Re: kern/172535: [modules] kldload+kldunload if_carp makes kldstat not working

2014-03-05 Thread c0re
The following reply was made to PR kern/172535; it has been noted by GNATS.

From: c0re 
To: bug-follo...@freebsd.org, - - 
Cc:  
Subject: Re: kern/172535: [modules] kldload+kldunload if_carp makes kldstat
 not working
Date: Wed, 5 Mar 2014 16:03:57 +0400

 --001a11c1f542bd063504f3dad0be
 Content-Type: text/plain; charset=ISO-8859-1
 
 With new CARP in 10.0-RELESE problem disappeared.
 
 --001a11c1f542bd063504f3dad0be
 Content-Type: text/html; charset=ISO-8859-1
 
 With new CARP in 10.0-RELESE problem disappeared.
 
 --001a11c1f542bd063504f3dad0be--
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/187283: Failed for rsplib-3.0.1 in build

2014-03-05 Thread Thomas Dreibholz

>Number: 187283
>Category:   misc
>Synopsis:   Failed for rsplib-3.0.1 in build
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 05 14:50:01 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Thomas Dreibholz
>Release:9.2-RELEASE-p12
>Organization:
Simula Research Laboratory
>Environment:
FreeBSD pcbsd 9.2-RELEASE-p12 FreeBSD 9.2-RELEASE-p12 #0: Thu Jan 16 21:12:30 
UTC 2014 r...@amd64-builder.pcbsd.org:/usr/obj/usr/src/sys/GENERIC  amd64

>Description:
rsplib-3.0.1 fails to build. The upstream version 3.0.2 fixes this problem.
>How-To-Repeat:

>Fix:
Use the upstream bugfix version 3.0.2 from the port net/rsplib.

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/187103: clang 3.4 miscompiles nsAppRunner.cpp from firefox firefox-27.0.1, 1 in i386

2014-03-05 Thread dim
Synopsis: clang 3.4 miscompiles nsAppRunner.cpp from firefox firefox-27.0.1,1 
in i386

State-Changed-From-To: open->patched
State-Changed-By: dim
State-Changed-When: Wed Mar 5 22:44:05 UTC 2014
State-Changed-Why: 
Upstream fixed the bug here:

  http://llvm.org/viewvc/llvm-project?rev=203007&view=rev

I imported the fix in head r262809, and will MFC it after a week.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187103
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/187103: commit references a PR

2014-03-05 Thread dfilter service
The following reply was made to PR bin/187103; it has been noted by GNATS.

From: dfil...@freebsd.org (dfilter service)
To: bug-follo...@freebsd.org
Cc:  
Subject: Re: bin/187103: commit references a PR
Date: Wed,  5 Mar 2014 22:43:43 + (UTC)

 Author: dim
 Date: Wed Mar  5 22:43:30 2014
 New Revision: 262809
 URL: http://svnweb.freebsd.org/changeset/base/262809
 
 Log:
   Pull in r203007 from upstream clang trunk:
   
 Don't produce an alias between destructors with different calling 
conventions.
   
 Fixes pr19007.
   
   (Please note that is an LLVM PR identifier, not a FreeBSD one.)
   
   This should fix Firefox and/or libxul crashes (due to problems with
   regparm/stdcall calling conventions) on i386.
   
   Reported by: multiple users on freebsd-current
   PR:  bin/187103
   MFC after:   1 week
 
 Modified:
   head/contrib/llvm/tools/clang/lib/CodeGen/CGCXX.cpp
 
 Modified: head/contrib/llvm/tools/clang/lib/CodeGen/CGCXX.cpp
 ==
 --- head/contrib/llvm/tools/clang/lib/CodeGen/CGCXX.cppWed Mar  5 
22:04:30 2014(r262808)
 +++ head/contrib/llvm/tools/clang/lib/CodeGen/CGCXX.cppWed Mar  5 
22:43:30 2014(r262809)
 @@ -92,7 +92,13 @@ bool CodeGenModule::TryEmitBaseDestructo
if (!ClassLayout.getBaseClassOffset(UniqueBase).isZero())
  return true;
  
 +  // Give up if the calling conventions don't match. We could update the call,
 +  // but it is probably not worth it.
const CXXDestructorDecl *BaseD = UniqueBase->getDestructor();
 +  if (BaseD->getType()->getAs()->getCallConv() !=
 +  D->getType()->getAs()->getCallConv())
 +return true;
 +
return TryEmitDefinitionAsAlias(GlobalDecl(D, Dtor_Base),
GlobalDecl(BaseD, Dtor_Base),
false);
 ___
 svn-src-...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/svn-src-all
 To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"
 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/187307: Security vulnerability with FreeBSD Jail

2014-03-05 Thread Nicola Galante

>Number: 187307
>Category:   misc
>Synopsis:   Security vulnerability with FreeBSD Jail
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 05 23:10:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Nicola Galante
>Release:10.0
>Organization:
Smithsonian Astrophysical Observatory
>Environment:
FreeBSD hostserver.localdomain 10.0-RELEASE FreeBSD 10.0-RELEASE #0 r260789: 
Thu Jan 16 22:34:59 UTC 2014 
r...@snap.freebsd.org:/usr/obj/usr/src/sys/GENERIC  amd64
>Description:
I found a potential vulnerability with FreeBSD jails. I installed a server 
(hostserver) for my institute. This hostserver has a certain IP address, let's 
say 10.0.0.100, and I installed and configured three service jails (elog, mail, 
www), each with a different IP address (10.0.0.101, 10.0.0.102, 10.0.0.103)

  root@hostserver:/jails/j # jls
   JID  IP Address  Hostname  Path
 1  10.0.0.101  elogjail  /jails/j/elog
 2  10.0.0.102  mailjail  /jails/j/mail
 3  10.0.0.103  wwwjail   /jails/j/www

I have an account on both the hostserver and the elogjail. Password 
authentication on hostserver and ssh key authentication in the jail. The 
service sshd is running on both the hostserver and elogjail. If I ssh into the 
elogjail

  [galante@caronte ~]$ ssh galante@elogjail
  Enter passphrase for key '/home/galante/.ssh/id_dsa':
  Last login: Wed Mar  5 21:37:23 2014 from caronte
  galante@elogjail:~ %

as expected. But if I turn off the sshd service in elogjail (and keep the 
elogjail up and running) and I try to connect to elogjail, I first get a 
complaint that the fingerprint for the RSA key sent by the remote host has 
changed. If I remove the corresponding line in my local .ssh/known_hosts file 
and try to reconnect, this is what happens:

  [galante@caronte ~]$ ssh galante@elogjail
  Password for galante@hostserver:
  Last login: Wed Mar  5 21:12:20 2014 from caronte
  galante@hostserver:~ %

I log into the host system! Of course this is possible because I have an 
account on both the host system and the jail. However, I believe that this can 
cause a serious potential security threat. I can envision several scenarios 
where somebody attempts to get into a jail and instead gets into the host 
system. I checked also the DNS responsiveness. The problem persists even if I 
use IP addresses instead of host names.
>How-To-Repeat:
Follow the steps described above. 
>Fix:
I don't know how to fix the problem other than by disabling sshd in the 
hostserver.

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/176051: [kernel] [patch] uipc: Simplify and correct debug printing of flags.

2014-03-05 Thread Christian Brueffer
On 3/4/14 8:29 AM, Christoph Mallon wrote:
> On 27.02.2014 11:02, bruef...@freebsd.org wrote:
>> The patch in the PR doesn't compile (latest HEAD).
> 
> 
> "doesn't compile" is not helpful feedback.
> Please state at least the error message.
> 

[...]
cc  -c -O2 -pipe -fno-strict-aliasing  -std=c99 -gdwarf-2 -Wall
-Wredundant-decls -Wnested-externs -Wstrict-prototypes
-Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual  -Wundef
-Wno-pointer-sign -fformat-extensions  -Wmissing-include-dirs
-fdiagnostics-show-option  -Wno-error-tautological-compare
-Wno-error-empty-body  -Wno-error-parentheses-equality
-Wno-unused-function   -nostdinc  -I. -I/usr/src/sys
-I/usr/src/sys/contrib/altq -I/usr/src/sys/contrib/libfdt -D_KERNEL
-DHAVE_KERNEL_OPTION_HEADERS -include opt_global.h
-fno-omit-frame-pointer -mno-omit-leaf-frame-pointer -mno-aes -mno-avx
-mcmodel=kernel -mno-red-zone -mno-mmx -mno-sse -msoft-float
-fno-asynchronous-unwind-tables -ffreestanding -fstack-protector -Werror
 /usr/src/sys/kern/uipc_debug.c
/usr/src/sys/kern/uipc_debug.c:87:2: error: adding 'int' to a string
does not append to the string [-Werror,-Wstring-plus-int]
PRINT_FLAG(so_options, SO_DEBUG);
^~~~
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
~~~^
/usr/src/sys/kern/uipc_debug.c:87:2: note: use array indexing to silence
this warning
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
   ^
/usr/src/sys/kern/uipc_debug.c:87:2: error: format string is not a
string literal (potentially insecure) [-Werror,-Wformat-security]
PRINT_FLAG(so_options, SO_DEBUG);
^~~~
/usr/src/sys/kern/uipc_debug.c:49:33: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
^~~~
/usr/src/sys/kern/uipc_debug.c:88:2: error: adding 'int' to a string
does not append to the string [-Werror,-Wstring-plus-int]
PRINT_FLAG(so_options, SO_ACCEPTCONN);
^
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
~~~^
/usr/src/sys/kern/uipc_debug.c:88:2: note: use array indexing to silence
this warning
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
   ^
/usr/src/sys/kern/uipc_debug.c:88:2: error: format string is not a
string literal (potentially insecure) [-Werror,-Wformat-security]
PRINT_FLAG(so_options, SO_ACCEPTCONN);
^
/usr/src/sys/kern/uipc_debug.c:49:33: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
^~~~
/usr/src/sys/kern/uipc_debug.c:89:2: error: adding 'int' to a string
does not append to the string [-Werror,-Wstring-plus-int]
PRINT_FLAG(so_options, SO_REUSEADDR);
^~~~
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
~~~^
/usr/src/sys/kern/uipc_debug.c:89:2: note: use array indexing to silence
this warning
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
   ^
/usr/src/sys/kern/uipc_debug.c:89:2: error: format string is not a
string literal (potentially insecure) [-Werror,-Wformat-security]
PRINT_FLAG(so_options, SO_REUSEADDR);
^~~~
/usr/src/sys/kern/uipc_debug.c:49:33: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
^~~~
/usr/src/sys/kern/uipc_debug.c:90:2: error: adding 'int' to a string
does not append to the string [-Werror,-Wstring-plus-int]
PRINT_FLAG(so_options, SO_KEEPALIVE);
^~~~
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_FLAG'
((var) & (flag) ? db_printf(", " #flag + sep), (void)(sep = 0) :
(void)0)
~~~^
/usr/src/sys/kern/uipc_debug.c:90:2: note: use array indexing to silence
this warning
/usr/src/sys/kern/uipc_debug.c:49:44: note: expanded from macro 'PRINT_F

Re: misc/187307: Security vulnerability with FreeBSD Jail

2014-03-05 Thread delphij
Synopsis: Security vulnerability with FreeBSD Jail

State-Changed-From-To: open->closed
State-Changed-By: delphij
State-Changed-When: Wed Mar 5 23:39:19 UTC 2014
State-Changed-Why: 
Not a bug, please see my reply on freebsd-security@.


Responsible-Changed-From-To: freebsd-bugs->delphij
Responsible-Changed-By: delphij
Responsible-Changed-When: Wed Mar 5 23:39:19 UTC 2014
Responsible-Changed-Why: 
Take just in case I was wrong.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187307
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: ports/187283: Failed for net/rsplib 3.0.1 in build

2014-03-05 Thread linimon
Old Synopsis: Failed for rsplib-3.0.1 in build
New Synopsis: Failed for net/rsplib 3.0.1 in build

Responsible-Changed-From-To: freebsd-bugs->freebsd-ports-bugs
Responsible-Changed-By: linimon
Responsible-Changed-When: Thu Mar 6 02:35:48 UTC 2014
Responsible-Changed-Why: 
ports PR.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187283
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/187309: databases/memcached: install error

2014-03-05 Thread Ross

>Number: 187309
>Category:   misc
>Synopsis:   databases/memcached: install error
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Mar 06 04:30:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Ross
>Release:10.0
>Organization:
>Environment:
FreeBSD ghost.arzinger.ua 10.0-RELEASE FreeBSD 10.0-RELEASE #0 r260789: Thu Jan 
16 22:34:59 UTC 2014 r...@snap.freebsd.org:/usr/obj/usr/src/sys/GENERIC  
amd64
>Description:
today's update give the following error (during install phase):

--->  Installing the new version via the port
===>  Staging for memcached-1.4.17_1
===>   memcached-1.4.17_1 depends on shared library: libevent-2.0.so - found
===>   Generating temporary packing list
/usr/bin/make  install-recursive
Making install in doc
/usr/bin/make  install-am
test -z "/usr/local/man/man1" || /bin/mkdir -p 
"/usr/ports/databases/memcached/work/stage/usr/local/man/man1"
 install  -o root -g wheel -m 444 memcached.1 
'/usr/ports/databases/memcached/work/stage/usr/local/man/man1'
test -z "/usr/local/bin" || /bin/mkdir -p 
"/usr/ports/databases/memcached/work/stage/usr/local/bin"
  install  -s -o root -g wheel -m 555 memcached 
'/usr/ports/databases/memcached/work/stage/usr/local/bin'
test -z "/usr/local/include/memcached" || /bin/mkdir -p 
"/usr/ports/databases/memcached/work/stage/usr/local/include/memcached"
 install  -o root -g wheel -m 444 protocol_binary.h 
'/usr/ports/databases/memcached/work/stage/usr/local/include/memcached'
install  -o root -g wheel -m 555 
/usr/ports/databases/memcached/work/memcached-1.4.17/scripts/memcached-tool 
/usr/ports/databases/memcached/work/stage/usr/local/bin
install  -o root -g wheel -m 444 
/usr/ports/databases/memcached/work/memcached-1.4.17/doc/ 
/usr/ports/databases/memcached/work/stage/usr/local/man/man1
install: /usr/ports/databases/memcached/work/memcached-1.4.17/doc/: 
Inappropriate file type or format
*** Error code 71

Stop.
make[2]: stopped in /usr/ports/databases/memcached
*** Error code 1

Stop.
make[1]: stopped in /usr/ports/databases/memcached
*** Error code 1

Stop.
make: stopped in /usr/ports/databases/memcached
>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/187310: [patch] pw command segfaults when the -V parameter is used on commands that alter groups

2014-03-05 Thread Kim Shrier

>Number: 187310
>Category:   bin
>Synopsis:   [patch] pw command segfaults when the -V parameter is used on 
>commands that alter groups
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Mar 06 05:50:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Kim Shrier
>Release:10.0 Release amd64
>Organization:
>Environment:
FreeBSD snorri.lab.westryn.net 10.0-RELEASE FreeBSD 10.0-RELEASE #1 r261308M: 
Sun Feb 23 18:45:19 MST 2014 
ca...@snorri.lab.westryn.net:/usr/obj/usr/src/sys/SNORRI_02  amd64
>Description:
When specifying an alternate location of the etc directory using the -V command 
line parameter to /usr/sbin/pw, the pw command segfaults when it does anything 
that updates groups
>How-To-Repeat:
Create a master.passwd and group file in a directory other than /etc.  For the 
sake of this description, I'll use /tmp/pw_problem/etc.

mkdir -p /tmp/pw_problem/etc
cd /tmp/pw_problem/etc

Create a master.passwd file in this directory that contains a line like:

bob:*:1001:1001::0:0:Robert:/home/bob:/bin/sh

Create a group file in this directory that contains a line like:

bob:*:1001:

Run pwd_mkdb.

pwd_mkdb -p -d /tmp/pw_problem/etc master.passwd

Now, try to delete the user with pw

pw -V /tmp/pw_problem/etc userdel bob
Segmentation fault (core dumped)

>Fix:
The problem is that the gr_mem member of the group struct is dereferenced 
without first checking to see if it is NULL.  This occurs in both 
/usr/src/usr.sbin/pw/pw_group.c and /usr/src/usr.sbin/pw/pw_user.c.

The reason this happens only when the -V parameter is used is because pw uses 
different routines based on whether or not the -V parameter is present.  When 
it isn't specified, it uses getgrent, getgrgid, and getgrnam from libc.  When 
-V is specified, it uses vgetgrent, vgetgrgid, and vgetgrnam which uses code 
from pw_vpw.c which is part of the source for pw.  These three routines call 
vnextgrent which eventually calls gr_scan from libutil.  Looking at the source 
in libutil, it is possible for the group structure returned by gr_scan to have 
a NULL gr_mem.  Other code in libutil deals with this possibility.  The pw code 
does not.

I am attaching a patch file that I made against head.

The rcsid for pw_group is:
static const char rcsid[] =
  "$FreeBSD: head/usr.sbin/pw/pw_group.c 244738 2012-12-27 14:44:13Z bapt $";

The rcsid for pw_user is:
static const char rcsid[] =
  "$FreeBSD: head/usr.sbin/pw/pw_user.c 252688 2013-07-04 07:59:11Z des $";


Patch attached with submission follows:

--- usr.sbin/pw/pw_group.c.orig 2014-03-05 21:12:10.0 -0700
+++ usr.sbin/pw/pw_group.c  2014-03-05 21:22:03.0 -0700
@@ -227,10 +227,12 @@
else if (arg->ch == 'm') {
int k = 0;
 
-   while (grp->gr_mem[k] != NULL) {
-   if (extendarray(&members, &grmembers, i + 2) != 
-1)
-   members[i++] = grp->gr_mem[k];
-   k++;
+   if (grp->gr_mem != NULL) {
+   while (grp->gr_mem[k] != NULL) {
+   if (extendarray(&members, &grmembers, i 
+ 2) != -1)
+   members[i++] = grp->gr_mem[k];
+   k++;
+   }
}
}
 
@@ -311,6 +313,9 @@
int k;
struct passwd *pwd;
 
+   if (grp->gr_mem == NULL)
+   return;
+
k = 0;
while (grp->gr_mem[k] != NULL) {
matchFound = false;
@@ -415,8 +420,10 @@
printf("Group Name: %-15s   #%lu\n"
   "   Members: ",
   grp->gr_name, (long) grp->gr_gid);
-   for (i = 0; grp->gr_mem[i]; i++)
-   printf("%s%s", i ? "," : "", grp->gr_mem[i]);
+   if (grp->gr_mem != NULL) {
+   for (i = 0; grp->gr_mem[i]; i++)
+   printf("%s%s", i ? "," : "", grp->gr_mem[i]);
+   }
fputs("\n\n", stdout);
}
return EXIT_SUCCESS;
--- usr.sbin/pw/pw_user.c.orig  2014-03-05 21:12:10.0 -0700
+++ usr.sbin/pw/pw_user.c   2014-03-05 21:21:43.0 -0700
@@ -425,19 +425,21 @@
}
 
grp = GETGRNAM(a_name->val);
-   if (grp != NULL && *grp->gr_mem == NULL)
+   if (grp != NULL && (grp->gr_mem == NULL || *grp->gr_mem 
== NULL))
delgrent(GETGRNAM(a_name->val));
SETGRENT();
while ((grp = GETGRENT()) != NULL) {
  

Re: ports/187309: databases/memcached: install error

2014-03-05 Thread linimon
Synopsis: databases/memcached: install error

Responsible-Changed-From-To: freebsd-bugs->freebsd-ports-bugs
Responsible-Changed-By: linimon
Responsible-Changed-When: Thu Mar 6 06:43:43 UTC 2014
Responsible-Changed-Why: 
ports PR.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187309
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"