[Bug 249166] ports-mgmt/pkg audit -F Segmentation fault
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Sep 7 15:10:41 UTC 2020
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=249166
--- Comment #2 from Matthias Andree <mandree at FreeBSD.org> ---
Thread 1 (LWP 100699 of process 42411):
#0 0x000000000050413f in pkg_fetch_file_to_fd (repo=0x0, url=0x800fe7090
"http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=5, t=0x7fffffffcc38,
offset=0, size=-1, silent=false) at fetch.c:226
u = 0x0
kv = 0x0
kvtmp = 0x0
envtorestore = 0x0
envtounset = 0x0
tmp = 0x0
done = 0
r = 0
buf = '\000' <repeats 2024 times>...
retcode = 0
sz = 0
buflen = 0
left = 0
fetcher = 0x0
remote = 0x0
#1 0x0000000000503f35 in pkg_fetch_file_tmp (repo=0x0, url=0x800fe7090
"http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=0x7fffffffcde0
"/tmp/vuln.xml.bz2.I1CiSa8L", t=1599442709) at fetch.c:112
fd = 5
retcode = 3
#2 0x000000000047f2b9 in pkg_audit_fetch (src=0x800fe7090
"http://vuxml.freebsd.org/freebsd/vuln.xml.bz2", dest=0x0) at pkg_audit.c:276
fd = -1
outfd = -1
tmp =
"/tmp/vuln.xml.bz2.I1CiSa8L\000\000\000\000\000\000q\000\000\000q\203&5\000\206V\000\b\000\000\000\000\206V\000\b\000\000\000\a\000\000\000\000\000\000\000\203H#\000\000\000\000\000\200\200V\000\b\000\000\000\000\206V\000\b\000\000\000e[S\000\b\000\000\000\203H#\000\000\000\000\000\200\317\377\377\377\177\000\000࠶\000\b\000\000\000\a\000\000\000\b\000\000\000G\t\000\000\000\000\000\000TU\267\000\b\000\000\000\330\316\377\377\377\177\000\000\326\f\a\003^\254\203\245\300\316\377\377\377\177\000\000\344\066@\000\000\000\000\000\300\021\376\000\b\000\000\000\000\000\000\000\001\000\000\000\300\021\376\000\b\000\000\000\203H"...
tmpdir = 0x240280 "/tmp"
retcode = 3
t = 1599442709
st = {st_dev = 13574555021139550870, st_ino = 11, st_nlink = 1, st_mode
= 33060, st_padding0 = 0, st_uid = 0, st_gid = 0, st_padding1 = 0, st_rdev =
18446744073709551615, st_atim = {tv_sec = 1599442709, tv_nsec = 659811000},
st_mtim = {tv_sec = 1599442709, tv_nsec = 306768000}, st_ctim = {tv_sec =
1599442709, tv_nsec = 306768000}, st_birthtim = {tv_sec = 1516670331, tv_nsec =
88524000}, st_size = 6339069, st_blocks = 7144, st_blksize = 131072, st_flags =
2048, st_gen = 8013493, st_spare = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}
cbdata = {out = 1599491381, fname = 0x14 <error: Cannot access memory
at address 0x14>, dest = 0x225a58 "CASE_SENSITIVE_MATCH"}
dfd = 4
#3 0x00000000002ada78 in exec_audit (argc=0, argv=0x7fffffffdac8) at
audit.c:164
audit = 0x800fe72a0
db = 0x0
it = 0x0
pkg = 0x0
name = 0x7fffffffd310 "\346\333#"
version = 0x800fe7030 "`p\376"
audit_file = 0x0
affected = 0
vuln = 0
fetch = true
recursive = false
ch = -1
i = -11648
ret = 0
sb = 0x225a58
check = 0x0
longopts = {{name = 0x22e1b6 "fetch", has_arg = 0, flag = 0x0, val =
70}, {name = 0x247986 "file", has_arg = 1, flag = 0x0, val = 102}, {name =
0x23dbe6 "recursive", has_arg = 0, flag = 0x0, val = 114}, {name = 0x23521a
"quiet", has_arg = 0, flag = 0x0, val = 113}, {name = 0x0, has_arg = 0, flag =
0x0, val = 0}}
#4 0x00000000002bc1ed in main (argc=2, argv=0x7fffffffdab8) at main.c:886
i = 3
command = 0x5220c0 <cmd+96>
ambiguous = 0
chroot_path = 0x0
rootdir = 0x0
jid = 0
jail_str = 0x0
len = 5
ch = -1 '\377'
debug = 0
version = 0
ret = 0
plugins_enabled = true
plugin_found = false
show_commands = false
activation_test = false
init_flags = (unknown: 0)
c = 0x0
conffile = 0x0
reposdir = 0x0
save_argv = 0x7fffffffdab8
realrootdir = "\000\000\000\000\000\000\000\000p\330\377\377\377\177",
'\000' <repeats 11 times>,
"\232T\000\b\000\000\000\000\327\377\377\377\177\000\000\067SS\000\b", '\000'
<repeats 19 times>,
"\271+!\000\000\000\000\000\004ϊ\006\000\000\000\000\364\362\217\362\000\000\000\000\060\002U\000\b\000\000\000\001\000\000\000\000\000\000\000\000HU\000\b\000\000\000\300{\266\000\b\000\000\000
\331\377\377\377\177\000\000\271+!\000\000\000\000\000\004ϊ\006\000\000\000\000\060\002U\000\b\000\000\000
\331\377\377\377\177\000\000\364\362\217\362\001\000\000\000\020\327\377\377\377\177\000\000\002\000\000\000\000\000\000\000\000\260T\000\b\000\000\000\000\260T\000\b\000\000\000p\330"...
j = 0
longopts = {{name = 0x22e2ac "debug", has_arg = 0, flag = 0x0, val =
100}, {name = 0x2202b5 "jail", has_arg = 1, flag = 0x0, val = 106}, {name =
0x2325e4 "chroot", has_arg = 1, flag = 0x0, val = 99}, {name = 0x221e5f
"config", has_arg = 1, flag = 0x0, val = 67}, {name = 0x228873 "repo-conf-dir",
has_arg = 1, flag = 0x0, val = 82}, {name = 0x24437d "rootdir", has_arg = 1,
flag = 0x0, val = 114}, {name = 0x2201b7 "list", has_arg = 0, flag = 0x0, val =
108}, {name = 0x22cd3d "version", has_arg = 0, flag = 0x0, val = 118}, {name =
0x2460b5 "option", has_arg = 1, flag = 0x0, val = 111}, {name = 0x240375
"only-ipv4", has_arg = 0, flag = 0x0, val = 52}, {name = 0x221e66 "only-ipv6",
has_arg = 0, flag = 0x0, val = 54}, {name = 0x0, has_arg = 0, flag = 0x0, val =
0}}
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-pkg
mailing list