0s autopkgtest [21:21:58]: starting date and time: 2024-07-23 21:21:58+0000 0s autopkgtest [21:21:58]: git checkout: fd3bed09 nova: allow more retries for quota issues 0s autopkgtest [21:21:58]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.adf1pmmd/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.11+dfsg-1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@bos03-arm64-7.secgroup --name adt-oracular-arm64-tomb-20240723-212158-juju-7f2275-prod-proposed-migration-environment-3-f71a30dd-fbe1-4ced-a181-05a11914f7c9 --image adt/ubuntu-oracular-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 74s autopkgtest [21:23:12]: testbed dpkg architecture: arm64 75s autopkgtest [21:23:13]: testbed apt version: 2.9.6 75s autopkgtest [21:23:13]: @@@@@@@@@@@@@@@@@@@@ test bed setup 75s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [126 kB] 76s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/main Sources [68.9 kB] 76s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [409 kB] 76s Get:4 http://ftpmaster.internal/ubuntu oracular-proposed/restricted Sources [8548 B] 76s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse Sources [5704 B] 76s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/main arm64 Packages [133 kB] 76s Get:7 http://ftpmaster.internal/ubuntu oracular-proposed/main arm64 c-n-f Metadata [2116 B] 76s Get:8 http://ftpmaster.internal/ubuntu oracular-proposed/restricted arm64 Packages [43.9 kB] 76s Get:9 http://ftpmaster.internal/ubuntu oracular-proposed/restricted arm64 c-n-f Metadata [364 B] 76s Get:10 http://ftpmaster.internal/ubuntu oracular-proposed/universe arm64 Packages [569 kB] 77s Get:11 http://ftpmaster.internal/ubuntu oracular-proposed/universe arm64 c-n-f Metadata [8752 B] 77s Get:12 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse arm64 Packages [9560 B] 77s Get:13 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse arm64 c-n-f Metadata [276 B] 79s Fetched 1385 kB in 2s (851 kB/s) 79s Reading package lists... 83s Reading package lists... 83s Building dependency tree... 83s Reading state information... 84s Calculating upgrade... 84s The following packages will be upgraded: 84s gcc-14-base gdisk libgcc-s1 libstdc++6 netcat-openbsd systemd-hwe-hwdb 84s 6 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 84s Need to get 1156 kB of archives. 84s After this operation, 0 B of additional disk space will be used. 84s Get:1 http://ftpmaster.internal/ubuntu oracular/main arm64 gcc-14-base arm64 14.1.0-5ubuntu1 [49.9 kB] 85s Get:2 http://ftpmaster.internal/ubuntu oracular/main arm64 libstdc++6 arm64 14.1.0-5ubuntu1 [749 kB] 85s Get:3 http://ftpmaster.internal/ubuntu oracular/main arm64 libgcc-s1 arm64 14.1.0-5ubuntu1 [61.8 kB] 85s Get:4 http://ftpmaster.internal/ubuntu oracular/main arm64 netcat-openbsd arm64 1.226-1.1 [43.3 kB] 85s Get:5 http://ftpmaster.internal/ubuntu oracular/main arm64 systemd-hwe-hwdb all 256.2.1 [3210 B] 85s Get:6 http://ftpmaster.internal/ubuntu oracular/main arm64 gdisk arm64 1.0.10-2 [249 kB] 87s Fetched 1156 kB in 1s (1572 kB/s) 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78393 files and directories currently installed.) 87s Preparing to unpack .../gcc-14-base_14.1.0-5ubuntu1_arm64.deb ... 87s Unpacking gcc-14-base:arm64 (14.1.0-5ubuntu1) over (14.1.0-4ubuntu2) ... 87s Setting up gcc-14-base:arm64 (14.1.0-5ubuntu1) ... 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78393 files and directories currently installed.) 87s Preparing to unpack .../libstdc++6_14.1.0-5ubuntu1_arm64.deb ... 87s Unpacking libstdc++6:arm64 (14.1.0-5ubuntu1) over (14.1.0-4ubuntu2) ... 87s Setting up libstdc++6:arm64 (14.1.0-5ubuntu1) ... 87s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78393 files and directories currently installed.) 87s Preparing to unpack .../libgcc-s1_14.1.0-5ubuntu1_arm64.deb ... 87s Unpacking libgcc-s1:arm64 (14.1.0-5ubuntu1) over (14.1.0-4ubuntu2) ... 87s Setting up libgcc-s1:arm64 (14.1.0-5ubuntu1) ... 88s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78393 files and directories currently installed.) 88s Preparing to unpack .../netcat-openbsd_1.226-1.1_arm64.deb ... 88s Unpacking netcat-openbsd (1.226-1.1) over (1.226-1ubuntu2) ... 88s Preparing to unpack .../systemd-hwe-hwdb_256.2.1_all.deb ... 88s Unpacking systemd-hwe-hwdb (256.2.1) over (255.1.3) ... 88s Preparing to unpack .../gdisk_1.0.10-2_arm64.deb ... 88s Unpacking gdisk (1.0.10-2) over (1.0.10-1build1) ... 88s Setting up netcat-openbsd (1.226-1.1) ... 88s Setting up gdisk (1.0.10-2) ... 88s Setting up systemd-hwe-hwdb (256.2.1) ... 89s Processing triggers for man-db (2.12.1-2) ... 90s Processing triggers for udev (256-1ubuntu1) ... 90s Processing triggers for libc-bin (2.39-0ubuntu9) ... 91s Reading package lists... 91s Building dependency tree... 91s Reading state information... 92s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 92s Hit:1 http://ftpmaster.internal/ubuntu oracular InRelease 92s Hit:2 http://ftpmaster.internal/ubuntu oracular-updates InRelease 92s Hit:3 http://ftpmaster.internal/ubuntu oracular-security InRelease 92s Hit:4 http://ftpmaster.internal/ubuntu oracular-proposed InRelease 94s Reading package lists... 94s Reading package lists... 94s Building dependency tree... 95s Reading state information... 95s Calculating upgrade... 95s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 95s Reading package lists... 96s Building dependency tree... 96s Reading state information... 96s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 100s autopkgtest [21:23:38]: testbed running kernel: Linux 6.8.0-31-generic #31-Ubuntu SMP PREEMPT_DYNAMIC Sat Apr 20 02:32:42 UTC 2024 100s autopkgtest [21:23:38]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 103s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.11+dfsg-1 (dsc) [2037 B] 103s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.11+dfsg-1 (tar) [1262 kB] 103s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.11+dfsg-1 (diff) [16.0 kB] 104s gpgv: Signature made Mon Jul 22 20:25:44 2024 UTC 104s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 104s gpgv: issuer "sge@debian.org" 104s gpgv: Can't check signature: No public key 104s dpkg-source: warning: cannot verify inline signature for ./tomb_2.11+dfsg-1.dsc: no acceptable signature found 105s autopkgtest [21:23:43]: testing package tomb version 2.11+dfsg-1 106s autopkgtest [21:23:44]: build not needed 106s autopkgtest [21:23:44]: test create-and-use-a-tomb: preparing testbed 108s Reading package lists... 108s Building dependency tree... 108s Reading state information... 109s Starting pkgProblemResolver with broken count: 0 109s Starting 2 pkgProblemResolver with broken count: 0 109s Done 109s The following additional packages will be installed: 109s argon2 tomb zsh zsh-common 109s Suggested packages: 109s dcfldd plocate pwdsphinx qrencode recoll steghide unoconv zsh-doc 109s The following NEW packages will be installed: 109s argon2 autopkgtest-satdep tomb zsh zsh-common 110s 0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded. 110s Need to get 5072 kB/5073 kB of archives. 110s After this operation, 21.2 MB of additional disk space will be used. 110s Get:1 /tmp/autopkgtest.4PoS2X/1-autopkgtest-satdep.deb autopkgtest-satdep arm64 0 [716 B] 111s Get:2 http://ftpmaster.internal/ubuntu oracular/universe arm64 argon2 arm64 0~20190702+dfsg-4build1 [22.8 kB] 111s Get:3 http://ftpmaster.internal/ubuntu oracular/main arm64 zsh-common all 5.9-6ubuntu2 [4173 kB] 111s Get:4 http://ftpmaster.internal/ubuntu oracular/main arm64 zsh arm64 5.9-6ubuntu2 [797 kB] 111s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe arm64 tomb arm64 2.11+dfsg-1 [79.4 kB] 113s Fetched 5072 kB in 2s (2650 kB/s) 113s Selecting previously unselected package argon2. 113s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 78393 files and directories currently installed.) 113s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_arm64.deb ... 113s Unpacking argon2 (0~20190702+dfsg-4build1) ... 113s Selecting previously unselected package zsh-common. 113s Preparing to unpack .../zsh-common_5.9-6ubuntu2_all.deb ... 113s Unpacking zsh-common (5.9-6ubuntu2) ... 114s Selecting previously unselected package zsh. 114s Preparing to unpack .../zsh_5.9-6ubuntu2_arm64.deb ... 114s Unpacking zsh (5.9-6ubuntu2) ... 114s Selecting previously unselected package tomb. 115s Preparing to unpack .../tomb_2.11+dfsg-1_arm64.deb ... 115s Unpacking tomb (2.11+dfsg-1) ... 115s Selecting previously unselected package autopkgtest-satdep. 115s Preparing to unpack .../1-autopkgtest-satdep.deb ... 115s Unpacking autopkgtest-satdep (0) ... 115s Setting up argon2 (0~20190702+dfsg-4build1) ... 115s Setting up zsh-common (5.9-6ubuntu2) ... 115s Setting up zsh (5.9-6ubuntu2) ... 115s Setting up tomb (2.11+dfsg-1) ... 115s Setting up autopkgtest-satdep (0) ... 115s Processing triggers for debianutils (5.20) ... 116s Processing triggers for man-db (2.12.1-2) ... 124s (Reading database ... 79948 files and directories currently installed.) 124s Removing autopkgtest-satdep (0) ... 125s autopkgtest [21:24:03]: test create-and-use-a-tomb: [----------------------- 126s ~~ Create a file to hold an encrypted file system ... 127s tomb . Commanded to dig tomb 127s tomb (*) Creating a new tomb in test.tomb 127s tomb . Generating test.tomb of 20MiB 128s 20+0 records in 128s 20+0 records out 128s 20971520 bytes (21 MB, 20 MiB) copied, 0.076311 s, 275 MB/s 128s -rw------- 1 ubuntu ubuntu 20M Jul 23 21:24 test.tomb 128s tomb (*) Done digging test.tomb 128s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 128s tomb . tomb forge test.tomb.key 128s tomb . tomb lock test.tomb -k test.tomb.key 128s ~~ Create a pbkdf2 key file ... 128s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 128s tomb . Using KDF to protect the key password (1 rounds) 128s tomb [W] This operation takes time. Keep using this computer on other tasks. 128s tomb [W] Once done you will be asked to choose a password for your tomb. 128s tomb [W] To make it faster you can move the mouse around. 128s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 128s 512+0 records in 128s 512+0 records out 128s 512 bytes copied, 0.000420004 s, 1.2 MB/s 128s tomb (*) Choose the password of your key: pbkdf2-test.key 129s tomb . (You can also change it later using 'tomb passwd'.) 129s tomb (*) Using KDF, iteration time: 1000000 129s tomb . generating salt 129s tomb . calculating iterations 130s tomb . encoding the password 132s tomb . Key is valid. 132s tomb . Done forging pbkdf2-test.key 132s tomb (*) Your key is ready: 132s -rw------- 1 ubuntu ubuntu 951 Jul 23 21:24 pbkdf2-test.key 132s ~~ Create an argon2 key file ... 133s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 133s tomb . Using KDF to protect the key password (1 rounds) 133s tomb [W] This operation takes time. Keep using this computer on other tasks. 133s tomb [W] Once done you will be asked to choose a password for your tomb. 133s tomb [W] To make it faster you can move the mouse around. 133s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 133s 512+0 records in 133s 512+0 records out 133s 512 bytes copied, 0.000646209 s, 792 kB/s 133s tomb (*) Choose the password of your key: argon2-test.key 133s tomb . (You can also change it later using 'tomb passwd'.) 133s tomb (*) Using KDF Argon2 133s tomb . memory used: 2^18 133s tomb . kdf salt: 5a14b70049a8f34666360a67a290d1d1a1d95ecd7078f8d9d5b48f3ee84d85e8 133s tomb . kdf iterations: 1 134s tomb . Key is valid. 134s tomb . Done forging argon2-test.key 134s tomb (*) Your key is ready: 134s -rw------- 1 ubuntu ubuntu 944 Jul 23 21:24 argon2-test.key 134s ~~ Cloak a key file ... 134s tomb . Key is valid. 134s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 134s tomb (*) Tomb key encoded succesfully 134s ~~ Uncloak and verify a key file ... 134s tomb (*) Key succesfully uncloaked to uncloaked.key. 134s ~~ Testing ext4 file system using a pbkdf2 key ... 134s tomb . Commanded to dig tomb 135s tomb (*) Creating a new tomb in test.tomb 135s tomb . Generating test.tomb of 20MiB 135s 20+0 records in 135s 20+0 records out 135s 20971520 bytes (21 MB, 20 MiB) copied, 0.0630827 s, 332 MB/s 135s -rw------- 1 ubuntu ubuntu 20M Jul 23 21:24 test.tomb 135s tomb (*) Done digging test.tomb 135s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 135s tomb . tomb forge test.tomb.key 135s tomb . tomb lock test.tomb -k test.tomb.key 135s tomb . File is not yet a tomb: test.tomb 135s tomb . Valid tomb file found: test.tomb 135s tomb . Commanded to lock tomb test.tomb 135s tomb (*) Selected filesystem type ext4. 135s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 136s tomb . Fine, this tomb seems empty. 136s tomb . Key is valid. 136s tomb . Locking using cipher: aes-xts-plain64 136s tomb . A password is required to use key pbkdf2-test.key 136s tomb . Unlocking KDF key protection (pbkdf2sha1) 137s tomb . Password OK. 137s tomb (*) Locking test.tomb with pbkdf2-test.key 137s tomb . Formatting Luks mapped device. 145s tomb . Formatting your Tomb with ext4 filesystem. 145s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 145s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 146s tomb . Commanded to open tomb test.tomb 146s tomb . Valid tomb file found: test.tomb 146s tomb . Key is valid. 146s tomb . Mountpoint not specified, using default: /media/test 146s tomb (*) Opening test on /media/test 146s tomb . This tomb is a valid LUKS encrypted device. 146s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 146s tomb . A password is required to use key pbkdf2-test.key 146s tomb . Unlocking KDF key protection (pbkdf2sha1) 147s tomb . Password OK. 150s tomb (*) Success unlocking tomb test 150s tomb . Filesystem detected: ext4 150s tomb . Checking filesystem via /dev/loop0 150s fsck from util-linux 2.39.3 150s test: clean, 12/4608 files, 1356/4608 blocks 150s tomb (*) Success opening test.tomb on /media/test 150s ~~ Copying some data into the opened tomb ... 150s ~~ Opened tomb's content is ... 150s total 44 150s drwxr-xr-x 3 ubuntu ubuntu 4096 Jul 23 21:24 . 150s drwxr-xr-x 3 root root 4096 Jul 23 21:24 .. 150s -rw------- 1 ubuntu ubuntu 12 Jul 23 21:24 .host 150s -rw------- 1 ubuntu ubuntu 11 Jul 23 21:24 .last 150s -rw------- 1 ubuntu ubuntu 5 Jul 23 21:24 .uid 150s -rw------- 1 ubuntu ubuntu 944 Jul 23 21:24 argon2-test.key 150s drwx------ 2 ubuntu ubuntu 16384 Jul 23 21:24 lost+found 150s -rw------- 1 ubuntu ubuntu 951 Jul 23 21:24 pbkdf2-test.key 151s tomb . Closing tomb [test] mounted on /media/test 151s tomb (*) Tomb [test] closed: your bones will rest in peace. 151s ~~ Testing ext4 file system using a argon2 key ... 151s tomb . Commanded to dig tomb 151s tomb (*) Creating a new tomb in test.tomb 151s tomb . Generating test.tomb of 20MiB 151s 20+0 records in 151s 20+0 records out 151s 20971520 bytes (21 MB, 20 MiB) copied, 0.0641244 s, 327 MB/s 152s -rw------- 1 ubuntu ubuntu 20M Jul 23 21:24 test.tomb 152s tomb (*) Done digging test.tomb 152s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 152s tomb . tomb forge test.tomb.key 152s tomb . tomb lock test.tomb -k test.tomb.key 152s tomb . File is not yet a tomb: test.tomb 152s tomb . Valid tomb file found: test.tomb 152s tomb . Commanded to lock tomb test.tomb 152s tomb (*) Selected filesystem type ext4. 152s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 152s tomb . Fine, this tomb seems empty. 152s tomb . Key is valid. 152s tomb . Locking using cipher: aes-xts-plain64 152s tomb . A password is required to use key argon2-test.key 152s tomb . Unlocking KDF key protection (argon2) 152s tomb . Password OK. 152s tomb (*) Locking test.tomb with argon2-test.key 152s tomb . Formatting Luks mapped device. 166s tomb . Formatting your Tomb with ext4 filesystem. 167s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 168s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 169s tomb . Commanded to open tomb test.tomb 170s tomb . Valid tomb file found: test.tomb 170s tomb . Key is valid. 170s tomb . Mountpoint not specified, using default: /media/test 170s tomb (*) Opening test on /media/test 170s tomb . This tomb is a valid LUKS encrypted device. 171s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 171s tomb . A password is required to use key argon2-test.key 171s tomb . Unlocking KDF key protection (argon2) 172s tomb . Password OK. 174s tomb (*) Success unlocking tomb test 174s tomb . Filesystem detected: ext4 174s tomb . Checking filesystem via /dev/loop0 174s fsck from util-linux 2.39.3 174s test: clean, 12/4608 files, 1356/4608 blocks 174s tomb (*) Success opening test.tomb on /media/test 175s ~~ Copying some data into the opened tomb ... 175s ~~ Opened tomb's content is ... 175s total 44 175s drwxr-xr-x 3 ubuntu ubuntu 4096 Jul 23 21:24 . 175s drwxr-xr-x 3 root root 4096 Jul 23 21:24 .. 175s -rw------- 1 ubuntu ubuntu 12 Jul 23 21:24 .host 175s -rw------- 1 ubuntu ubuntu 11 Jul 23 21:24 .last 175s -rw------- 1 ubuntu ubuntu 5 Jul 23 21:24 .uid 175s -rw------- 1 ubuntu ubuntu 944 Jul 23 21:24 argon2-test.key 175s drwx------ 2 ubuntu ubuntu 16384 Jul 23 21:24 lost+found 175s -rw------- 1 ubuntu ubuntu 951 Jul 23 21:24 pbkdf2-test.key 175s tomb . Closing tomb [test] mounted on /media/test 175s tomb (*) Tomb [test] closed: your bones will rest in peace. 175s ~~ Testing btrfs file system using a pbkdf2 key ... 175s tomb . Commanded to dig tomb 175s tomb (*) Creating a new tomb in test.tomb 175s tomb . Generating test.tomb of 115MiB 176s 115+0 records in 176s 115+0 records out 176s 120586240 bytes (121 MB, 115 MiB) copied, 0.467834 s, 258 MB/s 176s -rw------- 1 ubuntu ubuntu 115M Jul 23 21:24 test.tomb 176s tomb (*) Done digging test.tomb 176s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 176s tomb . tomb forge test.tomb.key 176s tomb . tomb lock test.tomb -k test.tomb.key 176s tomb . File is not yet a tomb: test.tomb 176s tomb . Valid tomb file found: test.tomb 176s tomb . Commanded to lock tomb test.tomb 176s tomb (*) Selected filesystem type btrfs. 176s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 176s tomb . Fine, this tomb seems empty. 176s tomb . Key is valid. 176s tomb . Locking using cipher: aes-xts-plain64 176s tomb . A password is required to use key pbkdf2-test.key 176s tomb . Unlocking KDF key protection (pbkdf2sha1) 177s tomb . Password OK. 178s tomb (*) Locking test.tomb with pbkdf2-test.key 178s tomb . Formatting Luks mapped device. 186s tomb . Formatting your Tomb with btrfs filesystem. 187s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 187s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 187s tomb . Commanded to open tomb test.tomb 187s tomb . Valid tomb file found: test.tomb 187s tomb . Key is valid. 187s tomb . Mountpoint not specified, using default: /media/test 187s tomb (*) Opening test on /media/test 187s tomb . This tomb is a valid LUKS encrypted device. 187s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 187s tomb . A password is required to use key pbkdf2-test.key 187s tomb . Unlocking KDF key protection (pbkdf2sha1) 189s tomb . Password OK. 191s tomb (*) Success unlocking tomb test 191s tomb . Filesystem detected: btrfs 191s tomb . Checking filesystem via /dev/loop0 191s [1/7] checking root items 191s [2/7] checking extents 191s [3/7] checking free space tree 191s [4/7] checking fs roots 191s [5/7] checking only csums items (without verifying data) 191s [6/7] checking root refs 191s [7/7] checking quota groups skipped (not enabled on this FS) 191s Opening filesystem to check... 191s Checking filesystem on /dev/mapper/tomb.test.4f59700e5480563a1dd7441b0390209ca4da04534b3ceb579e8bac9edb417dc7.loop0 191s UUID: adfd92c7-4095-42f3-8fec-b8e31c945382 191s found 147456 bytes used, no error found 191s total csum bytes: 0 191s total tree bytes: 147456 191s total fs tree bytes: 32768 191s total extent tree bytes: 16384 191s btree space waste bytes: 140595 191s file data blocks allocated: 0 191s referenced 0 192s tomb (*) Success opening test.tomb on /media/test 192s ~~ Copying some data into the opened tomb ... 192s ~~ Opened tomb's content is ... 192s total 40 192s drwxr-xr-x 1 ubuntu ubuntu 88 Jul 23 21:25 . 192s drwxr-xr-x 3 root root 4096 Jul 23 21:25 .. 192s -rw------- 1 ubuntu ubuntu 12 Jul 23 21:25 .host 192s -rw------- 1 ubuntu ubuntu 11 Jul 23 21:25 .last 192s -rw------- 1 ubuntu ubuntu 5 Jul 23 21:25 .uid 192s -rw------- 1 ubuntu ubuntu 944 Jul 23 21:24 argon2-test.key 192s -rw------- 1 ubuntu ubuntu 951 Jul 23 21:24 pbkdf2-test.key 192s tomb . Closing tomb [test] mounted on /media/test 192s tomb (*) Tomb [test] closed: your bones will rest in peace. 192s ~~ Testing btrfsmixedmode file system using a argon2 key ... 192s tomb . Commanded to dig tomb 192s tomb (*) Creating a new tomb in test.tomb 192s tomb . Generating test.tomb of 20MiB 192s 20+0 records in 192s 20+0 records out 192s 20971520 bytes (21 MB, 20 MiB) copied, 0.065254 s, 321 MB/s 192s -rw------- 1 ubuntu ubuntu 20M Jul 23 21:25 test.tomb 192s tomb (*) Done digging test.tomb 193s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 193s tomb . tomb forge test.tomb.key 193s tomb . tomb lock test.tomb -k test.tomb.key 193s tomb . File is not yet a tomb: test.tomb 193s tomb . Valid tomb file found: test.tomb 193s tomb . Commanded to lock tomb test.tomb 193s tomb (*) Selected filesystem type btrfsmixedmode. 193s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 193s tomb . Fine, this tomb seems empty. 193s tomb . Key is valid. 193s tomb . Locking using cipher: aes-xts-plain64 193s tomb . A password is required to use key argon2-test.key 193s tomb . Unlocking KDF key protection (argon2) 193s tomb . Password OK. 193s tomb (*) Locking test.tomb with argon2-test.key 193s tomb . Formatting Luks mapped device. 202s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 203s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 203s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 203s tomb . Commanded to open tomb test.tomb 204s tomb . Valid tomb file found: test.tomb 204s tomb . Key is valid. 204s tomb . Mountpoint not specified, using default: /media/test 204s tomb (*) Opening test on /media/test 204s tomb . This tomb is a valid LUKS encrypted device. 204s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 204s tomb . A password is required to use key argon2-test.key 204s tomb . Unlocking KDF key protection (argon2) 205s tomb . Password OK. 207s tomb (*) Success unlocking tomb test 208s tomb . Filesystem detected: btrfs 208s tomb . Checking filesystem via /dev/loop0 208s [1/7] checking root items 208s [2/7] checking extents 208s Opening filesystem to check... 208s Checking filesystem on /dev/mapper/tomb.test.4f59700e5480563a1dd7441b0390209ca4da04534b3ceb579e8bac9edb417dc7.loop0 208s UUID: a1817e56-d7ca-4cb9-92fc-cd219cd93edf 208s found 36864 bytes used, no error found 208s total csum bytes: 0 208s total tree bytes: 36864 208s total fs tree bytes: 8192 208s total extent tree bytes: 4096 208s btree space waste bytes: 30304 208s file data blocks allocated: 0 208s referenced 0 208s [3/7] checking free space tree 208s [4/7] checking fs roots 208s [5/7] checking only csums items (without verifying data) 208s [6/7] checking root refs 208s [7/7] checking quota groups skipped (not enabled on this FS) 208s tomb (*) Success opening test.tomb on /media/test 208s ~~ Copying some data into the opened tomb ... 208s ~~ Opened tomb's content is ... 208s total 28 208s drwxr-xr-x 1 ubuntu ubuntu 88 Jul 23 21:25 . 208s drwxr-xr-x 3 root root 4096 Jul 23 21:25 .. 208s -rw------- 1 ubuntu ubuntu 12 Jul 23 21:25 .host 208s -rw------- 1 ubuntu ubuntu 11 Jul 23 21:25 .last 208s -rw------- 1 ubuntu ubuntu 5 Jul 23 21:25 .uid 208s -rw------- 1 ubuntu ubuntu 944 Jul 23 21:24 argon2-test.key 208s -rw------- 1 ubuntu ubuntu 951 Jul 23 21:24 pbkdf2-test.key 208s tomb . Closing tomb [test] mounted on /media/test 209s tomb (*) Tomb [test] closed: your bones will rest in peace. 210s autopkgtest [21:25:28]: test create-and-use-a-tomb: -----------------------] 210s autopkgtest [21:25:28]: test create-and-use-a-tomb: - - - - - - - - - - results - - - - - - - - - - 210s create-and-use-a-tomb PASS 211s autopkgtest [21:25:29]: @@@@@@@@@@@@@@@@@@@@ summary 211s create-and-use-a-tomb PASS 222s nova [W] Skipping flock in bos03-arm64 222s Creating nova instance adt-oracular-arm64-tomb-20240723-212158-juju-7f2275-prod-proposed-migration-environment-3-f71a30dd-fbe1-4ced-a181-05a11914f7c9 from image adt/ubuntu-oracular-arm64-server-20240721.img (UUID 82bde252-f2f6-4a5f-8912-308e3b0a85c9)...