As a first step, I created a script which exercises all combinations of luks with ext2/ext3/ext4/swap/vfat.
This runs fine on current karmic, which shows that all the mkfs.* are fixed now and we don't create further breakage with the karmic versions. The script needs to run as root, and uses /dev/ram0 for testing, so please make sure that you don't use this! (or change it in the script, it's a variable at the top). Expected output: $ sudo ./test-luks-blkid.sh *** test pair: luks/ext2 *** ext2 luks ext2 *** test pair: luks/ext3 *** ext3 luks ext3 *** test pair: luks/ext4 *** ext4 luks ext4 *** test pair: luks/swap *** swap luks swap *** test pair: luks/vfat *** vfat luks vfat On Jaunty, this demonstrates that cryptsetup doesn't properly clean traces of ext: $ ./test-luks-blkid.sh *** test pair: luks/ext2 *** ext2 luks FAIL: Expected fs type: crypto_LUKS; blkid result /dev/ram0: LABEL="MyExt2" UUID="a359cbd4-d406-4aa8-a0a2-807697a50710" TYPE="ext2" Since most things in Jaunty use vol_id, I also added a vol_id mode to the script, which gets a little further due to the different preference order of vol_id. It still stumbles over luks-after-swap: [jaunty] # ./test-luks-blkid.sh vol_id *** test pair: luks/ext2 *** ext2 luks ext2 *** test pair: luks/ext3 *** ext3 luks ext3 *** test pair: luks/ext4 *** ext4 luks ext4 *** test pair: luks/swap *** swap luks unknown or non-unique volume type (--probe-all lists possibly conflicting types) [jaunty] # vol_id --probe-all /dev/ram0 swap crypto_LUKS On hardy, blkid behaves exactly the same. vol_id did not yet prefer luks over swap at that time (and the script can't test ext4, sinced that wasn't available yet): [hardy] # ./test-luks-blkid.sh vol_id *** test pair: luks/ext2 *** ext2 luks ext2 *** test pair: luks/ext3 *** ext3 luks ext3 *** test pair: luks/swap *** swap luks FAIL: Expected fs type: crypto_LUKS; vol_id result ID_FS_USAGE=other ID_FS_TYPE=swap ID_FS_VERSION=2 ID_FS_UUID=fa48b160-08fb-44a5-9db5-1be7440912e5 ID_FS_UUID_ENC=fa48b160-08fb-44a5-9db5-1be7440912e5 ID_FS_LABEL= ID_FS_LABEL_ENC= ID_FS_LABEL_SAFE= [hardy] # vol_id --probe-all /dev/ram0 swap crypto_LUKS Another real-world test case is the ext3-luks.img which is attached here, which can be used to verify a proposed karmic fix for blkid: $ BLKID_DEBUG=0xffff blkid -p /tmp/ext3-luks.img [...] ERROR: ambivalent result detected (2 filesystems)! /tmp/ext3-luks.img: ambivalent result (probably more filesystems on the device) ** Attachment added: "test-luks-blkid.sh" http://launchpadlibrarian.net/34094423/test-luks-blkid.sh -- luks encrypted partition not detected https://bugs.launchpad.net/bugs/428435 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs