Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp10443188rwp; Thu, 20 Jul 2023 22:16:48 -0700 (PDT) X-Google-Smtp-Source: APBJJlGScuDRumwts6WR2g2XpYjr5Cn1Eq7dkDIzZfrjCFZwEW4T1/PVuRRMYnfwZZkFOUZfB7vX X-Received: by 2002:a17:907:7601:b0:99b:4d3d:c9b7 with SMTP id jx1-20020a170907760100b0099b4d3dc9b7mr899289ejc.31.1689916607768; Thu, 20 Jul 2023 22:16:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689916607; cv=none; d=google.com; s=arc-20160816; b=rvtZd17kwxKtMZR7rX4VntRWy7I6EFVyzjjyvP437YPENiYXWmfh3DZLwnkQ90v9gW 9+h5zvc4nSDT4oBAY4T+5M16mP6y6qHF+txI6yC9oUI0BDijwe55bK+m9a+51PMJTKsz Ig62IiOP2nI6Eq3o+j4+aCnRgwHXo5MMBG5ODDQSiKhD4lKB9TdcbfI6xD8KF5X/FtGd mA2e/PfdvDFCXojL3qxyr+RJ8Y9P/ut06fnNMGpM8S7O2deVYAcNznkHvo90BxF/xmO7 F/Q9Wt7dZowUrrJuPZCg/ACAdfbBbOtE6oj3iSdkKqOcwLMljXwIdbsvAD4S5l1QwSA/ ztaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id; bh=dfKWbVwD438YDLSYC64HkW+9NgPjmxNaYYNIsJmpIy4=; fh=qwxxoRHpDL7+k/6z+7D1VNBOVM7niYsF3sqcGBFHJfE=; b=qbaWYN22AvB4TgbGNF3bqI2dyBEYPrcTS1aGSQCToU1YQhSx2lrGbKDJS1LR+ZQQjA 2vcZqVV6AerMTb9BR/7lpwWXEJ3KmjSB5CqVWvQNcIaCwyb0q9Ih705uexMWB1FQy8d8 DbRHIKX0GaPNFVqouYTqH0Xtrt9YG5/bYlZzh/FS/z477P95+BgsbjuJW8ASfSqqUcdq srvjra2ucQG/ziu/cVwwIlxRu8p0HYaMojVeVD0m7PnnLJSO09TKarDhbnF7A4+SW5eU +Rc80EoFhw72VOLJnqOduXxGcae6w2pGx6DVNJi4McX3KKYDgrdJ/tqpu+Nd6ZC77gtt H7DA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pg28-20020a170907205c00b00988357b5f3fsi1726913ejb.758.2023.07.20.22.15.44; Thu, 20 Jul 2023 22:16:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229557AbjGUFHj convert rfc822-to-8bit (ORCPT + 99 others); Fri, 21 Jul 2023 01:07:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53378 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229450AbjGUFHh (ORCPT ); Fri, 21 Jul 2023 01:07:37 -0400 Received: from outpost1.zedat.fu-berlin.de (outpost1.zedat.fu-berlin.de [130.133.4.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A44B0B3; Thu, 20 Jul 2023 22:07:36 -0700 (PDT) Received: from inpost2.zedat.fu-berlin.de ([130.133.4.69]) by outpost.zedat.fu-berlin.de (Exim 4.95) with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (envelope-from ) id 1qMiML-003uNu-Uj; Fri, 21 Jul 2023 07:07:21 +0200 Received: from p57bd98fd.dip0.t-ipconnect.de ([87.189.152.253] helo=suse-laptop.fritz.box) by inpost2.zedat.fu-berlin.de (Exim 4.95) with esmtpsa (TLS1.3) tls TLS_AES_256_GCM_SHA384 (envelope-from ) id 1qMiML-0015U5-MU; Fri, 21 Jul 2023 07:07:21 +0200 Message-ID: <5ef77167046ad0a3e6d05433411c995c245464a8.camel@physik.fu-berlin.de> Subject: Re: [syzbot] [hfs?] WARNING in hfs_write_inode From: John Paul Adrian Glaubitz To: Michael Schmitz , Matthew Wilcox , Dmitry Vyukov Cc: Viacheslav Dubeyko , Arnd Bergmann , Linus Torvalds , syzbot , Andrew Morton , christian.brauner@ubuntu.com, Damien Le Moal , Jeff Layton , Linux FS Devel , LKML , syzkaller-bugs@googlegroups.com, ZhangPeng , linux-m68k@lists.linux-m68k.org, debian-powerpc Date: Fri, 21 Jul 2023 07:07:20 +0200 In-Reply-To: <47a12957-9d9b-4134-0736-bedb15428627@gmail.com> References: <000000000000dbce4e05f170f289@google.com> <5f45bb9a-5e00-48dd-82b0-46b19b1b98a3@app.fastmail.com> <2575F983-D170-4B79-A6BA-912D4ED2CC73@dubeyko.com> <46F233BB-E587-4F2B-AA62-898EB46C9DCE@dubeyko.com> <50D6A66B-D994-48F4-9EBA-360E57A37BBE@dubeyko.com> <47a12957-9d9b-4134-0736-bedb15428627@gmail.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT User-Agent: Evolution 3.48.4 MIME-Version: 1.0 X-Original-Sender: glaubitz@physik.fu-berlin.de X-Originating-IP: 87.189.152.253 X-ZEDAT-Hint: PO X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Michael! On Fri, 2023-07-21 at 07:05 +1200, Michael Schmitz wrote: > Installing a new kernel to the HFS filesystem, or a boot loader like > yaboot, might be another matter. But there still is an user space option > like hfsutils or hfsplus. Both won't work with GRUB. grub-install expects the boot partition to be mounted while hfsutils/hfsplus don't use the VFS layer. > That said, in terms of the argument about USB media with corrupt HFS > filesystems presenting a security risk, I take the view that once you > have physical access to a system, all bets are off. Doubly so if > auto-mounting USB media is enabled. I also don't understand why this was brought up. There are so many other potential options for attacking computer, even remotely. We also didn't drop x86 support after all these CPU vulnerabilities were discovered, did we? Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer `. `' Physicist `- GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913