0s autopkgtest [07:57:24]: starting date and time: 2025-01-18 07:57:24+0000 0s autopkgtest [07:57:24]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [07:57:24]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.yfxo69kc/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.11+dfsg-2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor builder-cpu2-ram4-disk20 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@bos03-19.secgroup --name adt-plucky-amd64-tomb-20250118-075724-juju-7f2275-prod-proposed-migration-environment-20-8dce0c5a-e0cb-41da-abfd-f0d9be47aa44 --image adt/ubuntu-plucky-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-proposed-migration-amd64 -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 93s autopkgtest [07:58:57]: testbed dpkg architecture: amd64 93s autopkgtest [07:58:57]: testbed apt version: 2.9.18 93s autopkgtest [07:58:57]: @@@@@@@@@@@@@@@@@@@@ test bed setup 93s autopkgtest [07:58:57]: testbed release detected to be: None 94s autopkgtest [07:58:58]: updating testbed package index (apt update) 94s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 95s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 95s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 95s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 95s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [825 kB] 95s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.6 kB] 95s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [156 kB] 95s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 95s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [292 kB] 95s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [203 kB] 95s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted i386 Packages [2408 B] 95s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 Packages [40.1 kB] 95s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [423 kB] 95s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [975 kB] 95s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [24.6 kB] 95s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [4116 B] 95s Fetched 3043 kB in 1s (2959 kB/s) 97s Reading package lists... 97s Reading package lists... 97s Building dependency tree... 97s Reading state information... 97s Calculating upgrade... 97s The following packages will be upgraded: 97s apport apport-core-dump-handler bash-completion python3-apport 97s python3-problem-report 97s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 97s Need to get 433 kB of archives. 97s After this operation, 0 B of additional disk space will be used. 97s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-problem-report all 2.31.0-0ubuntu3 [25.3 kB] 98s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-apport all 2.31.0-0ubuntu3 [93.1 kB] 98s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 apport-core-dump-handler all 2.31.0-0ubuntu3 [18.3 kB] 98s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 apport all 2.31.0-0ubuntu3 [83.0 kB] 98s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 bash-completion all 1:2.16.0-6 [214 kB] 98s Fetched 433 kB in 0s (889 kB/s) 98s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 98s Preparing to unpack .../python3-problem-report_2.31.0-0ubuntu3_all.deb ... 98s Unpacking python3-problem-report (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 98s Preparing to unpack .../python3-apport_2.31.0-0ubuntu3_all.deb ... 99s Unpacking python3-apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 99s Preparing to unpack .../apport-core-dump-handler_2.31.0-0ubuntu3_all.deb ... 99s Unpacking apport-core-dump-handler (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 99s Preparing to unpack .../apport_2.31.0-0ubuntu3_all.deb ... 99s Unpacking apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 99s Preparing to unpack .../bash-completion_1%3a2.16.0-6_all.deb ... 99s Unpacking bash-completion (1:2.16.0-6) over (1:2.16.0-3) ... 99s Setting up python3-problem-report (2.31.0-0ubuntu3) ... 99s Setting up python3-apport (2.31.0-0ubuntu3) ... 99s Setting up bash-completion (1:2.16.0-6) ... 99s Setting up apport-core-dump-handler (2.31.0-0ubuntu3) ... 99s invoke-rc.d: policy-rc.d denied execution of restart. 100s /usr/sbin/policy-rc.d returned 101, not running 'restart apport.service' 100s Setting up apport (2.31.0-0ubuntu3) ... 100s /usr/sbin/policy-rc.d returned 101, not running 'restart apport-autoreport.path apport-autoreport.service apport-autoreport.timer apport-forward.socket' 100s Processing triggers for man-db (2.13.0-1) ... 101s 101s Running kernel seems to be up-to-date. 101s 101s No services need to be restarted. 101s 101s No containers need to be restarted. 101s 101s No user sessions are running outdated binaries. 101s 101s No VM guests are running outdated hypervisor (qemu) binaries on this host. 102s Reading package lists... 102s Building dependency tree... 102s Reading state information... 103s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 103s autopkgtest [07:59:07]: upgrading testbed (apt dist-upgrade and autopurge) 103s Reading package lists... 103s Building dependency tree... 103s Reading state information... 103s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 103s Starting 2 pkgProblemResolver with broken count: 0 103s Done 104s Entering ResolveByKeep 104s 104s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 104s Reading package lists... 104s Building dependency tree... 104s Reading state information... 105s Starting pkgProblemResolver with broken count: 0 105s Starting 2 pkgProblemResolver with broken count: 0 105s Done 105s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 105s autopkgtest [07:59:09]: rebooting testbed after setup commands that affected boot 128s autopkgtest [07:59:32]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP PREEMPT_DYNAMIC Mon Sep 16 13:41:20 UTC 2024 131s autopkgtest [07:59:35]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 133s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (dsc) [2050 B] 133s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (tar) [1262 kB] 133s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (diff) [16.2 kB] 133s gpgv: Signature made Fri Jan 17 21:06:39 2025 UTC 133s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 133s gpgv: issuer "sge@debian.org" 133s gpgv: Can't check signature: No public key 133s dpkg-source: warning: cannot verify inline signature for ./tomb_2.11+dfsg-2.dsc: no acceptable signature found 133s autopkgtest [07:59:37]: testing package tomb version 2.11+dfsg-2 133s autopkgtest [07:59:37]: build not needed 134s autopkgtest [07:59:38]: test create-and-use-a-tomb-with-sudo: preparing testbed 134s Reading package lists... 134s Building dependency tree... 134s Reading state information... 134s Starting pkgProblemResolver with broken count: 0 134s Starting 2 pkgProblemResolver with broken count: 0 134s Done 135s The following NEW packages will be installed: 135s argon2 tomb zsh zsh-common 135s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 135s Need to get 5098 kB of archives. 135s After this operation, 19.5 MB of additional disk space will be used. 135s Get:1 http://ftpmaster.internal/ubuntu plucky/universe amd64 argon2 amd64 0~20190702+dfsg-4build1 [22.7 kB] 135s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 zsh-common all 5.9-6ubuntu3 [4170 kB] 135s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 zsh amd64 5.9-6ubuntu3 [826 kB] 136s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 tomb amd64 2.11+dfsg-2 [79.5 kB] 136s Fetched 5098 kB in 1s (6623 kB/s) 136s Selecting previously unselected package argon2. 136s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 136s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_amd64.deb ... 136s Unpacking argon2 (0~20190702+dfsg-4build1) ... 136s Selecting previously unselected package zsh-common. 136s Preparing to unpack .../zsh-common_5.9-6ubuntu3_all.deb ... 136s Unpacking zsh-common (5.9-6ubuntu3) ... 136s Selecting previously unselected package zsh. 136s Preparing to unpack .../zsh_5.9-6ubuntu3_amd64.deb ... 136s Unpacking zsh (5.9-6ubuntu3) ... 136s Selecting previously unselected package tomb. 136s Preparing to unpack .../tomb_2.11+dfsg-2_amd64.deb ... 136s Unpacking tomb (2.11+dfsg-2) ... 137s Setting up argon2 (0~20190702+dfsg-4build1) ... 137s Setting up zsh-common (5.9-6ubuntu3) ... 137s Setting up zsh (5.9-6ubuntu3) ... 137s Setting up tomb (2.11+dfsg-2) ... 137s Processing triggers for debianutils (5.21) ... 137s Processing triggers for man-db (2.13.0-1) ... 138s 138s Running kernel seems to be up-to-date. 138s 138s No services need to be restarted. 138s 138s No containers need to be restarted. 138s 138s No user sessions are running outdated binaries. 138s 138s No VM guests are running outdated hypervisor (qemu) binaries on this host. 139s autopkgtest [07:59:43]: test create-and-use-a-tomb-with-sudo: [----------------------- 140s ~~ Create a file to hold an encrypted file system ... 140s tomb . Commanded to dig tomb 140s tomb (*) Creating a new tomb in test.tomb 140s tomb . Generating test.tomb of 20MiB 140s 20+0 records in 140s 20+0 records out 140s 20971520 bytes (21 MB, 20 MiB) copied, 0.0656606 s, 319 MB/s 140s -rw------- 1 ubuntu ubuntu 20M Jan 18 07:59 test.tomb 140s tomb (*) Done digging test.tomb 140s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 140s tomb . tomb forge test.tomb.key 140s tomb . tomb lock test.tomb -k test.tomb.key 140s ~~ Create a pbkdf2 key file ... 140s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 140s tomb . Using KDF to protect the key password (1 rounds) 140s tomb [W] This operation takes time. Keep using this computer on other tasks. 140s tomb [W] Once done you will be asked to choose a password for your tomb. 140s tomb [W] To make it faster you can move the mouse around. 140s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 140s 512+0 records in 140s 512+0 records out 140s 512 bytes copied, 0.000640192 s, 800 kB/s 140s tomb (*) Choose the password of your key: pbkdf2-test.key 140s tomb . (You can also change it later using 'tomb passwd'.) 140s tomb (*) Using KDF, iteration time: 1000000 140s tomb . generating salt 140s tomb . calculating iterations 141s tomb . encoding the password 143s tomb . Key is valid. 143s tomb . Done forging pbkdf2-test.key 143s tomb (*) Your key is ready: 143s -rw------- 1 ubuntu ubuntu 947 Jan 18 07:59 pbkdf2-test.key 143s ~~ Create an argon2 key file ... 143s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 143s tomb . Using KDF to protect the key password (1 rounds) 143s tomb [W] This operation takes time. Keep using this computer on other tasks. 143s tomb [W] Once done you will be asked to choose a password for your tomb. 143s tomb [W] To make it faster you can move the mouse around. 143s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 143s 512+0 records in 143s 512+0 records out 143s 512 bytes copied, 0.000531067 s, 964 kB/s 143s tomb (*) Choose the password of your key: argon2-test.key 143s tomb . (You can also change it later using 'tomb passwd'.) 143s tomb (*) Using KDF Argon2 143s tomb . memory used: 2^18 143s tomb . kdf salt: e07595f017da70dcbaf376016a6c90a68e1f433235225001044d8828a89a03f0 143s tomb . kdf iterations: 1 143s tomb . Key is valid. 143s tomb . Done forging argon2-test.key 143s tomb (*) Your key is ready: 143s -rw------- 1 ubuntu ubuntu 944 Jan 18 07:59 argon2-test.key 143s ~~ Cloak a key file ... 143s tomb . Key is valid. 143s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 143s tomb (*) Tomb key encoded succesfully 143s ~~ Uncloak and verify a key file ... 143s tomb (*) Key succesfully uncloaked to uncloaked.key. 143s ~~ Testing ext4 file system using a pbkdf2 key ... 143s tomb . Commanded to dig tomb 143s tomb (*) Creating a new tomb in test.tomb 143s tomb . Generating test.tomb of 20MiB 143s 20+0 records in 143s 20+0 records out 143s 20971520 bytes (21 MB, 20 MiB) copied, 0.0669783 s, 313 MB/s 143s -rw------- 1 ubuntu ubuntu 20M Jan 18 07:59 test.tomb 143s tomb (*) Done digging test.tomb 143s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 143s tomb . tomb forge test.tomb.key 143s tomb . tomb lock test.tomb -k test.tomb.key 143s tomb . File is not yet a tomb: test.tomb 143s tomb . Valid tomb file found: test.tomb 143s tomb . Commanded to lock tomb test.tomb 143s tomb (*) Selected filesystem type ext4. 143s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 143s tomb . Fine, this tomb seems empty. 143s tomb . Key is valid. 143s tomb . Locking using cipher: aes-xts-plain64 143s tomb . A password is required to use key pbkdf2-test.key 143s tomb . Unlocking KDF key protection (pbkdf2sha1) 145s tomb . Password OK. 145s tomb (*) Locking test.tomb with pbkdf2-test.key 145s tomb . Formatting Luks mapped device. 151s tomb . Formatting your Tomb with ext4 filesystem. 152s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 152s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 152s tomb . Commanded to open tomb test.tomb 152s tomb . Valid tomb file found: test.tomb 152s tomb . Key is valid. 152s tomb . Mountpoint not specified, using default: /media/test 152s tomb (*) Opening test on /media/test 152s tomb . This tomb is a valid LUKS encrypted device. 152s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 152s tomb . A password is required to use key pbkdf2-test.key 152s tomb . Unlocking KDF key protection (pbkdf2sha1) 152s tomb . Password OK. 154s tomb (*) Success unlocking tomb test 154s tomb . Filesystem detected: ext4 154s tomb . Checking filesystem via /dev/loop0 154s fsck from util-linux 2.40.2 155s test: clean, 12/4608 files, 1356/4608 blocks 155s tomb (*) Success opening test.tomb on /media/test 155s ~~ Copying some data into the opened tomb ... 155s ~~ Opened tomb's content is ... 155s total 44 155s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 07:59 . 155s drwxr-xr-x 3 root root 4096 Jan 18 07:59 .. 155s -rw------- 1 ubuntu ubuntu 12 Jan 18 07:59 .host 155s -rw------- 1 ubuntu ubuntu 11 Jan 18 07:59 .last 155s -rw------- 1 ubuntu ubuntu 5 Jan 18 07:59 .uid 155s -rw------- 1 ubuntu ubuntu 944 Jan 18 07:59 argon2-test.key 155s drwx------ 2 ubuntu ubuntu 16384 Jan 18 07:59 lost+found 155s -rw------- 1 ubuntu ubuntu 947 Jan 18 07:59 pbkdf2-test.key 155s tomb . Closing tomb [test] mounted on /media/test 155s tomb (*) Tomb [test] closed: your bones will rest in peace. 155s ~~ Testing ext4 file system using a argon2 key ... 155s tomb . Commanded to dig tomb 155s tomb (*) Creating a new tomb in test.tomb 155s tomb . Generating test.tomb of 20MiB 155s 20+0 records in 155s 20+0 records out 155s 20971520 bytes (21 MB, 20 MiB) copied, 0.0664239 s, 316 MB/s 155s -rw------- 1 ubuntu ubuntu 20M Jan 18 07:59 test.tomb 155s tomb (*) Done digging test.tomb 155s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 155s tomb . tomb forge test.tomb.key 155s tomb . tomb lock test.tomb -k test.tomb.key 155s tomb . File is not yet a tomb: test.tomb 155s tomb . Valid tomb file found: test.tomb 155s tomb . Commanded to lock tomb test.tomb 155s tomb (*) Selected filesystem type ext4. 155s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 155s tomb . Fine, this tomb seems empty. 155s tomb . Key is valid. 155s tomb . Locking using cipher: aes-xts-plain64 155s tomb . A password is required to use key argon2-test.key 155s tomb . Unlocking KDF key protection (argon2) 155s tomb . Password OK. 155s tomb (*) Locking test.tomb with argon2-test.key 155s tomb . Formatting Luks mapped device. 162s tomb . Formatting your Tomb with ext4 filesystem. 162s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 162s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 162s tomb . Commanded to open tomb test.tomb 162s tomb . Valid tomb file found: test.tomb 162s tomb . Key is valid. 162s tomb . Mountpoint not specified, using default: /media/test 162s tomb (*) Opening test on /media/test 162s tomb . This tomb is a valid LUKS encrypted device. 162s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 162s tomb . A password is required to use key argon2-test.key 162s tomb . Unlocking KDF key protection (argon2) 162s tomb . Password OK. 165s tomb (*) Success unlocking tomb test 165s tomb . Filesystem detected: ext4 165s tomb . Checking filesystem via /dev/loop0 165s fsck from util-linux 2.40.2 165s test: clean, 12/4608 files, 1356/4608 blocks 165s tomb (*) Success opening test.tomb on /media/test 165s ~~ Copying some data into the opened tomb ... 165s ~~ Opened tomb's content is ... 165s total 44 165s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 08:00 . 165s drwxr-xr-x 3 root root 4096 Jan 18 08:00 .. 165s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:00 .host 165s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:00 .last 165s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:00 .uid 165s -rw------- 1 ubuntu ubuntu 944 Jan 18 07:59 argon2-test.key 165s drwx------ 2 ubuntu ubuntu 16384 Jan 18 08:00 lost+found 165s -rw------- 1 ubuntu ubuntu 947 Jan 18 07:59 pbkdf2-test.key 165s tomb . Closing tomb [test] mounted on /media/test 165s tomb (*) Tomb [test] closed: your bones will rest in peace. 165s ~~ Testing btrfs file system using a pbkdf2 key ... 165s tomb . Commanded to dig tomb 165s tomb (*) Creating a new tomb in test.tomb 165s tomb . Generating test.tomb of 115MiB 165s 115+0 records in 165s 115+0 records out 165s 120586240 bytes (121 MB, 115 MiB) copied, 0.380021 s, 317 MB/s 165s -rw------- 1 ubuntu ubuntu 115M Jan 18 08:00 test.tomb 165s tomb (*) Done digging test.tomb 165s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 165s tomb . tomb forge test.tomb.key 165s tomb . tomb lock test.tomb -k test.tomb.key 165s tomb . File is not yet a tomb: test.tomb 165s tomb . Valid tomb file found: test.tomb 165s tomb . Commanded to lock tomb test.tomb 165s tomb (*) Selected filesystem type btrfs. 165s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 165s tomb . Fine, this tomb seems empty. 165s tomb . Key is valid. 165s tomb . Locking using cipher: aes-xts-plain64 165s tomb . A password is required to use key pbkdf2-test.key 165s tomb . Unlocking KDF key protection (pbkdf2sha1) 167s tomb . Password OK. 167s tomb (*) Locking test.tomb with pbkdf2-test.key 167s tomb . Formatting Luks mapped device. 173s tomb . Formatting your Tomb with btrfs filesystem. 173s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 173s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 173s tomb . Commanded to open tomb test.tomb 173s tomb . Valid tomb file found: test.tomb 173s tomb . Key is valid. 173s tomb . Mountpoint not specified, using default: /media/test 173s tomb (*) Opening test on /media/test 173s tomb . This tomb is a valid LUKS encrypted device. 173s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 173s tomb . A password is required to use key pbkdf2-test.key 173s tomb . Unlocking KDF key protection (pbkdf2sha1) 174s tomb . Password OK. 176s tomb (*) Success unlocking tomb test 176s tomb . Filesystem detected: btrfs 176s tomb . Checking filesystem via /dev/loop0 176s [1/7] checking root items 176s [2/7] checking extents 176s Opening filesystem to check... 176s Checking filesystem on /dev/mapper/tomb.test.60af949564b051b07e6f28ed0f91d8a1bb5f47c0e8d0603c2f07719e54fa858f.loop0 176s UUID: f218b4a7-e1d7-4806-b4ec-d932f4959647 176s found 147456 bytes used, no error found 176s total csum bytes: 0 176s total tree bytes: 147456 176s total fs tree bytes: 32768 176s total extent tree bytes: 16384 176s btree space waste bytes: 140595 176s file data blocks allocated: 0 176s referenced 0 176s [3/7] checking free space tree 176s [4/7] checking fs roots 176s [5/7] checking only csums items (without verifying data) 176s [6/7] checking root refs 176s [7/7] checking quota groups skipped (not enabled on this FS) 176s tomb (*) Success opening test.tomb on /media/test 176s ~~ Copying some data into the opened tomb ... 176s ~~ Opened tomb's content is ... 176s total 40 176s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 08:00 . 176s drwxr-xr-x 3 root root 4096 Jan 18 08:00 .. 176s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:00 .host 176s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:00 .last 176s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:00 .uid 176s -rw------- 1 ubuntu ubuntu 944 Jan 18 07:59 argon2-test.key 176s -rw------- 1 ubuntu ubuntu 947 Jan 18 07:59 pbkdf2-test.key 176s tomb . Closing tomb [test] mounted on /media/test 176s tomb (*) Tomb [test] closed: your bones will rest in peace. 177s ~~ Testing btrfsmixedmode file system using a argon2 key ... 177s tomb . Commanded to dig tomb 177s tomb (*) Creating a new tomb in test.tomb 177s tomb . Generating test.tomb of 20MiB 177s -rw------- 1 ubuntu ubuntu 20M Jan 18 08:00 test.tomb 177s 20+0 records in 177s 20+0 records out 177s 20971520 bytes (21 MB, 20 MiB) copied, 0.0666127 s, 315 MB/s 177s tomb (*) Done digging test.tomb 177s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 177s tomb . tomb forge test.tomb.key 177s tomb . tomb lock test.tomb -k test.tomb.key 177s tomb . File is not yet a tomb: test.tomb 177s tomb . Valid tomb file found: test.tomb 177s tomb . Commanded to lock tomb test.tomb 177s tomb (*) Selected filesystem type btrfsmixedmode. 177s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 177s tomb . Fine, this tomb seems empty. 177s tomb . Key is valid. 177s tomb . Locking using cipher: aes-xts-plain64 177s tomb . A password is required to use key argon2-test.key 177s tomb . Unlocking KDF key protection (argon2) 177s tomb . Password OK. 177s tomb (*) Locking test.tomb with argon2-test.key 177s tomb . Formatting Luks mapped device. 184s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 184s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 184s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 184s tomb . Commanded to open tomb test.tomb 184s tomb . Valid tomb file found: test.tomb 184s tomb . Key is valid. 184s tomb . Mountpoint not specified, using default: /media/test 184s tomb (*) Opening test on /media/test 184s tomb . This tomb is a valid LUKS encrypted device. 184s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 184s tomb . A password is required to use key argon2-test.key 184s tomb . Unlocking KDF key protection (argon2) 184s tomb . Password OK. 187s tomb (*) Success unlocking tomb test 187s tomb . Filesystem detected: btrfs 187s tomb . Checking filesystem via /dev/loop0 187s Opening filesystem to check... 187s Checking filesystem on /dev/mapper/tomb.test.60af949564b051b07e6f28ed0f91d8a1bb5f47c0e8d0603c2f07719e54fa858f.loop0 187s UUID: b92fafa6-b35c-4cb1-a5aa-472da501bb6e 187s found 36864 bytes used, no error found 187s total csum bytes: 0 187s total tree bytes: 36864 187s total fs tree bytes: 8192 187s total extent tree bytes: 4096 187s btree space waste bytes: 30304 187s file data blocks allocated: 0 187s referenced 0 187s [1/7] checking root items 187s [2/7] checking extents 187s [3/7] checking free space tree 187s [4/7] checking fs roots 187s [5/7] checking only csums items (without verifying data) 187s [6/7] checking root refs 187s [7/7] checking quota groups skipped (not enabled on this FS) 187s tomb (*) Success opening test.tomb on /media/test 187s ~~ Copying some data into the opened tomb ... 187s ~~ Opened tomb's content is ... 187s total 28 187s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 08:00 . 187s drwxr-xr-x 3 root root 4096 Jan 18 08:00 .. 187s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:00 .host 187s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:00 .last 187s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:00 .uid 187s -rw------- 1 ubuntu ubuntu 944 Jan 18 07:59 argon2-test.key 187s -rw------- 1 ubuntu ubuntu 947 Jan 18 07:59 pbkdf2-test.key 187s tomb . Closing tomb [test] mounted on /media/test 187s tomb (*) Tomb [test] closed: your bones will rest in peace. 187s autopkgtest [08:00:31]: test create-and-use-a-tomb-with-sudo: -----------------------] 188s create-and-use-a-tomb-with-sudo PASS 188s autopkgtest [08:00:32]: test create-and-use-a-tomb-with-sudo: - - - - - - - - - - results - - - - - - - - - - 188s autopkgtest [08:00:32]: test create-and-use-a-tomb-with-doas: preparing testbed 244s autopkgtest [08:01:28]: testbed dpkg architecture: amd64 244s autopkgtest [08:01:28]: testbed apt version: 2.9.18 244s autopkgtest [08:01:28]: @@@@@@@@@@@@@@@@@@@@ test bed setup 245s autopkgtest [08:01:29]: testbed release detected to be: plucky 245s autopkgtest [08:01:29]: updating testbed package index (apt update) 246s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 246s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 246s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 246s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 246s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [825 kB] 246s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [156 kB] 246s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.6 kB] 246s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 246s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main i386 Packages [203 kB] 246s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/main amd64 Packages [292 kB] 246s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/restricted i386 Packages [2408 B] 246s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/restricted amd64 Packages [40.1 kB] 246s Get:13 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 Packages [975 kB] 246s Get:14 http://ftpmaster.internal/ubuntu plucky-proposed/universe i386 Packages [423 kB] 246s Get:15 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse i386 Packages [4116 B] 246s Get:16 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse amd64 Packages [24.6 kB] 247s Fetched 3043 kB in 1s (3157 kB/s) 247s Reading package lists... 248s Reading package lists... 248s Building dependency tree... 248s Reading state information... 248s Calculating upgrade... 248s The following packages will be upgraded: 248s apport apport-core-dump-handler bash-completion python3-apport 248s python3-problem-report 249s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 249s Need to get 433 kB of archives. 249s After this operation, 0 B of additional disk space will be used. 249s Get:1 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-problem-report all 2.31.0-0ubuntu3 [25.3 kB] 249s Get:2 http://ftpmaster.internal/ubuntu plucky/main amd64 python3-apport all 2.31.0-0ubuntu3 [93.1 kB] 249s Get:3 http://ftpmaster.internal/ubuntu plucky/main amd64 apport-core-dump-handler all 2.31.0-0ubuntu3 [18.3 kB] 249s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 apport all 2.31.0-0ubuntu3 [83.0 kB] 249s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 bash-completion all 1:2.16.0-6 [214 kB] 249s Fetched 433 kB in 0s (884 kB/s) 249s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 249s Preparing to unpack .../python3-problem-report_2.31.0-0ubuntu3_all.deb ... 249s Unpacking python3-problem-report (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 249s Preparing to unpack .../python3-apport_2.31.0-0ubuntu3_all.deb ... 250s Unpacking python3-apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 250s Preparing to unpack .../apport-core-dump-handler_2.31.0-0ubuntu3_all.deb ... 250s Unpacking apport-core-dump-handler (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 250s Preparing to unpack .../apport_2.31.0-0ubuntu3_all.deb ... 250s Unpacking apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 250s Preparing to unpack .../bash-completion_1%3a2.16.0-6_all.deb ... 250s Unpacking bash-completion (1:2.16.0-6) over (1:2.16.0-3) ... 250s Setting up python3-problem-report (2.31.0-0ubuntu3) ... 250s Setting up python3-apport (2.31.0-0ubuntu3) ... 250s Setting up bash-completion (1:2.16.0-6) ... 250s Setting up apport-core-dump-handler (2.31.0-0ubuntu3) ... 250s invoke-rc.d: policy-rc.d denied execution of restart. 251s /usr/sbin/policy-rc.d returned 101, not running 'restart apport.service' 251s Setting up apport (2.31.0-0ubuntu3) ... 251s /usr/sbin/policy-rc.d returned 101, not running 'restart apport-autoreport.path apport-autoreport.service apport-autoreport.timer apport-forward.socket' 251s Processing triggers for man-db (2.13.0-1) ... 252s 252s Running kernel seems to be up-to-date. 252s 252s No services need to be restarted. 252s 252s No containers need to be restarted. 252s 252s No user sessions are running outdated binaries. 252s 252s No VM guests are running outdated hypervisor (qemu) binaries on this host. 253s Reading package lists... 254s Building dependency tree... 254s Reading state information... 254s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 254s autopkgtest [08:01:38]: upgrading testbed (apt dist-upgrade and autopurge) 254s Reading package lists... 254s Building dependency tree... 254s Reading state information... 254s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 254s Starting 2 pkgProblemResolver with broken count: 0 254s Done 255s Entering ResolveByKeep 255s 255s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 255s Reading package lists... 256s Building dependency tree... 256s Reading state information... 256s Starting pkgProblemResolver with broken count: 0 256s Starting 2 pkgProblemResolver with broken count: 0 256s Done 256s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 256s autopkgtest [08:01:40]: rebooting testbed after setup commands that affected boot 282s Reading package lists... 282s Building dependency tree... 282s Reading state information... 282s Starting pkgProblemResolver with broken count: 0 282s Starting 2 pkgProblemResolver with broken count: 0 282s Done 283s The following NEW packages will be installed: 283s argon2 doas opendoas tomb zsh zsh-common 283s 0 upgraded, 6 newly installed, 0 to remove and 0 not upgraded. 283s Need to get 5124 kB of archives. 283s After this operation, 19.6 MB of additional disk space will be used. 283s Get:1 http://ftpmaster.internal/ubuntu plucky/universe amd64 argon2 amd64 0~20190702+dfsg-4build1 [22.7 kB] 283s Get:2 http://ftpmaster.internal/ubuntu plucky/universe amd64 opendoas amd64 6.8.2-1 [23.2 kB] 283s Get:3 http://ftpmaster.internal/ubuntu plucky/universe amd64 doas amd64 6.8.2-1 [2774 B] 283s Get:4 http://ftpmaster.internal/ubuntu plucky/main amd64 zsh-common all 5.9-6ubuntu3 [4170 kB] 283s Get:5 http://ftpmaster.internal/ubuntu plucky/main amd64 zsh amd64 5.9-6ubuntu3 [826 kB] 283s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe amd64 tomb amd64 2.11+dfsg-2 [79.5 kB] 284s Fetched 5124 kB in 1s (6174 kB/s) 284s Selecting previously unselected package argon2. 284s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89449 files and directories currently installed.) 284s Preparing to unpack .../0-argon2_0~20190702+dfsg-4build1_amd64.deb ... 284s Unpacking argon2 (0~20190702+dfsg-4build1) ... 284s Selecting previously unselected package opendoas. 284s Preparing to unpack .../1-opendoas_6.8.2-1_amd64.deb ... 284s Unpacking opendoas (6.8.2-1) ... 284s Selecting previously unselected package doas. 284s Preparing to unpack .../2-doas_6.8.2-1_amd64.deb ... 284s Unpacking doas (6.8.2-1) ... 284s Selecting previously unselected package zsh-common. 284s Preparing to unpack .../3-zsh-common_5.9-6ubuntu3_all.deb ... 284s Unpacking zsh-common (5.9-6ubuntu3) ... 284s Selecting previously unselected package zsh. 284s Preparing to unpack .../4-zsh_5.9-6ubuntu3_amd64.deb ... 284s Unpacking zsh (5.9-6ubuntu3) ... 284s Selecting previously unselected package tomb. 285s Preparing to unpack .../5-tomb_2.11+dfsg-2_amd64.deb ... 285s Unpacking tomb (2.11+dfsg-2) ... 285s Setting up argon2 (0~20190702+dfsg-4build1) ... 285s Setting up zsh-common (5.9-6ubuntu3) ... 285s Setting up zsh (5.9-6ubuntu3) ... 285s Setting up opendoas (6.8.2-1) ... 285s Setting up tomb (2.11+dfsg-2) ... 285s Setting up doas (6.8.2-1) ... 285s Processing triggers for debianutils (5.21) ... 285s Processing triggers for man-db (2.13.0-1) ... 286s 286s Running kernel seems to be up-to-date. 286s 286s No services need to be restarted. 286s 286s No containers need to be restarted. 286s 286s No user sessions are running outdated binaries. 286s 286s No VM guests are running outdated hypervisor (qemu) binaries on this host. 290s autopkgtest [08:02:14]: test create-and-use-a-tomb-with-doas: [----------------------- 290s ~~ Create a file to hold an encrypted file system ... 290s tomb . Commanded to dig tomb 290s tomb (*) Creating a new tomb in test.tomb 290s tomb . Generating test.tomb of 20MiB 290s 20+0 records in 290s 20+0 records out 290s 20971520 bytes (21 MB, 20 MiB) copied, 0.0677968 s, 309 MB/s 290s -rw------- 1 ubuntu ubuntu 20M Jan 18 08:02 test.tomb 290s tomb (*) Done digging test.tomb 290s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 290s tomb . tomb forge test.tomb.key 290s tomb . tomb lock test.tomb -k test.tomb.key 290s ~~ Create a pbkdf2 key file ... 290s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 290s tomb . Using KDF to protect the key password (1 rounds) 290s tomb [W] This operation takes time. Keep using this computer on other tasks. 290s tomb [W] Once done you will be asked to choose a password for your tomb. 290s tomb [W] To make it faster you can move the mouse around. 290s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 290s 512+0 records in 290s 512+0 records out 290s 512 bytes copied, 0.000560611 s, 913 kB/s 290s tomb (*) Choose the password of your key: pbkdf2-test.key 290s tomb . (You can also change it later using 'tomb passwd'.) 290s tomb (*) Using KDF, iteration time: 1000000 290s tomb . generating salt 290s tomb . calculating iterations 292s tomb . encoding the password 293s tomb . Key is valid. 293s tomb . Done forging pbkdf2-test.key 293s tomb (*) Your key is ready: 293s -rw------- 1 ubuntu ubuntu 951 Jan 18 08:02 pbkdf2-test.key 293s ~~ Create an argon2 key file ... 293s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 293s tomb . Using KDF to protect the key password (1 rounds) 293s tomb [W] This operation takes time. Keep using this computer on other tasks. 293s tomb [W] Once done you will be asked to choose a password for your tomb. 293s tomb [W] To make it faster you can move the mouse around. 293s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 293s 512+0 records in 293s 512+0 records out 293s 512 bytes copied, 0.000545463 s, 939 kB/s 293s tomb (*) Choose the password of your key: argon2-test.key 293s tomb . (You can also change it later using 'tomb passwd'.) 293s tomb (*) Using KDF Argon2 293s tomb . memory used: 2^18 293s tomb . kdf salt: 10c9de391d8304482425291e6052458003f059d5ec0b48ec76d4da87b120cca4 293s tomb . kdf iterations: 1 294s tomb . Key is valid. 294s tomb . Done forging argon2-test.key 294s tomb (*) Your key is ready: 294s -rw------- 1 ubuntu ubuntu 940 Jan 18 08:02 argon2-test.key 294s ~~ Cloak a key file ... 294s tomb . Key is valid. 294s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 294s tomb (*) Tomb key encoded succesfully 294s ~~ Uncloak and verify a key file ... 294s tomb (*) Key succesfully uncloaked to uncloaked.key. 294s ~~ Testing ext4 file system using a pbkdf2 key ... 294s tomb . Commanded to dig tomb 294s tomb (*) Creating a new tomb in test.tomb 294s tomb . Generating test.tomb of 20MiB 294s 20+0 records in 294s 20+0 records out 294s 20971520 bytes (21 MB, 20 MiB) copied, 0.0680192 s, 308 MB/s 294s -rw------- 1 ubuntu ubuntu 20M Jan 18 08:02 test.tomb 294s tomb (*) Done digging test.tomb 294s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 294s tomb . tomb forge test.tomb.key 294s tomb . tomb lock test.tomb -k test.tomb.key 294s tomb . File is not yet a tomb: test.tomb 294s tomb . Valid tomb file found: test.tomb 294s tomb . Commanded to lock tomb test.tomb 294s tomb (*) Selected filesystem type ext4. 294s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 294s tomb . Fine, this tomb seems empty. 294s tomb . Key is valid. 294s tomb . Locking using cipher: aes-xts-plain64 294s tomb . A password is required to use key pbkdf2-test.key 294s tomb . Unlocking KDF key protection (pbkdf2sha1) 295s tomb . Password OK. 295s tomb (*) Locking test.tomb with pbkdf2-test.key 295s tomb . Formatting Luks mapped device. 302s tomb . Formatting your Tomb with ext4 filesystem. 302s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 302s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 302s tomb . Commanded to open tomb test.tomb 302s tomb . Valid tomb file found: test.tomb 302s tomb . Key is valid. 302s tomb . Mountpoint not specified, using default: /media/test 302s tomb (*) Opening test on /media/test 302s tomb . This tomb is a valid LUKS encrypted device. 302s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 302s tomb . A password is required to use key pbkdf2-test.key 302s tomb . Unlocking KDF key protection (pbkdf2sha1) 303s tomb . Password OK. 305s tomb (*) Success unlocking tomb test 305s tomb . Filesystem detected: ext4 305s tomb . Checking filesystem via /dev/loop0 305s fsck from util-linux 2.40.2 305s test: clean, 12/4608 files, 1356/4608 blocks 305s tomb (*) Success opening test.tomb on /media/test 305s ~~ Copying some data into the opened tomb ... 305s ~~ Opened tomb's content is ... 305s total 44 305s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 08:02 . 305s drwxr-xr-x 3 root root 4096 Jan 18 08:02 .. 305s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:02 .host 305s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:02 .last 305s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:02 .uid 305s -rw------- 1 ubuntu ubuntu 940 Jan 18 08:02 argon2-test.key 305s drwx------ 2 ubuntu ubuntu 16384 Jan 18 08:02 lost+found 305s -rw------- 1 ubuntu ubuntu 951 Jan 18 08:02 pbkdf2-test.key 305s tomb . Closing tomb [test] mounted on /media/test 305s tomb (*) Tomb [test] closed: your bones will rest in peace. 305s ~~ Testing ext4 file system using a argon2 key ... 305s tomb . Commanded to dig tomb 305s tomb (*) Creating a new tomb in test.tomb 305s tomb . Generating test.tomb of 20MiB 306s 20+0 records in 306s 20+0 records out 306s 20971520 bytes (21 MB, 20 MiB) copied, 0.0670469 s, 313 MB/s 306s -rw------- 1 ubuntu ubuntu 20M Jan 18 08:02 test.tomb 306s tomb (*) Done digging test.tomb 306s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 306s tomb . tomb forge test.tomb.key 306s tomb . tomb lock test.tomb -k test.tomb.key 306s tomb . File is not yet a tomb: test.tomb 306s tomb . Valid tomb file found: test.tomb 306s tomb . Commanded to lock tomb test.tomb 306s tomb (*) Selected filesystem type ext4. 306s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 306s tomb . Fine, this tomb seems empty. 306s tomb . Key is valid. 306s tomb . Locking using cipher: aes-xts-plain64 306s tomb . A password is required to use key argon2-test.key 306s tomb . Unlocking KDF key protection (argon2) 306s tomb . Password OK. 306s tomb (*) Locking test.tomb with argon2-test.key 306s tomb . Formatting Luks mapped device. 313s tomb . Formatting your Tomb with ext4 filesystem. 313s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 313s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 313s tomb . Commanded to open tomb test.tomb 313s tomb . Valid tomb file found: test.tomb 313s tomb . Key is valid. 313s tomb . Mountpoint not specified, using default: /media/test 313s tomb (*) Opening test on /media/test 313s tomb . This tomb is a valid LUKS encrypted device. 313s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 313s tomb . A password is required to use key argon2-test.key 313s tomb . Unlocking KDF key protection (argon2) 313s tomb . Password OK. 315s tomb (*) Success unlocking tomb test 315s tomb . Filesystem detected: ext4 315s tomb . Checking filesystem via /dev/loop0 315s fsck from util-linux 2.40.2 315s test: clean, 12/4608 files, 1356/4608 blocks 315s tomb (*) Success opening test.tomb on /media/test 315s ~~ Copying some data into the opened tomb ... 315s ~~ Opened tomb's content is ... 315s total 44 315s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 08:02 . 315s drwxr-xr-x 3 root root 4096 Jan 18 08:02 .. 315s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:02 .host 315s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:02 .last 315s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:02 .uid 315s -rw------- 1 ubuntu ubuntu 940 Jan 18 08:02 argon2-test.key 315s drwx------ 2 ubuntu ubuntu 16384 Jan 18 08:02 lost+found 315s -rw------- 1 ubuntu ubuntu 951 Jan 18 08:02 pbkdf2-test.key 315s tomb . Closing tomb [test] mounted on /media/test 315s tomb (*) Tomb [test] closed: your bones will rest in peace. 315s ~~ Testing btrfs file system using a pbkdf2 key ... 315s tomb . Commanded to dig tomb 315s tomb (*) Creating a new tomb in test.tomb 315s tomb . Generating test.tomb of 115MiB 316s 115+0 records in 316s 115+0 records out 316s 120586240 bytes (121 MB, 115 MiB) copied, 0.376193 s, 321 MB/s 316s -rw------- 1 ubuntu ubuntu 115M Jan 18 08:02 test.tomb 316s tomb (*) Done digging test.tomb 316s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 316s tomb . tomb forge test.tomb.key 316s tomb . tomb lock test.tomb -k test.tomb.key 316s tomb . File is not yet a tomb: test.tomb 316s tomb . Valid tomb file found: test.tomb 316s tomb . Commanded to lock tomb test.tomb 316s tomb (*) Selected filesystem type btrfs. 316s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 316s tomb . Fine, this tomb seems empty. 316s tomb . Key is valid. 316s tomb . Locking using cipher: aes-xts-plain64 316s tomb . A password is required to use key pbkdf2-test.key 316s tomb . Unlocking KDF key protection (pbkdf2sha1) 317s tomb . Password OK. 317s tomb (*) Locking test.tomb with pbkdf2-test.key 317s tomb . Formatting Luks mapped device. 324s tomb . Formatting your Tomb with btrfs filesystem. 324s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 324s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 324s tomb . Commanded to open tomb test.tomb 324s tomb . Valid tomb file found: test.tomb 324s tomb . Key is valid. 324s tomb . Mountpoint not specified, using default: /media/test 324s tomb (*) Opening test on /media/test 324s tomb . This tomb is a valid LUKS encrypted device. 324s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 324s tomb . A password is required to use key pbkdf2-test.key 324s tomb . Unlocking KDF key protection (pbkdf2sha1) 325s tomb . Password OK. 328s tomb (*) Success unlocking tomb test 328s Opening filesystem to check... 328s Checking filesystem on /dev/mapper/tomb.test.60af949564b051b07e6f28ed0f91d8a1bb5f47c0e8d0603c2f07719e54fa858f.loop0 328s UUID: 6ff27578-47de-4b11-a2fa-93cef9ef8375 328s found 147456 bytes used, no error found 328s total csum bytes: 0 328s total tree bytes: 147456 328s total fs tree bytes: 32768 328s total extent tree bytes: 16384 328s btree space waste bytes: 140595 328s file data blocks allocated: 0 328s referenced 0 328s tomb . Filesystem detected: btrfs 328s tomb . Checking filesystem via /dev/loop0 328s [1/7] checking root items 328s [2/7] checking extents 328s [3/7] checking free space tree 328s [4/7] checking fs roots 328s [5/7] checking only csums items (without verifying data) 328s [6/7] checking root refs 328s [7/7] checking quota groups skipped (not enabled on this FS) 328s tomb (*) Success opening test.tomb on /media/test 328s tomb . Closing tomb [test] mounted on /media/test 328s tomb (*) Tomb [test] closed: your bones will rest in peace. 328s tomb . Commanded to dig tomb 328s tomb (*) Creating a new tomb in test.tomb 328s tomb . Generating test.tomb of 20MiB 328s 20+0 records in 328s 20+0 records out 328s 20971520 bytes (21 MB, 20 MiB) copied, 0.0670726 s, 313 MB/s 328s tomb (*) Done digging test.tomb 328s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 328s tomb . tomb forge test.tomb.key 328s tomb . tomb lock test.tomb -k test.tomb.key 328s tomb . File is not yet a tomb: test.tomb 328s tomb . Valid tomb file found: test.tomb 328s tomb . Commanded to lock tomb test.tomb 328s tomb (*) Selected filesystem type btrfsmixedmode. 328s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 328s tomb . Fine, this tomb seems empty. 328s tomb . Key is valid. 328s tomb . Locking using cipher: aes-xts-plain64 328s tomb . A password is required to use key argon2-test.key 328s tomb . Unlocking KDF key protection (argon2) 328s tomb . Password OK. 328s tomb (*) Locking test.tomb with argon2-test.key 328s tomb . Formatting Luks mapped device. 328s ~~ Copying some data into the opened tomb ... 328s ~~ Opened tomb's content is ... 328s total 40 328s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 08:02 . 328s drwxr-xr-x 3 root root 4096 Jan 18 08:02 .. 328s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:02 .host 328s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:02 .last 328s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:02 .uid 328s -rw------- 1 ubuntu ubuntu 940 Jan 18 08:02 argon2-test.key 328s -rw------- 1 ubuntu ubuntu 951 Jan 18 08:02 pbkdf2-test.key 328s ~~ Testing btrfsmixedmode file system using a argon2 key ... 328s -rw------- 1 ubuntu ubuntu 20M Jan 18 08:02 test.tomb 334s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 334s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 334s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 334s tomb . Commanded to open tomb test.tomb 334s tomb . Valid tomb file found: test.tomb 334s tomb . Key is valid. 334s tomb . Mountpoint not specified, using default: /media/test 334s tomb (*) Opening test on /media/test 334s tomb . This tomb is a valid LUKS encrypted device. 334s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 334s tomb . A password is required to use key argon2-test.key 334s tomb . Unlocking KDF key protection (argon2) 335s tomb . Password OK. 337s tomb (*) Success unlocking tomb test 337s tomb . Filesystem detected: btrfs 337s tomb . Checking filesystem via /dev/loop0 337s Opening filesystem to check... 337s Checking filesystem on /dev/mapper/tomb.test.60af949564b051b07e6f28ed0f91d8a1bb5f47c0e8d0603c2f07719e54fa858f.loop0 337s UUID: 9a3a7e9c-75c2-4586-86e8-bac66a08936a 337s found 36864 bytes used, no error found 337s total csum bytes: 0 337s total tree bytes: 36864 337s total fs tree bytes: 8192 337s total extent tree bytes: 4096 337s btree space waste bytes: 30304 337s file data blocks allocated: 0 337s referenced 0 337s [1/7] checking root items 337s [2/7] checking extents 337s [3/7] checking free space tree 337s [4/7] checking fs roots 337s [5/7] checking only csums items (without verifying data) 337s [6/7] checking root refs 337s [7/7] checking quota groups skipped (not enabled on this FS) 337s tomb (*) Success opening test.tomb on /media/test 337s ~~ Copying some data into the opened tomb ... 337s ~~ Opened tomb's content is ... 337s total 28 337s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 08:03 . 337s drwxr-xr-x 3 root root 4096 Jan 18 08:03 .. 337s -rw------- 1 ubuntu ubuntu 12 Jan 18 08:03 .host 337s -rw------- 1 ubuntu ubuntu 11 Jan 18 08:03 .last 337s -rw------- 1 ubuntu ubuntu 5 Jan 18 08:03 .uid 337s -rw------- 1 ubuntu ubuntu 940 Jan 18 08:02 argon2-test.key 337s -rw------- 1 ubuntu ubuntu 951 Jan 18 08:02 pbkdf2-test.key 337s tomb . Closing tomb [test] mounted on /media/test 337s tomb (*) Tomb [test] closed: your bones will rest in peace. 338s autopkgtest [08:03:02]: test create-and-use-a-tomb-with-doas: -----------------------] 338s create-and-use-a-tomb-with-doas PASS 338s autopkgtest [08:03:02]: test create-and-use-a-tomb-with-doas: - - - - - - - - - - results - - - - - - - - - - 339s autopkgtest [08:03:03]: @@@@@@@@@@@@@@@@@@@@ summary 339s create-and-use-a-tomb-with-sudo PASS 339s create-and-use-a-tomb-with-doas PASS 344s nova [W] Skipping flock for amd64 344s Creating nova instance adt-plucky-amd64-tomb-20250118-075724-juju-7f2275-prod-proposed-migration-environment-20-8dce0c5a-e0cb-41da-abfd-f0d9be47aa44 from image adt/ubuntu-plucky-amd64-server-20250118.img (UUID e058fd01-4631-4391-b35e-268af134294d)... 344s nova [W] Timed out waiting for 785519c1-6f73-4bcc-8f35-bea8df40b832 to get deleted. 344s nova [W] Skipping flock for amd64 344s Creating nova instance adt-plucky-amd64-tomb-20250118-075724-juju-7f2275-prod-proposed-migration-environment-20-8dce0c5a-e0cb-41da-abfd-f0d9be47aa44 from image adt/ubuntu-plucky-amd64-server-20250118.img (UUID e058fd01-4631-4391-b35e-268af134294d)... 344s nova [W] Timed out waiting for 29f1fa8c-1965-4c7c-91f1-a623f55a007b to get deleted.