I suspect I have a similar problem to the reporter of this bug.  I have
a swap partition that is set up as an encrypted dm device with a random
key, using the cryptsetup package.  cryptsetup now has a test that calls
vol_id, which thinks that my partition is vfat:

    % sudo /lib/udev/vol_id /dev/hda2                
    ID_FS_USAGE=filesystem
    ID_FS_TYPE=vfat
    ID_FS_VERSION=FAT32
    ID_FS_UUID=
    ID_FS_LABEL=
    ID_FS_LABEL_SAFE=

    % sudo mount -t vfat /dev/hda2 /mnt/tmp
    mount: /dev/hda2: can't read superblock

Inspecting this partition, I see clearly "MSDOS5.0", presumably the
long-preserved remnants of a vfat filesystem.  However, since the kernel
refuses to mount the partition as vfat, it seems that vol_id could apply
a stricter check.

I realize that vol_id can never be perfect, since the device metadata
may be consistent with multiple formats.  And I agree that device
initialization tools (like mkswap) should zero out part of the device.
But it would still help to make vol_id more exact, because this issue
evidently bites users in practice.  Perhaps there could be flags for
quick-and-dirty check versus more complete check.

I can send the strace output from running vol_id on this partition if
somebody would like to look at it.

Andrew


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to