0s autopkgtest [11:42:23]: starting date and time: 2024-05-18 11:42:23+0000 0s autopkgtest [11:42:23]: git checkout: 699e7f9f ssh-setup/nova: explicitely set 'fqdn' in cloud-init 0s autopkgtest [11:42:23]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.ym16jeyh/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.10+dfsg-2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@lcy02-25.secgroup --name adt-oracular-amd64-tomb-20240518-114223-juju-7f2275-prod-proposed-migration-environment-3-ae3ba371-9879-474d-8c4b-e77312534095 --image adt/ubuntu-oracular-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 283s autopkgtest [11:47:06]: testbed dpkg architecture: amd64 283s autopkgtest [11:47:06]: testbed apt version: 2.7.14build2 283s autopkgtest [11:47:06]: @@@@@@@@@@@@@@@@@@@@ test bed setup 284s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [73.9 kB] 284s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse Sources [8668 B] 284s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [1610 kB] 284s Get:4 http://ftpmaster.internal/ubuntu oracular-proposed/main Sources [132 kB] 284s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/restricted Sources [1964 B] 284s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/main amd64 Packages [239 kB] 284s Get:7 http://ftpmaster.internal/ubuntu oracular-proposed/main i386 Packages [192 kB] 284s Get:8 http://ftpmaster.internal/ubuntu oracular-proposed/restricted amd64 Packages [7700 B] 284s Get:9 http://ftpmaster.internal/ubuntu oracular-proposed/universe amd64 Packages [1949 kB] 284s Get:10 http://ftpmaster.internal/ubuntu oracular-proposed/universe i386 Packages [902 kB] 284s Get:11 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse i386 Packages [6036 B] 284s Get:12 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse amd64 Packages [18.5 kB] 285s Fetched 5141 kB in 1s (7174 kB/s) 285s Reading package lists... 286s Reading package lists... 287s Building dependency tree... 287s Reading state information... 287s Calculating upgrade... 288s The following packages will be upgraded: 288s dhcpcd-base intel-microcode libslang2 288s 3 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 288s Need to get 7582 kB of archives. 288s After this operation, 56.3 kB of additional disk space will be used. 288s Get:1 http://ftpmaster.internal/ubuntu oracular/main amd64 dhcpcd-base amd64 1:10.0.6-4 [215 kB] 288s Get:2 http://ftpmaster.internal/ubuntu oracular/main amd64 libslang2 amd64 2.3.3-5 [506 kB] 288s Get:3 http://ftpmaster.internal/ubuntu oracular/main amd64 intel-microcode amd64 3.20240514.1 [6861 kB] 288s Fetched 7582 kB in 0s (76.8 MB/s) 288s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73899 files and directories currently installed.) 288s Preparing to unpack .../dhcpcd-base_1%3a10.0.6-4_amd64.deb ... 288s Unpacking dhcpcd-base (1:10.0.6-4) over (1:10.0.6-1ubuntu3) ... 289s Preparing to unpack .../libslang2_2.3.3-5_amd64.deb ... 289s Unpacking libslang2:amd64 (2.3.3-5) over (2.3.3-3build2) ... 289s Preparing to unpack .../intel-microcode_3.20240514.1_amd64.deb ... 289s Unpacking intel-microcode (3.20240514.1) over (3.20240312.1build1) ... 289s Setting up intel-microcode (3.20240514.1) ... 289s update-initramfs: deferring update (trigger activated) 289s intel-microcode: microcode will be updated at next boot 289s Setting up libslang2:amd64 (2.3.3-5) ... 289s Setting up dhcpcd-base (1:10.0.6-4) ... 289s Processing triggers for man-db (2.12.0-4build2) ... 290s Processing triggers for libc-bin (2.39-0ubuntu8) ... 290s Processing triggers for initramfs-tools (0.142ubuntu25) ... 290s update-initramfs: Generating /boot/initrd.img-6.8.0-31-generic 290s W: No lz4 in /usr/bin:/sbin:/bin, using gzip 299s Reading package lists... 299s Building dependency tree... 299s Reading state information... 300s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 300s Hit:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease 300s Hit:2 http://ftpmaster.internal/ubuntu oracular InRelease 300s Hit:3 http://ftpmaster.internal/ubuntu oracular-updates InRelease 300s Hit:4 http://ftpmaster.internal/ubuntu oracular-security InRelease 301s Reading package lists... 301s Reading package lists... 302s Building dependency tree... 302s Reading state information... 302s Calculating upgrade... 302s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 302s Reading package lists... 302s Building dependency tree... 302s Reading state information... 303s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 303s autopkgtest [11:47:26]: rebooting testbed after setup commands that affected boot 306s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 318s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 322s autopkgtest [11:47:45]: testbed running kernel: Linux 6.8.0-31-generic #31-Ubuntu SMP PREEMPT_DYNAMIC Sat Apr 20 00:40:06 UTC 2024 322s autopkgtest [11:47:45]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 323s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (dsc) [2066 B] 323s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (tar) [1266 kB] 323s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (diff) [8084 B] 324s gpgv: Signature made Tue May 7 08:58:50 2024 UTC 324s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 324s gpgv: issuer "debmaint@g-e-u-e-r.de" 324s gpgv: Can't check signature: No public key 324s dpkg-source: warning: cannot verify inline signature for ./tomb_2.10+dfsg-2.dsc: no acceptable signature found 324s autopkgtest [11:47:47]: testing package tomb version 2.10+dfsg-2 324s autopkgtest [11:47:47]: build not needed 324s autopkgtest [11:47:47]: test create-and-use-a-tomb: preparing testbed 324s Reading package lists... 325s Building dependency tree... 325s Reading state information... 325s Starting pkgProblemResolver with broken count: 0 325s Starting 2 pkgProblemResolver with broken count: 0 325s Done 325s The following additional packages will be installed: 325s argon2 tomb zsh zsh-common 325s Suggested packages: 325s dcfldd pwdsphinx qrencode unoconv steghide swish-e zsh-doc 325s The following NEW packages will be installed: 325s argon2 autopkgtest-satdep tomb zsh zsh-common 325s 0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded. 325s Need to get 5059 kB/5060 kB of archives. 325s After this operation, 19.4 MB of additional disk space will be used. 325s Get:1 /tmp/autopkgtest.2GpCtd/1-autopkgtest-satdep.deb autopkgtest-satdep amd64 0 [716 B] 325s Get:2 http://ftpmaster.internal/ubuntu oracular/universe amd64 argon2 amd64 0~20190702+dfsg-4build1 [22.7 kB] 325s Get:3 http://ftpmaster.internal/ubuntu oracular/main amd64 zsh-common all 5.9-6ubuntu2 [4173 kB] 326s Get:4 http://ftpmaster.internal/ubuntu oracular/main amd64 zsh amd64 5.9-6ubuntu2 [812 kB] 326s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe amd64 tomb amd64 2.10+dfsg-2 [51.2 kB] 326s Fetched 5059 kB in 0s (53.8 MB/s) 326s Selecting previously unselected package argon2. 326s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73899 files and directories currently installed.) 326s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_amd64.deb ... 326s Unpacking argon2 (0~20190702+dfsg-4build1) ... 326s Selecting previously unselected package zsh-common. 326s Preparing to unpack .../zsh-common_5.9-6ubuntu2_all.deb ... 326s Unpacking zsh-common (5.9-6ubuntu2) ... 326s Selecting previously unselected package zsh. 326s Preparing to unpack .../zsh_5.9-6ubuntu2_amd64.deb ... 326s Unpacking zsh (5.9-6ubuntu2) ... 326s Selecting previously unselected package tomb. 326s Preparing to unpack .../tomb_2.10+dfsg-2_amd64.deb ... 326s Unpacking tomb (2.10+dfsg-2) ... 326s Selecting previously unselected package autopkgtest-satdep. 326s Preparing to unpack .../1-autopkgtest-satdep.deb ... 326s Unpacking autopkgtest-satdep (0) ... 327s Setting up argon2 (0~20190702+dfsg-4build1) ... 327s Setting up zsh-common (5.9-6ubuntu2) ... 327s Setting up zsh (5.9-6ubuntu2) ... 327s Setting up tomb (2.10+dfsg-2) ... 327s Setting up autopkgtest-satdep (0) ... 327s Processing triggers for debianutils (5.17build1) ... 327s Processing triggers for man-db (2.12.0-4build2) ... 329s (Reading database ... 75426 files and directories currently installed.) 329s Removing autopkgtest-satdep (0) ... 330s autopkgtest [11:47:53]: test create-and-use-a-tomb: [----------------------- 330s tomb . Commanded to dig tomb 330s tomb (*) Creating a new tomb in test.tomb 330s tomb . Generating test.tomb of 20MiB 330s 20+0 records in 330s 20+0 records out 330s 20971520 bytes (21 MB, 20 MiB) copied, 0.0993123 s, 211 MB/s 330s -rw------- 1 ubuntu ubuntu 20M May 18 11:47 test.tomb 330s tomb (*) Done digging test.tomb 330s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 330s tomb . tomb forge test.tomb.key 330s tomb . tomb lock test.tomb -k test.tomb.key 330s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 330s tomb . Using KDF to protect the key password (1 rounds) 330s tomb [W] This operation takes time. Keep using this computer on other tasks. 330s tomb [W] Once done you will be asked to choose a password for your tomb. 330s tomb [W] To make it faster you can move the mouse around. 330s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 330s 512+0 records in 330s 512+0 records out 330s 512 bytes copied, 0.00108413 s, 472 kB/s 330s tomb (*) Choose the password of your key: pbkdf2-test.key 330s tomb . (You can also change it later using 'tomb passwd'.) 330s tomb (*) Using KDF, iteration time: 1000000 330s tomb . generating salt 330s tomb . calculating iterations 331s tomb . encoding the password 333s tomb . Key is valid. 333s tomb . Done forging pbkdf2-test.key 333s tomb (*) Your key is ready: 333s -rw------- 1 ubuntu ubuntu 943 May 18 11:47 pbkdf2-test.key 333s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 333s tomb . Using KDF to protect the key password (1 rounds) 333s tomb [W] This operation takes time. Keep using this computer on other tasks. 333s tomb [W] Once done you will be asked to choose a password for your tomb. 333s tomb [W] To make it faster you can move the mouse around. 333s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 333s 512+0 records in 333s 512+0 records out 333s 512 bytes copied, 0.00095939 s, 534 kB/s 333s tomb (*) Choose the password of your key: argon2-test.key 333s tomb . (You can also change it later using 'tomb passwd'.) 333s tomb (*) Using KDF Argon2 333s tomb . memory used: 2^18 333s tomb . kdf salt: 9ae8e4aacdf10562f70e65ec3fd01aed00b7a4230d9690b1b50d688e4c075e8b 333s tomb . kdf iterations: 1 334s tomb . Key is valid. 334s tomb . Done forging argon2-test.key 334s tomb (*) Your key is ready: 334s -rw------- 1 ubuntu ubuntu 940 May 18 11:47 argon2-test.key 334s Testing ext4 file system using a pbkdf2 key ... 334s tomb . Commanded to dig tomb 334s tomb (*) Creating a new tomb in test.tomb 334s tomb . Generating test.tomb of 20MiB 334s 20+0 records in 334s 20+0 records out 334s 20971520 bytes (21 MB, 20 MiB) copied, 0.0994457 s, 211 MB/s 334s -rw------- 1 ubuntu ubuntu 20M May 18 11:47 test.tomb 334s tomb (*) Done digging test.tomb 334s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 334s tomb . tomb forge test.tomb.key 334s tomb . tomb lock test.tomb -k test.tomb.key 334s tomb . File is not yet a tomb: test.tomb 334s tomb . Valid tomb file found: test.tomb 334s tomb . Commanded to lock tomb test.tomb 334s tomb (*) Selected filesystem type ext4. 334s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 334s tomb . Fine, this tomb seems empty. 334s tomb . Key is valid. 334s tomb . Locking using cipher: aes-xts-plain64 334s tomb . A password is required to use key pbkdf2-test.key 334s tomb . Unlocking KDF key protection (pbkdf2sha1) 336s tomb . Password OK. 336s tomb (*) Locking test.tomb with pbkdf2-test.key 336s tomb . Formatting Luks mapped device. 341s tomb . Formatting your Tomb with ext4 filesystem. 341s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 341s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 341s tomb . Commanded to open tomb test.tomb 341s tomb . Valid tomb file found: test.tomb 341s tomb . Key is valid. 341s tomb . Mountpoint not specified, using default: /media/test 341s tomb (*) Opening test on /media/test 341s tomb . This tomb is a valid LUKS encrypted device. 341s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 341s tomb . A password is required to use key pbkdf2-test.key 341s tomb . Unlocking KDF key protection (pbkdf2sha1) 343s tomb . Password OK. 345s tomb (*) Success unlocking tomb test 345s tomb . Filesystem detected: ext4 345s tomb . Checking filesystem via /dev/loop0 345s fsck from util-linux 2.39.3 345s test: clean, 11/4608 files, 1324/4608 blocks 345s tomb (*) Success opening test.tomb on /media/test 345s Copying some data into the opened tomb ... 345s Opened tomb's content: 345s total 44 345s drwxr-xr-x 3 ubuntu ubuntu 4096 May 18 11:48 . 345s drwxr-xr-x 3 root root 4096 May 18 11:48 .. 345s -rw-r--r-- 1 ubuntu ubuntu 12 May 18 11:48 .host 345s -rw-r--r-- 1 ubuntu ubuntu 11 May 18 11:48 .last 345s -rw-r--r-- 1 ubuntu ubuntu 5 May 18 11:48 .uid 345s -rw------- 1 ubuntu ubuntu 940 May 18 11:47 argon2-test.key 345s drwx------ 2 ubuntu ubuntu 16384 May 18 11:48 lost+found 345s -rw------- 1 ubuntu ubuntu 943 May 18 11:47 pbkdf2-test.key 345s tomb . Closing tomb [test] mounted on /media/test 345s tomb (*) Tomb [test] closed: your bones will rest in peace. 345s Testing ext4 file system using a argon2 key ... 345s tomb . Commanded to dig tomb 345s tomb (*) Creating a new tomb in test.tomb 345s tomb . Generating test.tomb of 20MiB 345s 20+0 records in 345s 20+0 records out 345s 20971520 bytes (21 MB, 20 MiB) copied, 0.10423 s, 201 MB/s 345s -rw------- 1 ubuntu ubuntu 20M May 18 11:48 test.tomb 345s tomb (*) Done digging test.tomb 345s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 345s tomb . tomb forge test.tomb.key 345s tomb . tomb lock test.tomb -k test.tomb.key 345s tomb . File is not yet a tomb: test.tomb 346s tomb . Valid tomb file found: test.tomb 346s tomb . Commanded to lock tomb test.tomb 346s tomb (*) Selected filesystem type ext4. 346s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 346s tomb . Fine, this tomb seems empty. 346s tomb . Key is valid. 346s tomb . Locking using cipher: aes-xts-plain64 346s tomb . A password is required to use key argon2-test.key 346s tomb . Unlocking KDF key protection (argon2) 346s tomb . Password OK. 346s tomb (*) Locking test.tomb with argon2-test.key 346s tomb . Formatting Luks mapped device. 353s tomb . Formatting your Tomb with ext4 filesystem. 353s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 353s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 353s tomb . Commanded to open tomb test.tomb 353s tomb . Valid tomb file found: test.tomb 353s tomb . Key is valid. 353s tomb . Mountpoint not specified, using default: /media/test 353s tomb (*) Opening test on /media/test 353s tomb . This tomb is a valid LUKS encrypted device. 353s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 353s tomb . A password is required to use key argon2-test.key 353s tomb . Unlocking KDF key protection (argon2) 353s tomb . Password OK. 356s tomb (*) Success unlocking tomb test 356s tomb . Filesystem detected: ext4 356s tomb . Checking filesystem via /dev/loop0 356s fsck from util-linux 2.39.3 356s test: clean, 11/4608 files, 1324/4608 blocks 356s tomb (*) Success opening test.tomb on /media/test 356s Copying some data into the opened tomb ... 356s Opened tomb's content: 356s total 44 356s drwxr-xr-x 3 ubuntu ubuntu 4096 May 18 11:48 . 356s drwxr-xr-x 3 root root 4096 May 18 11:48 .. 356s -rw-r--r-- 1 ubuntu ubuntu 12 May 18 11:48 .host 356s -rw-r--r-- 1 ubuntu ubuntu 11 May 18 11:48 .last 356s -rw-r--r-- 1 ubuntu ubuntu 5 May 18 11:48 .uid 356s -rw------- 1 ubuntu ubuntu 940 May 18 11:47 argon2-test.key 356s drwx------ 2 ubuntu ubuntu 16384 May 18 11:48 lost+found 356s -rw------- 1 ubuntu ubuntu 943 May 18 11:47 pbkdf2-test.key 356s tomb . Closing tomb [test] mounted on /media/test 356s tomb (*) Tomb [test] closed: your bones will rest in peace. 356s Testing btrfs file system using a pbkdf2 key ... 356s tomb . Commanded to dig tomb 356s tomb (*) Creating a new tomb in test.tomb 356s tomb . Generating test.tomb of 115MiB 357s 115+0 records in 357s 115+0 records out 357s 120586240 bytes (121 MB, 115 MiB) copied, 0.639609 s, 189 MB/s 357s -rw------- 1 ubuntu ubuntu 115M May 18 11:48 test.tomb 357s tomb (*) Done digging test.tomb 357s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 357s tomb . tomb forge test.tomb.key 357s tomb . tomb lock test.tomb -k test.tomb.key 357s tomb . File is not yet a tomb: test.tomb 357s tomb . Valid tomb file found: test.tomb 357s tomb . Commanded to lock tomb test.tomb 357s tomb (*) Selected filesystem type btrfs. 357s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 357s tomb . Fine, this tomb seems empty. 357s tomb . Key is valid. 357s tomb . Locking using cipher: aes-xts-plain64 357s tomb . A password is required to use key pbkdf2-test.key 357s tomb . Unlocking KDF key protection (pbkdf2sha1) 358s tomb . Password OK. 358s tomb (*) Locking test.tomb with pbkdf2-test.key 358s tomb . Formatting Luks mapped device. 366s tomb . Formatting your Tomb with btrfs filesystem. 366s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 366s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 366s tomb . Commanded to open tomb test.tomb 366s tomb . Valid tomb file found: test.tomb 366s tomb . Key is valid. 366s tomb . Mountpoint not specified, using default: /media/test 366s tomb (*) Opening test on /media/test 366s tomb . This tomb is a valid LUKS encrypted device. 366s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 366s tomb . A password is required to use key pbkdf2-test.key 366s tomb . Unlocking KDF key protection (pbkdf2sha1) 367s tomb . Password OK. 370s tomb (*) Success unlocking tomb test 370s tomb . Filesystem detected: btrfs 370s tomb . Checking filesystem via /dev/loop0 370s [1/7] checking root items 370s [2/7] checking extents 370s [3/7] checking free space tree 370s [4/7] checking fs roots 370s [5/7] checking only csums items (without verifying data) 370s [6/7] checking root refs 370s [7/7] checking quota groups skipped (not enabled on this FS) 370s Opening filesystem to check... 370s Checking filesystem on /dev/mapper/tomb.test.2f1ac8bafa021da3835264d0f76d9c1f5129c16b867220bc25da65230ec78d54.loop0 370s UUID: 8a08c1e6-8f45-4494-bb9e-d3932b867a8b 370s found 147456 bytes used, no error found 370s total csum bytes: 0 370s total tree bytes: 147456 370s total fs tree bytes: 32768 370s total extent tree bytes: 16384 370s btree space waste bytes: 140595 370s file data blocks allocated: 0 370s referenced 0 370s tomb (*) Success opening test.tomb on /media/test 370s Copying some data into the opened tomb ... 370s Opened tomb's content: 370s total 40 370s drwxr-xr-x 1 ubuntu ubuntu 88 May 18 11:48 . 370s drwxr-xr-x 3 root root 4096 May 18 11:48 .. 370s -rw-r--r-- 1 ubuntu ubuntu 12 May 18 11:48 .host 370s -rw-r--r-- 1 ubuntu ubuntu 11 May 18 11:48 .last 370s -rw-r--r-- 1 ubuntu ubuntu 5 May 18 11:48 .uid 370s -rw------- 1 ubuntu ubuntu 940 May 18 11:47 argon2-test.key 370s -rw------- 1 ubuntu ubuntu 943 May 18 11:47 pbkdf2-test.key 370s tomb . Closing tomb [test] mounted on /media/test 370s tomb (*) Tomb [test] closed: your bones will rest in peace. 370s Testing btrfsmixedmode file system using a argon2 key ... 370s tomb . Commanded to dig tomb 370s tomb (*) Creating a new tomb in test.tomb 370s tomb . Generating test.tomb of 20MiB 370s 20+0 records in 370s 20+0 records out 370s 20971520 bytes (21 MB, 20 MiB) copied, 0.106298 s, 197 MB/s 370s -rw------- 1 ubuntu ubuntu 20M May 18 11:48 test.tomb 370s tomb (*) Done digging test.tomb 370s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 370s tomb . tomb forge test.tomb.key 370s tomb . tomb lock test.tomb -k test.tomb.key 370s tomb . File is not yet a tomb: test.tomb 370s tomb . Valid tomb file found: test.tomb 370s tomb . Commanded to lock tomb test.tomb 370s tomb (*) Selected filesystem type btrfsmixedmode. 371s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 371s tomb . Fine, this tomb seems empty. 371s tomb . Key is valid. 371s tomb . Locking using cipher: aes-xts-plain64 371s tomb . A password is required to use key argon2-test.key 371s tomb . Unlocking KDF key protection (argon2) 371s tomb . Password OK. 371s tomb (*) Locking test.tomb with argon2-test.key 371s tomb . Formatting Luks mapped device. 378s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 378s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 378s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 378s tomb . Commanded to open tomb test.tomb 378s tomb . Valid tomb file found: test.tomb 378s tomb . Key is valid. 378s tomb . Mountpoint not specified, using default: /media/test 378s tomb (*) Opening test on /media/test 378s tomb . This tomb is a valid LUKS encrypted device. 378s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 378s tomb . A password is required to use key argon2-test.key 378s tomb . Unlocking KDF key protection (argon2) 379s tomb . Password OK. 381s tomb (*) Success unlocking tomb test 381s tomb . Filesystem detected: btrfs 381s tomb . Checking filesystem via /dev/loop0 381s [1/7] checking root items 381s [2/7] checking extents 381s [3/7] checking free space tree 381s [4/7] checking fs roots 381s [5/7] checking only csums items (without verifying data) 381s [6/7] checking root refs 381s [7/7] checking quota groups skipped (not enabled on this FS) 381s Opening filesystem to check... 381s Checking filesystem on /dev/mapper/tomb.test.2f1ac8bafa021da3835264d0f76d9c1f5129c16b867220bc25da65230ec78d54.loop0 381s UUID: 50ee060b-9672-4eff-92d3-eac426834026 381s found 36864 bytes used, no error found 381s total csum bytes: 0 381s total tree bytes: 36864 381s total fs tree bytes: 8192 381s total extent tree bytes: 4096 381s btree space waste bytes: 30304 381s file data blocks allocated: 0 381s referenced 0 381s tomb (*) Success opening test.tomb on /media/test 381s Copying some data into the opened tomb ... 381s Opened tomb's content: 381s total 28 381s drwxr-xr-x 1 ubuntu ubuntu 88 May 18 11:48 . 381s drwxr-xr-x 3 root root 4096 May 18 11:48 .. 381s -rw-r--r-- 1 ubuntu ubuntu 12 May 18 11:48 .host 381s -rw-r--r-- 1 ubuntu ubuntu 11 May 18 11:48 .last 381s -rw-r--r-- 1 ubuntu ubuntu 5 May 18 11:48 .uid 381s -rw------- 1 ubuntu ubuntu 940 May 18 11:47 argon2-test.key 381s -rw------- 1 ubuntu ubuntu 943 May 18 11:47 pbkdf2-test.key 381s tomb . Closing tomb [test] mounted on /media/test 381s tomb (*) Tomb [test] closed: your bones will rest in peace. 382s autopkgtest [11:48:45]: test create-and-use-a-tomb: -----------------------] 382s create-and-use-a-tomb PASS 382s autopkgtest [11:48:45]: test create-and-use-a-tomb: - - - - - - - - - - results - - - - - - - - - - 382s autopkgtest [11:48:45]: @@@@@@@@@@@@@@@@@@@@ summary 382s create-and-use-a-tomb PASS 406s flock: timeout while waiting to get lock 406s Creating nova instance adt-oracular-amd64-tomb-20240518-114223-juju-7f2275-prod-proposed-migration-environment-3-ae3ba371-9879-474d-8c4b-e77312534095 from image adt/ubuntu-oracular-amd64-server-20240517.img (UUID 563125b5-f02b-4a53-8995-aabb4f54fc43)...