I suspect I have a similar problem to the reporter of this bug. I have a swap partition that is set up as an encrypted dm device with a random key, using the cryptsetup package. cryptsetup now has a test that calls vol_id, which thinks that my partition is vfat:
% sudo /lib/udev/vol_id /dev/hda2 ID_FS_USAGE=filesystem ID_FS_TYPE=vfat ID_FS_VERSION=FAT32 ID_FS_UUID= ID_FS_LABEL= ID_FS_LABEL_SAFE= % sudo mount -t vfat /dev/hda2 /mnt/tmp mount: /dev/hda2: can't read superblock Inspecting this partition, I see clearly "MSDOS5.0", presumably the long-preserved remnants of a vfat filesystem. However, since the kernel refuses to mount the partition as vfat, it seems that vol_id could apply a stricter check. I realize that vol_id can never be perfect, since the device metadata may be consistent with multiple formats. And I agree that device initialization tools (like mkswap) should zero out part of the device. But it would still help to make vol_id more exact, because this issue evidently bites users in practice. Perhaps there could be flags for quick-and-dirty check versus more complete check. I can send the strace output from running vol_id on this partition if somebody would like to look at it. Andrew -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]