /var/spool/abrt/ccpp-2017-05-03-06:58:33-3913
May  3 07:16:33 RHEL7 abrt-server: Deleting problem directory ccpp-2017-05-03-07:16:33-5935 (dup of ccpp-2017-05-03-06:58:33-3913)
May  3 07:16:33 RHEL7 abrt-server: Email address of sender was not specified. Would you like to do so now? If not, 'user@localhost' is to be used [y/N] 
May  3 07:16:33 RHEL7 abrt-server: Email address of receiver was not specified. Would you like to do so now? If not, 'root@localhost' is to be used [y/N] 
May  3 07:16:33 RHEL7 abrt-server: Sending an email...
May  3 07:16:33 RHEL7 abrt-server: Sending a notification email to: root@localhost
May  3 07:16:33 RHEL7 abrt-server: Email was sent to: root@localhost

Comment 3 Joseph Kachuck 2017-05-04 17:39:27 UTC
Hello Lenovo,
Please attach a sosreport of a system directly after seeing this issue.

Thank You
Joe Kachuck

Comment 4 Jerry Snitselaar 2017-05-04 18:01:50 UTC
I have a patch that fixes this issue.

Comment 5 Neo Cui 2017-05-05 01:11:22 UTC
(In reply to Jerry Snitselaar from comment #4)
> I have a patch that fixes this issue.

Hi Jerry,

So will you apply the patch to RHEL 7.4 ?
And do you still need the sosreport?

--Neo

Comment 6 Jerry Snitselaar 2017-05-05 01:35:16 UTC
I don't need the sosreport. I'm working on getting the fix approved for 7.4.

Comment 12 Neo Cui 2017-07-05 01:10:54 UTC
Hi Jerry,
I wonder if this defect is fixed or not?

Comment 13 Jerry Snitselaar 2017-07-05 01:23:26 UTC
Hi Neo,

This should be fixed in the tpm-tools that will ship with 7.4.

Comment 14 errata-xmlrpc 2017-08-01 23:21:40 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:2253