0s autopkgtest [20:25:02]: starting date and time: 2024-05-07 20:25:02+0000 0s autopkgtest [20:25:02]: git checkout: 699e7f9f ssh-setup/nova: explicitely set 'fqdn' in cloud-init 0s autopkgtest [20:25:02]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.njj72mxn/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.10+dfsg-2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@bos01-arm64-12.secgroup --name adt-oracular-arm64-tomb-20240507-202502-juju-7f2275-prod-proposed-migration-environment-3-ecf02900-0fca-45a4-ae4f-60083b268ace --image adt/ubuntu-oracular-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://us.ports.ubuntu.com/ubuntu-ports/ 160s autopkgtest [20:27:42]: testbed dpkg architecture: arm64 160s autopkgtest [20:27:42]: testbed apt version: 2.7.14build2 160s autopkgtest [20:27:42]: @@@@@@@@@@@@@@@@@@@@ test bed setup 161s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [64.7 kB] 162s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/restricted Sources [1964 B] 162s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse Sources [15.4 kB] 162s Get:4 http://ftpmaster.internal/ubuntu oracular-proposed/main Sources [103 kB] 163s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [1138 kB] 163s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/main arm64 Packages [164 kB] 163s Get:7 http://ftpmaster.internal/ubuntu oracular-proposed/restricted arm64 Packages [12.3 kB] 163s Get:8 http://ftpmaster.internal/ubuntu oracular-proposed/universe arm64 Packages [895 kB] 163s Get:9 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse arm64 Packages [16.7 kB] 163s Fetched 2410 kB in 2s (1523 kB/s) 163s Reading package lists... 168s Reading package lists... 169s Building dependency tree... 169s Reading state information... 171s Calculating upgrade... 172s The following packages will be upgraded: 172s libnghttp2-14 nano 172s 2 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 172s Need to get 360 kB of archives. 172s After this operation, 9216 B of additional disk space will be used. 172s Get:1 http://ftpmaster.internal/ubuntu oracular/main arm64 libnghttp2-14 arm64 1.61.0-1 [74.8 kB] 172s Get:2 http://ftpmaster.internal/ubuntu oracular/main arm64 nano arm64 8.0-1 [286 kB] 173s Fetched 360 kB in 1s (655 kB/s) 174s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 77903 files and directories currently installed.) 174s Preparing to unpack .../libnghttp2-14_1.61.0-1_arm64.deb ... 174s Unpacking libnghttp2-14:arm64 (1.61.0-1) over (1.59.0-1build4) ... 174s Preparing to unpack .../archives/nano_8.0-1_arm64.deb ... 174s Unpacking nano (8.0-1) over (7.2-2build1) ... 174s Setting up libnghttp2-14:arm64 (1.61.0-1) ... 174s Setting up nano (8.0-1) ... 174s Installing new version of config file /etc/nanorc ... 174s Processing triggers for libc-bin (2.39-0ubuntu8) ... 175s Processing triggers for man-db (2.12.0-4build2) ... 177s Processing triggers for install-info (7.1-3build2) ... 178s Reading package lists... 179s Building dependency tree... 179s Reading state information... 181s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 182s Hit:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease 182s Hit:2 http://ftpmaster.internal/ubuntu oracular InRelease 182s Hit:3 http://ftpmaster.internal/ubuntu oracular-updates InRelease 182s Hit:4 http://ftpmaster.internal/ubuntu oracular-security InRelease 186s Reading package lists... 186s Reading package lists... 186s Building dependency tree... 186s Reading state information... 188s Calculating upgrade... 189s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 189s Reading package lists... 190s Building dependency tree... 190s Reading state information... 192s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 196s autopkgtest [20:28:18]: testbed running kernel: Linux 6.8.0-31-generic #31-Ubuntu SMP PREEMPT_DYNAMIC Sat Apr 20 02:32:42 UTC 2024 196s autopkgtest [20:28:18]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 199s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (dsc) [2066 B] 199s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (tar) [1266 kB] 199s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (diff) [8084 B] 200s gpgv: Signature made Tue May 7 08:58:50 2024 UTC 200s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 200s gpgv: issuer "debmaint@g-e-u-e-r.de" 200s gpgv: Can't check signature: No public key 200s dpkg-source: warning: cannot verify inline signature for ./tomb_2.10+dfsg-2.dsc: no acceptable signature found 200s autopkgtest [20:28:22]: testing package tomb version 2.10+dfsg-2 201s autopkgtest [20:28:23]: build not needed 208s autopkgtest [20:28:30]: test create-and-use-a-tomb: preparing testbed 209s Reading package lists... 210s Building dependency tree... 210s Reading state information... 211s Starting pkgProblemResolver with broken count: 0 211s Starting 2 pkgProblemResolver with broken count: 0 211s Done 213s The following additional packages will be installed: 213s argon2 tomb zsh zsh-common 213s Suggested packages: 213s dcfldd pwdsphinx qrencode unoconv steghide swish-e zsh-doc 213s The following NEW packages will be installed: 213s argon2 autopkgtest-satdep tomb zsh zsh-common 213s 0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded. 213s Need to get 5044 kB/5044 kB of archives. 213s After this operation, 21.1 MB of additional disk space will be used. 213s Get:1 /tmp/autopkgtest.rc5ARJ/1-autopkgtest-satdep.deb autopkgtest-satdep arm64 0 [716 B] 213s Get:2 http://ftpmaster.internal/ubuntu oracular/universe arm64 argon2 arm64 0~20190702+dfsg-4build1 [22.8 kB] 213s Get:3 http://ftpmaster.internal/ubuntu oracular/main arm64 zsh-common all 5.9-6ubuntu2 [4173 kB] 214s Get:4 http://ftpmaster.internal/ubuntu oracular/main arm64 zsh arm64 5.9-6ubuntu2 [797 kB] 215s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe arm64 tomb arm64 2.10+dfsg-2 [51.4 kB] 216s Fetched 5044 kB in 2s (2995 kB/s) 216s Selecting previously unselected package argon2. 216s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 77903 files and directories currently installed.) 216s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_arm64.deb ... 216s Unpacking argon2 (0~20190702+dfsg-4build1) ... 216s Selecting previously unselected package zsh-common. 216s Preparing to unpack .../zsh-common_5.9-6ubuntu2_all.deb ... 216s Unpacking zsh-common (5.9-6ubuntu2) ... 217s Selecting previously unselected package zsh. 217s Preparing to unpack .../zsh_5.9-6ubuntu2_arm64.deb ... 217s Unpacking zsh (5.9-6ubuntu2) ... 217s Selecting previously unselected package tomb. 217s Preparing to unpack .../tomb_2.10+dfsg-2_arm64.deb ... 217s Unpacking tomb (2.10+dfsg-2) ... 217s Selecting previously unselected package autopkgtest-satdep. 217s Preparing to unpack .../1-autopkgtest-satdep.deb ... 217s Unpacking autopkgtest-satdep (0) ... 217s Setting up argon2 (0~20190702+dfsg-4build1) ... 217s Setting up zsh-common (5.9-6ubuntu2) ... 217s Setting up zsh (5.9-6ubuntu2) ... 217s Setting up tomb (2.10+dfsg-2) ... 217s Setting up autopkgtest-satdep (0) ... 217s Processing triggers for debianutils (5.17build1) ... 217s Processing triggers for man-db (2.12.0-4build2) ... 226s (Reading database ... 79430 files and directories currently installed.) 226s Removing autopkgtest-satdep (0) ... 227s autopkgtest [20:28:49]: test create-and-use-a-tomb: [----------------------- 227s tomb . Commanded to dig tomb 227s tomb (*) Creating a new tomb in test.tomb 227s tomb . Generating test.tomb of 20MiB 228s 20+0 records in 228s 20+0 records out 228s 20971520 bytes (21 MB, 20 MiB) copied, 0.230458 s, 91.0 MB/s 228s -rw------- 1 ubuntu ubuntu 20M May 7 20:28 test.tomb 228s tomb (*) Done digging test.tomb 228s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 228s tomb . tomb forge test.tomb.key 228s tomb . tomb lock test.tomb -k test.tomb.key 228s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 228s tomb . Using KDF to protect the key password (1 rounds) 228s tomb [W] This operation takes time. Keep using this computer on other tasks. 228s tomb [W] Once done you will be asked to choose a password for your tomb. 228s tomb [W] To make it faster you can move the mouse around. 228s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 228s 512+0 records in 228s 512+0 records out 228s 512 bytes copied, 0.0159776 s, 32.0 kB/s 228s tomb (*) Choose the password of your key: pbkdf2-test.key 228s tomb . (You can also change it later using 'tomb passwd'.) 228s tomb (*) Using KDF, iteration time: 1000000 228s tomb . generating salt 228s tomb . calculating iterations 230s tomb . encoding the password 232s tomb . Key is valid. 232s tomb . Done forging pbkdf2-test.key 232s tomb (*) Your key is ready: 232s -rw------- 1 ubuntu ubuntu 946 May 7 20:28 pbkdf2-test.key 232s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 232s tomb . Using KDF to protect the key password (1 rounds) 232s tomb [W] This operation takes time. Keep using this computer on other tasks. 232s tomb [W] Once done you will be asked to choose a password for your tomb. 232s tomb [W] To make it faster you can move the mouse around. 232s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 232s 512+0 records in 232s 512+0 records out 232s 512 bytes copied, 0.00596889 s, 85.8 kB/s 232s tomb (*) Choose the password of your key: argon2-test.key 232s tomb . (You can also change it later using 'tomb passwd'.) 232s tomb (*) Using KDF Argon2 232s tomb . memory used: 2^18 232s tomb . kdf salt: d038f43d7a26253b70ca9d312952f2be53f75bc0b1e715c84362eb44af14fa9e 232s tomb . kdf iterations: 1 233s tomb . Key is valid. 233s tomb . Done forging argon2-test.key 233s tomb (*) Your key is ready: 233s -rw------- 1 ubuntu ubuntu 936 May 7 20:28 argon2-test.key 233s Testing ext4 file system using a pbkdf2 key ... 234s tomb . Commanded to dig tomb 234s tomb (*) Creating a new tomb in test.tomb 234s tomb . Generating test.tomb of 20MiB 234s 20+0 records in 234s 20+0 records out 234s 20971520 bytes (21 MB, 20 MiB) copied, 0.236351 s, 88.7 MB/s 234s -rw------- 1 ubuntu ubuntu 20M May 7 20:28 test.tomb 234s tomb (*) Done digging test.tomb 234s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 234s tomb . tomb forge test.tomb.key 234s tomb . tomb lock test.tomb -k test.tomb.key 234s tomb . File is not yet a tomb: test.tomb 234s tomb . Valid tomb file found: test.tomb 234s tomb . Commanded to lock tomb test.tomb 234s tomb (*) Selected filesystem type ext4. 234s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 234s tomb . Fine, this tomb seems empty. 235s tomb . Key is valid. 235s tomb . Locking using cipher: aes-xts-plain64 235s tomb . A password is required to use key pbkdf2-test.key 235s tomb . Unlocking KDF key protection (pbkdf2sha1) 236s tomb . Password OK. 236s tomb (*) Locking test.tomb with pbkdf2-test.key 236s tomb . Formatting Luks mapped device. 242s tomb . Formatting your Tomb with ext4 filesystem. 242s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 242s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 242s tomb . Commanded to open tomb test.tomb 243s tomb . Valid tomb file found: test.tomb 243s tomb . Key is valid. 243s tomb . Mountpoint not specified, using default: /media/test 243s tomb (*) Opening test on /media/test 243s tomb . This tomb is a valid LUKS encrypted device. 243s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 243s tomb . A password is required to use key pbkdf2-test.key 243s tomb . Unlocking KDF key protection (pbkdf2sha1) 244s tomb . Password OK. 246s tomb (*) Success unlocking tomb test 246s tomb . Filesystem detected: ext4 246s tomb . Checking filesystem via /dev/loop0 246s fsck from util-linux 2.39.3 246s test: clean, 11/4608 files, 1324/4608 blocks 246s tomb (*) Success opening test.tomb on /media/test 247s Copying some data into the opened tomb ... 247s Opened tomb's content: 247s total 44 247s drwxr-xr-x 3 ubuntu ubuntu 4096 May 7 20:29 . 247s drwxr-xr-x 3 root root 4096 May 7 20:29 .. 247s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:29 .host 247s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:29 .last 247s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:29 .uid 247s -rw------- 1 ubuntu ubuntu 936 May 7 20:28 argon2-test.key 247s drwx------ 2 ubuntu ubuntu 16384 May 7 20:29 lost+found 247s -rw------- 1 ubuntu ubuntu 946 May 7 20:28 pbkdf2-test.key 247s tomb . Closing tomb [test] mounted on /media/test 247s tomb (*) Tomb [test] closed: your bones will rest in peace. 247s Testing ext4 file system using a argon2 key ... 247s tomb . Commanded to dig tomb 247s tomb (*) Creating a new tomb in test.tomb 247s tomb . Generating test.tomb of 20MiB 248s 20+0 records in 248s 20+0 records out 248s 20971520 bytes (21 MB, 20 MiB) copied, 0.215689 s, 97.2 MB/s 248s -rw------- 1 ubuntu ubuntu 20M May 7 20:29 test.tomb 248s tomb (*) Done digging test.tomb 248s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 248s tomb . tomb forge test.tomb.key 248s tomb . tomb lock test.tomb -k test.tomb.key 248s tomb . File is not yet a tomb: test.tomb 248s tomb . Valid tomb file found: test.tomb 248s tomb . Commanded to lock tomb test.tomb 248s tomb (*) Selected filesystem type ext4. 248s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 248s tomb . Fine, this tomb seems empty. 248s tomb . Key is valid. 248s tomb . Locking using cipher: aes-xts-plain64 248s tomb . A password is required to use key argon2-test.key 248s tomb . Unlocking KDF key protection (argon2) 250s tomb . Password OK. 250s tomb (*) Locking test.tomb with argon2-test.key 250s tomb . Formatting Luks mapped device. 257s tomb . Formatting your Tomb with ext4 filesystem. 257s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 257s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 257s tomb . Commanded to open tomb test.tomb 257s tomb . Valid tomb file found: test.tomb 257s tomb . Key is valid. 257s tomb . Mountpoint not specified, using default: /media/test 257s tomb (*) Opening test on /media/test 258s tomb . This tomb is a valid LUKS encrypted device. 258s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 258s tomb . A password is required to use key argon2-test.key 258s tomb . Unlocking KDF key protection (argon2) 259s tomb . Password OK. 261s tomb (*) Success unlocking tomb test 261s tomb . Filesystem detected: ext4 261s tomb . Checking filesystem via /dev/loop0 261s fsck from util-linux 2.39.3 261s test: clean, 11/4608 files, 1324/4608 blocks 262s tomb (*) Success opening test.tomb on /media/test 262s Copying some data into the opened tomb ... 262s Opened tomb's content: 262s total 44 262s drwxr-xr-x 3 ubuntu ubuntu 4096 May 7 20:29 . 262s drwxr-xr-x 3 root root 4096 May 7 20:29 .. 262s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:29 .host 262s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:29 .last 262s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:29 .uid 262s -rw------- 1 ubuntu ubuntu 936 May 7 20:28 argon2-test.key 262s drwx------ 2 ubuntu ubuntu 16384 May 7 20:29 lost+found 262s -rw------- 1 ubuntu ubuntu 946 May 7 20:28 pbkdf2-test.key 263s tomb . Closing tomb [test] mounted on /media/test 263s tomb (*) Tomb [test] closed: your bones will rest in peace. 263s Testing btrfs file system using a pbkdf2 key ... 263s tomb . Commanded to dig tomb 263s tomb (*) Creating a new tomb in test.tomb 263s tomb . Generating test.tomb of 115MiB 265s 115+0 records in 265s 115+0 records out 265s 120586240 bytes (121 MB, 115 MiB) copied, 1.50099 s, 80.3 MB/s 265s -rw------- 1 ubuntu ubuntu 115M May 7 20:29 test.tomb 265s tomb (*) Done digging test.tomb 265s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 265s tomb . tomb forge test.tomb.key 265s tomb . tomb lock test.tomb -k test.tomb.key 265s tomb . File is not yet a tomb: test.tomb 265s tomb . Valid tomb file found: test.tomb 265s tomb . Commanded to lock tomb test.tomb 265s tomb (*) Selected filesystem type btrfs. 265s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 266s tomb . Fine, this tomb seems empty. 266s tomb . Key is valid. 266s tomb . Locking using cipher: aes-xts-plain64 266s tomb . A password is required to use key pbkdf2-test.key 266s tomb . Unlocking KDF key protection (pbkdf2sha1) 267s tomb . Password OK. 267s tomb (*) Locking test.tomb with pbkdf2-test.key 267s tomb . Formatting Luks mapped device. 274s tomb . Formatting your Tomb with btrfs filesystem. 274s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 274s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 274s tomb . Commanded to open tomb test.tomb 275s tomb . Valid tomb file found: test.tomb 275s tomb . Key is valid. 275s tomb . Mountpoint not specified, using default: /media/test 275s tomb (*) Opening test on /media/test 275s tomb . This tomb is a valid LUKS encrypted device. 275s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 275s tomb . A password is required to use key pbkdf2-test.key 275s tomb . Unlocking KDF key protection (pbkdf2sha1) 276s tomb . Password OK. 279s tomb (*) Success unlocking tomb test 279s tomb . Filesystem detected: btrfs 279s tomb . Checking filesystem via /dev/loop0 279s [1/7] checking root items 279s [2/7] checking extents 279s [3/7] checking free space tree 279s [4/7] checking fs roots 279s [5/7] checking only csums items (without verifying data) 279s [6/7] checking root refs 279s [7/7] checking quota groups skipped (not enabled on this FS) 279s Opening filesystem to check... 279s Checking filesystem on /dev/mapper/tomb.test.71451aac46efe4106946139cbc93b54ef9983a4bf14d27f01a2160a22cc99ad8.loop0 279s UUID: e80e4579-864e-492c-8439-88d707425410 279s found 147456 bytes used, no error found 279s total csum bytes: 0 279s total tree bytes: 147456 279s total fs tree bytes: 32768 279s total extent tree bytes: 16384 279s btree space waste bytes: 140595 279s file data blocks allocated: 0 279s referenced 0 279s tomb (*) Success opening test.tomb on /media/test 279s Copying some data into the opened tomb ... 279s Opened tomb's content: 279s total 40 279s drwxr-xr-x 1 ubuntu ubuntu 88 May 7 20:29 . 279s drwxr-xr-x 3 root root 4096 May 7 20:29 .. 279s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:29 .host 279s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:29 .last 279s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:29 .uid 279s -rw------- 1 ubuntu ubuntu 936 May 7 20:28 argon2-test.key 279s -rw------- 1 ubuntu ubuntu 946 May 7 20:28 pbkdf2-test.key 280s tomb . Closing tomb [test] mounted on /media/test 280s tomb (*) Tomb [test] closed: your bones will rest in peace. 280s Testing btrfsmixedmode file system using a argon2 key ... 281s tomb . Commanded to dig tomb 281s tomb (*) Creating a new tomb in test.tomb 281s tomb . Generating test.tomb of 20MiB 281s 20+0 records in 281s 20+0 records out 281s 20971520 bytes (21 MB, 20 MiB) copied, 0.178339 s, 118 MB/s 281s -rw------- 1 ubuntu ubuntu 20M May 7 20:29 test.tomb 281s tomb (*) Done digging test.tomb 281s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 281s tomb . tomb forge test.tomb.key 281s tomb . tomb lock test.tomb -k test.tomb.key 281s tomb . File is not yet a tomb: test.tomb 281s tomb . Valid tomb file found: test.tomb 281s tomb . Commanded to lock tomb test.tomb 281s tomb (*) Selected filesystem type btrfsmixedmode. 281s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 281s tomb . Fine, this tomb seems empty. 281s tomb . Key is valid. 281s tomb . Locking using cipher: aes-xts-plain64 281s tomb . A password is required to use key argon2-test.key 281s tomb . Unlocking KDF key protection (argon2) 283s tomb . Password OK. 283s tomb (*) Locking test.tomb with argon2-test.key 283s tomb . Formatting Luks mapped device. 291s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 291s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 291s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 292s tomb . Commanded to open tomb test.tomb 292s tomb . Valid tomb file found: test.tomb 292s tomb . Key is valid. 292s tomb . Mountpoint not specified, using default: /media/test 292s tomb (*) Opening test on /media/test 292s tomb . This tomb is a valid LUKS encrypted device. 292s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 292s tomb . A password is required to use key argon2-test.key 292s tomb . Unlocking KDF key protection (argon2) 294s tomb . Password OK. 297s tomb (*) Success unlocking tomb test 297s tomb . Filesystem detected: btrfs 297s tomb . Checking filesystem via /dev/loop0 297s [1/7] checking root items 297s [2/7] checking extents 297s [3/7] checking free space tree 297s [4/7] checking fs roots 297s [5/7] checking only csums items (without verifying data) 297s [6/7] checking root refs 297s [7/7] checking quota groups skipped (not enabled on this FS) 297s Opening filesystem to check... 297s Checking filesystem on /dev/mapper/tomb.test.71451aac46efe4106946139cbc93b54ef9983a4bf14d27f01a2160a22cc99ad8.loop0 297s UUID: 5115bcc3-4b3b-4132-9d83-727735c53cae 297s found 36864 bytes used, no error found 297s total csum bytes: 0 297s total tree bytes: 36864 297s total fs tree bytes: 8192 297s total extent tree bytes: 4096 297s btree space waste bytes: 30304 297s file data blocks allocated: 0 297s referenced 0 297s tomb (*) Success opening test.tomb on /media/test 298s Copying some data into the opened tomb ... 298s Opened tomb's content: 298s total 28 298s drwxr-xr-x 1 ubuntu ubuntu 88 May 7 20:30 . 298s drwxr-xr-x 3 root root 4096 May 7 20:29 .. 298s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:29 .host 298s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:29 .last 298s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:29 .uid 298s -rw------- 1 ubuntu ubuntu 936 May 7 20:28 argon2-test.key 298s -rw------- 1 ubuntu ubuntu 946 May 7 20:28 pbkdf2-test.key 298s tomb . Closing tomb [test] mounted on /media/test 298s tomb (*) Tomb [test] closed: your bones will rest in peace. 299s autopkgtest [20:30:01]: test create-and-use-a-tomb: -----------------------] 299s create-and-use-a-tomb PASS 299s autopkgtest [20:30:01]: test create-and-use-a-tomb: - - - - - - - - - - results - - - - - - - - - - 300s autopkgtest [20:30:02]: @@@@@@@@@@@@@@@@@@@@ summary 300s create-and-use-a-tomb PASS 320s Creating nova instance adt-oracular-arm64-tomb-20240507-202502-juju-7f2275-prod-proposed-migration-environment-3-ecf02900-0fca-45a4-ae4f-60083b268ace from image adt/ubuntu-oracular-arm64-server-20240507.img (UUID e47d225a-61a3-4024-aef3-324a426d0eca)...