0s autopkgtest [18:24:17]: starting date and time: 2024-07-26 18:24:17+0000 0s autopkgtest [18:24:17]: git checkout: fd3bed09 nova: allow more retries for quota issues 0s autopkgtest [18:24:17]: host juju-7f2275-prod-proposed-migration-environment-3; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.3im3cpz9/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.11+dfsg-1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-3@bos03-ppc64el-7.secgroup --name adt-oracular-ppc64el-tomb-20240726-182416-juju-7f2275-prod-proposed-migration-environment-3-bd87f18e-af27-47a6-8edc-f0027a534d66 --image adt/ubuntu-oracular-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-3 --net-id=net_prod-proposed-migration-ppc64el -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 77s autopkgtest [18:25:34]: testbed dpkg architecture: ppc64el 77s autopkgtest [18:25:34]: testbed apt version: 2.9.6 77s autopkgtest [18:25:34]: @@@@@@@@@@@@@@@@@@@@ test bed setup 78s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease [126 kB] 78s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse Sources [4288 B] 78s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe Sources [420 kB] 79s Get:4 http://ftpmaster.internal/ubuntu oracular-proposed/restricted Sources [8548 B] 79s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/main Sources [52.1 kB] 79s Get:6 http://ftpmaster.internal/ubuntu oracular-proposed/main ppc64el Packages [80.2 kB] 79s Get:7 http://ftpmaster.internal/ubuntu oracular-proposed/main ppc64el c-n-f Metadata [2116 B] 79s Get:8 http://ftpmaster.internal/ubuntu oracular-proposed/restricted ppc64el Packages [1368 B] 79s Get:9 http://ftpmaster.internal/ubuntu oracular-proposed/restricted ppc64el c-n-f Metadata [120 B] 79s Get:10 http://ftpmaster.internal/ubuntu oracular-proposed/universe ppc64el Packages [486 kB] 79s Get:11 http://ftpmaster.internal/ubuntu oracular-proposed/universe ppc64el c-n-f Metadata [8952 B] 79s Get:12 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse ppc64el Packages [1448 B] 79s Get:13 http://ftpmaster.internal/ubuntu oracular-proposed/multiverse ppc64el c-n-f Metadata [120 B] 82s Fetched 1191 kB in 1s (1390 kB/s) 82s Reading package lists... 84s Reading package lists... 84s Building dependency tree... 84s Reading state information... 84s Calculating upgrade... 85s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 85s Reading package lists... 85s Building dependency tree... 85s Reading state information... 85s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 85s Hit:1 http://ftpmaster.internal/ubuntu oracular-proposed InRelease 86s Hit:2 http://ftpmaster.internal/ubuntu oracular InRelease 86s Hit:3 http://ftpmaster.internal/ubuntu oracular-updates InRelease 86s Hit:4 http://ftpmaster.internal/ubuntu oracular-security InRelease 86s Reading package lists... 87s Reading package lists... 87s Building dependency tree... 87s Reading state information... 87s Calculating upgrade... 87s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 87s Reading package lists... 87s Building dependency tree... 87s Reading state information... 87s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 90s autopkgtest [18:25:47]: testbed running kernel: Linux 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:05:55 UTC 2024 90s autopkgtest [18:25:47]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 92s Get:1 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.11+dfsg-1 (dsc) [2037 B] 92s Get:2 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.11+dfsg-1 (tar) [1262 kB] 92s Get:3 http://ftpmaster.internal/ubuntu oracular-proposed/universe tomb 2.11+dfsg-1 (diff) [16.0 kB] 92s gpgv: Signature made Mon Jul 22 20:25:44 2024 UTC 92s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 92s gpgv: issuer "sge@debian.org" 92s gpgv: Can't check signature: No public key 92s dpkg-source: warning: cannot verify inline signature for ./tomb_2.11+dfsg-1.dsc: no acceptable signature found 93s autopkgtest [18:25:50]: testing package tomb version 2.11+dfsg-1 93s autopkgtest [18:25:50]: build not needed 94s autopkgtest [18:25:51]: test create-and-use-a-tomb: preparing testbed 95s Reading package lists... 95s Building dependency tree... 95s Reading state information... 95s Starting pkgProblemResolver with broken count: 0 95s Starting 2 pkgProblemResolver with broken count: 0 95s Done 95s The following additional packages will be installed: 95s argon2 tomb zsh zsh-common 95s Suggested packages: 95s dcfldd plocate pwdsphinx qrencode recoll steghide unoconv zsh-doc 95s The following NEW packages will be installed: 95s argon2 autopkgtest-satdep tomb zsh zsh-common 95s 0 upgraded, 5 newly installed, 0 to remove and 0 not upgraded. 95s Need to get 5278 kB/5279 kB of archives. 95s After this operation, 22.0 MB of additional disk space will be used. 95s Get:1 /tmp/autopkgtest.DSCFC0/1-autopkgtest-satdep.deb autopkgtest-satdep ppc64el 0 [724 B] 95s Get:2 http://ftpmaster.internal/ubuntu oracular/universe ppc64el argon2 ppc64el 0~20190702+dfsg-4build1 [29.7 kB] 95s Get:3 http://ftpmaster.internal/ubuntu oracular/main ppc64el zsh-common all 5.9-6ubuntu2 [4173 kB] 96s Get:4 http://ftpmaster.internal/ubuntu oracular/main ppc64el zsh ppc64el 5.9-6ubuntu2 [996 kB] 96s Get:5 http://ftpmaster.internal/ubuntu oracular-proposed/universe ppc64el tomb ppc64el 2.11+dfsg-1 [79.7 kB] 96s Fetched 5278 kB in 1s (6743 kB/s) 96s Selecting previously unselected package argon2. 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 72808 files and directories currently installed.) 97s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_ppc64el.deb ... 97s Unpacking argon2 (0~20190702+dfsg-4build1) ... 97s Selecting previously unselected package zsh-common. 97s Preparing to unpack .../zsh-common_5.9-6ubuntu2_all.deb ... 97s Unpacking zsh-common (5.9-6ubuntu2) ... 97s Selecting previously unselected package zsh. 97s Preparing to unpack .../zsh_5.9-6ubuntu2_ppc64el.deb ... 97s Unpacking zsh (5.9-6ubuntu2) ... 97s Selecting previously unselected package tomb. 97s Preparing to unpack .../tomb_2.11+dfsg-1_ppc64el.deb ... 97s Unpacking tomb (2.11+dfsg-1) ... 97s Selecting previously unselected package autopkgtest-satdep. 97s Preparing to unpack .../1-autopkgtest-satdep.deb ... 97s Unpacking autopkgtest-satdep (0) ... 97s Setting up argon2 (0~20190702+dfsg-4build1) ... 97s Setting up zsh-common (5.9-6ubuntu2) ... 98s Setting up zsh (5.9-6ubuntu2) ... 98s Setting up tomb (2.11+dfsg-1) ... 98s Setting up autopkgtest-satdep (0) ... 98s Processing triggers for debianutils (5.20) ... 98s Processing triggers for man-db (2.12.1-2) ... 102s (Reading database ... 74363 files and directories currently installed.) 102s Removing autopkgtest-satdep (0) ... 102s autopkgtest [18:25:59]: test create-and-use-a-tomb: [----------------------- 103s ~~ Create a file to hold an encrypted file system ... 103s tomb . Commanded to dig tomb 103s tomb (*) Creating a new tomb in test.tomb 103s tomb . Generating test.tomb of 20MiB 103s -rw------- 1 ubuntu ubuntu 20M Jul 26 18:26 test.tomb 103s 20+0 records in 103s 20+0 records out 103s 20971520 bytes (21 MB, 20 MiB) copied, 0.0971885 s, 216 MB/s 103s tomb (*) Done digging test.tomb 103s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 103s tomb . tomb forge test.tomb.key 103s tomb . tomb lock test.tomb -k test.tomb.key 103s ~~ Create a pbkdf2 key file ... 103s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 103s tomb . Using KDF to protect the key password (1 rounds) 103s tomb [W] This operation takes time. Keep using this computer on other tasks. 103s tomb [W] Once done you will be asked to choose a password for your tomb. 103s tomb [W] To make it faster you can move the mouse around. 103s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 103s 512+0 records in 103s 512+0 records out 103s 512 bytes copied, 0.000886663 s, 577 kB/s 103s tomb (*) Choose the password of your key: pbkdf2-test.key 103s tomb . (You can also change it later using 'tomb passwd'.) 103s tomb (*) Using KDF, iteration time: 1000000 103s tomb . generating salt 103s tomb . calculating iterations 104s tomb . encoding the password 107s tomb . Key is valid. 107s tomb . Done forging pbkdf2-test.key 107s tomb (*) Your key is ready: 107s -rw------- 1 ubuntu ubuntu 946 Jul 26 18:26 pbkdf2-test.key 107s ~~ Create an argon2 key file ... 107s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 107s tomb . Using KDF to protect the key password (1 rounds) 107s tomb [W] This operation takes time. Keep using this computer on other tasks. 107s tomb [W] Once done you will be asked to choose a password for your tomb. 107s tomb [W] To make it faster you can move the mouse around. 107s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 107s 512+0 records in 107s 512+0 records out 107s 512 bytes copied, 0.000856067 s, 598 kB/s 107s tomb (*) Choose the password of your key: argon2-test.key 107s tomb . (You can also change it later using 'tomb passwd'.) 107s tomb (*) Using KDF Argon2 107s tomb . memory used: 2^18 107s tomb . kdf salt: e611d7b51e1a35a3384b6032c06c9a5809f151d403ef7937d7156fe5a016ef47 107s tomb . kdf iterations: 1 108s tomb . Key is valid. 108s tomb . Done forging argon2-test.key 108s tomb (*) Your key is ready: 108s -rw------- 1 ubuntu ubuntu 940 Jul 26 18:26 argon2-test.key 108s ~~ Cloak a key file ... 108s tomb . Key is valid. 108s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 108s tomb (*) Tomb key encoded succesfully 108s ~~ Uncloak and verify a key file ... 108s tomb (*) Key succesfully uncloaked to uncloaked.key. 108s ~~ Testing ext4 file system using a pbkdf2 key ... 108s tomb . Commanded to dig tomb 108s tomb (*) Creating a new tomb in test.tomb 108s tomb . Generating test.tomb of 20MiB 108s 20+0 records in 108s 20+0 records out 108s 20971520 bytes (21 MB, 20 MiB) copied, 0.106144 s, 198 MB/s 108s -rw------- 1 ubuntu ubuntu 20M Jul 26 18:26 test.tomb 108s tomb (*) Done digging test.tomb 108s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 108s tomb . tomb forge test.tomb.key 108s tomb . tomb lock test.tomb -k test.tomb.key 108s tomb . File is not yet a tomb: test.tomb 108s tomb . Valid tomb file found: test.tomb 108s tomb . Commanded to lock tomb test.tomb 108s tomb (*) Selected filesystem type ext4. 108s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 108s tomb . Fine, this tomb seems empty. 108s tomb . Key is valid. 108s tomb . Locking using cipher: aes-xts-plain64 108s tomb . A password is required to use key pbkdf2-test.key 108s tomb . Unlocking KDF key protection (pbkdf2sha1) 110s tomb . Password OK. 110s tomb (*) Locking test.tomb with pbkdf2-test.key 110s tomb . Formatting Luks mapped device. 116s tomb . Formatting your Tomb with ext4 filesystem. 116s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 116s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 116s tomb . Commanded to open tomb test.tomb 116s tomb . Valid tomb file found: test.tomb 116s tomb . Key is valid. 116s tomb . Mountpoint not specified, using default: /media/test 116s tomb (*) Opening test on /media/test 116s tomb . This tomb is a valid LUKS encrypted device. 116s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 116s tomb . A password is required to use key pbkdf2-test.key 116s tomb . Unlocking KDF key protection (pbkdf2sha1) 118s tomb . Password OK. 120s tomb (*) Success unlocking tomb test 120s tomb . Filesystem detected: ext4 120s tomb . Checking filesystem via /dev/loop0 120s fsck from util-linux 2.39.3 120s test: clean, 12/4608 files, 1356/4608 blocks 120s tomb (*) Success opening test.tomb on /media/test 120s ~~ Copying some data into the opened tomb ... 120s ~~ Opened tomb's content is ... 120s total 44 120s drwxr-xr-x 3 ubuntu ubuntu 4096 Jul 26 18:26 . 120s drwxr-xr-x 3 root root 4096 Jul 26 18:26 .. 120s -rw------- 1 ubuntu ubuntu 12 Jul 26 18:26 .host 120s -rw------- 1 ubuntu ubuntu 11 Jul 26 18:26 .last 120s -rw------- 1 ubuntu ubuntu 5 Jul 26 18:26 .uid 120s -rw------- 1 ubuntu ubuntu 940 Jul 26 18:26 argon2-test.key 120s drwx------ 2 ubuntu ubuntu 16384 Jul 26 18:26 lost+found 120s -rw------- 1 ubuntu ubuntu 946 Jul 26 18:26 pbkdf2-test.key 120s tomb . Closing tomb [test] mounted on /media/test 120s tomb (*) Tomb [test] closed: your bones will rest in peace. 120s ~~ Testing ext4 file system using a argon2 key ... 120s tomb . Commanded to dig tomb 120s tomb (*) Creating a new tomb in test.tomb 120s tomb . Generating test.tomb of 20MiB 121s 20+0 records in 121s 20+0 records out 121s 20971520 bytes (21 MB, 20 MiB) copied, 0.0983048 s, 213 MB/s 121s -rw------- 1 ubuntu ubuntu 20M Jul 26 18:26 test.tomb 121s tomb (*) Done digging test.tomb 121s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 121s tomb . tomb forge test.tomb.key 121s tomb . tomb lock test.tomb -k test.tomb.key 121s tomb . File is not yet a tomb: test.tomb 121s tomb . Valid tomb file found: test.tomb 121s tomb . Commanded to lock tomb test.tomb 121s tomb (*) Selected filesystem type ext4. 121s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 121s tomb . Fine, this tomb seems empty. 121s tomb . Key is valid. 121s tomb . Locking using cipher: aes-xts-plain64 121s tomb . A password is required to use key argon2-test.key 121s tomb . Unlocking KDF key protection (argon2) 121s tomb . Password OK. 121s tomb (*) Locking test.tomb with argon2-test.key 121s tomb . Formatting Luks mapped device. 127s tomb . Formatting your Tomb with ext4 filesystem. 127s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 127s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 128s tomb . Commanded to open tomb test.tomb 128s tomb . Valid tomb file found: test.tomb 128s tomb . Key is valid. 128s tomb . Mountpoint not specified, using default: /media/test 128s tomb (*) Opening test on /media/test 128s tomb . This tomb is a valid LUKS encrypted device. 128s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 128s tomb . A password is required to use key argon2-test.key 128s tomb . Unlocking KDF key protection (argon2) 129s tomb . Password OK. 131s tomb (*) Success unlocking tomb test 131s tomb . Filesystem detected: ext4 131s tomb . Checking filesystem via /dev/loop0 131s fsck from util-linux 2.39.3 131s test: clean, 12/4608 files, 1356/4608 blocks 131s tomb (*) Success opening test.tomb on /media/test 131s ~~ Copying some data into the opened tomb ... 131s ~~ Opened tomb's content is ... 131s total 44 131s drwxr-xr-x 3 ubuntu ubuntu 4096 Jul 26 18:26 . 131s drwxr-xr-x 3 root root 4096 Jul 26 18:26 .. 131s -rw------- 1 ubuntu ubuntu 12 Jul 26 18:26 .host 131s -rw------- 1 ubuntu ubuntu 11 Jul 26 18:26 .last 131s -rw------- 1 ubuntu ubuntu 5 Jul 26 18:26 .uid 131s -rw------- 1 ubuntu ubuntu 940 Jul 26 18:26 argon2-test.key 131s drwx------ 2 ubuntu ubuntu 16384 Jul 26 18:26 lost+found 131s -rw------- 1 ubuntu ubuntu 946 Jul 26 18:26 pbkdf2-test.key 131s tomb . Closing tomb [test] mounted on /media/test 131s tomb (*) Tomb [test] closed: your bones will rest in peace. 131s ~~ Testing btrfs file system using a pbkdf2 key ... 131s tomb . Commanded to dig tomb 131s tomb (*) Creating a new tomb in test.tomb 131s tomb . Generating test.tomb of 115MiB 132s 115+0 records in 132s 115+0 records out 132s 120586240 bytes (121 MB, 115 MiB) copied, 0.737043 s, 164 MB/s 132s -rw------- 1 ubuntu ubuntu 115M Jul 26 18:26 test.tomb 132s tomb (*) Done digging test.tomb 132s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 132s tomb . tomb forge test.tomb.key 132s tomb . tomb lock test.tomb -k test.tomb.key 132s tomb . File is not yet a tomb: test.tomb 132s tomb . Valid tomb file found: test.tomb 132s tomb . Commanded to lock tomb test.tomb 132s tomb (*) Selected filesystem type btrfs. 132s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 132s tomb . Fine, this tomb seems empty. 132s tomb . Key is valid. 132s tomb . Locking using cipher: aes-xts-plain64 132s tomb . A password is required to use key pbkdf2-test.key 132s tomb . Unlocking KDF key protection (pbkdf2sha1) 134s tomb . Password OK. 134s tomb (*) Locking test.tomb with pbkdf2-test.key 134s tomb . Formatting Luks mapped device. 139s tomb . Formatting your Tomb with btrfs filesystem. 140s device-mapper: remove ioctl on tomb.tmp failed: Device or resource busy 140s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 140s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 140s tomb . Commanded to open tomb test.tomb 140s tomb . Valid tomb file found: test.tomb 140s tomb . Key is valid. 140s tomb . Mountpoint not specified, using default: /media/test 140s tomb (*) Opening test on /media/test 140s tomb . This tomb is a valid LUKS encrypted device. 140s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 140s tomb . A password is required to use key pbkdf2-test.key 140s tomb . Unlocking KDF key protection (pbkdf2sha1) 142s tomb . Password OK. 144s tomb (*) Success unlocking tomb test 144s tomb . Filesystem detected: btrfs 144s tomb . Checking filesystem via /dev/loop0 144s [1/7] checking root items 144s [2/7] checking extents 144s [3/7] checking free space tree 144s [4/7] checking fs roots 144s [5/7] checking only csums items (without verifying data) 144s [6/7] checking root refs 144s [7/7] checking quota groups skipped (not enabled on this FS) 144s Opening filesystem to check... 144s Checking filesystem on /dev/mapper/tomb.test.14b3e9dc3575ace1c654c1e1f1888ccd4ccd2d0590ec9b8d4007da72bd046148.loop0 144s UUID: 7fe08c17-ecfc-4e65-99f7-afab270184d9 144s found 589824 bytes used, no error found 144s total csum bytes: 0 144s total tree bytes: 589824 144s total fs tree bytes: 131072 144s total extent tree bytes: 65536 144s btree space waste bytes: 582963 144s file data blocks allocated: 0 144s referenced 0 144s tomb (*) Success opening test.tomb on /media/test 144s ~~ Copying some data into the opened tomb ... 144s ~~ Opened tomb's content is ... 144s total 388 144s drwxr-xr-x 1 ubuntu ubuntu 88 Jul 26 18:26 . 144s drwxr-xr-x 3 root root 4096 Jul 26 18:26 .. 144s -rw------- 1 ubuntu ubuntu 12 Jul 26 18:26 .host 144s -rw------- 1 ubuntu ubuntu 11 Jul 26 18:26 .last 144s -rw------- 1 ubuntu ubuntu 5 Jul 26 18:26 .uid 144s -rw------- 1 ubuntu ubuntu 940 Jul 26 18:26 argon2-test.key 144s -rw------- 1 ubuntu ubuntu 946 Jul 26 18:26 pbkdf2-test.key 144s tomb . Closing tomb [test] mounted on /media/test 144s tomb (*) Tomb [test] closed: your bones will rest in peace. 144s ~~ Testing btrfsmixedmode file system using a argon2 key ... 144s tomb . Commanded to dig tomb 144s tomb (*) Creating a new tomb in test.tomb 144s tomb . Generating test.tomb of 20MiB 145s 20+0 records in 145s 20+0 records out 145s 20971520 bytes (21 MB, 20 MiB) copied, 0.097841 s, 214 MB/s 145s -rw------- 1 ubuntu ubuntu 20M Jul 26 18:26 test.tomb 145s tomb (*) Done digging test.tomb 145s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 145s tomb . tomb forge test.tomb.key 145s tomb . tomb lock test.tomb -k test.tomb.key 145s tomb . File is not yet a tomb: test.tomb 145s tomb . Valid tomb file found: test.tomb 145s tomb . Commanded to lock tomb test.tomb 145s tomb (*) Selected filesystem type btrfsmixedmode. 145s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 145s tomb . Fine, this tomb seems empty. 145s tomb . Key is valid. 145s tomb . Locking using cipher: aes-xts-plain64 145s tomb . A password is required to use key argon2-test.key 145s tomb . Unlocking KDF key protection (argon2) 145s tomb . Password OK. 145s tomb (*) Locking test.tomb with argon2-test.key 145s tomb . Formatting Luks mapped device. 151s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 151s ERROR: '/dev/mapper/tomb.tmp' is too small to make a usable filesystem 151s ERROR: minimum size for each btrfs device is 142606336 151s tomb [W] Tomb format returned an error. 151s tomb [E] Your tomb test.tomb may be corrupted. 152s autopkgtest [18:26:49]: test create-and-use-a-tomb: -----------------------] 152s autopkgtest [18:26:49]: test create-and-use-a-tomb: - - - - - - - - - - results - - - - - - - - - - 152s create-and-use-a-tomb FAIL non-zero exit status 1 153s autopkgtest [18:26:50]: @@@@@@@@@@@@@@@@@@@@ summary 153s create-and-use-a-tomb FAIL non-zero exit status 1 164s nova [W] Using flock in prodstack6-ppc64el 164s Creating nova instance adt-oracular-ppc64el-tomb-20240726-182416-juju-7f2275-prod-proposed-migration-environment-3-bd87f18e-af27-47a6-8edc-f0027a534d66 from image adt/ubuntu-oracular-ppc64el-server-20240726.img (UUID cf08a693-81bf-423c-a684-4129eea7b1f2)...