0s autopkgtest [15:51:51]: starting date and time: 2025-01-20 15:51:51+0000 0s autopkgtest [15:51:51]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [15:51:51]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.qeca104l/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.11+dfsg-2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-ppc64el-8.secgroup --name adt-plucky-ppc64el-tomb-20250120-151648-juju-7f2275-prod-proposed-migration-environment-2-c71f7295-c69b-4179-9051-73417d44cd3d --image adt/ubuntu-plucky-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration-ppc64el -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 65s autopkgtest [15:52:56]: testbed dpkg architecture: ppc64el 65s autopkgtest [15:52:56]: testbed apt version: 2.9.18 66s autopkgtest [15:52:57]: @@@@@@@@@@@@@@@@@@@@ test bed setup 66s autopkgtest [15:52:57]: testbed release detected to be: None 67s autopkgtest [15:52:58]: updating testbed package index (apt update) 67s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 67s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 67s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 67s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 67s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 67s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [142 kB] 67s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [797 kB] 68s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.1 kB] 68s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el Packages [248 kB] 68s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted ppc64el Packages [756 B] 68s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el Packages [883 kB] 68s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse ppc64el Packages [17.6 kB] 68s Fetched 2188 kB in 1s (2074 kB/s) 69s Reading package lists... 69s + lsb_release --codename --short 69s + RELEASE=plucky 69s + cat 69s + [ plucky != trusty ] 69s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 69s Reading package lists... 69s Building dependency tree... 69s Reading state information... 70s Calculating upgrade... 70s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 70s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 70s + /usr/lib/apt/apt-helper analyze-pattern ?true 70s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 70s Reading package lists... 70s Building dependency tree... 70s Reading state information... 70s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 70s + grep -q trusty /etc/lsb-release 70s + [ ! -d /usr/share/doc/unattended-upgrades ] 70s + [ ! -d /usr/share/doc/lxd ] 70s + [ ! -d /usr/share/doc/lxd-client ] 70s + [ ! -d /usr/share/doc/snapd ] 70s + type iptables 70s + cat 70s + chmod 755 /etc/rc.local 70s + . /etc/rc.local 70s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 70s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 70s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 70s + uname -m 70s + [ ppc64le = ppc64le ] 70s + systemctl is-active keyboard-setup.service 70s + [ active = failed ] 70s + [ -d /run/systemd/system ] 70s + systemd-detect-virt --quiet --vm 70s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 70s + cat 70s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 70s + echo COMPRESS=lz4 70s + sync 70s autopkgtest [15:53:01]: upgrading testbed (apt dist-upgrade and autopurge) 70s Reading package lists... 71s Building dependency tree... 71s Reading state information... 71s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 71s Starting 2 pkgProblemResolver with broken count: 0 71s Done 71s Entering ResolveByKeep 71s 71s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 72s Reading package lists... 72s Building dependency tree... 72s Reading state information... 72s Starting pkgProblemResolver with broken count: 0 72s Starting 2 pkgProblemResolver with broken count: 0 72s Done 73s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 75s autopkgtest [15:53:06]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 13:49:23 UTC 2024 75s autopkgtest [15:53:06]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 77s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (dsc) [2050 B] 77s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (tar) [1262 kB] 77s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (diff) [16.2 kB] 77s gpgv: Signature made Fri Jan 17 21:06:39 2025 UTC 77s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 77s gpgv: issuer "sge@debian.org" 77s gpgv: Can't check signature: No public key 77s dpkg-source: warning: cannot verify inline signature for ./tomb_2.11+dfsg-2.dsc: no acceptable signature found 77s autopkgtest [15:53:08]: testing package tomb version 2.11+dfsg-2 78s autopkgtest [15:53:09]: build not needed 79s autopkgtest [15:53:10]: test create-and-use-a-tomb-with-sudo: preparing testbed 79s Reading package lists... 79s Building dependency tree... 79s Reading state information... 79s Starting pkgProblemResolver with broken count: 0 79s Starting 2 pkgProblemResolver with broken count: 0 79s Done 79s The following NEW packages will be installed: 79s argon2 tomb zsh zsh-common 80s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 80s Need to get 5282 kB of archives. 80s After this operation, 22.0 MB of additional disk space will be used. 80s Get:1 http://ftpmaster.internal/ubuntu plucky/universe ppc64el argon2 ppc64el 0~20190702+dfsg-4build1 [29.7 kB] 80s Get:2 http://ftpmaster.internal/ubuntu plucky/main ppc64el zsh-common all 5.9-6ubuntu3 [4170 kB] 80s Get:3 http://ftpmaster.internal/ubuntu plucky/main ppc64el zsh ppc64el 5.9-6ubuntu3 [1003 kB] 80s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el tomb ppc64el 2.11+dfsg-2 [79.9 kB] 80s Fetched 5282 kB in 1s (7005 kB/s) 80s Selecting previously unselected package argon2. 81s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74042 files and directories currently installed.) 81s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_ppc64el.deb ... 81s Unpacking argon2 (0~20190702+dfsg-4build1) ... 81s Selecting previously unselected package zsh-common. 81s Preparing to unpack .../zsh-common_5.9-6ubuntu3_all.deb ... 81s Unpacking zsh-common (5.9-6ubuntu3) ... 81s Selecting previously unselected package zsh. 81s Preparing to unpack .../zsh_5.9-6ubuntu3_ppc64el.deb ... 81s Unpacking zsh (5.9-6ubuntu3) ... 81s Selecting previously unselected package tomb. 81s Preparing to unpack .../tomb_2.11+dfsg-2_ppc64el.deb ... 81s Unpacking tomb (2.11+dfsg-2) ... 81s Setting up argon2 (0~20190702+dfsg-4build1) ... 81s Setting up zsh-common (5.9-6ubuntu3) ... 81s Setting up zsh (5.9-6ubuntu3) ... 81s Setting up tomb (2.11+dfsg-2) ... 81s Processing triggers for debianutils (5.21) ... 81s Processing triggers for man-db (2.13.0-1) ... 83s autopkgtest [15:53:14]: test create-and-use-a-tomb-with-sudo: [----------------------- 83s ~~ Create a file to hold an encrypted file system ... 83s tomb . Commanded to dig tomb 83s tomb (*) Creating a new tomb in test.tomb 83s tomb . Generating test.tomb of 20MiB 83s 20+0 records in 83s 20+0 records out 83s 20971520 bytes (21 MB, 20 MiB) copied, 0.0988345 s, 212 MB/s 83s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:53 test.tomb 83s tomb (*) Done digging test.tomb 83s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 83s tomb . tomb forge test.tomb.key 83s tomb . tomb lock test.tomb -k test.tomb.key 83s ~~ Create a pbkdf2 key file ... 83s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 83s tomb . Using KDF to protect the key password (1 rounds) 83s tomb [W] This operation takes time. Keep using this computer on other tasks. 83s tomb [W] Once done you will be asked to choose a password for your tomb. 83s tomb [W] To make it faster you can move the mouse around. 83s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 83s 512+0 records in 83s 512+0 records out 83s 512 bytes copied, 0.00072247 s, 709 kB/s 83s tomb (*) Choose the password of your key: pbkdf2-test.key 83s tomb . (You can also change it later using 'tomb passwd'.) 83s tomb (*) Using KDF, iteration time: 1000000 83s tomb . generating salt 83s tomb . calculating iterations 84s tomb . encoding the password 87s tomb . Key is valid. 87s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:53 pbkdf2-test.key 87s tomb . Done forging pbkdf2-test.key 87s tomb (*) Your key is ready: 87s ~~ Create an argon2 key file ... 87s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 87s tomb . Using KDF to protect the key password (1 rounds) 87s tomb [W] This operation takes time. Keep using this computer on other tasks. 87s tomb [W] Once done you will be asked to choose a password for your tomb. 87s tomb [W] To make it faster you can move the mouse around. 87s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 87s 512+0 records in 87s 512+0 records out 87s 512 bytes copied, 0.000717738 s, 713 kB/s 87s tomb (*) Choose the password of your key: argon2-test.key 87s tomb . (You can also change it later using 'tomb passwd'.) 87s tomb (*) Using KDF Argon2 87s tomb . memory used: 2^18 87s tomb . kdf salt: ff96a774b41793a521627110a5fa9def1245ea33cc5a8b8fc70980f5b29dce1d 87s tomb . kdf iterations: 1 88s tomb . Key is valid. 88s tomb . Done forging argon2-test.key 88s tomb (*) Your key is ready: 88s -rw------- 1 ubuntu ubuntu 940 Jan 20 15:53 argon2-test.key 88s ~~ Cloak a key file ... 88s tomb . Key is valid. 88s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 88s tomb (*) Tomb key encoded succesfully 88s ~~ Uncloak and verify a key file ... 88s tomb (*) Key succesfully uncloaked to uncloaked.key. 88s ~~ Testing ext4 file system using a pbkdf2 key ... 88s tomb . Commanded to dig tomb 88s tomb (*) Creating a new tomb in test.tomb 88s tomb . Generating test.tomb of 20MiB 88s 20+0 records in 88s 20+0 records out 88s 20971520 bytes (21 MB, 20 MiB) copied, 0.0972482 s, 216 MB/s 88s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:53 test.tomb 88s tomb (*) Done digging test.tomb 88s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 88s tomb . tomb forge test.tomb.key 88s tomb . tomb lock test.tomb -k test.tomb.key 88s tomb . File is not yet a tomb: test.tomb 88s tomb . Valid tomb file found: test.tomb 88s tomb . Commanded to lock tomb test.tomb 88s tomb (*) Selected filesystem type ext4. 88s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 88s tomb . Fine, this tomb seems empty. 88s tomb . Key is valid. 88s tomb . Locking using cipher: aes-xts-plain64 88s tomb . A password is required to use key pbkdf2-test.key 88s tomb . Unlocking KDF key protection (pbkdf2sha1) 90s tomb . Password OK. 90s tomb (*) Locking test.tomb with pbkdf2-test.key 90s tomb . Formatting Luks mapped device. 95s tomb . Formatting your Tomb with ext4 filesystem. 95s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 95s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 95s tomb . Commanded to open tomb test.tomb 96s tomb . Valid tomb file found: test.tomb 96s tomb . Key is valid. 96s tomb . Mountpoint not specified, using default: /media/test 96s tomb (*) Opening test on /media/test 96s tomb . This tomb is a valid LUKS encrypted device. 96s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 96s tomb . A password is required to use key pbkdf2-test.key 96s tomb . Unlocking KDF key protection (pbkdf2sha1) 97s tomb . Password OK. 99s tomb (*) Success unlocking tomb test 99s tomb . Filesystem detected: ext4 99s tomb . Checking filesystem via /dev/loop0 99s fsck from util-linux 2.40.2 99s test: clean, 12/4608 files, 1356/4608 blocks 99s tomb (*) Success opening test.tomb on /media/test 99s ~~ Copying some data into the opened tomb ... 99s ~~ Opened tomb's content is ... 99s total 44 99s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 20 15:53 . 99s drwxr-xr-x 3 root root 4096 Jan 20 15:53 .. 99s -rw------- 1 ubuntu ubuntu 12 Jan 20 15:53 .host 99s -rw------- 1 ubuntu ubuntu 11 Jan 20 15:53 .last 99s -rw------- 1 ubuntu ubuntu 5 Jan 20 15:53 .uid 99s -rw------- 1 ubuntu ubuntu 940 Jan 20 15:53 argon2-test.key 99s drwx------ 2 ubuntu ubuntu 16384 Jan 20 15:53 lost+found 99s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:53 pbkdf2-test.key 99s tomb . Closing tomb [test] mounted on /media/test 100s tomb (*) Tomb [test] closed: your bones will rest in peace. 100s ~~ Testing ext4 file system using a argon2 key ... 100s tomb . Commanded to dig tomb 100s tomb (*) Creating a new tomb in test.tomb 100s tomb . Generating test.tomb of 20MiB 100s 20+0 records in 100s 20+0 records out 100s 20971520 bytes (21 MB, 20 MiB) copied, 0.0988062 s, 212 MB/s 100s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:53 test.tomb 100s tomb (*) Done digging test.tomb 100s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 100s tomb . tomb forge test.tomb.key 100s tomb . tomb lock test.tomb -k test.tomb.key 100s tomb . File is not yet a tomb: test.tomb 100s tomb . Valid tomb file found: test.tomb 100s tomb . Commanded to lock tomb test.tomb 100s tomb (*) Selected filesystem type ext4. 100s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 100s tomb . Fine, this tomb seems empty. 100s tomb . Key is valid. 100s tomb . Locking using cipher: aes-xts-plain64 100s tomb . A password is required to use key argon2-test.key 100s tomb . Unlocking KDF key protection (argon2) 101s tomb . Password OK. 101s tomb (*) Locking test.tomb with argon2-test.key 101s tomb . Formatting Luks mapped device. 106s tomb . Formatting your Tomb with ext4 filesystem. 106s device-mapper: remove ioctl on tomb.tmp failed: Device or resource busy 106s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 106s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 106s tomb . Commanded to open tomb test.tomb 107s tomb . Valid tomb file found: test.tomb 107s tomb . Key is valid. 107s tomb . Mountpoint not specified, using default: /media/test 107s tomb (*) Opening test on /media/test 107s tomb . This tomb is a valid LUKS encrypted device. 107s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 107s tomb . A password is required to use key argon2-test.key 107s tomb . Unlocking KDF key protection (argon2) 107s tomb . Password OK. 110s tomb (*) Success unlocking tomb test 110s tomb . Filesystem detected: ext4 110s tomb . Checking filesystem via /dev/loop0 110s fsck from util-linux 2.40.2 110s test: clean, 12/4608 files, 1356/4608 blocks 110s tomb (*) Success opening test.tomb on /media/test 110s ~~ Copying some data into the opened tomb ... 110s ~~ Opened tomb's content is ... 110s total 44 110s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 20 15:53 . 110s drwxr-xr-x 3 root root 4096 Jan 20 15:53 .. 110s -rw------- 1 ubuntu ubuntu 12 Jan 20 15:53 .host 110s -rw------- 1 ubuntu ubuntu 11 Jan 20 15:53 .last 110s -rw------- 1 ubuntu ubuntu 5 Jan 20 15:53 .uid 110s -rw------- 1 ubuntu ubuntu 940 Jan 20 15:53 argon2-test.key 110s drwx------ 2 ubuntu ubuntu 16384 Jan 20 15:53 lost+found 110s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:53 pbkdf2-test.key 110s tomb . Closing tomb [test] mounted on /media/test 110s tomb (*) Tomb [test] closed: your bones will rest in peace. 110s ~~ Testing btrfs file system using a pbkdf2 key ... 110s tomb . Commanded to dig tomb 110s tomb (*) Creating a new tomb in test.tomb 110s tomb . Generating test.tomb of 115MiB 110s 115+0 records in 110s 115+0 records out 110s 120586240 bytes (121 MB, 115 MiB) copied, 0.579735 s, 208 MB/s 110s -rw------- 1 ubuntu ubuntu 115M Jan 20 15:53 test.tomb 110s tomb (*) Done digging test.tomb 110s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 110s tomb . tomb forge test.tomb.key 110s tomb . tomb lock test.tomb -k test.tomb.key 110s tomb . File is not yet a tomb: test.tomb 110s tomb . Valid tomb file found: test.tomb 110s tomb . Commanded to lock tomb test.tomb 110s tomb (*) Selected filesystem type btrfs. 110s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 110s tomb . Fine, this tomb seems empty. 110s tomb . Key is valid. 110s tomb . Locking using cipher: aes-xts-plain64 110s tomb . A password is required to use key pbkdf2-test.key 110s tomb . Unlocking KDF key protection (pbkdf2sha1) 112s tomb . Password OK. 112s tomb (*) Locking test.tomb with pbkdf2-test.key 112s tomb . Formatting Luks mapped device. 118s tomb . Formatting your Tomb with btrfs filesystem. 118s device-mapper: remove ioctl on tomb.tmp failed: Device or resource busy 118s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 118s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 118s tomb . Commanded to open tomb test.tomb 118s tomb . Valid tomb file found: test.tomb 118s tomb . Key is valid. 118s tomb . Mountpoint not specified, using default: /media/test 118s tomb (*) Opening test on /media/test 118s tomb . This tomb is a valid LUKS encrypted device. 118s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 118s tomb . A password is required to use key pbkdf2-test.key 118s tomb . Unlocking KDF key protection (pbkdf2sha1) 120s tomb . Password OK. 122s tomb (*) Success unlocking tomb test 122s tomb . Filesystem detected: btrfs 122s tomb . Checking filesystem via /dev/loop0 122s [1/7] checking root items 122s [2/7] checking extents 122s [3/7] checking free space tree 122s [4/7] checking fs roots 122s [5/7] checking only csums items (without verifying data) 122s [6/7] checking root refs 122s [7/7] checking quota groups skipped (not enabled on this FS) 122s Opening filesystem to check... 122s Checking filesystem on /dev/mapper/tomb.test.271f16dfca8db776a7a3fff109ddc92c44960778bd715ef540cc0d6228518de4.loop0 122s UUID: 9b8a4f0f-7978-4f96-85cf-a2868194ad0c 122s found 589824 bytes used, no error found 122s total csum bytes: 0 122s total tree bytes: 589824 122s total fs tree bytes: 131072 122s total extent tree bytes: 65536 122s btree space waste bytes: 582963 122s file data blocks allocated: 0 122s referenced 0 122s tomb (*) Success opening test.tomb on /media/test 122s ~~ Copying some data into the opened tomb ... 122s ~~ Opened tomb's content is ... 122s total 388 122s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 20 15:53 . 122s drwxr-xr-x 3 root root 4096 Jan 20 15:53 .. 122s -rw------- 1 ubuntu ubuntu 12 Jan 20 15:53 .host 122s -rw------- 1 ubuntu ubuntu 11 Jan 20 15:53 .last 122s -rw------- 1 ubuntu ubuntu 5 Jan 20 15:53 .uid 122s -rw------- 1 ubuntu ubuntu 940 Jan 20 15:53 argon2-test.key 122s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:53 pbkdf2-test.key 122s tomb . Closing tomb [test] mounted on /media/test 122s tomb (*) Tomb [test] closed: your bones will rest in peace. 122s ~~ Testing btrfsmixedmode file system using a argon2 key ... 122s tomb . Commanded to dig tomb 122s tomb (*) Creating a new tomb in test.tomb 122s tomb . Generating test.tomb of 20MiB 122s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:53 test.tomb 122s 20+0 records in 122s 20+0 records out 122s 20971520 bytes (21 MB, 20 MiB) copied, 0.0977662 s, 215 MB/s 122s tomb (*) Done digging test.tomb 122s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 122s tomb . tomb forge test.tomb.key 122s tomb . tomb lock test.tomb -k test.tomb.key 122s tomb . File is not yet a tomb: test.tomb 122s tomb . Valid tomb file found: test.tomb 122s tomb . Commanded to lock tomb test.tomb 122s tomb (*) Selected filesystem type btrfsmixedmode. 122s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 122s tomb . Fine, this tomb seems empty. 122s tomb . Key is valid. 122s tomb . Locking using cipher: aes-xts-plain64 122s tomb . A password is required to use key argon2-test.key 122s tomb . Unlocking KDF key protection (argon2) 123s tomb . Password OK. 123s tomb (*) Locking test.tomb with argon2-test.key 123s tomb . Formatting Luks mapped device. 129s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 129s ERROR: '/dev/mapper/tomb.tmp' is too small to make a usable filesystem 129s ERROR: minimum size for each btrfs device is 142606336 129s tomb [W] Tomb format returned an error. 129s tomb [E] Your tomb test.tomb may be corrupted. 129s autopkgtest [15:54:00]: test create-and-use-a-tomb-with-sudo: -----------------------] 130s autopkgtest [15:54:01]: test create-and-use-a-tomb-with-sudo: - - - - - - - - - - results - - - - - - - - - - 130s create-and-use-a-tomb-with-sudo FAIL non-zero exit status 1 130s autopkgtest [15:54:01]: test create-and-use-a-tomb-with-doas: preparing testbed 217s autopkgtest [15:55:28]: testbed dpkg architecture: ppc64el 217s autopkgtest [15:55:28]: testbed apt version: 2.9.18 218s autopkgtest [15:55:29]: @@@@@@@@@@@@@@@@@@@@ test bed setup 218s autopkgtest [15:55:29]: testbed release detected to be: plucky 219s autopkgtest [15:55:30]: updating testbed package index (apt update) 219s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 219s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 219s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 219s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 219s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [16.1 kB] 219s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [142 kB] 219s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [797 kB] 220s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 220s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main ppc64el Packages [248 kB] 220s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted ppc64el Packages [756 B] 220s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el Packages [883 kB] 220s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse ppc64el Packages [17.6 kB] 220s Fetched 2188 kB in 1s (2114 kB/s) 221s Reading package lists... 221s + lsb_release --codename --short 221s + RELEASE=plucky 221s + cat 221s + [ plucky != trusty ] 221s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 221s Reading package lists... 221s Building dependency tree... 221s Reading state information... 222s Calculating upgrade... 222s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 222s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 222s + /usr/lib/apt/apt-helper analyze-pattern ?true 222s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 222s Reading package lists... 222s Building dependency tree... 222s Reading state information... 222s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 222s + grep -q trusty /etc/lsb-release 222s + [ ! -d /usr/share/doc/unattended-upgrades ] 222s + [ ! -d /usr/share/doc/lxd ] 222s + [ ! -d /usr/share/doc/lxd-client ] 222s + [ ! -d /usr/share/doc/snapd ] 222s + type iptables 222s + cat 222s + chmod 755 /etc/rc.local 222s + . /etc/rc.local 222s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 222s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 222s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 222s + uname -m 222s + [ ppc64le = ppc64le ] 222s + systemctl is-active keyboard-setup.service 222s + [ active = failed ] 222s + [ -d /run/systemd/system ] 222s + systemd-detect-virt --quiet --vm 222s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 222s + cat 222s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 222s + echo COMPRESS=lz4 222s + sync 222s autopkgtest [15:55:33]: upgrading testbed (apt dist-upgrade and autopurge) 223s Reading package lists... 223s Building dependency tree... 223s Reading state information... 223s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 223s Starting 2 pkgProblemResolver with broken count: 0 223s Done 223s Entering ResolveByKeep 224s 224s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 224s Reading package lists... 224s Building dependency tree... 224s Reading state information... 224s Starting pkgProblemResolver with broken count: 0 224s Starting 2 pkgProblemResolver with broken count: 0 224s Done 225s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 227s Reading package lists... 227s Building dependency tree... 227s Reading state information... 228s Starting pkgProblemResolver with broken count: 0 228s Starting 2 pkgProblemResolver with broken count: 0 228s Done 228s The following NEW packages will be installed: 228s argon2 doas opendoas tomb zsh zsh-common 228s 0 upgraded, 6 newly installed, 0 to remove and 0 not upgraded. 228s Need to get 5310 kB of archives. 228s After this operation, 22.2 MB of additional disk space will be used. 228s Get:1 http://ftpmaster.internal/ubuntu plucky/universe ppc64el argon2 ppc64el 0~20190702+dfsg-4build1 [29.7 kB] 228s Get:2 http://ftpmaster.internal/ubuntu plucky/universe ppc64el opendoas ppc64el 6.8.2-1 [24.9 kB] 228s Get:3 http://ftpmaster.internal/ubuntu plucky/universe ppc64el doas ppc64el 6.8.2-1 [2776 B] 228s Get:4 http://ftpmaster.internal/ubuntu plucky/main ppc64el zsh-common all 5.9-6ubuntu3 [4170 kB] 229s Get:5 http://ftpmaster.internal/ubuntu plucky/main ppc64el zsh ppc64el 5.9-6ubuntu3 [1003 kB] 229s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe ppc64el tomb ppc64el 2.11+dfsg-2 [79.9 kB] 229s Fetched 5310 kB in 1s (7076 kB/s) 229s Selecting previously unselected package argon2. 229s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 74042 files and directories currently installed.) 229s Preparing to unpack .../0-argon2_0~20190702+dfsg-4build1_ppc64el.deb ... 229s Unpacking argon2 (0~20190702+dfsg-4build1) ... 229s Selecting previously unselected package opendoas. 229s Preparing to unpack .../1-opendoas_6.8.2-1_ppc64el.deb ... 229s Unpacking opendoas (6.8.2-1) ... 229s Selecting previously unselected package doas. 229s Preparing to unpack .../2-doas_6.8.2-1_ppc64el.deb ... 229s Unpacking doas (6.8.2-1) ... 229s Selecting previously unselected package zsh-common. 229s Preparing to unpack .../3-zsh-common_5.9-6ubuntu3_all.deb ... 229s Unpacking zsh-common (5.9-6ubuntu3) ... 229s Selecting previously unselected package zsh. 229s Preparing to unpack .../4-zsh_5.9-6ubuntu3_ppc64el.deb ... 229s Unpacking zsh (5.9-6ubuntu3) ... 229s Selecting previously unselected package tomb. 229s Preparing to unpack .../5-tomb_2.11+dfsg-2_ppc64el.deb ... 229s Unpacking tomb (2.11+dfsg-2) ... 229s Setting up argon2 (0~20190702+dfsg-4build1) ... 229s Setting up zsh-common (5.9-6ubuntu3) ... 229s Setting up zsh (5.9-6ubuntu3) ... 229s Setting up opendoas (6.8.2-1) ... 229s Setting up tomb (2.11+dfsg-2) ... 229s Setting up doas (6.8.2-1) ... 229s Processing triggers for debianutils (5.21) ... 229s Processing triggers for man-db (2.13.0-1) ... 235s autopkgtest [15:55:46]: test create-and-use-a-tomb-with-doas: [----------------------- 235s ~~ Create a file to hold an encrypted file system ... 235s tomb . Commanded to dig tomb 235s tomb (*) Creating a new tomb in test.tomb 235s tomb . Generating test.tomb of 20MiB 235s 20+0 records in 235s 20+0 records out 235s 20971520 bytes (21 MB, 20 MiB) copied, 0.103159 s, 203 MB/s 235s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:55 test.tomb 235s tomb (*) Done digging test.tomb 235s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 235s tomb . tomb forge test.tomb.key 235s ~~ Create a pbkdf2 key file ... 235s tomb . tomb lock test.tomb -k test.tomb.key 235s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 235s tomb . Using KDF to protect the key password (1 rounds) 235s tomb [W] This operation takes time. Keep using this computer on other tasks. 235s tomb [W] Once done you will be asked to choose a password for your tomb. 235s tomb [W] To make it faster you can move the mouse around. 235s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 235s 512+0 records in 235s 512+0 records out 235s 512 bytes copied, 0.000699626 s, 732 kB/s 235s tomb (*) Choose the password of your key: pbkdf2-test.key 235s tomb . (You can also change it later using 'tomb passwd'.) 235s tomb (*) Using KDF, iteration time: 1000000 235s tomb . generating salt 235s tomb . calculating iterations 236s tomb . encoding the password 239s tomb . Key is valid. 239s tomb . Done forging pbkdf2-test.key 239s tomb (*) Your key is ready: 239s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:55 pbkdf2-test.key 239s ~~ Create an argon2 key file ... 239s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 239s tomb . Using KDF to protect the key password (1 rounds) 239s tomb [W] This operation takes time. Keep using this computer on other tasks. 239s tomb [W] Once done you will be asked to choose a password for your tomb. 239s tomb [W] To make it faster you can move the mouse around. 239s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 239s 512+0 records in 239s 512+0 records out 239s 512 bytes copied, 0.000703672 s, 728 kB/s 239s tomb (*) Choose the password of your key: argon2-test.key 239s tomb . (You can also change it later using 'tomb passwd'.) 239s tomb (*) Using KDF Argon2 239s tomb . memory used: 2^18 239s tomb . kdf salt: 6b2d3d00add088f5106f7e0095450e19dc2ae885f63c09e56f39c792e2b9968e 239s tomb . kdf iterations: 1 240s tomb . Key is valid. 240s tomb . Done forging argon2-test.key 240s tomb (*) Your key is ready: 240s -rw------- 1 ubuntu ubuntu 944 Jan 20 15:55 argon2-test.key 240s ~~ Cloak a key file ... 240s tomb . Key is valid. 240s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 240s tomb (*) Tomb key encoded succesfully 240s ~~ Uncloak and verify a key file ... 240s tomb (*) Key succesfully uncloaked to uncloaked.key. 240s ~~ Testing ext4 file system using a pbkdf2 key ... 240s tomb . Commanded to dig tomb 240s tomb (*) Creating a new tomb in test.tomb 240s tomb . Generating test.tomb of 20MiB 240s 20+0 records in 240s 20+0 records out 240s 20971520 bytes (21 MB, 20 MiB) copied, 0.0971053 s, 216 MB/s 240s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:55 test.tomb 240s tomb (*) Done digging test.tomb 240s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 240s tomb . tomb forge test.tomb.key 240s tomb . tomb lock test.tomb -k test.tomb.key 240s tomb . File is not yet a tomb: test.tomb 240s tomb . Valid tomb file found: test.tomb 240s tomb . Commanded to lock tomb test.tomb 240s tomb (*) Selected filesystem type ext4. 240s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 240s tomb . Fine, this tomb seems empty. 240s tomb . Key is valid. 240s tomb . Locking using cipher: aes-xts-plain64 240s tomb . A password is required to use key pbkdf2-test.key 240s tomb . Unlocking KDF key protection (pbkdf2sha1) 242s tomb . Password OK. 242s tomb (*) Locking test.tomb with pbkdf2-test.key 242s tomb . Formatting Luks mapped device. 247s tomb . Formatting your Tomb with ext4 filesystem. 247s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 247s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 248s tomb . Commanded to open tomb test.tomb 248s tomb . Valid tomb file found: test.tomb 248s tomb . Key is valid. 248s tomb . Mountpoint not specified, using default: /media/test 248s tomb (*) Opening test on /media/test 248s tomb . This tomb is a valid LUKS encrypted device. 248s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 248s tomb . A password is required to use key pbkdf2-test.key 248s tomb . Unlocking KDF key protection (pbkdf2sha1) 249s tomb . Password OK. 251s tomb (*) Success unlocking tomb test 251s tomb . Filesystem detected: ext4 251s tomb . Checking filesystem via /dev/loop0 251s fsck from util-linux 2.40.2 251s test: clean, 12/4608 files, 1356/4608 blocks 251s tomb (*) Success opening test.tomb on /media/test 251s ~~ Copying some data into the opened tomb ... 251s ~~ Opened tomb's content is ... 251s total 44 251s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 20 15:56 . 251s drwxr-xr-x 3 root root 4096 Jan 20 15:56 .. 251s -rw------- 1 ubuntu ubuntu 12 Jan 20 15:56 .host 251s -rw------- 1 ubuntu ubuntu 11 Jan 20 15:56 .last 251s -rw------- 1 ubuntu ubuntu 5 Jan 20 15:56 .uid 251s -rw------- 1 ubuntu ubuntu 944 Jan 20 15:55 argon2-test.key 251s drwx------ 2 ubuntu ubuntu 16384 Jan 20 15:55 lost+found 251s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:55 pbkdf2-test.key 251s tomb . Closing tomb [test] mounted on /media/test 252s tomb (*) Tomb [test] closed: your bones will rest in peace. 252s ~~ Testing ext4 file system using a argon2 key ... 252s tomb . Commanded to dig tomb 252s tomb (*) Creating a new tomb in test.tomb 252s tomb . Generating test.tomb of 20MiB 252s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:56 test.tomb 252s 20+0 records in 252s 20+0 records out 252s 20971520 bytes (21 MB, 20 MiB) copied, 0.0974247 s, 215 MB/s 252s tomb (*) Done digging test.tomb 252s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 252s tomb . tomb forge test.tomb.key 252s tomb . tomb lock test.tomb -k test.tomb.key 252s tomb . File is not yet a tomb: test.tomb 252s tomb . Valid tomb file found: test.tomb 252s tomb . Commanded to lock tomb test.tomb 252s tomb (*) Selected filesystem type ext4. 252s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 252s tomb . Fine, this tomb seems empty. 252s tomb . Key is valid. 252s tomb . Locking using cipher: aes-xts-plain64 252s tomb . A password is required to use key argon2-test.key 252s tomb . Unlocking KDF key protection (argon2) 253s tomb . Password OK. 253s tomb (*) Locking test.tomb with argon2-test.key 253s tomb . Formatting Luks mapped device. 258s tomb . Formatting your Tomb with ext4 filesystem. 258s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 258s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 258s tomb . Commanded to open tomb test.tomb 258s tomb . Valid tomb file found: test.tomb 258s tomb . Key is valid. 258s tomb . Mountpoint not specified, using default: /media/test 258s tomb (*) Opening test on /media/test 258s tomb . This tomb is a valid LUKS encrypted device. 259s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 259s tomb . A password is required to use key argon2-test.key 259s tomb . Unlocking KDF key protection (argon2) 259s tomb . Password OK. 262s tomb (*) Success unlocking tomb test 262s tomb . Filesystem detected: ext4 262s tomb . Checking filesystem via /dev/loop0 262s fsck from util-linux 2.40.2 262s test: clean, 12/4608 files, 1356/4608 blocks 262s tomb (*) Success opening test.tomb on /media/test 262s ~~ Copying some data into the opened tomb ... 262s ~~ Opened tomb's content is ... 262s total 44 262s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 20 15:56 . 262s drwxr-xr-x 3 root root 4096 Jan 20 15:56 .. 262s -rw------- 1 ubuntu ubuntu 12 Jan 20 15:56 .host 262s -rw------- 1 ubuntu ubuntu 11 Jan 20 15:56 .last 262s -rw------- 1 ubuntu ubuntu 5 Jan 20 15:56 .uid 262s -rw------- 1 ubuntu ubuntu 944 Jan 20 15:55 argon2-test.key 262s drwx------ 2 ubuntu ubuntu 16384 Jan 20 15:56 lost+found 262s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:55 pbkdf2-test.key 262s tomb . Closing tomb [test] mounted on /media/test 262s tomb (*) Tomb [test] closed: your bones will rest in peace. 262s ~~ Testing btrfs file system using a pbkdf2 key ... 262s tomb . Commanded to dig tomb 262s tomb (*) Creating a new tomb in test.tomb 262s tomb . Generating test.tomb of 115MiB 262s 115+0 records in 262s 115+0 records out 262s 120586240 bytes (121 MB, 115 MiB) copied, 0.597045 s, 202 MB/s 262s -rw------- 1 ubuntu ubuntu 115M Jan 20 15:56 test.tomb 262s tomb (*) Done digging test.tomb 262s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 262s tomb . tomb forge test.tomb.key 262s tomb . tomb lock test.tomb -k test.tomb.key 262s tomb . File is not yet a tomb: test.tomb 262s tomb . Valid tomb file found: test.tomb 262s tomb . Commanded to lock tomb test.tomb 262s tomb (*) Selected filesystem type btrfs. 262s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 262s tomb . Fine, this tomb seems empty. 262s tomb . Key is valid. 262s tomb . Locking using cipher: aes-xts-plain64 262s tomb . A password is required to use key pbkdf2-test.key 263s tomb . Unlocking KDF key protection (pbkdf2sha1) 264s tomb . Password OK. 264s tomb (*) Locking test.tomb with pbkdf2-test.key 264s tomb . Formatting Luks mapped device. 270s tomb . Formatting your Tomb with btrfs filesystem. 270s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 270s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 270s tomb . Commanded to open tomb test.tomb 270s tomb . Valid tomb file found: test.tomb 270s tomb . Key is valid. 270s tomb . Mountpoint not specified, using default: /media/test 270s tomb (*) Opening test on /media/test 270s tomb . This tomb is a valid LUKS encrypted device. 270s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 270s tomb . A password is required to use key pbkdf2-test.key 270s tomb . Unlocking KDF key protection (pbkdf2sha1) 272s tomb . Password OK. 274s tomb (*) Success unlocking tomb test 274s tomb . Filesystem detected: btrfs 274s tomb . Checking filesystem via /dev/loop0 274s [1/7] checking root items 274s [2/7] checking extents 274s [3/7] checking free space tree 274s [4/7] checking fs roots 274s Opening filesystem to check... 274s Checking filesystem on /dev/mapper/tomb.test.271f16dfca8db776a7a3fff109ddc92c44960778bd715ef540cc0d6228518de4.loop0 274s UUID: 1ffbf87c-1ff7-45b5-b334-c168f87c4c64 274s found 589824 bytes used, no error found 274s total csum bytes: 0 274s total tree bytes: 589824 274s total fs tree bytes: 131072 274s total extent tree bytes: 65536 274s btree space waste bytes: 582963 274s file data blocks allocated: 0 274s referenced 0 274s [5/7] checking only csums items (without verifying data) 274s [6/7] checking root refs 274s [7/7] checking quota groups skipped (not enabled on this FS) 274s tomb (*) Success opening test.tomb on /media/test 274s ~~ Copying some data into the opened tomb ... 274s ~~ Opened tomb's content is ... 274s total 388 274s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 20 15:56 . 274s drwxr-xr-x 3 root root 4096 Jan 20 15:56 .. 274s -rw------- 1 ubuntu ubuntu 12 Jan 20 15:56 .host 274s -rw------- 1 ubuntu ubuntu 11 Jan 20 15:56 .last 274s -rw------- 1 ubuntu ubuntu 5 Jan 20 15:56 .uid 274s -rw------- 1 ubuntu ubuntu 944 Jan 20 15:55 argon2-test.key 274s -rw------- 1 ubuntu ubuntu 950 Jan 20 15:55 pbkdf2-test.key 274s tomb . Closing tomb [test] mounted on /media/test 274s tomb (*) Tomb [test] closed: your bones will rest in peace. 274s ~~ Testing btrfsmixedmode file system using a argon2 key ... 274s tomb . Commanded to dig tomb 274s tomb (*) Creating a new tomb in test.tomb 274s tomb . Generating test.tomb of 20MiB 274s 20+0 records in 274s 20+0 records out 274s 20971520 bytes (21 MB, 20 MiB) copied, 0.103772 s, 202 MB/s 274s -rw------- 1 ubuntu ubuntu 20M Jan 20 15:56 test.tomb 274s tomb (*) Done digging test.tomb 274s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 274s tomb . tomb forge test.tomb.key 274s tomb . tomb lock test.tomb -k test.tomb.key 274s tomb . File is not yet a tomb: test.tomb 274s tomb . Valid tomb file found: test.tomb 274s tomb . Commanded to lock tomb test.tomb 274s tomb (*) Selected filesystem type btrfsmixedmode. 274s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 274s tomb . Fine, this tomb seems empty. 274s tomb . Key is valid. 274s tomb . Locking using cipher: aes-xts-plain64 274s tomb . A password is required to use key argon2-test.key 274s tomb . Unlocking KDF key protection (argon2) 275s tomb . Password OK. 275s tomb (*) Locking test.tomb with argon2-test.key 275s tomb . Formatting Luks mapped device. 281s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 281s ERROR: '/dev/mapper/tomb.tmp' is too small to make a usable filesystem 281s ERROR: minimum size for each btrfs device is 142606336 281s tomb [W] Tomb format returned an error. 281s tomb [E] Your tomb test.tomb may be corrupted. 281s autopkgtest [15:56:32]: test create-and-use-a-tomb-with-doas: -----------------------] 282s autopkgtest [15:56:33]: test create-and-use-a-tomb-with-doas: - - - - - - - - - - results - - - - - - - - - - 282s create-and-use-a-tomb-with-doas FAIL non-zero exit status 1 282s autopkgtest [15:56:33]: @@@@@@@@@@@@@@@@@@@@ summary 282s create-and-use-a-tomb-with-sudo FAIL non-zero exit status 1 282s create-and-use-a-tomb-with-doas FAIL non-zero exit status 1 298s nova [W] Using flock in prodstack6-ppc64el 298s Creating nova instance adt-plucky-ppc64el-tomb-20250120-151648-juju-7f2275-prod-proposed-migration-environment-2-c71f7295-c69b-4179-9051-73417d44cd3d from image adt/ubuntu-plucky-ppc64el-server-20250120.img (UUID abac778f-d5cb-4120-a417-4c82b765c941)... 298s nova [W] Timed out waiting for 9a52d52c-66d2-4751-83b4-7d51d36e902d to get deleted. 298s nova [W] Using flock in prodstack6-ppc64el 298s Creating nova instance adt-plucky-ppc64el-tomb-20250120-151648-juju-7f2275-prod-proposed-migration-environment-2-c71f7295-c69b-4179-9051-73417d44cd3d from image adt/ubuntu-plucky-ppc64el-server-20250120.img (UUID abac778f-d5cb-4120-a417-4c82b765c941)... 298s nova [W] Timed out waiting for 042ecdd2-ffdb-4e25-a2bb-a60ce36c3c95 to get deleted.