0s autopkgtest [22:49:44]: starting date and time: 2024-11-13 22:49:44+0000 0s autopkgtest [22:49:44]: git checkout: 6f3be7a8 Fix armhf LXD image generation for plucky 0s autopkgtest [22:49:44]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.8akfqbee/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb,src:pinentry --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=tomb/2.11+dfsg-1 pinentry/1.3.1-0ubuntu1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@bos03-ppc64el-3.secgroup --name adt-plucky-ppc64el-tomb-20241113-224944-juju-7f2275-prod-proposed-migration-environment-15-ecb2bfbe-a977-498e-9e53-d1b251b4b785 --image adt/ubuntu-plucky-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-proposed-migration-ppc64el -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 111s autopkgtest [22:51:35]: testbed dpkg architecture: ppc64el 111s autopkgtest [22:51:35]: testbed apt version: 2.9.8 111s autopkgtest [22:51:35]: @@@@@@@@@@@@@@@@@@@@ test bed setup 112s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 112s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [101 kB] 112s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [17.2 kB] 112s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [7016 B] 112s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [974 kB] 112s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el Packages [110 kB] 112s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el Packages [684 kB] 112s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse ppc64el Packages [20.8 kB] 113s Fetched 1986 kB in 1s (2144 kB/s) 113s Reading package lists... 116s Reading package lists... 116s Building dependency tree... 116s Reading state information... 116s Calculating upgrade... 117s The following packages will be upgraded: 117s bpfcc-tools bpftrace libbpfcc libgnutls30t64 libjson-glib-1.0-0 117s libjson-glib-1.0-common libnewt0.52 libutempter0 pinentry-curses 117s python3-bpfcc python3-newt whiptail 117s 12 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 117s Need to get 4642 kB of archives. 117s After this operation, 74.8 kB of additional disk space will be used. 117s Get:1 http://ftpmaster.internal/ubuntu plucky/main ppc64el libgnutls30t64 ppc64el 3.8.8-2ubuntu1 [1072 kB] 117s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el python3-newt ppc64el 0.52.24-2ubuntu4 [21.8 kB] 117s Get:3 http://ftpmaster.internal/ubuntu plucky/main ppc64el libnewt0.52 ppc64el 0.52.24-2ubuntu4 [62.1 kB] 117s Get:4 http://ftpmaster.internal/ubuntu plucky/main ppc64el whiptail ppc64el 0.52.24-2ubuntu4 [19.5 kB] 117s Get:5 http://ftpmaster.internal/ubuntu plucky/main ppc64el libbpfcc ppc64el 0.30.0+ds-1ubuntu5 [696 kB] 117s Get:6 http://ftpmaster.internal/ubuntu plucky/main ppc64el python3-bpfcc all 0.30.0+ds-1ubuntu5 [40.4 kB] 117s Get:7 http://ftpmaster.internal/ubuntu plucky/main ppc64el bpfcc-tools all 0.30.0+ds-1ubuntu5 [697 kB] 117s Get:8 http://ftpmaster.internal/ubuntu plucky/main ppc64el bpftrace ppc64el 0.21.2-2ubuntu2 [1898 kB] 117s Get:9 http://ftpmaster.internal/ubuntu plucky/main ppc64el libjson-glib-1.0-common all 1.10.0+ds-3 [5586 B] 117s Get:10 http://ftpmaster.internal/ubuntu plucky/main ppc64el libjson-glib-1.0-0 ppc64el 1.10.0+ds-3 [76.0 kB] 117s Get:11 http://ftpmaster.internal/ubuntu plucky/main ppc64el libutempter0 ppc64el 1.2.1-4 [9850 B] 117s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el pinentry-curses ppc64el 1.3.1-0ubuntu1 [43.6 kB] 118s Fetched 4642 kB in 1s (6047 kB/s) 118s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73767 files and directories currently installed.) 118s Preparing to unpack .../libgnutls30t64_3.8.8-2ubuntu1_ppc64el.deb ... 118s Unpacking libgnutls30t64:ppc64el (3.8.8-2ubuntu1) over (3.8.6-2ubuntu1) ... 118s Setting up libgnutls30t64:ppc64el (3.8.8-2ubuntu1) ... 118s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73767 files and directories currently installed.) 118s Preparing to unpack .../00-python3-newt_0.52.24-2ubuntu4_ppc64el.deb ... 118s Unpacking python3-newt:ppc64el (0.52.24-2ubuntu4) over (0.52.24-2ubuntu3) ... 118s Preparing to unpack .../01-libnewt0.52_0.52.24-2ubuntu4_ppc64el.deb ... 118s Unpacking libnewt0.52:ppc64el (0.52.24-2ubuntu4) over (0.52.24-2ubuntu3) ... 118s Preparing to unpack .../02-whiptail_0.52.24-2ubuntu4_ppc64el.deb ... 118s Unpacking whiptail (0.52.24-2ubuntu4) over (0.52.24-2ubuntu3) ... 118s Preparing to unpack .../03-libbpfcc_0.30.0+ds-1ubuntu5_ppc64el.deb ... 118s Unpacking libbpfcc:ppc64el (0.30.0+ds-1ubuntu5) over (0.30.0+ds-1ubuntu4) ... 118s Preparing to unpack .../04-python3-bpfcc_0.30.0+ds-1ubuntu5_all.deb ... 118s Unpacking python3-bpfcc (0.30.0+ds-1ubuntu5) over (0.30.0+ds-1ubuntu4) ... 118s Preparing to unpack .../05-bpfcc-tools_0.30.0+ds-1ubuntu5_all.deb ... 118s Unpacking bpfcc-tools (0.30.0+ds-1ubuntu5) over (0.30.0+ds-1ubuntu4) ... 118s Preparing to unpack .../06-bpftrace_0.21.2-2ubuntu2_ppc64el.deb ... 118s Unpacking bpftrace (0.21.2-2ubuntu2) over (0.21.2-2) ... 118s Preparing to unpack .../07-libjson-glib-1.0-common_1.10.0+ds-3_all.deb ... 118s Unpacking libjson-glib-1.0-common (1.10.0+ds-3) over (1.10.0+ds-2) ... 118s Preparing to unpack .../08-libjson-glib-1.0-0_1.10.0+ds-3_ppc64el.deb ... 118s Unpacking libjson-glib-1.0-0:ppc64el (1.10.0+ds-3) over (1.10.0+ds-2) ... 118s Preparing to unpack .../09-libutempter0_1.2.1-4_ppc64el.deb ... 118s Unpacking libutempter0:ppc64el (1.2.1-4) over (1.2.1-3build1) ... 118s Preparing to unpack .../10-pinentry-curses_1.3.1-0ubuntu1_ppc64el.deb ... 118s Unpacking pinentry-curses (1.3.1-0ubuntu1) over (1.2.1-3ubuntu5) ... 118s Setting up pinentry-curses (1.3.1-0ubuntu1) ... 118s Setting up libnewt0.52:ppc64el (0.52.24-2ubuntu4) ... 118s Setting up python3-newt:ppc64el (0.52.24-2ubuntu4) ... 119s Setting up libutempter0:ppc64el (1.2.1-4) ... 119s Setting up whiptail (0.52.24-2ubuntu4) ... 119s Setting up libjson-glib-1.0-common (1.10.0+ds-3) ... 119s Setting up libbpfcc:ppc64el (0.30.0+ds-1ubuntu5) ... 119s Setting up python3-bpfcc (0.30.0+ds-1ubuntu5) ... 119s Setting up bpftrace (0.21.2-2ubuntu2) ... 119s Setting up libjson-glib-1.0-0:ppc64el (1.10.0+ds-3) ... 119s Setting up bpfcc-tools (0.30.0+ds-1ubuntu5) ... 119s Processing triggers for man-db (2.12.1-3) ... 120s Processing triggers for libc-bin (2.40-1ubuntu3) ... 120s Reading package lists... 120s Building dependency tree... 120s Reading state information... 120s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 121s Hit:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease 121s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 121s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 121s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 122s Reading package lists... 122s Reading package lists... 122s Building dependency tree... 122s Reading state information... 122s Calculating upgrade... 122s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 122s Reading package lists... 123s Building dependency tree... 123s Reading state information... 123s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 125s autopkgtest [22:51:49]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 13:49:23 UTC 2024 126s autopkgtest [22:51:50]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 127s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-1 (dsc) [2037 B] 127s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-1 (tar) [1262 kB] 127s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-1 (diff) [16.0 kB] 128s gpgv: Signature made Mon Jul 22 20:25:44 2024 UTC 128s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 128s gpgv: issuer "sge@debian.org" 128s gpgv: Can't check signature: No public key 128s dpkg-source: warning: cannot verify inline signature for ./tomb_2.11+dfsg-1.dsc: no acceptable signature found 128s autopkgtest [22:51:52]: testing package tomb version 2.11+dfsg-1 128s autopkgtest [22:51:52]: build not needed 129s autopkgtest [22:51:53]: test create-and-use-a-tomb: preparing testbed 132s Reading package lists... 132s Building dependency tree... 132s Reading state information... 133s Starting pkgProblemResolver with broken count: 0 133s Starting 2 pkgProblemResolver with broken count: 0 133s Done 133s The following additional packages will be installed: 133s argon2 tomb zsh zsh-common 133s Suggested packages: 133s dcfldd plocate pwdsphinx qrencode recoll steghide unoconv zsh-doc 133s The following NEW packages will be installed: 133s argon2 autopkgtest-satdep tomb zsh zsh-common 133s 0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded. 133s Need to get 5282 kB/5282 kB of archives. 133s After this operation, 22.0 MB of additional disk space will be used. 133s Get:1 /tmp/autopkgtest.UVF7t2/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [720 B] 133s Get:2 http://ftpmaster.internal/ubuntu plucky/universe ppc64el argon2 ppc64el 0~20190702+dfsg-4build1 [29.7 kB] 134s Get:3 http://ftpmaster.internal/ubuntu plucky/main ppc64el zsh-common all 5.9-6ubuntu3 [4170 kB] 137s Get:4 http://ftpmaster.internal/ubuntu plucky/main ppc64el zsh ppc64el 5.9-6ubuntu3 [1003 kB] 137s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el tomb ppc64el 2.11+dfsg-1 [79.7 kB] 138s Fetched 5282 kB in 5s (1137 kB/s) 138s Selecting previously unselected package argon2. 138s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 73768 files and directories currently installed.) 138s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_ppc64el.deb ... 138s Unpacking argon2 (0~20190702+dfsg-4build1) ... 138s Selecting previously unselected package zsh-common. 138s Preparing to unpack .../zsh-common_5.9-6ubuntu3_all.deb ... 138s Unpacking zsh-common (5.9-6ubuntu3) ... 138s Selecting previously unselected package zsh. 138s Preparing to unpack .../zsh_5.9-6ubuntu3_ppc64el.deb ... 138s Unpacking zsh (5.9-6ubuntu3) ... 138s Selecting previously unselected package tomb. 138s Preparing to unpack .../tomb_2.11+dfsg-1_ppc64el.deb ... 138s Unpacking tomb (2.11+dfsg-1) ... 138s Selecting previously unselected package autopkgtest-satdep. 138s Preparing to unpack .../1-autopkgtest-satdep.deb ... 138s Unpacking autopkgtest-satdep (0) ... 138s Setting up argon2 (0~20190702+dfsg-4build1) ... 138s Setting up zsh-common (5.9-6ubuntu3) ... 138s Setting up zsh (5.9-6ubuntu3) ... 138s Setting up tomb (2.11+dfsg-1) ... 138s Setting up autopkgtest-satdep (0) ... 138s Processing triggers for debianutils (5.20) ... 138s Processing triggers for man-db (2.12.1-3) ... 141s (Reading database ... 75323 files and directories currently installed.) 141s Removing autopkgtest-satdep (0) ... 141s autopkgtest [22:52:05]: test create-and-use-a-tomb: [----------------------- 142s ~~ Create a file to hold an encrypted file system ... 142s tomb . Commanded to dig tomb 142s tomb (*) Creating a new tomb in test.tomb 142s tomb . Generating test.tomb of 20MiB 142s 20+0 records in 142s 20+0 records out 142s 20971520 bytes (21 MB, 20 MiB) copied, 0.1004 s, 209 MB/s 142s -rw------- 1 ubuntu ubuntu 20M Nov 13 22:52 test.tomb 142s tomb (*) Done digging test.tomb 142s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 142s tomb . tomb forge test.tomb.key 142s tomb . tomb lock test.tomb -k test.tomb.key 142s ~~ Create a pbkdf2 key file ... 142s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 142s tomb . Using KDF to protect the key password (1 rounds) 142s tomb [W] This operation takes time. Keep using this computer on other tasks. 142s tomb [W] Once done you will be asked to choose a password for your tomb. 142s tomb [W] To make it faster you can move the mouse around. 142s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 142s 512+0 records in 142s 512+0 records out 142s 512 bytes copied, 0.000717502 s, 714 kB/s 142s tomb (*) Choose the password of your key: pbkdf2-test.key 142s tomb . (You can also change it later using 'tomb passwd'.) 142s tomb (*) Using KDF, iteration time: 1000000 142s tomb . generating salt 142s tomb . calculating iterations 143s tomb . encoding the password 145s tomb . Key is valid. 145s tomb . Done forging pbkdf2-test.key 145s tomb (*) Your key is ready: 145s -rw------- 1 ubuntu ubuntu 950 Nov 13 22:52 pbkdf2-test.key 145s ~~ Create an argon2 key file ... 146s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 146s tomb . Using KDF to protect the key password (1 rounds) 146s tomb [W] This operation takes time. Keep using this computer on other tasks. 146s tomb [W] Once done you will be asked to choose a password for your tomb. 146s tomb [W] To make it faster you can move the mouse around. 146s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 146s 512+0 records in 146s 512+0 records out 146s 512 bytes copied, 0.00077917 s, 657 kB/s 146s tomb (*) Choose the password of your key: argon2-test.key 146s tomb . (You can also change it later using 'tomb passwd'.) 146s tomb (*) Using KDF Argon2 146s tomb . memory used: 2^18 146s tomb . kdf salt: b4a748dce056783e61ade6243046c163519e0aa26f8237f7cd58f19e96fccca2 146s tomb . kdf iterations: 1 146s tomb . Key is valid. 146s tomb . Done forging argon2-test.key 146s tomb (*) Your key is ready: 146s -rw------- 1 ubuntu ubuntu 940 Nov 13 22:52 argon2-test.key 146s ~~ Cloak a key file ... 146s tomb . Key is valid. 146s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 147s tomb (*) Tomb key encoded succesfully 147s ~~ Uncloak and verify a key file ... 147s tomb (*) Key succesfully uncloaked to uncloaked.key. 147s ~~ Testing ext4 file system using a pbkdf2 key ... 147s tomb . Commanded to dig tomb 147s tomb (*) Creating a new tomb in test.tomb 147s tomb . Generating test.tomb of 20MiB 147s 20+0 records in 147s 20+0 records out 147s 20971520 bytes (21 MB, 20 MiB) copied, 0.099924 s, 210 MB/s 147s -rw------- 1 ubuntu ubuntu 20M Nov 13 22:52 test.tomb 147s tomb (*) Done digging test.tomb 147s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 147s tomb . tomb forge test.tomb.key 147s tomb . tomb lock test.tomb -k test.tomb.key 147s tomb . File is not yet a tomb: test.tomb 147s tomb . Valid tomb file found: test.tomb 147s tomb . Commanded to lock tomb test.tomb 147s tomb (*) Selected filesystem type ext4. 147s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 147s tomb . Fine, this tomb seems empty. 147s tomb . Key is valid. 147s tomb . Locking using cipher: aes-xts-plain64 147s tomb . A password is required to use key pbkdf2-test.key 147s tomb . Unlocking KDF key protection (pbkdf2sha1) 148s tomb . Password OK. 148s tomb (*) Locking test.tomb with pbkdf2-test.key 148s tomb . Formatting Luks mapped device. 154s tomb . Formatting your Tomb with ext4 filesystem. 154s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 154s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 154s tomb . Commanded to open tomb test.tomb 154s tomb . Valid tomb file found: test.tomb 154s tomb . Key is valid. 154s tomb . Mountpoint not specified, using default: /media/test 154s tomb (*) Opening test on /media/test 154s tomb . This tomb is a valid LUKS encrypted device. 154s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 154s tomb . A password is required to use key pbkdf2-test.key 154s tomb . Unlocking KDF key protection (pbkdf2sha1) 156s tomb . Password OK. 158s tomb (*) Success unlocking tomb test 158s tomb . Filesystem detected: ext4 158s tomb . Checking filesystem via /dev/loop0 158s fsck from util-linux 2.40.2 158s test: clean, 12/4608 files, 1356/4608 blocks 158s tomb (*) Success opening test.tomb on /media/test 158s ~~ Copying some data into the opened tomb ... 158s ~~ Opened tomb's content is ... 158s total 44 158s drwxr-xr-x 3 ubuntu ubuntu 4096 Nov 13 22:52 . 158s drwxr-xr-x 3 root root 4096 Nov 13 22:52 .. 158s -rw------- 1 ubuntu ubuntu 12 Nov 13 22:52 .host 158s -rw------- 1 ubuntu ubuntu 11 Nov 13 22:52 .last 158s -rw------- 1 ubuntu ubuntu 5 Nov 13 22:52 .uid 158s -rw------- 1 ubuntu ubuntu 940 Nov 13 22:52 argon2-test.key 158s drwx------ 2 ubuntu ubuntu 16384 Nov 13 22:52 lost+found 158s -rw------- 1 ubuntu ubuntu 950 Nov 13 22:52 pbkdf2-test.key 158s tomb . Closing tomb [test] mounted on /media/test 158s tomb (*) Tomb [test] closed: your bones will rest in peace. 158s ~~ Testing ext4 file system using a argon2 key ... 158s tomb . Commanded to dig tomb 158s tomb (*) Creating a new tomb in test.tomb 158s tomb . Generating test.tomb of 20MiB 158s 20+0 records in 158s 20+0 records out 158s 20971520 bytes (21 MB, 20 MiB) copied, 0.0997065 s, 210 MB/s 159s -rw------- 1 ubuntu ubuntu 20M Nov 13 22:52 test.tomb 159s tomb (*) Done digging test.tomb 159s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 159s tomb . tomb forge test.tomb.key 159s tomb . tomb lock test.tomb -k test.tomb.key 159s tomb . File is not yet a tomb: test.tomb 159s tomb . Valid tomb file found: test.tomb 159s tomb . Commanded to lock tomb test.tomb 159s tomb (*) Selected filesystem type ext4. 159s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 159s tomb . Fine, this tomb seems empty. 159s tomb . Key is valid. 159s tomb . Locking using cipher: aes-xts-plain64 159s tomb . A password is required to use key argon2-test.key 159s tomb . Unlocking KDF key protection (argon2) 159s tomb . Password OK. 159s tomb (*) Locking test.tomb with argon2-test.key 159s tomb . Formatting Luks mapped device. 165s tomb . Formatting your Tomb with ext4 filesystem. 165s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 165s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 165s tomb . Commanded to open tomb test.tomb 165s tomb . Valid tomb file found: test.tomb 165s tomb . Key is valid. 165s tomb . Mountpoint not specified, using default: /media/test 165s tomb (*) Opening test on /media/test 165s tomb . This tomb is a valid LUKS encrypted device. 165s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 165s tomb . A password is required to use key argon2-test.key 165s tomb . Unlocking KDF key protection (argon2) 166s tomb . Password OK. 168s tomb (*) Success unlocking tomb test 168s tomb . Filesystem detected: ext4 168s tomb . Checking filesystem via /dev/loop0 168s fsck from util-linux 2.40.2 169s test: clean, 12/4608 files, 1356/4608 blocks 169s tomb (*) Success opening test.tomb on /media/test 169s ~~ Copying some data into the opened tomb ... 169s ~~ Opened tomb's content is ... 169s total 44 169s drwxr-xr-x 3 ubuntu ubuntu 4096 Nov 13 22:52 . 169s drwxr-xr-x 3 root root 4096 Nov 13 22:52 .. 169s -rw------- 1 ubuntu ubuntu 12 Nov 13 22:52 .host 169s -rw------- 1 ubuntu ubuntu 11 Nov 13 22:52 .last 169s -rw------- 1 ubuntu ubuntu 5 Nov 13 22:52 .uid 169s -rw------- 1 ubuntu ubuntu 940 Nov 13 22:52 argon2-test.key 169s drwx------ 2 ubuntu ubuntu 16384 Nov 13 22:52 lost+found 169s -rw------- 1 ubuntu ubuntu 950 Nov 13 22:52 pbkdf2-test.key 169s tomb . Closing tomb [test] mounted on /media/test 169s tomb (*) Tomb [test] closed: your bones will rest in peace. 169s ~~ Testing btrfs file system using a pbkdf2 key ... 169s tomb . Commanded to dig tomb 169s tomb (*) Creating a new tomb in test.tomb 169s tomb . Generating test.tomb of 115MiB 169s 115+0 records in 169s 115+0 records out 169s 120586240 bytes (121 MB, 115 MiB) copied, 0.668574 s, 180 MB/s 169s -rw------- 1 ubuntu ubuntu 115M Nov 13 22:52 test.tomb 169s tomb (*) Done digging test.tomb 169s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 169s tomb . tomb forge test.tomb.key 169s tomb . tomb lock test.tomb -k test.tomb.key 169s tomb . File is not yet a tomb: test.tomb 170s tomb . Valid tomb file found: test.tomb 170s tomb . Commanded to lock tomb test.tomb 170s tomb (*) Selected filesystem type btrfs. 170s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 170s tomb . Fine, this tomb seems empty. 170s tomb . Key is valid. 170s tomb . Locking using cipher: aes-xts-plain64 170s tomb . A password is required to use key pbkdf2-test.key 170s tomb . Unlocking KDF key protection (pbkdf2sha1) 171s tomb . Password OK. 171s tomb (*) Locking test.tomb with pbkdf2-test.key 171s tomb . Formatting Luks mapped device. 177s tomb . Formatting your Tomb with btrfs filesystem. 177s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 177s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 177s tomb . Commanded to open tomb test.tomb 177s tomb . Valid tomb file found: test.tomb 177s tomb . Key is valid. 177s tomb . Mountpoint not specified, using default: /media/test 177s tomb (*) Opening test on /media/test 177s tomb . This tomb is a valid LUKS encrypted device. 177s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 177s tomb . A password is required to use key pbkdf2-test.key 177s tomb . Unlocking KDF key protection (pbkdf2sha1) 179s tomb . Password OK. 181s tomb (*) Success unlocking tomb test 181s tomb . Filesystem detected: btrfs 181s tomb . Checking filesystem via /dev/loop0 181s [1/7] checking root items 181s [2/7] checking extents 181s [3/7] checking free space tree 181s [4/7] checking fs roots 181s [5/7] checking only csums items (without verifying data) 181s [6/7] checking root refs 181s [7/7] checking quota groups skipped (not enabled on this FS) 181s Opening filesystem to check... 181s Checking filesystem on /dev/mapper/tomb.test.f164f4fad287c86c29d817a71252962ac8a9c2d08a7f2b3e71262950f238e8ce.loop0 181s UUID: 6dd3ae24-6fa6-4b30-b41b-a1e966e13248 181s found 589824 bytes used, no error found 181s total csum bytes: 0 181s total tree bytes: 589824 181s total fs tree bytes: 131072 181s total extent tree bytes: 65536 181s btree space waste bytes: 582963 181s file data blocks allocated: 0 181s referenced 0 181s tomb (*) Success opening test.tomb on /media/test 181s ~~ Copying some data into the opened tomb ... 181s ~~ Opened tomb's content is ... 181s total 388 181s drwxr-xr-x 1 ubuntu ubuntu 88 Nov 13 22:52 . 181s drwxr-xr-x 3 root root 4096 Nov 13 22:52 .. 181s -rw------- 1 ubuntu ubuntu 12 Nov 13 22:52 .host 181s -rw------- 1 ubuntu ubuntu 11 Nov 13 22:52 .last 181s -rw------- 1 ubuntu ubuntu 5 Nov 13 22:52 .uid 181s -rw------- 1 ubuntu ubuntu 940 Nov 13 22:52 argon2-test.key 181s -rw------- 1 ubuntu ubuntu 950 Nov 13 22:52 pbkdf2-test.key 181s tomb . Closing tomb [test] mounted on /media/test 181s tomb (*) Tomb [test] closed: your bones will rest in peace. 181s ~~ Testing btrfsmixedmode file system using a argon2 key ... 181s tomb . Commanded to dig tomb 181s tomb (*) Creating a new tomb in test.tomb 181s tomb . Generating test.tomb of 20MiB 181s 20+0 records in 181s 20+0 records out 181s 20971520 bytes (21 MB, 20 MiB) copied, 0.0986998 s, 212 MB/s 181s -rw------- 1 ubuntu ubuntu 20M Nov 13 22:52 test.tomb 181s tomb (*) Done digging test.tomb 181s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 181s tomb . tomb forge test.tomb.key 181s tomb . tomb lock test.tomb -k test.tomb.key 181s tomb . File is not yet a tomb: test.tomb 181s tomb . Valid tomb file found: test.tomb 181s tomb . Commanded to lock tomb test.tomb 181s tomb (*) Selected filesystem type btrfsmixedmode. 181s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 181s tomb . Fine, this tomb seems empty. 181s tomb . Key is valid. 181s tomb . Locking using cipher: aes-xts-plain64 181s tomb . A password is required to use key argon2-test.key 181s tomb . Unlocking KDF key protection (argon2) 182s tomb . Password OK. 182s tomb (*) Locking test.tomb with argon2-test.key 182s tomb . Formatting Luks mapped device. 188s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 188s ERROR: '/dev/mapper/tomb.tmp' is too small to make a usable filesystem 188s ERROR: minimum size for each btrfs device is 142606336 188s tomb [W] Tomb format returned an error. 188s tomb [E] Your tomb test.tomb may be corrupted. 188s autopkgtest [22:52:52]: test create-and-use-a-tomb: -----------------------] 189s autopkgtest [22:52:53]: test create-and-use-a-tomb: - - - - - - - - - - results - - - - - - - - - - 189s create-and-use-a-tomb FAIL non-zero exit status 1 189s autopkgtest [22:52:53]: @@@@@@@@@@@@@@@@@@@@ summary 189s create-and-use-a-tomb FAIL non-zero exit status 1 194s nova [W] Using flock in prodstack6-ppc64el 194s Creating nova instance adt-plucky-ppc64el-tomb-20241113-224944-juju-7f2275-prod-proposed-migration-environment-15-ecb2bfbe-a977-498e-9e53-d1b251b4b785 from image adt/ubuntu-plucky-ppc64el-server-20241113.img (UUID 0c5715b6-5cca-4485-b8bf-b85dfd917a5f)...