0s autopkgtest [09:15:13]: starting date and time: 2025-01-18 09:15:13+0000 0s autopkgtest [09:15:13]: git checkout: 325255d2 Merge branch 'pin-any-arch' into 'ubuntu/production' 0s autopkgtest [09:15:13]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.u_wnr_9z/out --timeout-copy=6000 --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:tomb --apt-upgrade tomb --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=tomb/2.11+dfsg-2 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@bos03-s390x-26.secgroup --name adt-plucky-s390x-tomb-20250118-091513-juju-7f2275-prod-proposed-migration-environment-2-b894195d-ce60-48da-ab8c-80bc5b6f8a95 --image adt/ubuntu-plucky-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-proposed-migration-s390x -e TERM=linux -e ''"'"'http_proxy=http://squid.internal:3128'"'"'' -e ''"'"'https_proxy=http://squid.internal:3128'"'"'' -e ''"'"'no_proxy=127.0.0.1,127.0.1.1,login.ubuntu.com,localhost,localdomain,novalocal,internal,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,10.24.0.0/24,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com'"'"'' --mirror=http://ftpmaster.internal/ubuntu/ 99s autopkgtest [09:16:52]: testbed dpkg architecture: s390x 100s autopkgtest [09:16:53]: testbed apt version: 2.9.18 100s autopkgtest [09:16:53]: @@@@@@@@@@@@@@@@@@@@ test bed setup 100s autopkgtest [09:16:53]: testbed release detected to be: None 101s autopkgtest [09:16:54]: updating testbed package index (apt update) 101s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 101s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 101s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 101s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 101s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 101s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.6 kB] 101s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [823 kB] 102s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [156 kB] 102s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [266 kB] 102s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 102s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [900 kB] 102s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4668 B] 102s Fetched 2249 kB in 1s (2381 kB/s) 102s Reading package lists... 103s + lsb_release --codename --short 103s + RELEASE=plucky 103s + cat 103s + [ plucky != trusty ] 103s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 103s Reading package lists... 103s Building dependency tree... 103s Reading state information... 103s Calculating upgrade... 103s The following packages will be upgraded: 103s apport apport-core-dump-handler bash-completion gcc-14-base libatomic1 103s libgcc-s1 libstdc++6 python3-apport python3-certifi python3-chardet 103s python3-jwt python3-problem-report rng-tools-debian usb.ids 103s 14 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 103s Need to get 1842 kB of archives. 103s After this operation, 1024 B disk space will be freed. 103s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x python3-problem-report all 2.31.0-0ubuntu3 [25.3 kB] 104s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x python3-apport all 2.31.0-0ubuntu3 [93.1 kB] 104s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x apport-core-dump-handler all 2.31.0-0ubuntu3 [18.3 kB] 104s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x apport all 2.31.0-0ubuntu3 [83.0 kB] 104s Get:5 http://ftpmaster.internal/ubuntu plucky/universe s390x rng-tools-debian s390x 2.6 [44.6 kB] 104s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libatomic1 s390x 14.2.0-13ubuntu1 [9422 B] 104s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x gcc-14-base s390x 14.2.0-13ubuntu1 [53.0 kB] 104s Get:8 http://ftpmaster.internal/ubuntu plucky/main s390x libstdc++6 s390x 14.2.0-13ubuntu1 [896 kB] 104s Get:9 http://ftpmaster.internal/ubuntu plucky/main s390x libgcc-s1 s390x 14.2.0-13ubuntu1 [35.9 kB] 104s Get:10 http://ftpmaster.internal/ubuntu plucky/main s390x bash-completion all 1:2.16.0-6 [214 kB] 104s Get:11 http://ftpmaster.internal/ubuntu plucky/main s390x usb.ids all 2025.01.14-1 [223 kB] 104s Get:12 http://ftpmaster.internal/ubuntu plucky/main s390x python3-certifi all 2024.12.14+ds-1 [9800 B] 104s Get:13 http://ftpmaster.internal/ubuntu plucky/main s390x python3-chardet all 5.2.0+dfsg-2 [116 kB] 104s Get:14 http://ftpmaster.internal/ubuntu plucky/main s390x python3-jwt all 2.10.1-2 [21.0 kB] 104s Fetched 1842 kB in 1s (2861 kB/s) 104s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 104s Preparing to unpack .../0-python3-problem-report_2.31.0-0ubuntu3_all.deb ... 104s Unpacking python3-problem-report (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 104s Preparing to unpack .../1-python3-apport_2.31.0-0ubuntu3_all.deb ... 104s Unpacking python3-apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 104s Preparing to unpack .../2-apport-core-dump-handler_2.31.0-0ubuntu3_all.deb ... 104s Unpacking apport-core-dump-handler (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 104s Preparing to unpack .../3-apport_2.31.0-0ubuntu3_all.deb ... 104s Unpacking apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 105s Preparing to unpack .../4-rng-tools-debian_2.6_s390x.deb ... 105s Unpacking rng-tools-debian (2.6) over (2.5) ... 105s Preparing to unpack .../5-libatomic1_14.2.0-13ubuntu1_s390x.deb ... 105s Unpacking libatomic1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 105s Preparing to unpack .../6-gcc-14-base_14.2.0-13ubuntu1_s390x.deb ... 105s Unpacking gcc-14-base:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 105s Setting up gcc-14-base:s390x (14.2.0-13ubuntu1) ... 105s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 105s Preparing to unpack .../libstdc++6_14.2.0-13ubuntu1_s390x.deb ... 105s Unpacking libstdc++6:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 105s Setting up libstdc++6:s390x (14.2.0-13ubuntu1) ... 105s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 105s Preparing to unpack .../libgcc-s1_14.2.0-13ubuntu1_s390x.deb ... 105s Unpacking libgcc-s1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 105s Setting up libgcc-s1:s390x (14.2.0-13ubuntu1) ... 105s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 105s Preparing to unpack .../bash-completion_1%3a2.16.0-6_all.deb ... 105s Unpacking bash-completion (1:2.16.0-6) over (1:2.16.0-3) ... 105s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 105s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 105s Preparing to unpack .../python3-certifi_2024.12.14+ds-1_all.deb ... 105s Unpacking python3-certifi (2024.12.14+ds-1) over (2024.8.30+dfsg-1) ... 105s Preparing to unpack .../python3-chardet_5.2.0+dfsg-2_all.deb ... 105s Unpacking python3-chardet (5.2.0+dfsg-2) over (5.2.0+dfsg-1) ... 105s Preparing to unpack .../python3-jwt_2.10.1-2_all.deb ... 105s Unpacking python3-jwt (2.10.1-2) over (2.7.0-1) ... 105s Setting up python3-jwt (2.10.1-2) ... 105s Setting up python3-problem-report (2.31.0-0ubuntu3) ... 105s Setting up python3-apport (2.31.0-0ubuntu3) ... 105s Setting up python3-chardet (5.2.0+dfsg-2) ... 106s Setting up python3-certifi (2024.12.14+ds-1) ... 106s Setting up bash-completion (1:2.16.0-6) ... 106s Setting up rng-tools-debian (2.6) ... 106s Setting up libatomic1:s390x (14.2.0-13ubuntu1) ... 106s Setting up usb.ids (2025.01.14-1) ... 106s Setting up apport-core-dump-handler (2.31.0-0ubuntu3) ... 107s Setting up apport (2.31.0-0ubuntu3) ... 108s apport-autoreport.service is a disabled or a static unit not running, not starting it. 108s Processing triggers for libc-bin (2.40-4ubuntu1) ... 108s Processing triggers for man-db (2.13.0-1) ... 109s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 109s + /usr/lib/apt/apt-helper analyze-pattern ?true 109s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 109s Reading package lists... 109s Building dependency tree... 109s Reading state information... 109s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 109s + grep -q trusty /etc/lsb-release 109s + [ ! -d /usr/share/doc/unattended-upgrades ] 109s + [ ! -d /usr/share/doc/lxd ] 109s + [ ! -d /usr/share/doc/lxd-client ] 109s + [ ! -d /usr/share/doc/snapd ] 109s + type iptables 109s + cat 109s + chmod 755 /etc/rc.local 109s + . /etc/rc.local 109s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 109s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 109s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 109s + uname -m 109s + [ s390x = ppc64le ] 109s + [ -d /run/systemd/system ] 109s + systemd-detect-virt --quiet --vm 109s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 109s + cat 109s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 109s + echo COMPRESS=lz4 109s + sync 109s autopkgtest [09:17:02]: upgrading testbed (apt dist-upgrade and autopurge) 109s Reading package lists... 109s Building dependency tree... 109s Reading state information... 109s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 109s Starting 2 pkgProblemResolver with broken count: 0 109s Done 110s Entering ResolveByKeep 110s 110s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 110s Reading package lists... 110s Building dependency tree... 110s Reading state information... 110s Starting pkgProblemResolver with broken count: 0 110s Starting 2 pkgProblemResolver with broken count: 0 110s Done 110s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 111s autopkgtest [09:17:04]: rebooting testbed after setup commands that affected boot 129s autopkgtest [09:17:22]: testbed running kernel: Linux 6.11.0-8-generic #8-Ubuntu SMP Mon Sep 16 12:49:35 UTC 2024 131s autopkgtest [09:17:24]: @@@@@@@@@@@@@@@@@@@@ apt-source tomb 133s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (dsc) [2050 B] 133s Get:2 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (tar) [1262 kB] 133s Get:3 http://ftpmaster.internal/ubuntu plucky-proposed/universe tomb 2.11+dfsg-2 (diff) [16.2 kB] 133s gpgv: Signature made Fri Jan 17 21:06:39 2025 UTC 133s gpgv: using RSA key 3DF5E8AA43FC9FDFD086F195ADF50EDAF8ADD585 133s gpgv: issuer "sge@debian.org" 133s gpgv: Can't check signature: No public key 133s dpkg-source: warning: cannot verify inline signature for ./tomb_2.11+dfsg-2.dsc: no acceptable signature found 133s autopkgtest [09:17:26]: testing package tomb version 2.11+dfsg-2 134s autopkgtest [09:17:27]: build not needed 134s autopkgtest [09:17:27]: test create-and-use-a-tomb-with-sudo: preparing testbed 135s Reading package lists... 135s Building dependency tree... 135s Reading state information... 135s Starting pkgProblemResolver with broken count: 0 135s Starting 2 pkgProblemResolver with broken count: 0 135s Done 135s The following NEW packages will be installed: 135s argon2 tomb zsh zsh-common 135s 0 upgraded, 4 newly installed, 0 to remove and 0 not upgraded. 135s Need to get 5216 kB of archives. 135s After this operation, 19.6 MB of additional disk space will be used. 135s Get:1 http://ftpmaster.internal/ubuntu plucky/universe s390x argon2 s390x 0~20190702+dfsg-4build1 [55.6 kB] 135s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x zsh-common all 5.9-6ubuntu3 [4170 kB] 136s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x zsh s390x 5.9-6ubuntu3 [911 kB] 136s Get:4 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x tomb s390x 2.11+dfsg-2 [79.7 kB] 136s Fetched 5216 kB in 1s (6639 kB/s) 136s Selecting previously unselected package argon2. 136s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55655 files and directories currently installed.) 136s Preparing to unpack .../argon2_0~20190702+dfsg-4build1_s390x.deb ... 136s Unpacking argon2 (0~20190702+dfsg-4build1) ... 136s Selecting previously unselected package zsh-common. 136s Preparing to unpack .../zsh-common_5.9-6ubuntu3_all.deb ... 136s Unpacking zsh-common (5.9-6ubuntu3) ... 136s Selecting previously unselected package zsh. 136s Preparing to unpack .../zsh_5.9-6ubuntu3_s390x.deb ... 136s Unpacking zsh (5.9-6ubuntu3) ... 136s Selecting previously unselected package tomb. 136s Preparing to unpack .../tomb_2.11+dfsg-2_s390x.deb ... 136s Unpacking tomb (2.11+dfsg-2) ... 136s Setting up argon2 (0~20190702+dfsg-4build1) ... 136s Setting up zsh-common (5.9-6ubuntu3) ... 136s Setting up zsh (5.9-6ubuntu3) ... 136s Setting up tomb (2.11+dfsg-2) ... 136s Processing triggers for debianutils (5.21) ... 136s Processing triggers for man-db (2.13.0-1) ... 138s autopkgtest [09:17:31]: test create-and-use-a-tomb-with-sudo: [----------------------- 138s ~~ Create a file to hold an encrypted file system ... 138s tomb . Commanded to dig tomb 138s tomb (*) Creating a new tomb in test.tomb 138s tomb . Generating test.tomb of 20MiB 138s 20+0 records in 138s 20+0 records out 138s 20971520 bytes (21 MB, 20 MiB) copied, 0.0666671 s, 315 MB/s 138s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:18 test.tomb 138s tomb (*) Done digging test.tomb 138s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 138s ~~ Create a pbkdf2 key file ... 138s tomb . tomb forge test.tomb.key 138s tomb . tomb lock test.tomb -k test.tomb.key 138s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 138s tomb . Using KDF to protect the key password (1 rounds) 138s tomb [W] This operation takes time. Keep using this computer on other tasks. 138s tomb [W] Once done you will be asked to choose a password for your tomb. 138s tomb [W] To make it faster you can move the mouse around. 138s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 138s 512+0 records in 138s 512+0 records out 138s 512 bytes copied, 0.000254135 s, 2.0 MB/s 138s tomb (*) Choose the password of your key: pbkdf2-test.key 138s tomb . (You can also change it later using 'tomb passwd'.) 138s tomb (*) Using KDF, iteration time: 1000000 138s tomb . generating salt 138s tomb . calculating iterations 139s tomb . encoding the password 141s tomb . Key is valid. 141s tomb . Done forging pbkdf2-test.key 141s tomb (*) Your key is ready: 141s -rw------- 1 ubuntu ubuntu 946 Jan 18 09:19 pbkdf2-test.key 141s ~~ Create an argon2 key file ... 141s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 141s tomb . Using KDF to protect the key password (1 rounds) 141s tomb [W] This operation takes time. Keep using this computer on other tasks. 141s tomb [W] Once done you will be asked to choose a password for your tomb. 141s tomb [W] To make it faster you can move the mouse around. 141s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 141s 512+0 records in 141s 512+0 records out 141s 512 bytes copied, 0.000245158 s, 2.1 MB/s 141s tomb (*) Choose the password of your key: argon2-test.key 141s tomb . (You can also change it later using 'tomb passwd'.) 141s tomb (*) Using KDF Argon2 141s tomb . memory used: 2^18 141s tomb . kdf salt: 48a30a690b7a63fdd850b0bcca9b83399bb604e9310a5721e529061389ea452b 141s tomb . kdf iterations: 1 142s tomb . Key is valid. 142s tomb . Done forging argon2-test.key 142s tomb (*) Your key is ready: 142s -rw------- 1 ubuntu ubuntu 940 Jan 18 09:19 argon2-test.key 142s ~~ Cloak a key file ... 142s tomb . Key is valid. 142s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 142s tomb (*) Tomb key encoded succesfully 142s ~~ Uncloak and verify a key file ... 142s tomb (*) Key succesfully uncloaked to uncloaked.key. 142s ~~ Testing ext4 file system using a pbkdf2 key ... 142s tomb . Commanded to dig tomb 142s tomb (*) Creating a new tomb in test.tomb 142s tomb . Generating test.tomb of 20MiB 142s 20+0 records in 142s 20+0 records out 142s 20971520 bytes (21 MB, 20 MiB) copied, 0.0678275 s, 309 MB/s 142s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:19 test.tomb 142s tomb (*) Done digging test.tomb 142s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 142s tomb . tomb forge test.tomb.key 142s tomb . tomb lock test.tomb -k test.tomb.key 142s tomb . File is not yet a tomb: test.tomb 142s tomb . Valid tomb file found: test.tomb 142s tomb . Commanded to lock tomb test.tomb 142s tomb (*) Selected filesystem type ext4. 142s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 142s tomb . Fine, this tomb seems empty. 142s tomb . Key is valid. 142s tomb . Locking using cipher: aes-xts-plain64 142s tomb . A password is required to use key pbkdf2-test.key 142s tomb . Unlocking KDF key protection (pbkdf2sha1) 144s tomb . Password OK. 144s tomb (*) Locking test.tomb with pbkdf2-test.key 144s tomb . Formatting Luks mapped device. 150s tomb . Formatting your Tomb with ext4 filesystem. 150s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 150s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 150s tomb . Commanded to open tomb test.tomb 150s tomb . Valid tomb file found: test.tomb 150s tomb . Key is valid. 150s tomb . Mountpoint not specified, using default: /media/test 150s tomb (*) Opening test on /media/test 150s tomb . This tomb is a valid LUKS encrypted device. 150s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 150s tomb . A password is required to use key pbkdf2-test.key 150s tomb . Unlocking KDF key protection (pbkdf2sha1) 152s tomb . Password OK. 154s tomb (*) Success unlocking tomb test 154s tomb . Filesystem detected: ext4 154s tomb . Checking filesystem via /dev/loop0 154s fsck from util-linux 2.40.2 154s test: clean, 12/4608 files, 1356/4608 blocks 154s tomb (*) Success opening test.tomb on /media/test 154s ~~ Copying some data into the opened tomb ... 154s ~~ Opened tomb's content is ... 154s total 44 154s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 09:19 . 154s drwxr-xr-x 3 root root 4096 Jan 18 09:19 .. 154s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:19 .host 154s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:19 .last 154s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:19 .uid 154s -rw------- 1 ubuntu ubuntu 940 Jan 18 09:19 argon2-test.key 154s drwx------ 2 ubuntu ubuntu 16384 Jan 18 09:19 lost+found 154s -rw------- 1 ubuntu ubuntu 946 Jan 18 09:19 pbkdf2-test.key 154s tomb . Closing tomb [test] mounted on /media/test 154s tomb (*) Tomb [test] closed: your bones will rest in peace. 154s ~~ Testing ext4 file system using a argon2 key ... 154s tomb . Commanded to dig tomb 154s tomb (*) Creating a new tomb in test.tomb 154s tomb . Generating test.tomb of 20MiB 154s 20+0 records in 154s 20+0 records out 154s 20971520 bytes (21 MB, 20 MiB) copied, 0.0629555 s, 333 MB/s 154s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:19 test.tomb 154s tomb (*) Done digging test.tomb 154s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 154s tomb . tomb forge test.tomb.key 154s tomb . tomb lock test.tomb -k test.tomb.key 154s tomb . File is not yet a tomb: test.tomb 154s tomb . Valid tomb file found: test.tomb 154s tomb . Commanded to lock tomb test.tomb 154s tomb (*) Selected filesystem type ext4. 154s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 154s tomb . Fine, this tomb seems empty. 154s tomb . Key is valid. 154s tomb . Locking using cipher: aes-xts-plain64 154s tomb . A password is required to use key argon2-test.key 154s tomb . Unlocking KDF key protection (argon2) 155s tomb . Password OK. 155s tomb (*) Locking test.tomb with argon2-test.key 155s tomb . Formatting Luks mapped device. 161s tomb . Formatting your Tomb with ext4 filesystem. 161s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 161s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 161s tomb . Commanded to open tomb test.tomb 161s tomb . Valid tomb file found: test.tomb 161s tomb . Key is valid. 161s tomb . Mountpoint not specified, using default: /media/test 161s tomb (*) Opening test on /media/test 161s tomb . This tomb is a valid LUKS encrypted device. 161s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 161s tomb . A password is required to use key argon2-test.key 161s tomb . Unlocking KDF key protection (argon2) 162s tomb . Password OK. 164s tomb (*) Success unlocking tomb test 164s tomb . Filesystem detected: ext4 164s tomb . Checking filesystem via /dev/loop0 164s fsck from util-linux 2.40.2 164s test: clean, 12/4608 files, 1356/4608 blocks 164s tomb (*) Success opening test.tomb on /media/test 164s ~~ Copying some data into the opened tomb ... 164s ~~ Opened tomb's content is ... 164s total 44 164s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 09:17 . 164s drwxr-xr-x 3 root root 4096 Jan 18 09:17 .. 164s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:17 .host 164s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:17 .last 164s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:17 .uid 164s -rw------- 1 ubuntu ubuntu 940 Jan 18 2025 argon2-test.key 164s drwx------ 2 ubuntu ubuntu 16384 Jan 18 09:17 lost+found 164s -rw------- 1 ubuntu ubuntu 946 Jan 18 2025 pbkdf2-test.key 164s tomb . Closing tomb [test] mounted on /media/test 164s tomb (*) Tomb [test] closed: your bones will rest in peace. 164s ~~ Testing btrfs file system using a pbkdf2 key ... 164s tomb . Commanded to dig tomb 164s tomb (*) Creating a new tomb in test.tomb 164s tomb . Generating test.tomb of 115MiB 165s 115+0 records in 165s 115+0 records out 165s 120586240 bytes (121 MB, 115 MiB) copied, 0.384342 s, 314 MB/s 165s -rw------- 1 ubuntu ubuntu 115M Jan 18 09:17 test.tomb 165s tomb (*) Done digging test.tomb 165s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 165s tomb . tomb forge test.tomb.key 165s tomb . tomb lock test.tomb -k test.tomb.key 165s tomb . File is not yet a tomb: test.tomb 165s tomb . Valid tomb file found: test.tomb 165s tomb . Commanded to lock tomb test.tomb 165s tomb (*) Selected filesystem type btrfs. 165s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 165s tomb . Fine, this tomb seems empty. 165s tomb . Key is valid. 165s tomb . Locking using cipher: aes-xts-plain64 165s tomb . A password is required to use key pbkdf2-test.key 165s tomb . Unlocking KDF key protection (pbkdf2sha1) 166s tomb . Password OK. 166s tomb (*) Locking test.tomb with pbkdf2-test.key 166s tomb . Formatting Luks mapped device. 173s tomb . Formatting your Tomb with btrfs filesystem. 173s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 173s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 173s tomb . Commanded to open tomb test.tomb 173s tomb . Valid tomb file found: test.tomb 173s tomb . Key is valid. 173s tomb . Mountpoint not specified, using default: /media/test 173s tomb (*) Opening test on /media/test 173s tomb . This tomb is a valid LUKS encrypted device. 173s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 173s tomb . A password is required to use key pbkdf2-test.key 173s tomb . Unlocking KDF key protection (pbkdf2sha1) 174s tomb . Password OK. 176s tomb (*) Success unlocking tomb test 176s tomb . Filesystem detected: btrfs 176s tomb . Checking filesystem via /dev/loop0 176s Opening filesystem to check... 176s Checking filesystem on /dev/mapper/tomb.test.82cf7fd58a33160bc5a1f1521d8a4ebbf03468f996ad62c48065367ae8d72fd4.loop0 176s UUID: db243c77-1e35-4d57-a7c0-4fdbb9c44ddc 176s found 147456 bytes used, no error found 176s total csum bytes: 0 176s total tree bytes: 147456 176s total fs tree bytes: 32768 176s total extent tree bytes: 16384 176s btree space waste bytes: 140595 176s file data blocks allocated: 0 176s referenced 0 176s [1/7] checking root items 176s [2/7] checking extents 176s [3/7] checking free space tree 176s [4/7] checking fs roots 176s [5/7] checking only csums items (without verifying data) 176s [6/7] checking root refs 176s [7/7] checking quota groups skipped (not enabled on this FS) 176s tomb (*) Success opening test.tomb on /media/test 176s ~~ Copying some data into the opened tomb ... 176s ~~ Opened tomb's content is ... 176s total 40 176s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 09:18 . 176s drwxr-xr-x 3 root root 4096 Jan 18 09:18 .. 176s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:18 .host 176s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:18 .last 176s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:18 .uid 176s -rw------- 1 ubuntu ubuntu 940 Jan 18 2025 argon2-test.key 176s -rw------- 1 ubuntu ubuntu 946 Jan 18 2025 pbkdf2-test.key 176s tomb . Closing tomb [test] mounted on /media/test 176s tomb (*) Tomb [test] closed: your bones will rest in peace. 176s ~~ Testing btrfsmixedmode file system using a argon2 key ... 176s tomb . Commanded to dig tomb 176s tomb (*) Creating a new tomb in test.tomb 176s tomb . Generating test.tomb of 20MiB 176s 20+0 records in 176s 20+0 records out 176s 20971520 bytes (21 MB, 20 MiB) copied, 0.0634217 s, 331 MB/s 176s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:18 test.tomb 176s tomb (*) Done digging test.tomb 176s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 176s tomb . tomb forge test.tomb.key 176s tomb . tomb lock test.tomb -k test.tomb.key 177s tomb . File is not yet a tomb: test.tomb 177s tomb . Valid tomb file found: test.tomb 177s tomb . Commanded to lock tomb test.tomb 177s tomb (*) Selected filesystem type btrfsmixedmode. 177s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 177s tomb . Fine, this tomb seems empty. 177s tomb . Key is valid. 177s tomb . Locking using cipher: aes-xts-plain64 177s tomb . A password is required to use key argon2-test.key 177s tomb . Unlocking KDF key protection (argon2) 177s tomb . Password OK. 177s tomb (*) Locking test.tomb with argon2-test.key 177s tomb . Formatting Luks mapped device. 184s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 184s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 184s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 184s tomb . Commanded to open tomb test.tomb 184s tomb . Valid tomb file found: test.tomb 184s tomb . Key is valid. 184s tomb . Mountpoint not specified, using default: /media/test 184s tomb (*) Opening test on /media/test 184s tomb . This tomb is a valid LUKS encrypted device. 184s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 184s tomb . A password is required to use key argon2-test.key 184s tomb . Unlocking KDF key protection (argon2) 185s tomb . Password OK. 187s tomb (*) Success unlocking tomb test 187s tomb . Filesystem detected: btrfs 187s tomb . Checking filesystem via /dev/loop0 187s Opening filesystem to check... 187s Checking filesystem on /dev/mapper/tomb.test.82cf7fd58a33160bc5a1f1521d8a4ebbf03468f996ad62c48065367ae8d72fd4.loop0 187s UUID: 374cd1ce-ab18-4fb8-bd6a-81e8b506bff6 187s found 36864 bytes used, no error found 187s total csum bytes: 0 187s total tree bytes: 36864 187s total fs tree bytes: 8192 187s total extent tree bytes: 4096 187s btree space waste bytes: 30304 187s file data blocks allocated: 0 187s referenced 0 187s [1/7] checking root items 187s [2/7] checking extents 187s [3/7] checking free space tree 187s [4/7] checking fs roots 187s [5/7] checking only csums items (without verifying data) 187s [6/7] checking root refs 187s [7/7] checking quota groups skipped (not enabled on this FS) 187s tomb (*) Success opening test.tomb on /media/test 187s ~~ Copying some data into the opened tomb ... 187s ~~ Opened tomb's content is ... 187s total 28 187s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 09:18 . 187s drwxr-xr-x 3 root root 4096 Jan 18 09:18 .. 187s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:18 .host 187s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:18 .last 187s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:18 .uid 187s -rw------- 1 ubuntu ubuntu 940 Jan 18 2025 argon2-test.key 187s -rw------- 1 ubuntu ubuntu 946 Jan 18 2025 pbkdf2-test.key 187s tomb . Closing tomb [test] mounted on /media/test 187s tomb (*) Tomb [test] closed: your bones will rest in peace. 187s autopkgtest [09:18:20]: test create-and-use-a-tomb-with-sudo: -----------------------] 188s create-and-use-a-tomb-with-sudo PASS 188s autopkgtest [09:18:21]: test create-and-use-a-tomb-with-sudo: - - - - - - - - - - results - - - - - - - - - - 188s autopkgtest [09:18:21]: test create-and-use-a-tomb-with-doas: preparing testbed 267s autopkgtest [09:19:40]: testbed dpkg architecture: s390x 267s autopkgtest [09:19:40]: testbed apt version: 2.9.18 267s autopkgtest [09:19:40]: @@@@@@@@@@@@@@@@@@@@ test bed setup 267s autopkgtest [09:19:40]: testbed release detected to be: plucky 268s autopkgtest [09:19:41]: updating testbed package index (apt update) 268s Get:1 http://ftpmaster.internal/ubuntu plucky-proposed InRelease [73.9 kB] 268s Hit:2 http://ftpmaster.internal/ubuntu plucky InRelease 268s Hit:3 http://ftpmaster.internal/ubuntu plucky-updates InRelease 269s Hit:4 http://ftpmaster.internal/ubuntu plucky-security InRelease 269s Get:5 http://ftpmaster.internal/ubuntu plucky-proposed/universe Sources [823 kB] 269s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/main Sources [156 kB] 269s Get:7 http://ftpmaster.internal/ubuntu plucky-proposed/restricted Sources [9708 B] 269s Get:8 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse Sources [14.6 kB] 269s Get:9 http://ftpmaster.internal/ubuntu plucky-proposed/main s390x Packages [266 kB] 269s Get:10 http://ftpmaster.internal/ubuntu plucky-proposed/restricted s390x Packages [756 B] 269s Get:11 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x Packages [900 kB] 269s Get:12 http://ftpmaster.internal/ubuntu plucky-proposed/multiverse s390x Packages [4668 B] 269s Fetched 2249 kB in 1s (2397 kB/s) 270s Reading package lists... 270s + lsb_release --codename --short 270s + RELEASE=plucky 270s + cat 270s + [ plucky != trusty ] 270s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y --allow-downgrades -o Dpkg::Options::=--force-confnew dist-upgrade 270s Reading package lists... 270s Building dependency tree... 270s Reading state information... 270s Calculating upgrade... 271s The following packages will be upgraded: 271s apport apport-core-dump-handler bash-completion gcc-14-base libatomic1 271s libgcc-s1 libstdc++6 python3-apport python3-certifi python3-chardet 271s python3-jwt python3-problem-report rng-tools-debian usb.ids 271s 14 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 271s Need to get 1842 kB of archives. 271s After this operation, 1024 B disk space will be freed. 271s Get:1 http://ftpmaster.internal/ubuntu plucky/main s390x python3-problem-report all 2.31.0-0ubuntu3 [25.3 kB] 271s Get:2 http://ftpmaster.internal/ubuntu plucky/main s390x python3-apport all 2.31.0-0ubuntu3 [93.1 kB] 271s Get:3 http://ftpmaster.internal/ubuntu plucky/main s390x apport-core-dump-handler all 2.31.0-0ubuntu3 [18.3 kB] 271s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x apport all 2.31.0-0ubuntu3 [83.0 kB] 271s Get:5 http://ftpmaster.internal/ubuntu plucky/universe s390x rng-tools-debian s390x 2.6 [44.6 kB] 271s Get:6 http://ftpmaster.internal/ubuntu plucky/main s390x libatomic1 s390x 14.2.0-13ubuntu1 [9422 B] 271s Get:7 http://ftpmaster.internal/ubuntu plucky/main s390x gcc-14-base s390x 14.2.0-13ubuntu1 [53.0 kB] 271s Get:8 http://ftpmaster.internal/ubuntu plucky/main s390x libstdc++6 s390x 14.2.0-13ubuntu1 [896 kB] 271s Get:9 http://ftpmaster.internal/ubuntu plucky/main s390x libgcc-s1 s390x 14.2.0-13ubuntu1 [35.9 kB] 271s Get:10 http://ftpmaster.internal/ubuntu plucky/main s390x bash-completion all 1:2.16.0-6 [214 kB] 271s Get:11 http://ftpmaster.internal/ubuntu plucky/main s390x usb.ids all 2025.01.14-1 [223 kB] 271s Get:12 http://ftpmaster.internal/ubuntu plucky/main s390x python3-certifi all 2024.12.14+ds-1 [9800 B] 271s Get:13 http://ftpmaster.internal/ubuntu plucky/main s390x python3-chardet all 5.2.0+dfsg-2 [116 kB] 271s Get:14 http://ftpmaster.internal/ubuntu plucky/main s390x python3-jwt all 2.10.1-2 [21.0 kB] 272s Fetched 1842 kB in 1s (2407 kB/s) 272s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 272s Preparing to unpack .../0-python3-problem-report_2.31.0-0ubuntu3_all.deb ... 272s Unpacking python3-problem-report (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 272s Preparing to unpack .../1-python3-apport_2.31.0-0ubuntu3_all.deb ... 272s Unpacking python3-apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 272s Preparing to unpack .../2-apport-core-dump-handler_2.31.0-0ubuntu3_all.deb ... 272s Unpacking apport-core-dump-handler (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 272s Preparing to unpack .../3-apport_2.31.0-0ubuntu3_all.deb ... 272s Unpacking apport (2.31.0-0ubuntu3) over (2.31.0-0ubuntu2) ... 272s Preparing to unpack .../4-rng-tools-debian_2.6_s390x.deb ... 272s Unpacking rng-tools-debian (2.6) over (2.5) ... 272s Preparing to unpack .../5-libatomic1_14.2.0-13ubuntu1_s390x.deb ... 272s Unpacking libatomic1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 272s Preparing to unpack .../6-gcc-14-base_14.2.0-13ubuntu1_s390x.deb ... 272s Unpacking gcc-14-base:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 272s Setting up gcc-14-base:s390x (14.2.0-13ubuntu1) ... 272s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 272s Preparing to unpack .../libstdc++6_14.2.0-13ubuntu1_s390x.deb ... 272s Unpacking libstdc++6:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 272s Setting up libstdc++6:s390x (14.2.0-13ubuntu1) ... 272s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 272s Preparing to unpack .../libgcc-s1_14.2.0-13ubuntu1_s390x.deb ... 272s Unpacking libgcc-s1:s390x (14.2.0-13ubuntu1) over (14.2.0-12ubuntu1) ... 272s Setting up libgcc-s1:s390x (14.2.0-13ubuntu1) ... 272s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55658 files and directories currently installed.) 272s Preparing to unpack .../bash-completion_1%3a2.16.0-6_all.deb ... 272s Unpacking bash-completion (1:2.16.0-6) over (1:2.16.0-3) ... 272s Preparing to unpack .../usb.ids_2025.01.14-1_all.deb ... 272s Unpacking usb.ids (2025.01.14-1) over (2024.12.04-1) ... 272s Preparing to unpack .../python3-certifi_2024.12.14+ds-1_all.deb ... 272s Unpacking python3-certifi (2024.12.14+ds-1) over (2024.8.30+dfsg-1) ... 272s Preparing to unpack .../python3-chardet_5.2.0+dfsg-2_all.deb ... 272s Unpacking python3-chardet (5.2.0+dfsg-2) over (5.2.0+dfsg-1) ... 272s Preparing to unpack .../python3-jwt_2.10.1-2_all.deb ... 272s Unpacking python3-jwt (2.10.1-2) over (2.7.0-1) ... 272s Setting up python3-jwt (2.10.1-2) ... 272s Setting up python3-problem-report (2.31.0-0ubuntu3) ... 272s Setting up python3-apport (2.31.0-0ubuntu3) ... 273s Setting up python3-chardet (5.2.0+dfsg-2) ... 273s Setting up python3-certifi (2024.12.14+ds-1) ... 273s Setting up bash-completion (1:2.16.0-6) ... 273s Setting up rng-tools-debian (2.6) ... 273s Setting up libatomic1:s390x (14.2.0-13ubuntu1) ... 273s Setting up usb.ids (2025.01.14-1) ... 273s Setting up apport-core-dump-handler (2.31.0-0ubuntu3) ... 274s Setting up apport (2.31.0-0ubuntu3) ... 275s apport-autoreport.service is a disabled or a static unit not running, not starting it. 275s Processing triggers for libc-bin (2.40-4ubuntu1) ... 275s Processing triggers for man-db (2.13.0-1) ... 276s + rm /etc/apt/preferences.d/force-downgrade-to-release.pref 276s + /usr/lib/apt/apt-helper analyze-pattern ?true 276s + DEBIAN_FRONTEND=noninteractive eatmydata apt-get -y purge --autoremove ?obsolete 276s Reading package lists... 276s Building dependency tree... 276s Reading state information... 276s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 276s + grep -q trusty /etc/lsb-release 276s + [ ! -d /usr/share/doc/unattended-upgrades ] 276s + [ ! -d /usr/share/doc/lxd ] 276s + [ ! -d /usr/share/doc/lxd-client ] 276s + [ ! -d /usr/share/doc/snapd ] 276s + type iptables 276s + cat 276s + chmod 755 /etc/rc.local 276s + . /etc/rc.local 276s + iptables -w -t mangle -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 276s + iptables -A OUTPUT -d 10.255.255.1/32 -p tcp -j DROP 276s + iptables -A OUTPUT -d 10.255.255.2/32 -p tcp -j DROP 276s + uname -m 276s + [ s390x = ppc64le ] 276s + [ -d /run/systemd/system ] 276s + systemd-detect-virt --quiet --vm 276s + mkdir -p /etc/systemd/system/systemd-random-seed.service.d/ 276s + cat 276s + grep -q lz4 /etc/initramfs-tools/initramfs.conf 276s + echo COMPRESS=lz4 276s + sync 276s autopkgtest [09:19:49]: upgrading testbed (apt dist-upgrade and autopurge) 276s Reading package lists... 276s Building dependency tree... 276s Reading state information... 276s Calculating upgrade...Starting pkgProblemResolver with broken count: 0 276s Starting 2 pkgProblemResolver with broken count: 0 276s Done 277s Entering ResolveByKeep 277s 277s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 277s Reading package lists... 277s Building dependency tree... 277s Reading state information... 277s Starting pkgProblemResolver with broken count: 0 277s Starting 2 pkgProblemResolver with broken count: 0 277s Done 277s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 278s autopkgtest [09:19:51]: rebooting testbed after setup commands that affected boot 299s Reading package lists... 300s Building dependency tree... 300s Reading state information... 300s Starting pkgProblemResolver with broken count: 0 300s Starting 2 pkgProblemResolver with broken count: 0 300s Done 300s The following NEW packages will be installed: 300s argon2 doas opendoas tomb zsh zsh-common 300s 0 upgraded, 6 newly installed, 0 to remove and 0 not upgraded. 300s Need to get 5241 kB of archives. 300s After this operation, 19.7 MB of additional disk space will be used. 300s Get:1 http://ftpmaster.internal/ubuntu plucky/universe s390x argon2 s390x 0~20190702+dfsg-4build1 [55.6 kB] 300s Get:2 http://ftpmaster.internal/ubuntu plucky/universe s390x opendoas s390x 6.8.2-1 [23.0 kB] 300s Get:3 http://ftpmaster.internal/ubuntu plucky/universe s390x doas s390x 6.8.2-1 [2772 B] 300s Get:4 http://ftpmaster.internal/ubuntu plucky/main s390x zsh-common all 5.9-6ubuntu3 [4170 kB] 301s Get:5 http://ftpmaster.internal/ubuntu plucky/main s390x zsh s390x 5.9-6ubuntu3 [911 kB] 301s Get:6 http://ftpmaster.internal/ubuntu plucky-proposed/universe s390x tomb s390x 2.11+dfsg-2 [79.7 kB] 301s Fetched 5241 kB in 1s (4235 kB/s) 301s Selecting previously unselected package argon2. 301s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 55655 files and directories currently installed.) 301s Preparing to unpack .../0-argon2_0~20190702+dfsg-4build1_s390x.deb ... 301s Unpacking argon2 (0~20190702+dfsg-4build1) ... 301s Selecting previously unselected package opendoas. 301s Preparing to unpack .../1-opendoas_6.8.2-1_s390x.deb ... 301s Unpacking opendoas (6.8.2-1) ... 302s Selecting previously unselected package doas. 302s Preparing to unpack .../2-doas_6.8.2-1_s390x.deb ... 302s Unpacking doas (6.8.2-1) ... 302s Selecting previously unselected package zsh-common. 302s Preparing to unpack .../3-zsh-common_5.9-6ubuntu3_all.deb ... 302s Unpacking zsh-common (5.9-6ubuntu3) ... 302s Selecting previously unselected package zsh. 302s Preparing to unpack .../4-zsh_5.9-6ubuntu3_s390x.deb ... 302s Unpacking zsh (5.9-6ubuntu3) ... 302s Selecting previously unselected package tomb. 302s Preparing to unpack .../5-tomb_2.11+dfsg-2_s390x.deb ... 302s Unpacking tomb (2.11+dfsg-2) ... 302s Setting up argon2 (0~20190702+dfsg-4build1) ... 302s Setting up zsh-common (5.9-6ubuntu3) ... 302s Setting up zsh (5.9-6ubuntu3) ... 302s Setting up opendoas (6.8.2-1) ... 302s Setting up tomb (2.11+dfsg-2) ... 302s Setting up doas (6.8.2-1) ... 302s Processing triggers for debianutils (5.21) ... 302s Processing triggers for man-db (2.13.0-1) ... 305s autopkgtest [09:20:18]: test create-and-use-a-tomb-with-doas: [----------------------- 305s ~~ Create a file to hold an encrypted file system ... 305s tomb . Commanded to dig tomb 305s tomb (*) Creating a new tomb in test.tomb 305s tomb . Generating test.tomb of 20MiB 305s 20+0 records in 305s 20+0 records out 305s 20971520 bytes (21 MB, 20 MiB) copied, 0.0669172 s, 313 MB/s 305s tomb (*) Done digging test.tomb 305s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 305s tomb . tomb forge test.tomb.key 305s tomb . tomb lock test.tomb -k test.tomb.key 305s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:21 test.tomb 305s ~~ Create a pbkdf2 key file ... 305s tomb . Commanded to forge key pbkdf2-test.key with cipher algorithm AES256 305s tomb . Using KDF to protect the key password (1 rounds) 305s tomb [W] This operation takes time. Keep using this computer on other tasks. 305s tomb [W] Once done you will be asked to choose a password for your tomb. 305s tomb [W] To make it faster you can move the mouse around. 305s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 305s 512+0 records in 305s 512+0 records out 305s 512 bytes copied, 0.000242352 s, 2.1 MB/s 305s tomb (*) Choose the password of your key: pbkdf2-test.key 305s tomb . (You can also change it later using 'tomb passwd'.) 305s tomb (*) Using KDF, iteration time: 1000000 305s tomb . generating salt 305s tomb . calculating iterations 306s tomb . encoding the password 308s tomb . Key is valid. 308s tomb . Done forging pbkdf2-test.key 308s tomb (*) Your key is ready: 308s -rw------- 1 ubuntu ubuntu 946 Jan 18 09:21 pbkdf2-test.key 308s ~~ Create an argon2 key file ... 308s tomb . Commanded to forge key argon2-test.key with cipher algorithm AES256 308s tomb . Using KDF to protect the key password (1 rounds) 308s tomb [W] This operation takes time. Keep using this computer on other tasks. 308s tomb [W] Once done you will be asked to choose a password for your tomb. 308s tomb [W] To make it faster you can move the mouse around. 308s tomb [W] If you are on a server, you can use an Entropy Generation Daemon. 308s 512+0 records in 308s 512+0 records out 308s 512 bytes copied, 0.000251531 s, 2.0 MB/s 308s tomb (*) Choose the password of your key: argon2-test.key 308s tomb . (You can also change it later using 'tomb passwd'.) 308s tomb (*) Using KDF Argon2 308s tomb . memory used: 2^18 308s tomb . kdf salt: ed3e1bda54e5c214c89c97af8cd0da51e736b379c71697bb3252d566e8498436 308s tomb . kdf iterations: 1 309s tomb . Key is valid. 309s tomb . Done forging argon2-test.key 309s tomb (*) Your key is ready: 309s -rw------- 1 ubuntu ubuntu 940 Jan 18 09:21 argon2-test.key 309s ~~ Cloak a key file ... 309s tomb . Key is valid. 309s tomb (*) Encoding key argon2-test.key using cipher /usr/share/doc/tomb/examples/cloak-ciphers/emoji 309s tomb (*) Tomb key encoded succesfully 309s ~~ Uncloak and verify a key file ... 309s tomb (*) Key succesfully uncloaked to uncloaked.key. 309s ~~ Testing ext4 file system using a pbkdf2 key ... 309s tomb . Commanded to dig tomb 309s tomb (*) Creating a new tomb in test.tomb 309s tomb . Generating test.tomb of 20MiB 309s 20+0 records in 309s 20+0 records out 309s 20971520 bytes (21 MB, 20 MiB) copied, 0.0657168 s, 319 MB/s 309s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:21 test.tomb 309s tomb (*) Done digging test.tomb 309s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 309s tomb . tomb forge test.tomb.key 309s tomb . tomb lock test.tomb -k test.tomb.key 309s tomb . File is not yet a tomb: test.tomb 309s tomb . Valid tomb file found: test.tomb 309s tomb . Commanded to lock tomb test.tomb 309s tomb (*) Selected filesystem type ext4. 309s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 309s tomb . Fine, this tomb seems empty. 309s tomb . Key is valid. 309s tomb . Locking using cipher: aes-xts-plain64 309s tomb . A password is required to use key pbkdf2-test.key 309s tomb . Unlocking KDF key protection (pbkdf2sha1) 311s tomb . Password OK. 311s tomb (*) Locking test.tomb with pbkdf2-test.key 311s tomb . Formatting Luks mapped device. 317s tomb . Formatting your Tomb with ext4 filesystem. 317s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 317s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 317s tomb . Commanded to open tomb test.tomb 317s tomb . Valid tomb file found: test.tomb 317s tomb . Key is valid. 317s tomb . Mountpoint not specified, using default: /media/test 317s tomb (*) Opening test on /media/test 317s tomb . This tomb is a valid LUKS encrypted device. 317s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 317s tomb . A password is required to use key pbkdf2-test.key 317s tomb . Unlocking KDF key protection (pbkdf2sha1) 319s tomb . Password OK. 321s tomb (*) Success unlocking tomb test 321s tomb . Filesystem detected: ext4 321s tomb . Checking filesystem via /dev/loop0 321s fsck from util-linux 2.40.2 321s test: clean, 12/4608 files, 1356/4608 blocks 321s tomb (*) Success opening test.tomb on /media/test 321s ~~ Copying some data into the opened tomb ... 321s ~~ Opened tomb's content is ... 321s total 44 321s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 09:22 . 321s drwxr-xr-x 3 root root 4096 Jan 18 09:22 .. 321s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:22 .host 321s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:22 .last 321s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:22 .uid 321s -rw------- 1 ubuntu ubuntu 940 Jan 18 09:21 argon2-test.key 321s drwx------ 2 ubuntu ubuntu 16384 Jan 18 09:21 lost+found 321s -rw------- 1 ubuntu ubuntu 946 Jan 18 09:21 pbkdf2-test.key 321s tomb . Closing tomb [test] mounted on /media/test 321s tomb (*) Tomb [test] closed: your bones will rest in peace. 321s ~~ Testing ext4 file system using a argon2 key ... 321s tomb . Commanded to dig tomb 321s tomb (*) Creating a new tomb in test.tomb 321s tomb . Generating test.tomb of 20MiB 321s 20+0 records in 321s 20+0 records out 321s 20971520 bytes (21 MB, 20 MiB) copied, 0.0586176 s, 358 MB/s 321s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:22 test.tomb 321s tomb (*) Done digging test.tomb 321s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 321s tomb . tomb forge test.tomb.key 321s tomb . tomb lock test.tomb -k test.tomb.key 321s tomb . File is not yet a tomb: test.tomb 321s tomb . Valid tomb file found: test.tomb 321s tomb . Commanded to lock tomb test.tomb 321s tomb (*) Selected filesystem type ext4. 321s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 321s tomb . Fine, this tomb seems empty. 321s tomb . Key is valid. 321s tomb . Locking using cipher: aes-xts-plain64 321s tomb . A password is required to use key argon2-test.key 321s tomb . Unlocking KDF key protection (argon2) 322s tomb . Password OK. 322s tomb (*) Locking test.tomb with argon2-test.key 322s tomb . Formatting Luks mapped device. 328s tomb . Formatting your Tomb with ext4 filesystem. 328s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 328s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 328s tomb . Commanded to open tomb test.tomb 328s tomb . Valid tomb file found: test.tomb 328s tomb . Key is valid. 328s tomb . Mountpoint not specified, using default: /media/test 328s tomb (*) Opening test on /media/test 328s tomb . This tomb is a valid LUKS encrypted device. 328s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 328s tomb . A password is required to use key argon2-test.key 328s tomb . Unlocking KDF key protection (argon2) 329s tomb . Password OK. 331s tomb (*) Success unlocking tomb test 331s tomb . Filesystem detected: ext4 331s tomb . Checking filesystem via /dev/loop0 331s fsck from util-linux 2.40.2 331s test: clean, 12/4608 files, 1356/4608 blocks 331s tomb (*) Success opening test.tomb on /media/test 331s ~~ Copying some data into the opened tomb ... 331s ~~ Opened tomb's content is ... 331s total 44 331s drwxr-xr-x 3 ubuntu ubuntu 4096 Jan 18 09:20 . 331s drwxr-xr-x 3 root root 4096 Jan 18 09:20 .. 331s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:20 .host 331s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:20 .last 331s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:20 .uid 331s -rw------- 1 ubuntu ubuntu 940 Jan 18 2025 argon2-test.key 331s drwx------ 2 ubuntu ubuntu 16384 Jan 18 09:20 lost+found 331s -rw------- 1 ubuntu ubuntu 946 Jan 18 2025 pbkdf2-test.key 331s tomb . Closing tomb [test] mounted on /media/test 331s tomb (*) Tomb [test] closed: your bones will rest in peace. 331s ~~ Testing btrfs file system using a pbkdf2 key ... 331s tomb . Commanded to dig tomb 331s tomb (*) Creating a new tomb in test.tomb 331s tomb . Generating test.tomb of 115MiB 332s 115+0 records in 332s 115+0 records out 332s 120586240 bytes (121 MB, 115 MiB) copied, 0.358388 s, 336 MB/s 332s -rw------- 1 ubuntu ubuntu 115M Jan 18 09:20 test.tomb 332s tomb (*) Done digging test.tomb 332s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 332s tomb . tomb forge test.tomb.key 332s tomb . tomb lock test.tomb -k test.tomb.key 332s tomb . File is not yet a tomb: test.tomb 332s tomb . Valid tomb file found: test.tomb 332s tomb . Commanded to lock tomb test.tomb 332s tomb (*) Selected filesystem type btrfs. 332s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 332s tomb . Fine, this tomb seems empty. 332s tomb . Key is valid. 332s tomb . Locking using cipher: aes-xts-plain64 332s tomb . A password is required to use key pbkdf2-test.key 332s tomb . Unlocking KDF key protection (pbkdf2sha1) 333s tomb . Password OK. 333s tomb (*) Locking test.tomb with pbkdf2-test.key 333s tomb . Formatting Luks mapped device. 340s tomb . Formatting your Tomb with btrfs filesystem. 340s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 340s tomb (*) Your tomb is ready in test.tomb and secured with key pbkdf2-test.key 340s tomb . Commanded to open tomb test.tomb 340s tomb . Valid tomb file found: test.tomb 340s tomb . Key is valid. 340s tomb . Mountpoint not specified, using default: /media/test 340s tomb (*) Opening test on /media/test 340s tomb . This tomb is a valid LUKS encrypted device. 340s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 340s tomb . A password is required to use key pbkdf2-test.key 340s tomb . Unlocking KDF key protection (pbkdf2sha1) 341s tomb . Password OK. 343s tomb (*) Success unlocking tomb test 343s tomb . Filesystem detected: btrfs 343s tomb . Checking filesystem via /dev/loop0 343s [1/7] checking root items 343s [2/7] checking extents 343s [3/7] checking free space tree 343s [4/7] checking fs roots 343s [5/7] checking only csums items (without verifying data) 343s [6/7] checking root refs 343s Opening filesystem to check... 343s Checking filesystem on /dev/mapper/tomb.test.82cf7fd58a33160bc5a1f1521d8a4ebbf03468f996ad62c48065367ae8d72fd4.loop0 343s UUID: 7b0e43e2-6d87-49dc-a66a-ae673fde3dcb 343s found 147456 bytes used, no error found 343s total csum bytes: 0 343s total tree bytes: 147456 343s total fs tree bytes: 32768 343s total extent tree bytes: 16384 343s btree space waste bytes: 140595 343s file data blocks allocated: 0 343s referenced 0 343s [7/7] checking quota groups skipped (not enabled on this FS) 344s ~~ Copying some data into the opened tomb ... 344s ~~ Opened tomb's content is ... 344s total 40 344s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 09:20 . 344s drwxr-xr-x 3 root root 4096 Jan 18 09:20 .. 344s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:20 .host 344s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:20 .last 344s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:20 .uid 344s -rw------- 1 ubuntu ubuntu 940 Jan 18 2025 argon2-test.key 344s -rw------- 1 ubuntu ubuntu 946 Jan 18 2025 pbkdf2-test.key 344s tomb (*) Success opening test.tomb on /media/test 344s tomb . Closing tomb [test] mounted on /media/test 344s tomb (*) Tomb [test] closed: your bones will rest in peace. 344s ~~ Testing btrfsmixedmode file system using a argon2 key ... 344s tomb . Commanded to dig tomb 344s tomb (*) Creating a new tomb in test.tomb 344s tomb . Generating test.tomb of 20MiB 344s 20+0 records in 344s 20+0 records out 344s 20971520 bytes (21 MB, 20 MiB) copied, 0.0640164 s, 328 MB/s 344s -rw------- 1 ubuntu ubuntu 20M Jan 18 09:20 test.tomb 344s tomb (*) Done digging test.tomb 344s tomb . Your tomb is not yet ready, you need to forge a key and lock it: 344s tomb . tomb forge test.tomb.key 344s tomb . tomb lock test.tomb -k test.tomb.key 344s tomb . File is not yet a tomb: test.tomb 344s tomb . Valid tomb file found: test.tomb 344s tomb . Commanded to lock tomb test.tomb 344s tomb (*) Selected filesystem type btrfsmixedmode. 344s tomb . Checking if the tomb is empty (we never step on somebody else's bones). 344s tomb . Fine, this tomb seems empty. 344s tomb . Key is valid. 344s tomb . Locking using cipher: aes-xts-plain64 344s tomb . A password is required to use key argon2-test.key 344s tomb . Unlocking KDF key protection (argon2) 344s tomb . Password OK. 344s tomb (*) Locking test.tomb with argon2-test.key 344s tomb . Formatting Luks mapped device. 351s tomb . Formatting your Tomb with btrfsmixedmode filesystem. 351s tomb . Done locking test using Luks dm-crypt aes-xts-plain64 351s tomb (*) Your tomb is ready in test.tomb and secured with key argon2-test.key 351s tomb . Commanded to open tomb test.tomb 351s tomb . Valid tomb file found: test.tomb 351s tomb . Key is valid. 351s tomb . Mountpoint not specified, using default: /media/test 351s tomb (*) Opening test on /media/test 351s tomb . This tomb is a valid LUKS encrypted device. 351s tomb . Cipher is "aes" mode "xts-plain64" hash "sha512" 351s tomb . A password is required to use key argon2-test.key 351s tomb . Unlocking KDF key protection (argon2) 352s tomb . Password OK. 354s tomb (*) Success unlocking tomb test 354s tomb . Filesystem detected: btrfs 354s tomb . Checking filesystem via /dev/loop0 354s [1/7] checking root items 354s [2/7] checking extents 354s [3/7] checking free space tree 354s [4/7] checking fs roots 354s [5/7] checking only csums items (without verifying data) 354s [6/7] checking root refs 354s [7/7] checking quota groups skipped (not enabled on this FS) 354s Opening filesystem to check... 354s Checking filesystem on /dev/mapper/tomb.test.82cf7fd58a33160bc5a1f1521d8a4ebbf03468f996ad62c48065367ae8d72fd4.loop0 354s UUID: 3149713c-232a-46cc-9c98-90810eaa3966 354s found 36864 bytes used, no error found 354s total csum bytes: 0 354s total tree bytes: 36864 354s total fs tree bytes: 8192 354s total extent tree bytes: 4096 354s btree space waste bytes: 30304 354s file data blocks allocated: 0 354s referenced 0 354s ~~ Copying some data into the opened tomb ... 354s ~~ Opened tomb's content is ... 354s total 28 354s drwxr-xr-x 1 ubuntu ubuntu 88 Jan 18 09:21 . 354s drwxr-xr-x 3 root root 4096 Jan 18 09:21 .. 354s -rw------- 1 ubuntu ubuntu 12 Jan 18 09:21 .host 354s -rw------- 1 ubuntu ubuntu 11 Jan 18 09:21 .last 354s -rw------- 1 ubuntu ubuntu 5 Jan 18 09:21 .uid 354s -rw------- 1 ubuntu ubuntu 940 Jan 18 2025 argon2-test.key 354s -rw------- 1 ubuntu ubuntu 946 Jan 18 2025 pbkdf2-test.key 354s tomb (*) Success opening test.tomb on /media/test 354s tomb . Closing tomb [test] mounted on /media/test 354s tomb (*) Tomb [test] closed: your bones will rest in peace. 354s autopkgtest [09:21:07]: test create-and-use-a-tomb-with-doas: -----------------------] 355s create-and-use-a-tomb-with-doas PASS 355s autopkgtest [09:21:08]: test create-and-use-a-tomb-with-doas: - - - - - - - - - - results - - - - - - - - - - 355s autopkgtest [09:21:08]: @@@@@@@@@@@@@@@@@@@@ summary 355s create-and-use-a-tomb-with-sudo PASS 355s create-and-use-a-tomb-with-doas PASS 360s nova [W] Using flock in prodstack6-s390x 360s flock: timeout while waiting to get lock 360s Creating nova instance adt-plucky-s390x-tomb-20250118-091513-juju-7f2275-prod-proposed-migration-environment-2-b894195d-ce60-48da-ab8c-80bc5b6f8a95 from image adt/ubuntu-plucky-s390x-server-20250117.img (UUID 77043c30-ce55-43c6-ae27-2590a56e9de9)... 360s nova [W] Timed out waiting for d32f5a6f-c5dd-41ce-8e0e-b51f4b928a95 to get deleted. 360s nova [W] Using flock in prodstack6-s390x 360s Creating nova instance adt-plucky-s390x-tomb-20250118-091513-juju-7f2275-prod-proposed-migration-environment-2-b894195d-ce60-48da-ab8c-80bc5b6f8a95 from image adt/ubuntu-plucky-s390x-server-20250117.img (UUID 77043c30-ce55-43c6-ae27-2590a56e9de9)... 360s nova [W] Timed out waiting for 7aa2a19e-278a-4f4c-8293-784bfd24417c to get deleted.