Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp202505ybt; Mon, 6 Jul 2020 07:23:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRrXGKjo4I1fUzkDJpJRNKeHUtHF7Xs/6Kp33enZqOcz6tvEfwD8uz5WydOP70TUdyeQ8G X-Received: by 2002:a05:6402:3113:: with SMTP id dc19mr54961136edb.20.1594045424263; Mon, 06 Jul 2020 07:23:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594045424; cv=none; d=google.com; s=arc-20160816; b=0AsDBbD9ccbl6oFYitXenkwC9WtW8MMjElvbUmZ6bVJ/aBvFTupMcu9RKBG660KEJP WTv5zp76PhbM1GxWPmj6A3syzX1aQc35YWORyOfmamBuOuVaCNtfMR8URGL+3WuFqdwK MaU2bwfVN4kovEBWhtVKn5uONWeJvI0yRbYtKpTqTu5DZdHeXpJEaHqqjRMdOyxi+CvB EmgFWrOgSs0TVr64Nk6Cd2piVquEMZsy2xSzJbTWJfqYcNnnsSOodQRbGm6QsDQgaXGQ 0+g+NiAkYeCm+Ow++LgMWqLrvIjY6inomBg8adDymtVHBWsPDvDjwlhCD3RaNZ9Zx7gv qLYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from; bh=uoVqQiVkzQrQlMpW3H72hAZVbUnbuF2nJINpzch1zsw=; b=LT/xpXaMqLVEikSW29DHLG4bYNEFh9o7pB/mZd1zHRiesoPQNqp5+NcmbAABPeMobx xSI5rM/gzQdrXIr2xSaEECa41pdvBt66SeVG/9A9LtrnNd1jRCfOVF2hQ9mw5bJy+IjX n5u/SlzVP/e76AMWl6VcPJYRWXxliUfqV0KOqldHjTBci7eZhpGAYMlP+PZLC+vMxSMx gd9j4RE8aT9YhC9qVBP0S3yNL45zfeYEu7FNcH6Jzd+nvgVXpPO3lgLwScP+L2CRhfSu Wo2ZQh6yYvUyIHu9LTC+Fk8FfY098FmUctIMagyT9Q+JdInR/Zx6E8V8L/VaYRtjsOXS uzTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a42si13623001edf.300.2020.07.06.07.23.21; Mon, 06 Jul 2020 07:23:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729171AbgGFOXB (ORCPT + 99 others); Mon, 6 Jul 2020 10:23:01 -0400 Received: from mail.parknet.co.jp ([210.171.160.6]:38844 "EHLO mail.parknet.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729140AbgGFOXA (ORCPT ); Mon, 6 Jul 2020 10:23:00 -0400 Received: from ibmpc.myhome.or.jp (server.parknet.ne.jp [210.171.168.39]) by mail.parknet.co.jp (Postfix) with ESMTPSA id E421E1B405B; Mon, 6 Jul 2020 23:22:59 +0900 (JST) Received: from devron.myhome.or.jp (foobar@devron.myhome.or.jp [192.168.0.3]) by ibmpc.myhome.or.jp (8.15.2/8.15.2/Debian-19) with ESMTPS id 066EMwFA074945 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Mon, 6 Jul 2020 23:22:59 +0900 Received: from devron.myhome.or.jp (foobar@localhost [127.0.0.1]) by devron.myhome.or.jp (8.15.2/8.15.2/Debian-19) with ESMTPS id 066EMwn8349763 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Mon, 6 Jul 2020 23:22:58 +0900 Received: (from hirofumi@localhost) by devron.myhome.or.jp (8.15.2/8.15.2/Submit) id 066EMwEw349762; Mon, 6 Jul 2020 23:22:58 +0900 From: OGAWA Hirofumi To: Anupam Aggarwal Cc: AMIT SAHRAWAT , VIVEK TRIVEDI , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] fs: fat: add check for dir size in fat_calc_dir_size References: <87zh8gct29.fsf@mail.parknet.co.jp> <20200630170748epcms5p87fa9b4348c1448d2d5a5f6cdddbc021e@epcms5p8> <875zb8o6zh.fsf@mail.parknet.co.jp> <87ftacolpf.fsf@mail.parknet.co.jp> <1593428559-13920-1-git-send-email-anupam.al@samsung.com> <20200630123355epcms5p602efe0e4ceedcfe11eae2153c8466678@epcms5p6> <20200703142939epcms5p1440ec65f7e8a3e4741ade2496135d747@epcms5p1> <20200706115303epcms5p262a630cd1517632c48e4f72a68d98b0c@epcms5p2> Date: Mon, 06 Jul 2020 23:22:58 +0900 In-Reply-To: <20200706115303epcms5p262a630cd1517632c48e4f72a68d98b0c@epcms5p2> (Anupam Aggarwal's message of "Mon, 06 Jul 2020 17:23:03 +0530") Message-ID: <87pn98g1tp.fsf@mail.parknet.co.jp> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.0.50 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Anupam Aggarwal writes: >>Anyway, fsck would be main way. And on other hand, if we want to add >>mitigation for corruption, we would have to see much more details of >>this corruption. Can you put somewhere to access the corrupted image >>(need the only metadata) to reproduce? > > Sorry, uploading of any file not allowed from within. > So, metadata image is not possible to be shared via. upload. > Can try to arrange few more logs via. fsck. Then, can you dump the invalid directory entries in corrupted image, and check exactly why recursive traverse (ls -lR) never end? We need to know the root cause to fix, e.g. this directory entry has loop, etc. >>What happens if you recursively traversed directories on Windows? This >>issue happens on Windows too? > > After connecting USB to windows 10, when corrupted dir(\CorruptedDIR) > is browsed, it shows 2623 number of files and directories, without > delay. Name and timestamps of those file/directories are garbage > values. Sounds like filtered the invalid names. > Further if we browse these sub-directories and open files of corrupted > dir(\CorruptedDIR) following popups are coming on Windows 10: > 1. The filename, directory name, or volume label syntax is incorrect > 2. Specified path does not exist. Check the path and try again > > So issue of un-ending browsing(ls -lR) of corrupted USB is not coming > on windows 10, it lists limited number of files/directories, of > corrupted dir(\CorruptedDIR) without delay. It may had the luck, loop was filtered by invalid names. Well, not sure. -- OGAWA Hirofumi