GNU gdb (GDB) 7.6.1 [GDB v7.6.1 for FreeBSD] Copyright (C) 2013 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-portbld-freebsd10.0". For bug reporting instructions, please see: ... Reading symbols from /usr/local/sbin/pkg...done. [New process 100155] [New Thread 803c06400 (LWP 100155)] Core was generated by `pkg'. Program terminated with signal 11, Segmentation fault. #0 0x0000000800aece91 in pkg_fetch_file_to_fd (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=3, t=0x7fffffffcfe8) at fetch.c:533 (gdb) tv  bat   bt all   full #0 0x0000000800aece91 in pkg_fetch_file_to_fd (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=3, t=0x7fffffffcfe8) at fetch.c:533 remote = 0x802d8ed70 u = 0x803c3e280 st = {size = 430911, atime = 1385176515, mtime = 1385176515} done = 0 r = 140737488343056 max_retry = 3 retry = 3 fetch_timeout = 30 begin_dl = 1385241241 now = 1385241241 last = 0 buf = '\000' ... doc = 0x803c16240 "/freebsd/vuln.xml.bz2" docpath = '\000' retcode = 0 zone = '\000' srv_current = 0x0 http_current = 0x0 sz = 430911 pkg_url_scheme = false #1 0x0000000800aec60f in pkg_fetch_file (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=0x7fffffffd100 "/tmp/vuln.xml.bz2", t=1385176515) at fetch.c:95 fd = 3 retcode = 3 #2 0x0000000000409248 in fetch_and_extract ( src=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=0x7fffffffd5a0 "/var/db/pkg/vuln.xml", xml=true) at audit.c:160 a = 0x0 ae = 0x0 fd = -1 tmp = "/tmp/vuln.xml.bz2", '\000' , "\377\177\000\000\036", '\000' , " \000\000\000\000\000\000\000\320\323\377\377\377\177\000\000P\321\377\377\377\177\000\000\000\000\000\000\000\000\000\000\262\tE\000\000\000\000\000\t\000\000\000\000\000\000\000\340\321\377\377\377\177\000\000\204\210f\000\b", '\000' , "w6@\000\000\000\000\000\006\002y\005\000\000\000\000\371,X\276\377\177\000\000\060\324g\000\b\000\000\000\001\000\000\000\b\000\000\000\000\\h\000\b\000\000\000\200;\240\002\b\000\000\000H\324\377\377\377\177\000\000\000\340g\000\b\000\000\000\310\323\377\377\377\177\000\000"... tmpdir = 0x450be2 "/tmp" retcode = 3 ret = 63083520 t = 0 st = {st_dev = 6801536, st_ino = 0, st_mode = 4160, st_nlink = 962, st_uid = 8, st_gid = 24, st_rdev = 48, st_atim = { tv_sec = 140737488344400, tv_nsec = 140737488343840}, st_mtim = { tv_sec = 140733193388032, tv_nsec = 47778576}, st_ctim = { tv_sec = 34403789752, tv_nsec = 140737488343304}, st_size = 34370941784, st_blocks = 0, st_blksize = 0, st_flags = 8, st_gen = 4294955488, st_lspare = 32767, st_birthtim = { tv_sec = 34366453837, tv_nsec = 18}} #3 0x0000000000408c1f in exec_audit (argc=0, argv=0x7fffffffdbe8) at audit.c:885 h = 0x0 cooked_audit_entries = 0x0 db = 0x0 it = 0x0 pkg = 0x0 db_dir = 0x803c21040 "/var/db/pkg" name = 0x8080808080808080
version = 0x0 audit_file = "/var/db/pkg/vuln.xml", '\000' , "@\326\377\377\377\177\000\000\366n\262\002\b\000\000\000\022\000\000\000\000\000\000\001\200 \302\003\b\000\000\000\001\000\000\000\021\000\000\000S\254\303\000\b\000\000\000\000\224\302\003\b\000\000\000\270\326\377\377\377\177", '\000' , " \312g\000\b\000\000\000\020\330\377\377\377\177\000\000\240\326\377\377\377\177\000\000\204\210f\000\b\000\000\000\230\331\377\377\377\177\000\000\253=@\000\000\000\000\000\060J\271\n\000\000\000\000\314?\f\257\b\000\000\000\060\324g\000\b\000\000\000\001\000\000\000\b\000\000\000\000\\h\000\b\000\000\000\000"... vuln = 0 fetch = true xml = true ch = -1 ret = 0 res = 8 portaudit_site = 0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2" #4 0x0000000000412d24 in main (argc=2, argv=0x7fffffffdbd8) at main.c:747 i = 2 command = 0x661f30 ambiguous = 0 chroot_path = 0x0 jid = 32767 jail_str = 0x0 len = 5 ch = -1 '\377' debug = 0 version = 0 ret = 0 plugins_enabled = true plugin_found = false show_commands = false activation_test = false c = 0x8006630bd conffile = 0x0 reposdir = 0x0 alias = 0x0 alias_value = 0x0 newargv = 0x7fffffffdbd8 newargc = 2 t = 0x0 newcmd = 0x0 j = 0 cmdargc = 3 (gdb) #0 0x0000000800aece91 in pkg_fetch_file_to_fd (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=3, t=0x7fffffffcfe8) at fetch.c:533 remote = 0x802d8ed70 u = 0x803c3e280 st = {size = 430911, atime = 1385176515, mtime = 1385176515} done = 0 r = 140737488343056 max_retry = 3 retry = 3 fetch_timeout = 30 begin_dl = 1385241241 now = 1385241241 last = 0 buf = '\000' ... doc = 0x803c16240 "/freebsd/vuln.xml.bz2" docpath = '\000' retcode = 0 zone = '\000' srv_current = 0x0 http_current = 0x0 sz = 430911 pkg_url_scheme = false #1 0x0000000800aec60f in pkg_fetch_file (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=0x7fffffffd100 "/tmp/vuln.xml.bz2", t=1385176515) at fetch.c:95 fd = 3 retcode = 3 #2 0x0000000000409248 in fetch_and_extract ( src=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=0x7fffffffd5a0 "/var/db/pkg/vuln.xml", xml=true) at audit.c:160 a = 0x0 ae = 0x0 fd = -1 tmp = "/tmp/vuln.xml.bz2", '\000' , "\377\177\000\000\036", '\000' , " \000\000\000\000\000\000\000\320\323\377\377\377\177\000\000P\321\377\377\377\177\000\000\000\000\000\000\000\000\000\000\262\tE\000\000\000\000\000\t\000\000\000\000\000\000\000\340\321\377\377\377\177\000\000\204\210f\000\b", '\000' , "w6@\000\000\000\000\000\006\002y\005\000\000\000\000\371,X\276\377\177\000\000\060\324g\000\b\000\000\000\001\000\000\000\b\000\000\000\000\\h\000\b\000\000\000\200;\240\002\b\000\000\000H\324\377\377\377\177\000\000\000\340g\000\b\000\000\000\310\323\377\377\377\177\000\000"... tmpdir = 0x450be2 "/tmp" retcode = 3 ret = 63083520 t = 0 st = {st_dev = 6801536, st_ino = 0, st_mode = 4160, st_nlink = 962, st_uid = 8, st_gid = 24, st_rdev = 48, st_atim = { tv_sec = 140737488344400, tv_nsec = 140737488343840}, st_mtim = { tv_sec = 140733193388032, tv_nsec = 47778576}, st_ctim = { tv_sec = 34403789752, tv_nsec = 140737488343304}, st_size = 34370941784, st_blocks = 0, st_blksize = 0, st_flags = 8, st_gen = 4294955488, st_lspare = 32767, st_birthtim = { tv_sec = 34366453837, tv_nsec = 18}} #3 0x0000000000408c1f in exec_audit (argc=0, argv=0x7fffffffdbe8) at audit.c:885 h = 0x0 cooked_audit_entries = 0x0 db = 0x0 it = 0x0 pkg = 0x0 db_dir = 0x803c21040 "/var/db/pkg" name = 0x8080808080808080
version = 0x0 audit_file = "/var/db/pkg/vuln.xml", '\000' , "@\326\377\377\377\177\000\000\366n\262\002\b\000\000\000\022\000\000\000\000\000\000\001\200 \302\003\b\000\000\000\001\000\000\000\021\000\000\000S\254\303\000\b\000\000\000\000\224\302\003\b\000\000\000\270\326\377\377\377\177", '\000' , " \312g\000\b\000\000\000\020\330\377\377\377\177\000\000\240\326\377\377\377\177\000\000\204\210f\000\b\000\000\000\230\331\377\377\377\177\000\000\253=@\000\000\000\000\000\060J\271\n\000\000\000\000\314?\f\257\b\000\000\000\060\324g\000\b\000\000\000\001\000\000\000\b\000\000\000\000\\h\000\b\000\000\000\000"... vuln = 0 fetch = true xml = true ch = -1 ret = 0 res = 8 portaudit_site = 0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2" #4 0x0000000000412d24 in main (argc=2, argv=0x7fffffffdbd8) at main.c:747 i = 2 command = 0x661f30 ambiguous = 0 chroot_path = 0x0 jid = 32767 jail_str = 0x0 len = 5 ch = -1 '\377' debug = 0 version = 0 ret = 0 plugins_enabled = true plugin_found = false show_commands = false activation_test = false c = 0x8006630bd conffile = 0x0 reposdir = 0x0 alias = 0x0 alias_value = 0x0 newargv = 0x7fffffffdbd8 newargc = 2 t = 0x0 newcmd = 0x0 j = 0 cmdargc = 3 (gdb) #0 0x0000000800aece91 in pkg_fetch_file_to_fd (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=3, t=0x7fffffffcfe8) at fetch.c:533 remote = 0x802d8ed70 u = 0x803c3e280 st = {size = 430911, atime = 1385176515, mtime = 1385176515} done = 0 r = 140737488343056 max_retry = 3 retry = 3 fetch_timeout = 30 begin_dl = 1385241241 now = 1385241241 last = 0 buf = '\000' ... doc = 0x803c16240 "/freebsd/vuln.xml.bz2" docpath = '\000' retcode = 0 zone = '\000' srv_current = 0x0 http_current = 0x0 sz = 430911 pkg_url_scheme = false #1 0x0000000800aec60f in pkg_fetch_file (repo=0x0, url=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=0x7fffffffd100 "/tmp/vuln.xml.bz2", t=1385176515) at fetch.c:95 fd = 3 retcode = 3 #2 0x0000000000409248 in fetch_and_extract ( src=0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2", dest=0x7fffffffd5a0 "/var/db/pkg/vuln.xml", xml=true) at audit.c:160 a = 0x0 ae = 0x0 fd = -1 tmp = "/tmp/vuln.xml.bz2", '\000' , "\377\177\000\000\036", '\000' , " \000\000\000\000\000\000\000\320\323\377\377\377\177\000\000P\321\377\377\377\177\000\000\000\000\000\000\000\000\000\000\262\tE\000\000\000\000\000\t\000\000\000\000\000\000\000\340\321\377\377\377\177\000\000\204\210f\000\b", '\000' , "w6@\000\000\000\000\000\006\002y\005\000\000\000\000\371,X\276\377\177\000\000\060\324g\000\b\000\000\000\001\000\000\000\b\000\000\000\000\\h\000\b\000\000\000\200;\240\002\b\000\000\000H\324\377\377\377\177\000\000\000\340g\000\b\000\000\000\310\323\377\377\377\177\000\000"... tmpdir = 0x450be2 "/tmp" retcode = 3 ret = 63083520 t = 0 st = {st_dev = 6801536, st_ino = 0, st_mode = 4160, st_nlink = 962, st_uid = 8, st_gid = 24, st_rdev = 48, st_atim = { tv_sec = 140737488344400, tv_nsec = 140737488343840}, st_mtim = { tv_sec = 140733193388032, tv_nsec = 47778576}, st_ctim = { tv_sec = 34403789752, tv_nsec = 140737488343304}, st_size = 34370941784, st_blocks = 0, st_blksize = 0, st_flags = 8, st_gen = 4294955488, st_lspare = 32767, st_birthtim = { tv_sec = 34366453837, tv_nsec = 18}} #3 0x0000000000408c1f in exec_audit (argc=0, argv=0x7fffffffdbe8) at audit.c:885 h = 0x0 cooked_audit_entries = 0x0 db = 0x0 it = 0x0 pkg = 0x0 db_dir = 0x803c21040 "/var/db/pkg" name = 0x8080808080808080
version = 0x0 audit_file = "/var/db/pkg/vuln.xml", '\000' , "@\326\377\377\377\177\000\000\366n\262\002\b\000\000\000\022\000\000\000\000\000\000\001\200 \302\003\b\000\000\000\001\000\000\000\021\000\000\000S\254\303\000\b\000\000\000\000\224\302\003\b\000\000\000\270\326\377\377\377\177", '\000' , " \312g\000\b\000\000\000\020\330\377\377\377\177\000\000\240\326\377\377\377\177\000\000\204\210f\000\b\000\000\000\230\331\377\377\377\177\000\000\253=@\000\000\000\000\000\060J\271\n\000\000\000\000\314?\f\257\b\000\000\000\060\324g\000\b\000\000\000\001\000\000\000\b\000\000\000\000\\h\000\b\000\000\000\000"... vuln = 0 fetch = true xml = true ch = -1 ret = 0 res = 8 portaudit_site = 0x803c23070 "http://www.vuxml.org/freebsd/vuln.xml.bz2" #4 0x0000000000412d24 in main (argc=2, argv=0x7fffffffdbd8) at main.c:747 i = 2 command = 0x661f30 ambiguous = 0 chroot_path = 0x0 jid = 32767 jail_str = 0x0 len = 5 ch = -1 '\377' debug = 0 version = 0 ret = 0 plugins_enabled = true plugin_found = false show_commands = false activation_test = false c = 0x8006630bd conffile = 0x0 reposdir = 0x0 alias = 0x0 alias_value = 0x0 newargv = 0x7fffffffdbd8 newargc = 2 t = 0x0 newcmd = 0x0 j = 0 cmdargc = 3 (gdb) quit