You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
When filing a bug, please include the following headings if possible. Any
example text in this template can be deleted.
Overview of the Issue
I'm using Packer and the QEMU builder to build a VM image for Haiku. Packer seems to hang when running the provisioning step. It seems to hang when Packer is running the chmod command to make the provisioning script executable after it has copied the script to the VM. I can manually SSH into the VM at the point when Packer hangs. I can see that it has managed to copy the script to the VM, but it has not been able to make it executable.
I've configured the SSH server to LogLevel DEBUG3. This is the output from the SSH server in the VM after the step: ==> qemu.qemu: Pausing after run of step 'StepConnect'. Press enter to continue.:
AUTH 'sshd'[539]: debug1: fd 9 clearing O_NONBLOCK
AUTH 'sshd'[539]: debug1: Forked child 592.
AUTH 'sshd'[539]: debug3: send_rexec_state: entering fd = 12 config len 3384
AUTH 'sshd'[592]: debug1: rexec start in 9 out 9 newsock 9 pipe 11 sock 12/13
AUTH 'sshd'[539]: debug3: ssh_msg_send: type 0 len 5648
AUTH 'sshd'[539]: debug3: ssh_msg_send: done
AUTH 'sshd'[539]: debug3: send_rexec_state: done
AUTH 'sshd'[539]: debug1: fd 9 clearing O_NONBLOCK
AUTH 'sshd'[539]: debug1: Forked child 593.
AUTH 'sshd'[539]: debug3: send_rexec_state: entering fd = 13 config len 3384
AUTH 'sshd'[593]: debug1: rexec start in 9 out 9 newsock 9 pipe 12 sock 13/14
AUTH 'sshd'[539]: debug3: ssh_msg_send: type 0 len 5648
AUTH 'sshd'[539]: debug3: ssh_msg_send: done
AUTH 'sshd'[539]: debug3: send_rexec_state: done
AUTH 'sshd-session'[592]: debug1: network sockets: 4, 4
AUTH 'sshd-session'[592]: debug3: server_process_channel_timeouts: setting 0 timeouts
AUTH 'sshd-session'[592]: debug3: channel_clear_timeouts: clearing
AUTH 'sshd-session'[592]: Connection from 10.0.2.2 port 61905 on 10.0.2.15 port 22
AUTH 'sshd-session'[592]: debug1: Local version string SSH-2.0-OpenSSH_9.8
AUTH 'sshd-session'[592]: kex_exchange_identification: Connection closed by remote host
AUTH 'sshd-session'[592]: Connection closed by 10.0.2.2 port 61905
AUTH 'sshd'[539]: debug2: server_accept_loop: child 592 for connection from 10.0.2.15 to 10.0.2.2 received config
AUTH 'sshd'[539]: debug1: child_reap: preauth child 592 for connection from 10.0.2.15 to 10.0.2.2 exited with status 255
AUTH 'sshd'[539]: srclimit_penalise: ipv4: new 10.0.2.2/32 deferred penalty of 1 seconds for penalty: connections without attempting authentication
AUTH 'sshd'[539]: debug1: child_close: enter
AUTH 'sshd'[539]: debug2: server_accept_loop: child 593 for connection from 10.0.2.15 to 10.0.2.2 received config
AUTH 'sshd-session'[593]: debug1: network sockets: 4, 4
AUTH 'sshd-session'[593]: debug3: server_process_channel_timeouts: setting 0 timeouts
AUTH 'sshd-session'[593]: debug3: channel_clear_timeouts: clearing
AUTH 'sshd-session'[593]: Connection from 10.0.2.2 port 61906 on 10.0.2.15 port 22
AUTH 'sshd-session'[593]: debug1: Local version string SSH-2.0-OpenSSH_9.8
AUTH 'sshd-session'[593]: debug1: Remote protocol version 2.0, remote software version Go
AUTH 'sshd-session'[593]: debug1: compat_banner: no match: Go
AUTH 'sshd-session'[593]: debug2: fd 4 setting O_NONBLOCK
AUTH 'sshd-session'[593]: debug2: Network child is on pid 594
AUTH 'sshd-session'[593]: debug3: preauth child monitor started
AUTH 'sshd-session'[593]: debug3: privsep user:group 1000:102 [preauth]
AUTH 'sshd-session'[593]: debug1: permanently_set_uid: 1000/102 [preauth]
AUTH 'sshd-session'[593]: debug3: append_hostkey_type: ssh-rsa key not permitted by HostkeyAlgorithms [preauth]
AUTH 'sshd-session'[593]: debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 20 [preauth]
AUTH 'sshd-session'[593]: debug1: SSH2_MSG_KEXINIT sent [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 20 [preauth]
AUTH 'sshd-session'[593]: debug1: SSH2_MSG_KEXINIT received [preauth]
AUTH 'sshd-session'[593]: debug2: local server KEXINIT proposal [preauth]
AUTH 'sshd-session'[593]: debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-v00@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
AUTH 'sshd-session'[593]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
AUTH 'sshd-session'[593]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
AUTH 'sshd-session'[593]: debug2: compression ctos: none,zlib@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: compression stoc: none,zlib@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: languages ctos: [preauth]
AUTH 'sshd-session'[593]: debug2: languages stoc: [preauth]
AUTH 'sshd-session'[593]: debug2: first_kex_follows 0 [preauth]
AUTH 'sshd-session'[593]: debug2: reserved 0 [preauth]
AUTH 'sshd-session'[593]: debug2: peer client KEXINIT proposal [preauth]
AUTH 'sshd-session'[593]: debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c,kex-strict-c-v00@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: host key algorithms: rsa-sha2-256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512,ssh-rsa,ssh-dss,ssh-ed25519 [preauth]
AUTH 'sshd-session'[593]: debug2: ciphers ctos: aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr [preauth]
AUTH 'sshd-session'[593]: debug2: ciphers stoc: aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr [preauth]
AUTH 'sshd-session'[593]: debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [preauth]
AUTH 'sshd-session'[593]: debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96 [preauth]
AUTH 'sshd-session'[593]: debug2: compression ctos: none [preauth]
AUTH 'sshd-session'[593]: debug2: compression stoc: none [preauth]
AUTH 'sshd-session'[593]: debug2: languages ctos: [preauth]
AUTH 'sshd-session'[593]: debug2: languages stoc: [preauth]
AUTH 'sshd-session'[593]: debug2: first_kex_follows 0 [preauth]
AUTH 'sshd-session'[593]: debug2: reserved 0 [preauth]
AUTH 'sshd-session'[593]: debug3: kex_choose_conf: will use strict KEX ordering [preauth]
AUTH 'sshd-session'[593]: debug1: kex: algorithm: curve25519-sha256 [preauth]
AUTH 'sshd-session'[593]: debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
AUTH 'sshd-session'[593]: debug1: kex: client->server cipher: aes128-gcm@openssh.com MAC: <implicit> compression: none [preauth]
AUTH 'sshd-session'[593]: debug1: kex: server->client cipher: aes128-gcm@openssh.com MAC: <implicit> compression: none [preauth]
AUTH 'sshd-session'[593]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 30 [preauth]
AUTH 'sshd-session'[593]: debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]
AUTH 'sshd-session'[593]: debug3: mm_sshkey_sign: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 6 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive_expect: entering, type 7 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering
AUTH 'sshd-session'[593]: debug3: monitor_read: checking request 6
AUTH 'sshd-session'[593]: debug3: mm_answer_sign: entering
AUTH 'sshd-session'[593]: debug3: mm_answer_sign: ecdsa-sha2-nistp256 KEX signature len=101
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 7
AUTH 'sshd-session'[593]: debug2: monitor_read: 6 used once, disabling now
AUTH 'sshd-session'[593]: debug3: send packet: type 31 [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 21 [preauth]
AUTH 'sshd-session'[593]: debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 [preauth]
AUTH 'sshd-session'[593]: debug2: ssh_set_newkeys: mode 1 [preauth]
AUTH 'sshd-session'[593]: debug1: rekey out after 4294967296 blocks [preauth]
AUTH 'sshd-session'[593]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
AUTH 'sshd-session'[593]: debug1: Sending SSH2_MSG_EXT_INFO [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 7 [preauth]
AUTH 'sshd-session'[593]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 21 [preauth]
AUTH 'sshd-session'[593]: debug1: ssh_packet_read_poll2: resetting read seqnr 3 [preauth]
AUTH 'sshd-session'[593]: debug1: SSH2_MSG_NEWKEYS received [preauth]
AUTH 'sshd-session'[593]: debug2: ssh_set_newkeys: mode 0 [preauth]
AUTH 'sshd-session'[593]: debug1: rekey in after 4294967296 blocks [preauth]
AUTH 'sshd-session'[593]: debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-v00@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
AUTH 'sshd-session'[593]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
AUTH 'sshd-session'[593]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
AUTH 'sshd-session'[593]: debug2: compression ctos: none,zlib@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: compression stoc: none,zlib@openssh.com [preauth]
AUTH 'sshd-session'[593]: debug2: languages ctos: [preauth]
AUTH 'sshd-session'[593]: debug2: languages stoc: [preauth]
AUTH 'sshd-session'[593]: debug2: first_kex_follows 0 [preauth]
AUTH 'sshd-session'[593]: debug2: reserved 0 [preauth]
AUTH 'sshd-session'[593]: debug1: KEX done [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 5 [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 6 [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 50 [preauth]
AUTH 'sshd-session'[593]: debug1: userauth-request for user user service ssh-connection method none [preauth]
AUTH 'sshd-session'[593]: debug1: attempt 0 failures 0 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_getpwnamallow: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 8 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive_expect: entering, type 9 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering
AUTH 'sshd-session'[593]: debug3: monitor_read: checking request 8
AUTH 'sshd-session'[593]: debug3: mm_answer_pwnamallow: entering
AUTH 'sshd-session'[593]: debug2: parse_server_config_depth: config reprocess config len 3384
AUTH 'sshd-session'[593]: debug3: auth_shadow_acctexpired: today 20141 sp_expire -1 days left -20142
AUTH 'sshd-session'[593]: debug3: account expiration disabled
AUTH 'sshd-session'[593]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 9
AUTH 'sshd-session'[593]: debug2: monitor_read: 8 used once, disabling now
AUTH 'sshd-session'[593]: debug3: server_process_channel_timeouts: setting 0 timeouts [preauth]
AUTH 'sshd-session'[593]: debug3: channel_clear_timeouts: clearing [preauth]
AUTH 'sshd-session'[593]: debug2: input_userauth_request: setting up authctxt for user [preauth]
AUTH 'sshd-session'[593]: debug3: mm_inform_authserv: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 4 [preauth]
AUTH 'sshd-session'[593]: debug2: input_userauth_request: try method none [preauth]
AUTH 'sshd-session'[593]: debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 51 [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 50 [preauth]
AUTH 'sshd-session'[593]: debug1: userauth-request for user user service ssh-connection method publickey [preauth]
AUTH 'sshd-session'[593]: debug1: attempt 1 failures 0 [preauth]
AUTH 'sshd-session'[593]: debug2: input_userauth_request: try method publickey [preauth]
AUTH 'sshd-session'[593]: debug2: userauth_pubkey: valid user user querying public key rsa-sha2-256 AAAAB3NzaC1yc2EAAAADAQABAAACAQDJX2ZQ6F8DtEhAZerAKWF8Vo+1yIP+oEXGRr6IiYU6Dnjmrtc4TOQu4QIR7kSXgEvVtZPSDmWLCeQsytjbokbaYpclNBJ5atPMmWXd13LobUzZHx+kS24nW0TKbLDpImCj8Bmovwgpo2vpfnJyWYz3VLXEdmySW/R1MPm07HB/8CJJUXaha3o0a83fTSc1YDjJj3PDIILE8G0emnhxyxYoMPt+0TswRchs2AC2bVQdEG7hrvmkCe74OHd2FIP/3TDH4OVYfplVxcoRDa/y36WkmXWz/lLROOrjtwXEML2XZDdsGX8B2dcR6ZtoRTJQ02Gj5l0COBP40FhsbDmApsfKAo4hNwqONGVvTiNe1tulBPxDFXWbKKnPCl6/4hLfbfosMLqgBsQ7N/
AUTH 'sshd-session'[593]: debug1: userauth_pubkey: publickey test pkalg rsa-sha2-256 pkblob RSA SHA256:xQiotayM91VPR5nz0J+bOC+83570f+3SHCQbkx3bAYE [preauth]
AUTH 'sshd-session'[593]: debug3: mm_key_allowed: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 22 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive_expect: entering, type 23 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering
AUTH 'sshd-session'[593]: debug3: monitor_read: checking request 4
AUTH 'sshd-session'[593]: debug3: mm_answer_authserv: service=ssh-connection, style=
AUTH 'sshd-session'[593]: debug2: monitor_read: 4 used once, disabling now
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering
AUTH 'sshd-session'[593]: debug3: monitor_read: checking request 22
AUTH 'sshd-session'[593]: debug3: mm_answer_keyallowed: entering
AUTH 'sshd-session'[593]: debug1: temporarily_use_uid: 0/0 (e=0/0)
AUTH 'sshd-session'[593]: debug1: trying public key file /boot/home/config/settings/ssh/authorized_keys
AUTH 'sshd-session'[593]: debug1: Could not open user 'user' authorized keys '/boot/home/config/settings/ssh/authorized_keys': No such file or directory
AUTH 'sshd-session'[593]: debug1: restore_uid: 0/0
AUTH 'sshd-session'[593]: debug3: mm_answer_keyallowed: publickey authentication test: RSA key is not allowed
AUTH 'sshd-session'[593]: Failed publickey for user from 10.0.2.2 port 61906 ssh2: RSA SHA256:xQiotayM91VPR5nz0J+bOC+83570f+3SHCQbkx3bAYE
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 23
AUTH 'sshd-session'[593]: debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-256 [preauth]
AUTH 'sshd-session'[593]: debug3: user_specific_delay: user specific delay 0.000ms [preauth]
AUTH 'sshd-session'[593]: debug3: ensure_minimum_time_since: elapsed 4.018ms, delaying 2.223ms (requested 6.241ms) [preauth]
AUTH 'sshd-session'[593]: debug3: userauth_finish: failure partial=0 next methods="publickey,password,keyboard-interactive" [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 51 [preauth]
AUTH 'sshd-session'[593]: debug3: receive packet: type 50 [preauth]
AUTH 'sshd-session'[593]: debug1: userauth-request for user user service ssh-connection method password [preauth]
AUTH 'sshd-session'[593]: debug1: attempt 2 failures 1 [preauth]
AUTH 'sshd-session'[593]: debug2: input_userauth_request: try method password [preauth]
AUTH 'sshd-session'[593]: debug3: mm_auth_password: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 12 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive_expect: entering, type 13 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering
AUTH 'sshd-session'[593]: debug3: monitor_read: checking request 12
AUTH 'sshd-session'[593]: debug3: auth_shadow_pwexpired: today 20141 sp_lstchg 1740209571 sp_max -1
AUTH 'sshd-session'[593]: debug3: password expiration disabled
AUTH 'sshd-session'[593]: debug3: mm_answer_authpassword: sending result 1
Last message repeated 1 time
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 13
AUTH 'sshd-session'[593]: Accepted password for user from 10.0.2.2 port 61906 ssh2
AUTH 'sshd-session'[593]: debug1: monitor_child_preauth: user user authenticated by privileged process
AUTH 'sshd-session'[593]: debug3: mm_get_keystate: Waiting for new keys
AUTH 'sshd-session'[593]: debug3: mm_request_receive_expect: entering, type 26
AUTH 'sshd-session'[593]: debug3: mm_request_receive: entering
AUTH 'sshd-session'[593]: debug3: mm_get_keystate: GOT new keys
AUTH 'sshd-session'[593]: debug3: mm_auth_password: user authenticated [preauth]
AUTH 'sshd-session'[593]: debug3: user_specific_delay: user specific delay 0.000ms [preauth]
AUTH 'sshd-session'[593]: debug3: ensure_minimum_time_since: elapsed 176.243ms, delaying 23.472ms (requested 6.241ms) [preauth]
AUTH 'sshd-session'[593]: debug3: send packet: type 52 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_request_send: entering, type 26 [preauth]
AUTH 'sshd-session'[593]: debug3: mm_send_keystate: Finished sending state [preauth]
AUTH 'sshd-session'[593]: debug1: monitor_read_log: child log fd closed
AUTH 'sshd'[539]: debug2: server_accept_loop: child 593 for connection from 10.0.2.15 to 10.0.2.2 auth done
AUTH 'sshd'[539]: debug1: child_close: enter (forcing)
AUTH 'sshd-session'[593]: User child is on pid 595
AUTH 'sshd-session'[595]: debug1: permanently_set_uid: 0/0
AUTH 'sshd-session'[595]: debug3: monitor_apply_keystate: packet_set_state
AUTH 'sshd-session'[595]: debug2: ssh_set_newkeys: mode 0
AUTH 'sshd-session'[595]: debug1: rekey in after 4294967296 blocks
AUTH 'sshd-session'[595]: debug2: ssh_set_newkeys: mode 1
AUTH 'sshd-session'[595]: debug1: rekey out after 4294967296 blocks
AUTH 'sshd-session'[595]: debug1: ssh_packet_set_postauth: called
AUTH 'sshd-session'[595]: debug3: ssh_packet_set_state: done
AUTH 'sshd-session'[595]: debug3: notify_hostkeys: key 0: ssh-rsa SHA256:PaI+e/nP7gK2PozkRIrVP2aB4voAzjhaVXtrYDvcJK0
AUTH 'sshd-session'[595]: debug3: notify_hostkeys: key 1: ecdsa-sha2-nistp256 SHA256:NAoBYh690Jc05dsx6kgrJkhZlJiUxaNGvWnR9Uwke74
AUTH 'sshd-session'[595]: debug3: notify_hostkeys: key 2: ssh-ed25519 SHA256:vXIxPoCOWJ0+slU/L2Gm+y+HcHySkQGpHw5bbn3/lH4
AUTH 'sshd-session'[595]: debug3: notify_hostkeys: sent 3 hostkeys
AUTH 'sshd-session'[595]: debug3: send packet: type 80
AUTH 'sshd-session'[595]: debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
AUTH 'sshd-session'[595]: debug1: Entering interactive session for SSH2.
AUTH 'sshd-session'[595]: debug1: server_init_dispatch
AUTH 'sshd-session'[595]: debug3: receive packet: type 90
AUTH 'sshd-session'[595]: debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768
AUTH 'sshd-session'[595]: debug1: input_session_request
AUTH 'sshd-session'[595]: debug1: channel 0: new session [server-session] (inactive timeout: 0)
AUTH 'sshd-session'[595]: debug2: session_new: allocate (allocated 0 max 10)
AUTH 'sshd-session'[595]: debug3: session_unused: session id 0 unused
AUTH 'sshd-session'[595]: debug1: session_new: session 0
AUTH 'sshd-session'[595]: debug1: session_open: channel 0
AUTH 'sshd-session'[595]: debug1: session_open: session 0: link with channel 0
AUTH 'sshd-session'[595]: debug1: server_input_channel_open: confirm session
AUTH 'sshd-session'[595]: debug3: send packet: type 91
AUTH 'sshd-session'[595]: debug3: receive packet: type 98
AUTH 'sshd-session'[595]: debug1: server_input_channel_req: channel 0 request auth-agent-req@openssh.com reply 1
AUTH 'sshd-session'[595]: debug1: session_by_channel: session 0 channel 0
AUTH 'sshd-session'[595]: debug1: session_input_channel_req: session 0 req auth-agent-req@openssh.com
AUTH 'sshd-session'[595]: debug1: temporarily_use_uid: 0/0 (e=0/0)
AUTH 'sshd-session'[595]: debug1: restore_uid: 0/0
AUTH 'sshd-session'[595]: debug2: fd 6 setting O_NONBLOCK
AUTH 'sshd-session'[595]: debug3: fd 6 is O_NONBLOCK
AUTH 'sshd-session'[595]: debug1: channel 1: new auth-listener [auth socket] (inactive timeout: 0)
AUTH 'sshd-session'[595]: debug3: send packet: type 99
AUTH 'sshd-session'[595]: debug3: receive packet: type 97
AUTH 'sshd-session'[595]: debug2: channel 0: rcvd close
AUTH 'sshd-session'[595]: debug2: channel 0: output open -> closed
AUTH 'sshd-session'[595]: debug2: channel 0: input open -> closed
AUTH 'sshd-session'[595]: debug2: channel 0: almost dead
AUTH 'sshd-session'[595]: debug2: channel 0: gc: notify user
AUTH 'sshd-session'[595]: debug1: session_by_channel: session 0 channel 0
AUTH 'sshd-session'[595]: debug1: session_close_by_channel: channel 0 child 0
AUTH 'sshd-session'[595]: Close session: user user from 10.0.2.2 port 61906 id 0
AUTH 'sshd-session'[595]: debug3: session_unused: session id 0 unused
AUTH 'sshd-session'[595]: debug2: channel 0: gc: user detached
AUTH 'sshd-session'[595]: debug2: channel 0: send close
AUTH 'sshd-session'[595]: debug3: send packet: type 97
AUTH 'sshd-session'[595]: debug2: channel 0: is dead
AUTH 'sshd-session'[595]: debug2: channel 0: garbage collecting
AUTH 'sshd-session'[595]: debug1: channel 0: free: server-session, nchannels 2
AUTH 'sshd-session'[595]: debug3: channel 0: status: The following connections are open:\r\n #0 server-session (t10 [session] r0 i3/0 o3/0 e[closed]/0 fd -1/-1/-1 sock -1 cc -1 io 0x00/0x00)\r\n
This is the output from the SSH server in the VM for the next command Packer is performing:
Community Note
When filing a bug, please include the following headings if possible. Any
example text in this template can be deleted.
Overview of the Issue
I'm using Packer and the QEMU builder to build a VM image for Haiku. Packer seems to hang when running the provisioning step. It seems to hang when Packer is running the
chmod
command to make the provisioning script executable after it has copied the script to the VM. I can manually SSH into the VM at the point when Packer hangs. I can see that it has managed to copy the script to the VM, but it has not been able to make it executable.I've configured the SSH server to
LogLevel DEBUG3
. This is the output from the SSH server in the VM after the step:==> qemu.qemu: Pausing after run of step 'StepConnect'. Press enter to continue.
:This is the output from the SSH server in the VM for the next command Packer is performing:
After that the
keepalive@packer.io
messages continue and nothing else happens.Reproduction Steps
https://github.com/cross-platform-actions/haiku-builder
repository05c79a3923a8eb678f6cf8300ba63bfc0f8f6fed
commitPacker version
Packer v1.12.0
Simplified Packer Template
https://github.com/cross-platform-actions/haiku-builder/blob/05c79a3923a8eb678f6cf8300ba63bfc0f8f6fed/main.pkr.hcl
Operating system and Environment details
Host information
Guest information
Operation system: Haiku
Version: r1beta5
Architecture: x86-64
ISO URL: http://mirror.rit.edu/haiku/r1beta5/haiku-r1beta5-x86_64-anyboot.iso
Log Fragments and crash.log files
This is the last few lines of the output of Packer before it hangs:
After the above last line there is no more output from Packer.
The text was updated successfully, but these errors were encountered: