0s autopkgtest [20:17:01]: starting date and time: 2024-05-07 20:17:01+0000 0s autopkgtest [20:17:01]: git checkout: 699e7f9f ssh-setup/nova: explicitely set 'fqdn' in cloud-init 0s autopkgtest [20:17:01]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.1m8ennfo/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.10+dfsg-2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@bos01-s390x-3.secgroup --name adt-oracular-s390x-tomb-20240507-201701-juju-7f2275-prod-proposed-migration-environment-3-ef4ec4b5-4bde-417b-80ab-1775b8be2550 --image adt/ubuntu-oracular-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://us.ports.ubuntu.com/ubuntu-ports/ 231s autopkgtest [20:20:52]: testbed dpkg architecture: s390x 231s autopkgtest [20:20:52]: testbed apt version: 2.7.14build2 231s autopkgtest [20:20:52]: @@@@@@@@@@@@@@@@@@@@ test bed setup 232s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [64.7 kB] 233s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [1138 kB] 233s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/main Sources [103 kB] 233s Get:4 http://ftpmaster.internal/ubuntu oracular-proposed/restricted Sources [1964 B] 233s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse Sources [15.4 kB] 233s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/main s390x Packages [161 kB] 233s Get:7 http://ftpmaster.internal/ubuntu oracular-proposed/universe s390x Packages [868 kB] 233s Get:8 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse s390x Packages [16.7 kB] 234s Fetched 2368 kB in 2s (1263 kB/s) 234s Reading package lists... 238s Reading package lists... 239s Building dependency tree... 239s Reading state information... 239s Calculating upgrade... 240s The following packages will be upgraded: 240s libpci3 libunistring5 nano pciutils python3-blinker sysstat 240s 6 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 240s Need to get 1492 kB of archives. 240s After this operation, 120 kB of additional disk space will be used. 240s Get:1 http://ftpmaster.internal/ubuntu oracular/main s390x libunistring5 s390x 1.2-1 [552 kB] 241s Get:2 http://ftpmaster.internal/ubuntu oracular/main s390x pciutils s390x 1:3.12.0-1 [90.0 kB] 241s Get:3 http://ftpmaster.internal/ubuntu oracular/main s390x libpci3 s390x 1:3.12.0-1 [36.7 kB] 241s Get:4 http://ftpmaster.internal/ubuntu oracular/main s390x nano s390x 8.0-1 [295 kB] 241s Get:5 http://ftpmaster.internal/ubuntu oracular/main s390x sysstat s390x 12.7.5-2 [507 kB] 241s Get:6 http://ftpmaster.internal/ubuntu oracular/main s390x python3-blinker all 1.8.1-1 [11.4 kB] 242s Preconfiguring packages ... 242s Fetched 1492 kB in 1s (1992 kB/s) 242s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 54491 files and directories currently installed.) 242s Preparing to unpack .../libunistring5_1.2-1_s390x.deb ... 242s Unpacking libunistring5:s390x (1.2-1) over (1.1-2build1) ... 242s Setting up libunistring5:s390x (1.2-1) ... 243s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 54491 files and directories currently installed.) 243s Preparing to unpack .../pciutils_1%3a3.12.0-1_s390x.deb ... 243s Unpacking pciutils (1:3.12.0-1) over (1:3.10.0-2build1) ... 243s Preparing to unpack .../libpci3_1%3a3.12.0-1_s390x.deb ... 243s Unpacking libpci3:s390x (1:3.12.0-1) over (1:3.10.0-2build1) ... 243s Preparing to unpack .../archives/nano_8.0-1_s390x.deb ... 243s Unpacking nano (8.0-1) over (7.2-2build1) ... 243s Preparing to unpack .../sysstat_12.7.5-2_s390x.deb ... 243s Unpacking sysstat (12.7.5-2) over (12.6.1-2) ... 243s Preparing to unpack .../python3-blinker_1.8.1-1_all.deb ... 243s Unpacking python3-blinker (1.8.1-1) over (1.7.0-1) ... 243s Setting up nano (8.0-1) ... 243s Installing new version of config file /etc/nanorc ... 243s Setting up libpci3:s390x (1:3.12.0-1) ... 243s Setting up sysstat (12.7.5-2) ... 243s Installing new version of config file /etc/cron.d/sysstat ... 243s Installing new version of config file /etc/cron.daily/sysstat ... 243s Installing new version of config file /etc/init.d/sysstat ... 243s Installing new version of config file /etc/sysstat/sysstat ... 245s Created symlink /etc/systemd/system/sysstat.service.wants/sysstat-rotate.timer → /usr/lib/systemd/system/sysstat-rotate.timer. 246s Setting up python3-blinker (1.8.1-1) ... 246s Setting up pciutils (1:3.12.0-1) ... 246s Processing triggers for libc-bin (2.39-0ubuntu8) ... 246s Processing triggers for man-db (2.12.0-4build2) ... 248s Processing triggers for install-info (7.1-3build2) ... 249s Reading package lists... 249s Building dependency tree... 249s Reading state information... 250s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 251s Get:1 http://ftpmaster.internal/ubuntu oracular InRelease [64.6 kB] 252s Hit:2 http://ftpmaster.internal/ubuntu oracular-updates InRelease 252s Hit:3 http://ftpmaster.internal/ubuntu oracular-security InRelease 252s Hit:4 http://ftpmaster.internal/ubuntu oracular-proposed InRelease 252s Get:5 http://ftpmaster.internal/ubuntu oracular/main Sources [1375 kB] 253s Get:6 http://ftpmaster.internal/ubuntu oracular/universe Sources [20.0 MB] 257s Get:7 http://ftpmaster.internal/ubuntu oracular/main s390x Packages [1321 kB] 257s Get:8 http://ftpmaster.internal/ubuntu oracular/universe s390x Packages [14.3 MB] 270s Fetched 37.0 MB in 19s (1985 kB/s) 272s Reading package lists... 272s Reading package lists... 273s Building dependency tree... 273s Reading state information... 274s Calculating upgrade... 274s The following packages will be upgraded: 274s libnghttp2-14 274s 1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 274s Need to get 77.2 kB of archives. 274s After this operation, 1024 B of additional disk space will be used. 274s Get:1 http://ftpmaster.internal/ubuntu oracular/main s390x libnghttp2-14 s390x 1.61.0-1 [77.2 kB] 275s Fetched 77.2 kB in 0s (246 kB/s) 275s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 54494 files and directories currently installed.) 275s Preparing to unpack .../libnghttp2-14_1.61.0-1_s390x.deb ... 275s Unpacking libnghttp2-14:s390x (1.61.0-1) over (1.59.0-1build4) ... 275s Setting up libnghttp2-14:s390x (1.61.0-1) ... 275s Processing triggers for libc-bin (2.39-0ubuntu8) ... 276s Reading package lists... 277s Building dependency tree... 277s Reading state information... 278s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 278s autopkgtest [20:21:39]: rebooting testbed after setup commands that affected boot 313s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 321s autopkgtest-virt-ssh: WARNING: ssh connection failed. Retrying in 3 seconds... 328s autopkgtest [20:22:29]: testbed running kernel: Linux 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 UTC 2024 332s autopkgtest [20:22:33]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 335s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (dsc) [2066 B] 335s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (tar) [1266 kB] 335s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.10+dfsg-2 (diff) [8084 B] 336s gpgv: Signature made Tue May 7 08:58:50 2024 UTC 336s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 336s gpgv: issuer "debmaint@g-e-u-e-r.de" 336s gpgv: Can't check signature: No public key 336s dpkg-source: warning: cannot verify inline signature for ./tomb_2.10+dfsg-2.dsc: no acceptable signature found 336s autopkgtest [20:22:37]: testing package tomb version 2.10+dfsg-2 336s autopkgtest [20:22:37]: build not needed 337s autopkgtest [20:22:38]: test create-and-use-a-tomb: preparing testbed 339s Reading package lists... 339s Building dependency tree... 339s Reading state information... 340s Starting pkgProblemResolver with broken count: 0 340s Starting 2 pkgProblemResolver with broken count: 0 340s Done 341s The following additional packages will be installed: 341s argon2 tomb zsh zsh-common 341s Suggested packages: 341s dcfldd pwdsphinx qrencode unoconv steghide swish-e zsh-doc 341s The following NEW packages will be installed: 341s argon2 autopkgtest-satdep tomb zsh zsh-common 341s 0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded. 341s Need to get 5182 kB/5183 kB of archives. 341s After this operation, 19.5 MB of additional disk space will be used. 341s Get:1 /tmp/autopkgtest.6aFV7p/1-autopkgtest-satdep.deb autopkgtest-satdep s390x 0 [720 B] 341s Get:2 http://ftpmaster.internal/ubuntu oracular/universe s390x argon2 s390x 0~20190702+dfsg-4build1 [55.6 kB] 342s Get:3 http://ftpmaster.internal/ubuntu oracular/main s390x zsh-common all 5.9-6ubuntu2 [4173 kB] 343s Get:4 http://ftpmaster.internal/ubuntu oracular/main s390x zsh s390x 5.9-6ubuntu2 [903 kB] 344s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe s390x tomb s390x 2.10+dfsg-2 [51.4 kB] 344s Fetched 5182 kB in 2s (2111 kB/s) 344s Selecting previously unselected package argon2. 345s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 54494 files and directories currently installed.) 345s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_s390x.deb ... 345s Unpacking argon2 (0~20190702+dfsg-4build1) ... 345s Selecting previously unselected package zsh-common. 345s Preparing to unpack .../zsh-common_5.9-6ubuntu2_all.deb ... 345s Unpacking zsh-common (5.9-6ubuntu2) ... 345s Selecting previously unselected package zsh. 345s Preparing to unpack .../zsh_5.9-6ubuntu2_s390x.deb ... 345s Unpacking zsh (5.9-6ubuntu2) ... 345s Selecting previously unselected package tomb. 345s Preparing to unpack .../tomb_2.10+dfsg-2_s390x.deb ... 345s Unpacking tomb (2.10+dfsg-2) ... 345s Selecting previously unselected package autopkgtest-satdep. 345s Preparing to unpack .../1-autopkgtest-satdep.deb ... 345s Unpacking autopkgtest-satdep (0) ... 345s Setting up argon2 (0~20190702+dfsg-4build1) ... 345s Setting up zsh-common (5.9-6ubuntu2) ... 345s Setting up zsh (5.9-6ubuntu2) ... 345s Setting up tomb (2.10+dfsg-2) ... 345s Setting up autopkgtest-satdep (0) ... 346s Processing triggers for debianutils (5.17build1) ... 346s Processing triggers for man-db (2.12.0-4build2) ... 353s (Reading database ... 56021 files and directories currently installed.) 353s Removing autopkgtest-satdep (0) ... 354s autopkgtest [20:22:55]: test create-and-use-a-tomb: [----------------------- 354s tomb . Commanded to dig tomb 354s tomb (*) Creating a new tomb in test.tomb 354s tomb . Generating test.tomb of 20MiB 355s 20+0 records in 355s 20+0 records out 355s 20971520 bytes (21 MB, 20 MiB) copied, 0.325922 s, 64.3 MB/s 355s -rw------- 1 ubuntu ubuntu 20M May 7 20:22 test.tomb 355s tomb (*) Done digging test.tomb 355s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 355s tomb . tomb forge test.tomb.key 355s tomb . tomb lock test.tomb -k test.tomb.key 355s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 355s tomb . Using KDF to protect the key password (1 rounds) 355s tomb [W] This operation takes time. Keep using this computer on other tasks. 355s tomb [W] Once done you will be asked to choose a password for your tomb. 355s tomb [W] To make it faster you can move the mouse around. 355s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 355s 512+0 records in 355s 512+0 records out 355s 512 bytes copied, 0.00187556 s, 273 kB/s 355s tomb (*) Choose the password of your key: pbkdf2-test.key 355s tomb . (You can also change it later using 'tomb passwd'.) 355s tomb (*) Using KDF, iteration time: 1000000 355s tomb . generating salt 355s tomb . calculating iterations 356s tomb . encoding the password 358s tomb . Key is valid. 358s tomb . Done forging pbkdf2-test.key 358s tomb (*) Your key is ready: 358s -rw------- 1 ubuntu ubuntu 946 May 7 20:22 pbkdf2-test.key 359s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 359s tomb . Using KDF to protect the key password (1 rounds) 359s tomb [W] This operation takes time. Keep using this computer on other tasks. 359s tomb [W] Once done you will be asked to choose a password for your tomb. 359s tomb [W] To make it faster you can move the mouse around. 359s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 359s 512+0 records in 359s 512+0 records out 359s 512 bytes copied, 0.00310954 s, 165 kB/s 359s tomb (*) Choose the password of your key: argon2-test.key 359s tomb . (You can also change it later using 'tomb passwd'.) 359s tomb (*) Using KDF Argon2 359s tomb . memory used: 2^18 359s tomb . kdf salt: 7cffe694cdd44f75910946816277d3bc8c109ea14b07d1ab8e634ec63d317bc6 359s tomb . kdf iterations: 1 360s tomb . Key is valid. 360s tomb . Done forging argon2-test.key 360s tomb (*) Your key is ready: 360s -rw------- 1 ubuntu ubuntu 944 May 7 20:23 argon2-test.key 361s Testing ext4 file system using a pbkdf2 key ... 361s tomb . Commanded to dig tomb 361s tomb (*) Creating a new tomb in test.tomb 361s tomb . Generating test.tomb of 20MiB 361s 20+0 records in 361s 20+0 records out 361s 20971520 bytes (21 MB, 20 MiB) copied, 0.145901 s, 144 MB/s 361s -rw------- 1 ubuntu ubuntu 20M May 7 20:23 test.tomb 361s tomb (*) Done digging test.tomb 361s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 361s tomb . tomb forge test.tomb.key 361s tomb . tomb lock test.tomb -k test.tomb.key 361s tomb . File is not yet a tomb: test.tomb 361s tomb . Valid tomb file found: test.tomb 361s tomb . Commanded to lock tomb test.tomb 361s tomb (*) Selected filesystem type ext4. 361s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 361s tomb . Fine, this tomb seems empty. 361s tomb . Key is valid. 361s tomb . Locking using cipher: aes-xts-plain64 361s tomb . A password is required to use key pbkdf2-test.key 361s tomb . Unlocking KDF key protection (pbkdf2sha1) 362s tomb . Password OK. 362s tomb (*) Locking test.tomb with pbkdf2-test.key 362s tomb . Formatting Luks mapped device. 376s tomb . Formatting your Tomb with ext4 filesystem. 376s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 376s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 376s tomb . Commanded to open tomb test.tomb 376s tomb . Valid tomb file found: test.tomb 376s tomb . Key is valid. 377s tomb . Mountpoint not specified, using default: /media/test 377s tomb (*) Opening test on /media/test 377s tomb . This tomb is a valid LUKS encrypted device. 377s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 377s tomb . A password is required to use key pbkdf2-test.key 377s tomb . Unlocking KDF key protection (pbkdf2sha1) 378s tomb . Password OK. 383s tomb (*) Success unlocking tomb test 383s tomb . Filesystem detected: ext4 383s tomb . Checking filesystem via /dev/loop0 383s fsck from util-linux 2.39.3 383s test: clean, 11/4608 files, 1324/4608 blocks 383s tomb (*) Success opening test.tomb on /media/test 383s Copying some data into the opened tomb ... 383s Opened tomb's content: 383s total 44 383s drwxr-xr-x 3 ubuntu ubuntu 4096 May 7 20:23 . 383s drwxr-xr-x 3 root root 4096 May 7 20:23 .. 383s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:23 .host 383s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:23 .last 383s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:23 .uid 383s -rw------- 1 ubuntu ubuntu 944 May 7 20:23 argon2-test.key 383s drwx------ 2 ubuntu ubuntu 16384 May 7 20:23 lost+found 383s -rw------- 1 ubuntu ubuntu 946 May 7 20:22 pbkdf2-test.key 383s tomb . Closing tomb [test] mounted on /media/test 384s tomb (*) Tomb [test] closed: your bones will rest in peace. 384s Testing ext4 file system using a argon2 key ... 384s tomb . Commanded to dig tomb 384s tomb (*) Creating a new tomb in test.tomb 384s tomb . Generating test.tomb of 20MiB 384s 20+0 records in 384s 20+0 records out 384s 20971520 bytes (21 MB, 20 MiB) copied, 0.170973 s, 123 MB/s 384s -rw------- 1 ubuntu ubuntu 20M May 7 20:23 test.tomb 384s tomb (*) Done digging test.tomb 384s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 384s tomb . tomb forge test.tomb.key 384s tomb . tomb lock test.tomb -k test.tomb.key 384s tomb . File is not yet a tomb: test.tomb 384s tomb . Valid tomb file found: test.tomb 384s tomb . Commanded to lock tomb test.tomb 384s tomb (*) Selected filesystem type ext4. 384s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 384s tomb . Fine, this tomb seems empty. 384s tomb . Key is valid. 384s tomb . Locking using cipher: aes-xts-plain64 384s tomb . A password is required to use key argon2-test.key 384s tomb . Unlocking KDF key protection (argon2) 386s tomb . Password OK. 386s tomb (*) Locking test.tomb with argon2-test.key 386s tomb . Formatting Luks mapped device. 398s tomb . Formatting your Tomb with ext4 filesystem. 398s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 398s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 399s tomb . Commanded to open tomb test.tomb 399s tomb . Valid tomb file found: test.tomb 399s tomb . Key is valid. 399s tomb . Mountpoint not specified, using default: /media/test 399s tomb (*) Opening test on /media/test 399s tomb . This tomb is a valid LUKS encrypted device. 399s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 399s tomb . A password is required to use key argon2-test.key 399s tomb . Unlocking KDF key protection (argon2) 401s tomb . Password OK. 405s tomb (*) Success unlocking tomb test 405s tomb . Filesystem detected: ext4 405s tomb . Checking filesystem via /dev/loop0 405s fsck from util-linux 2.39.3 405s test: clean, 11/4608 files, 1324/4608 blocks 405s tomb (*) Success opening test.tomb on /media/test 406s Copying some data into the opened tomb ... 406s Opened tomb's content: 406s total 44 406s drwxr-xr-x 3 ubuntu ubuntu 4096 May 7 20:23 . 406s drwxr-xr-x 3 root root 4096 May 7 20:23 .. 406s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:23 .host 406s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:23 .last 406s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:23 .uid 406s -rw------- 1 ubuntu ubuntu 944 May 7 20:23 argon2-test.key 406s drwx------ 2 ubuntu ubuntu 16384 May 7 20:23 lost+found 406s -rw------- 1 ubuntu ubuntu 946 May 7 20:22 pbkdf2-test.key 406s tomb . Closing tomb [test] mounted on /media/test 406s tomb (*) Tomb [test] closed: your bones will rest in peace. 406s Testing btrfs file system using a pbkdf2 key ... 406s tomb . Commanded to dig tomb 406s tomb (*) Creating a new tomb in test.tomb 406s tomb . Generating test.tomb of 115MiB 408s 115+0 records in 408s 115+0 records out 408s 120586240 bytes (121 MB, 115 MiB) copied, 1.51748 s, 79.5 MB/s 408s -rw------- 1 ubuntu ubuntu 115M May 7 20:23 test.tomb 408s tomb (*) Done digging test.tomb 408s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 408s tomb . tomb forge test.tomb.key 408s tomb . tomb lock test.tomb -k test.tomb.key 408s tomb . File is not yet a tomb: test.tomb 408s tomb . Valid tomb file found: test.tomb 408s tomb . Commanded to lock tomb test.tomb 408s tomb (*) Selected filesystem type btrfs. 408s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 408s tomb . Fine, this tomb seems empty. 408s tomb . Key is valid. 408s tomb . Locking using cipher: aes-xts-plain64 408s tomb . A password is required to use key pbkdf2-test.key 408s tomb . Unlocking KDF key protection (pbkdf2sha1) 410s tomb . Password OK. 410s tomb (*) Locking test.tomb with pbkdf2-test.key 410s tomb . Formatting Luks mapped device. 421s tomb . Formatting your Tomb with btrfs filesystem. 421s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 421s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 421s tomb . Commanded to open tomb test.tomb 421s tomb . Valid tomb file found: test.tomb 421s tomb . Key is valid. 421s tomb . Mountpoint not specified, using default: /media/test 421s tomb (*) Opening test on /media/test 421s tomb . This tomb is a valid LUKS encrypted device. 422s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 422s tomb . A password is required to use key pbkdf2-test.key 422s tomb . Unlocking KDF key protection (pbkdf2sha1) 423s tomb . Password OK. 426s tomb (*) Success unlocking tomb test 426s tomb . Filesystem detected: btrfs 426s tomb . Checking filesystem via /dev/loop0 426s [1/7] checking root items 426s [2/7] checking extents 426s [3/7] checking free space tree 426s [4/7] checking fs roots 426s [5/7] checking only csums items (without verifying data) 426s [6/7] checking root refs 426s [7/7] checking quota groups skipped (not enabled on this FS) 426s Opening filesystem to check... 426s Checking filesystem on /dev/mapper/tomb.test.637977845c05b13866f82f64287f1a76b7f90aa4a85aa218872d24f9d294ebaf.loop0 426s UUID: 993fad91-c97a-41b6-98b3-1641b8852934 426s found 147456 bytes used, no error found 426s total csum bytes: 0 426s total tree bytes: 147456 426s total fs tree bytes: 32768 426s total extent tree bytes: 16384 426s btree space waste bytes: 140595 426s file data blocks allocated: 0 426s referenced 0 426s tomb (*) Success opening test.tomb on /media/test 427s Copying some data into the opened tomb ... 427s Opened tomb's content: 427s total 40 427s drwxr-xr-x 1 ubuntu ubuntu 88 May 7 20:24 . 427s drwxr-xr-x 3 root root 4096 May 7 20:24 .. 427s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:24 .host 427s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:24 .last 427s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:24 .uid 427s -rw------- 1 ubuntu ubuntu 944 May 7 20:23 argon2-test.key 427s -rw------- 1 ubuntu ubuntu 946 May 7 20:22 pbkdf2-test.key 427s tomb . Closing tomb [test] mounted on /media/test 427s tomb (*) Tomb [test] closed: your bones will rest in peace. 427s Testing btrfsmixedmode file system using a argon2 key ... 427s tomb . Commanded to dig tomb 427s tomb (*) Creating a new tomb in test.tomb 427s tomb . Generating test.tomb of 20MiB 428s 20+0 records in 428s 20+0 records out 428s 20971520 bytes (21 MB, 20 MiB) copied, 0.253128 s, 82.8 MB/s 428s -rw------- 1 ubuntu ubuntu 20M May 7 20:24 test.tomb 428s tomb (*) Done digging test.tomb 428s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 428s tomb . tomb forge test.tomb.key 428s tomb . tomb lock test.tomb -k test.tomb.key 428s tomb . File is not yet a tomb: test.tomb 428s tomb . Valid tomb file found: test.tomb 428s tomb . Commanded to lock tomb test.tomb 428s tomb (*) Selected filesystem type btrfsmixedmode. 428s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 428s tomb . Fine, this tomb seems empty. 428s tomb . Key is valid. 428s tomb . Locking using cipher: aes-xts-plain64 428s tomb . A password is required to use key argon2-test.key 428s tomb . Unlocking KDF key protection (argon2) 430s tomb . Password OK. 430s tomb (*) Locking test.tomb with argon2-test.key 430s tomb . Formatting Luks mapped device. 442s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 443s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 443s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 443s tomb . Commanded to open tomb test.tomb 443s tomb . Valid tomb file found: test.tomb 443s tomb . Key is valid. 443s tomb . Mountpoint not specified, using default: /media/test 443s tomb (*) Opening test on /media/test 444s tomb . This tomb is a valid LUKS encrypted device. 444s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 444s tomb . A password is required to use key argon2-test.key 444s tomb . Unlocking KDF key protection (argon2) 445s tomb . Password OK. 449s tomb (*) Success unlocking tomb test 449s tomb . Filesystem detected: btrfs 449s tomb . Checking filesystem via /dev/loop0 449s [1/7] checking root items 449s [2/7] checking extents 449s [3/7] checking free space tree 449s [4/7] checking fs roots 449s [5/7] checking only csums items (without verifying data) 449s [6/7] checking root refs 449s [7/7] checking quota groups skipped (not enabled on this FS) 449s Opening filesystem to check... 449s Checking filesystem on /dev/mapper/tomb.test.637977845c05b13866f82f64287f1a76b7f90aa4a85aa218872d24f9d294ebaf.loop0 449s UUID: d4555e28-6e35-4d2f-859f-063ba4ae1505 449s found 36864 bytes used, no error found 449s total csum bytes: 0 449s total tree bytes: 36864 449s total fs tree bytes: 8192 449s total extent tree bytes: 4096 449s btree space waste bytes: 30304 449s file data blocks allocated: 0 449s referenced 0 449s tomb (*) Success opening test.tomb on /media/test 449s Copying some data into the opened tomb ... 449s Opened tomb's content: 449s total 28 449s drwxr-xr-x 1 ubuntu ubuntu 88 May 7 20:24 . 449s drwxr-xr-x 3 root root 4096 May 7 20:24 .. 449s -rw-r--r-- 1 ubuntu ubuntu 12 May 7 20:24 .host 449s -rw-r--r-- 1 ubuntu ubuntu 11 May 7 20:24 .last 449s -rw-r--r-- 1 ubuntu ubuntu 5 May 7 20:24 .uid 449s -rw------- 1 ubuntu ubuntu 944 May 7 20:23 argon2-test.key 449s -rw------- 1 ubuntu ubuntu 946 May 7 20:22 pbkdf2-test.key 450s tomb . Closing tomb [test] mounted on /media/test 450s tomb (*) Tomb [test] closed: your bones will rest in peace. 450s autopkgtest [20:24:31]: test create-and-use-a-tomb: -----------------------] 451s autopkgtest [20:24:32]: test create-and-use-a-tomb: - - - - - - - - - - results - - - - - - - - - - 451s create-and-use-a-tomb PASS 451s autopkgtest [20:24:32]: @@@@@@@@@@@@@@@@@@@@ summary 451s create-and-use-a-tomb PASS 477s Creating nova instance adt-oracular-s390x-tomb-20240507-201701-juju-7f2275-prod-proposed-migration-environment-3-ef4ec4b5-4bde-417b-80ab-1775b8be2550 from image adt/ubuntu-oracular-s390x-server-20240506.img (UUID 24f6244a-6677-4cf9-8a07-fa76c39c5d7e)...