Bug 2100508

Summary: Test for available issuercert before creating CA
Product: Red Hat Enterprise Linux 8 Reporter: Osher De Paz <odepaz>
Component: swtpmAssignee: Marc-Andre Lureau <marcandre.lureau>
Status: CLOSED ERRATA QA Contact: Yanqiu Zhang <yanqzhan>
Severity: high Docs Contact:
Priority: unspecified    
Version: 8.6CC: ddepaula, jdenemar, lmen, marcandre.lureau, nmagnezi, xuzhang, yanqzhan, ymankad
Target Milestone: rcKeywords: AutomationTriaged, Triaged, ZStream
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+15966+d9560ea1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 2108470 2109987 2152618 (view as bug list) Environment:
Last Closed: 2022-11-08 09:20:10 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2108470, 2109987, 2152618    

Description Osher De Paz 2022-06-23 14:54:02 UTC
Description of problem:
We (assisted-installer team which are related to OpenShift product) are currently experiencing some problems when trying to use swtpm version 0.7.0 in our tests. The bug is documented better in this GitHub issue: https://github.com/stefanberger/swtpm/issues/644

We would like RHEL 8.6 to have the updated patch version 0.7.1 of swtpm, because it contains the bug-fix for that problem.

Version-Release number of selected component (if applicable):
swtpm/swtpm-tools/swtpm-libs 0.7.0

How reproducible:
The original bug is a race-condition, affecting around 60% of selected jobs.

Comment 2 Danilo de Paula 2022-07-18 17:31:27 UTC
(In reply to Nir Magnezi from comment #1)
> Hi Danilo,
> 
> Any chance this can get a priority? it is impacting our CI:
> https://prow.ci.openshift.org/view/gs/origin-ci-test/logs/periodic-ci-
> openshift-assisted-test-infra-release-ocm-2.5-e2e-metal-assisted-tpmv2-
> periodic/1546312689087680512

Assigning to the right engineer so he can decide.

Comment 3 Marc-Andre Lureau 2022-07-18 17:58:40 UTC
The patch looks safe enough to backport:
https://github.com/stefanberger/swtpm/commit/27d4c5d83ff014f3b08cb7fc8ffdbfc32306cfbb

Do we need it in 8.6z, or can we simply target 8.7?

Comment 4 Osher De Paz 2022-07-18 18:10:45 UTC
For our team needs it's crucial to have it for 8.6 because that's the version our cloud provider and the QE machines are set on

Comment 10 Yanqiu Zhang 2022-07-25 08:00:29 UTC
Reproduce with swtpm-0.7.0-3.20211109gitb79fd91.module+el8.7.0+15743+c774064d.x86_64:
# rm -rf /var/lib/swtpm-localca/* ; for ((i = 0; i<200;i++)); do rm -rf /tmp/vtpm${i}; mkdir -p /tmp/vtpm${i}; swtpm_setup --tpm2 --tpmstate /tmp/vtpm${i} --create-ek-cert --create-platform-cert --pcr-banks sha256 2>&1 | grep -i read & done
[1] 104430
[2] 104434
[3] 104438
...
[200] 106130
# swtpm_localca exit with status 1: Need read rights on issuer certificate /var/lib/swtpm-localca/issuercert.pem for user root.
swtpm_localca exit with status 1: Need read rights on issuer certificate /var/lib/swtpm-localca/issuercert.pem for user root.
...

Verify with:
swtpm-0.7.0-4.20211109gitb79fd91.module+el8.7.0+15999+d24f860e.x86_64.rpm

# rm -rf /var/lib/swtpm-localca/* ; for ((i = 0; i<200;i++)); do rm -rf /tmp/vtpm${i}; mkdir -p /tmp/vtpm${i}; swtpm_setup --tpm2 --tpmstate /tmp/vtpm${i} --create-ek-cert --create-platform-cert --pcr-banks sha256 2>&1 | grep -i read & done
[1] 118044
[2] 118048
...
[200] 119748
#

Comment 13 errata-xmlrpc 2022-11-08 09:20:10 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:7472