-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

Ok, I've done a few things. First I've tested and determined a number of
problems with the testfs.sh-0.99 that was being used. Bertl has
incorporated my changes, and fixed a number of others and has made
testfs.sh-0.11 which more accurately represents successes.

Additionally, I've gotten a system together with a fresh sarge install
that I could test these things. I have completed my tests with the 2.4
kernel and kernel patch, and am limiting this reply that only, I will do
the 2.6 tests next and report those back as separate findings.

Ola Lundqvist wrote:

>reassign 329090 kernel-patch-vserver
>thanks

You need to CC control@ in order for these commands to take affect. If
you will notice, this bug is still on util-vserver.

However, as you will find from my exhaustive tests below, it seems to
remain a bug with util-vserver, and should not be changed (at least for
2.4, once I have done tests on 2.6 we will know if this bug needs to be
cloned and the 2.4 issues stay with util-vserver, and the 2.6 versions
go to the kernel-patch).

> I have only tested with ext2 and ext3 on my systems on a 2.4.27 kernel
> patched a long time ago. Do not remember when.

This isn't going to help us too much. You are basically saying that this
is a 2.4.27 kernel, but not which debian version, and you aren't
specifying which vserver kernel-patch you are running. Without that
information, it is really hard to correlate.

However, I've done tests with the current versions that are in sarge
now. See below.

> 0.30.204-5sarge2 (sarge version, built on machine with no vserver support):
> [000]. xattr related tests ...
> [101]. [102]. [103]* [104]* [106]* [108]. [109]* 
> [112]. [113]. [114]* [115]. [116]. [117]. [118]. [119]. 
> [121]* [122]* [123]. [124]* [199]. 

My tests:

Test #1
Using all debian sarge componants:
kernel-source: 2.4.27-10 (debian sarge)
util-vserver: 0.30-204-5sarge2 (debian sarge)
kernel-patch: 1.9.5.3 (debian sarge)

103, 104, 106, 109, 121, 122 all fail on ext2, not 114 or 124 as your
tests show.

Conclusion: either the fixes to testfs caused error 114 and 124 to go
away, or you have a different kernel-source or kernel-patch applied.
Either try again with testfs.sh-0.11 or install the latest sarge kernel
source and kernel-patch-vserver as those versions are all that matter here.

Test #2
Using only debian sarge util-vserver:
kernel-source: 2.4.31 (upstream)
util-vserver: 0.30-204-5sarge2 (debian sarge)
kernel-patch: 1.2.10 (upstream)


103, 104, 106, 109, 121, 122 all fail on ext2, the same as failed using
all debian sarge componants in test #1.

Conclusion: based on the results from this test, and the previous, it is
clear that the debian kernel source and the debian kernel patch dont
make a difference here

> 0.30.208-2 (unstable version, built on sarge host with no vserver support):
> [000]. xattr related tests ...
> [101]. [102]. [103]. [104]* [106]. [108]. [109]. 
> [112]. [113]. [114]* [115]. [116]. [117]. [118]. [119]. 
> [121]. [122]* [123]. [124]* [199].

My tests:

Test #3
Using debian sarge componants with upstream util-vserver:
kernel-source: 2.4.27-10 (debian sarge)
util-vserver: 0.30-208+fix03 (upstream)
kernel-patch: 1.9.5.3 (debian sarge)

Only test 106 fails... Not 104, 114, 122 or 124.

Conclusion: either the fixes to testfs caused 104, 114, 122, 124 to go
away or you have a different kernel-source or kernel-patch applied, try
with testfs.sh-0.11 to see, or just try with a current sarge kernel and
patch since that is all that matters here.

Test #4
Using all upstream componants:
kernel-source: 2.4.31 (upstream)
util-vserver: 0.30-208+fix03 (upstream)
kernel-patch: 1.2.10 (upstream)

Only test 106 fails, same as the previous test, when we use the debian
sarge kernel-source and kernel-patch.

Conclusion: Based on the results of this test, and the previous, it is
clear that the debian sarge kernel source and debian sarge kernel patch
don't make a difference here either, the problem has been isolated to
util-vserver 0.30-204-5sarge2 in sarge. If this is actually a problem, I
do not know, this definatetly needs to be determined. Additionally, test
106 could be in error, this should also be checked.


The above tests are only done with ext2, I am not sure why you didn't do
the xfs, reiserfs and jfs tests, but there is no need, as I have done them:

Test #1
Using all debian sarge componants:
kernel-source: 2.4.27-10 (debian sarge)
util-vserver: 0.30-204-5sarge2 (debian sarge)
kernel-patch: 1.9.5.3 (debian sarge)

ext3 failures: 103, 104, 106, 109, 121, 122 (note: same as ext2 in test #1)
xfs failures: 103, 104, 106, 109, 114, 115, 117, 121, 122, 124
reiserfs failures: 103, 104, 106, 109, 118, 119, 121, 122
jfs failures: 103, 104, 106, 109, 112, 113, 114, 116, 118, 119, 121,
122, 123, 124

Test #2
Using only debian sarge util-vserver:
kernel-source: 2.4.31 (upstream)
util-vserver: 0.30-204-5sarge2 (debian sarge)
kernel-patch: 1.2.10 (upstream)

ext3 failures: 103, 104, 106, 109, 121, 122 (note: same as test #1)
xfs failures: 103, 104, 106, 109, 114, 115, 117, 121, 122, 124 (note:
same as test #1)
reiserfs failures: 103, 104, 106, 109, 118, 119, 121, 122 (note: same as
test #1)
jfs failures: 103, 104, 106, 109, 112, 113, 114, 116, 118, 119, 121,
122, 123, 124 (note: same as test #1)

Conclusion: All tests had the same results as test #1 the conclusion
reached originally still holds: it is clear that the debian kernel
source and the debian kernel patch dont make a difference here

Test #3
Using debian sarge componants with upstream util-vserver:
kernel-source: 2.4.27-10 (debian sarge)
util-vserver: 0.30-208+fix03 (upstream)
kernel-patch: 1.9.5.3 (debian sarge)

ext3 failures: 106
xfs failures: 103, 104, 106, 114, 115, 117, 121, 122, 124
reiserfs failures: 106, 118, 119
jfs failures: 102, 103, 104, 106, 108, 109, 112, 113, 114, 116, 118,
119, 121, 122, 123, 124


Test #4
Using all upstream componants:
kernel-source: 2.4.31 (upstream)
util-vserver: 0.30-208+fix03 (upstream)
kernel-patch: 1.2.10 (upstream)

ext3 failures: 106 (note: same as test #3)
xfs failures: 103, 104, 106, 114, 115, 117, 121, 122, 124 (note: same as
test #3)
reiserfs failures: 106, 118, 119 (note: same as test #3)
jfs failures: 102, 103, 104, 106, 108, 109, 112, 113, 114, 116, 118,
119, 121, 122, 123, 124 (note: same as test #3)

Conclusion: using *all* upstream pieces, the same failures occur when
using debian kernel source and kernel patch. This leads me to believe
that either the upstream kernel source is broken, the upstream linux
vserver patch is broken, or most likely the testfs is not working
properly for these tests.

> So my conclusion is that where you build the binary (if it is a i386 machine)
> do not give any difference from a security point of view.

I agree, your test results show no difference, I dont believe this has
anything to do with it.

Micah
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDTas39n4qXRzy1ioRAu9hAJoD9VmatLu5KqHy4/yKAcs8HlgjAACgpI7U
DFzIQiA+iFtN608yD4MRnzE=
=0HBa
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to