Bug #38
8.0 beta 8r5606 won't install
Description
Attempting to install 8r5606:
Enter full pathname of shell or RETURN for /bin/sh
[I do not know the "full pathname of shell" so I press RETURN]
init: can't exec /bin/sh for /etc/rc; No such file or directory
init: can't exec /rescue/sh for single user; No such file or directory
init: login_getclass: unknown class 'daemon'
The above loops.
History
#1
Updated by Christophe - about 9 years ago
I do have the same issue on :
4GB SD on motherboard for freenas system
2x [[WesternDigital]] Caviar Green 2TB
Zotac ITX ION G (atom + ion)
2G Ram
external USB CD drive
It used to work with 0.72 embedded
Note : I use an external USB drive and think this issue is also related to ticket #27.
#2 Updated by Anonymous about 9 years ago
- Status changed from Unscreened to Closed
external cdroms use /dev/cd0 instead of /dev/acd0. We search for both now.
#3
Updated by Kris Moore about 4 years ago
Commit: 0509369ee15fa01be3d38e89d472f2076c60327d
https://github.com/pcbsd/freebsd-ports/commit/0509369ee15fa01be3d38e89d472f2076c60327d
Author: Kris Moore <kris@pcbsd.org>
Date: 2015-09-26 (Sat, 26 Sep 2015)
Log Message:
-----------
Merge pull request #38 from Sp1l/master
Fix some more No-SSLv3 and SHA0 builds
#4
Updated by Kris Moore about 4 years ago
Commit: 57196ae56acfbb391c242623c512ed96a4adeb60
https://github.com/pcbsd/freebsd-ports/commit/57196ae56acfbb391c242623c512ed96a4adeb60
Author: ohauer <ohauer@FreeBSD.org>
Date: 2015-11-20 (Fri, 20 Nov 2015)
Log Message:
-----------
- update to version 7.00
Changelog:
Nmap 7.00 [2015-11-19]
o This is the most important release since Nmap 6.00 back in May 2012!
For a list of the most significant improvements and new features,
see the announcement at: https://nmap.org/7
o [NSE] Added 6 NSE scripts from 6 authors, bringing the total up to 515!
They are all listed at https://nmap.org/nsedoc/, and the summaries are below
(authors are listed in brackets):
+ targets-xml extracts target addresses from previous Nmap XML results files.
[Daniel Miller]
+ [GH#232] ssl-dh-params checks for problems with weak, non-safe, and
export-grade Diffie-Hellman parameters in TLS handshakes. This includes the
LOGJAM vulnerability (CVE-2015-4000). [Jacob Gajek]
+ nje-node-brute does brute-forcing of z/OS JES Network Job Entry node names.
[Soldier of Fortran]
+ ip-https-discover detectings support for Microsoft's IP over HTTPS
tunneling protocol. [Niklaus Schiess]
+ [GH#165] broadcast-sonicwall-discover detects and extracts information from
SonicWall firewalls. [Raphael Hoegger]
+ [GH#38] http-vuln-cve2014-8877 checks for and optionally exploits a
vulnerability in CM Download Manager plugin for Wordpress. [Mariusz Ziulek]
o [Ncat] [GH#151] [GH#142] New option --no-shutdown prevents Ncat from shutting
down when it reads EOF on stdin. This is the same as traditional netcat's
"-d" option. [Adam Saponara]
o [NSE] [GH#229] Improve parsing in http.lua for multiple Set-Cookie headers in
a single response. [nnposter]
#5
Updated by Kris Moore almost 4 years ago
Commit: 3bd19b1310a12a6bae51db5d7ca2d6a6ed1aed17
https://github.com/pcbsd/freebsd-ports/commit/3bd19b1310a12a6bae51db5d7ca2d6a6ed1aed17
Author: truckman <truckman@FreeBSD.org>
Date: 2016-02-03 (Wed, 03 Feb 2016)
Log Message:
-----------
Upgrade net/nmsg to 0.11.0:
nmsg (0.11.0)
[ Henry Stern ]- Add an interval randomization option that randomizes the initial offset
within the selected time interval. This functionality is exposed via the
libnmsg nmsg_io_set_interval_randomized() function and the nmsgtool -R /
--randomize command-line option (#27, #33).
- Make nmsgtool -k / --kicker work when combined with -c or -t, when
producing output in JSON format (#25, #38).
- Add nmsg_message_get_num_field_values(),
nmsg_message_get_num_field_values_by_idx() functions (#5, #40).
- Remove the unused enum nmsg_modtype from the internal libnmsg API (#30).
- Add a message filtering capability to the libnmsg I/O loop, including
external filter module plugin and nmsgtool support (#41, #43, #44).
- Add yajl/ prefix to #include's of yajl headers (#37)
Pet portlint
Sponsored by: Farsight Security, Inc.
#6
Updated by Kris Moore almost 4 years ago
Commit: 3bd19b1310a12a6bae51db5d7ca2d6a6ed1aed17
https://github.com/pcbsd/freebsd-ports/commit/3bd19b1310a12a6bae51db5d7ca2d6a6ed1aed17
Author: truckman <truckman@FreeBSD.org>
Date: 2016-02-03 (Wed, 03 Feb 2016)
Log Message:
-----------
Upgrade net/nmsg to 0.11.0:
nmsg (0.11.0)
[ Henry Stern ]- Add an interval randomization option that randomizes the initial offset
within the selected time interval. This functionality is exposed via the
libnmsg nmsg_io_set_interval_randomized() function and the nmsgtool -R /
--randomize command-line option (#27, #33).
- Make nmsgtool -k / --kicker work when combined with -c or -t, when
producing output in JSON format (#25, #38).
- Add nmsg_message_get_num_field_values(),
nmsg_message_get_num_field_values_by_idx() functions (#5, #40).
- Remove the unused enum nmsg_modtype from the internal libnmsg API (#30).
- Add a message filtering capability to the libnmsg I/O loop, including
external filter module plugin and nmsgtool support (#41, #43, #44).
- Add yajl/ prefix to #include's of yajl headers (#37)
Pet portlint
Sponsored by: Farsight Security, Inc.