#0  0x00007f7ff4cf3c41 in fread () from /usr/lib/libc.so.12
No symbol table info available.
#1  0x00007f7ff762b4a3 in pkg_fetch_file_to_fd (repo=0x0,
    url=0x7f7ff7b03580 "http://muscles.dragonflybsd.org/pkgsrc-vuxml/vuln.xml.bz2", dest=4, t=0x7f7fffffcfb0, offset=0, size=-1) at fetch.c:654
        remote = 0xfffffffff4f65e20
        u = 0x7f7ff7b1c400
        st = {size = 294125, atime = 1479067247, mtime = 1479067247}
        done = 0
        r = 531
        max_retry = 3
        retry = 3
        fetch_timeout = 30
        buf = <error reading variable buf (Cannot access memory at address 0x7f7fffffa710)>
        doc = 0x7f7ff7b260c0 "/pkgsrc-vuxml/vuln.xml.bz2"
        docpath = <error reading variable docpath (Cannot access memory at address 0x7f7fffffa310)>
        retcode = 0
        zone = <error reading variable zone (Cannot access memory at address 0x7f7fffffa200)>
        srv_current = 0x0
        http_current = 0x0
        sz = 294125
        buflen = 10240
        left = 294125
        pkg_url_scheme = false
        fetchOpts = 0x7f7ff7b04280
#2  0x00007f7ff7629d42 in pkg_fetch_file_tmp (repo=0x0,
    url=0x7f7ff7b03580 "http://muscles.dragonflybsd.org/pkgsrc-vuxml/vuln.xml.bz2", dest=0x7f7fffffd0e0 "/tmp/vuln.xml.bz2.AKCLnH8l", t=1479067247)
    at fetch.c:100
        fd = 4
        retcode = 3
#3  0x00007f7ff762fb16 in pkg_audit_fetch (
    src=0x7f7ff7b03580 "http://muscles.dragonflybsd.org/pkgsrc-vuxml/vuln.xml.bz2", dest=0x7f7fffffd5e0 "/var/db/pkgng/vuln.xml") at pkg_audit.c:268
        fd = -1
        outfd = -1
        tmp = "/tmp/vuln.xml.bz2.AKCLnH8l", '\000' <repeats 78 times>, "C\243\317\364\\+\341\330\000\000\000\000\000\000\000\000\377\003\000\000\000\000\000\000`\302\366\364\177\177\000\000\061/B\000\000\000\000\000\000\250\365\364\177\177\000\000\070\324\377\377\177\177\000\000\340\325\377\377\177\177\000\000k\354\312\364\177\177", '\000' <repeats 18 times>, "\366\325\377\377\177\177\000\000\000\000\000\000"...
        tmpdir = 0x7f7ff77edf48 "/tmp"
        retcode = 3
        t = 0
        st = {st_dev = 0, st_mode = 1479141903, st_ino = 4, st_nlink = 0,
          st_uid = 0, st_gid = 0, st_rdev = 0, st_atim = {tv_sec = 0,
            tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {
            tv_sec = 0, tv_nsec = 0}, st_birthtim = {tv_sec = 0, tv_nsec = 0},
          st_size = 0, st_blocks = 0, st_blksize = 0, st_flags = 0,
          st_gen = 0, st_spare = {0, 0}}
        cbdata = {out = 0,
          fname = 0x9ea02ecccc187bdf <error: Cannot access memory at address 0x9ea02ecccc187bdf>,
          dest = 0x7f7ff4cc0e2d <__swrite> "AUATUSH\203\354\bH\211\373H\211\365I\211\324H\205\377\017\204\241"}
#4  0x00000000004083cd in exec_audit (argc=0, argv=0x7f7fffffdcf0)
    at audit.c:169
        audit = 0x7f7ff7b070e0
        db = 0x0
        it = 0x0
        pkg = 0x0
        db_dir = 0x7f7ff7b050a0 "/var/db/pkgng"
        name = 0x7f7fffffda30 ""
        version = 0x40fbf6 <set_globals+110> "\017\266\300\211\005\355-\""
        audit_file_buf = "/var/db/pkgng/vuln.xml\000\000CBi\367\177\177", '\000' <repeats 19 times>, "\354\377\367\177\177\000\000P'c\000\000\000\000\000\030UB\000\000\000\000\000\005\000\000\000\000\000\000\000}-\300\367\177\177\000\000C\243\317\364\\+\341\330\000\000\000\000\000\000\000\000P'c\000\000\000\000\000\030UB\000\000\000\000\000\250\326\377\377\177\177\000\000\001\000\000\000\000\000\000\000X\222\266\367\177\177\000\000\001\000\000\000\000\000\000\000\306\316\313\364\177\177\000\000P'c\000\000\000\000\000\030UB\000\000\000\000\000\005\000\000\000\000\000\000\000z\021\314\364\177\177\000\000\000\354\377\367\177\177\000\000"...
        audit_file = 0x7f7fffffd5e0 "/var/db/pkgng/vuln.xml"
        vuln = 0
        fetch = true
        recursive = false
        ch = -1
        i = 0
        ret = 0
        portaudit_site = 0x7f7ff7b03580 "http://muscles.dragonflybsd.org/pkgsrc-vuxml/vuln.xml.bz2"
        sb = 0x7f7ff7b0a100
        check = 0x0
        longopts = {{name = 0x4230df "fetch", has_arg = 0, flag = 0x0,
            val = 70}, {name = 0x4230e5 "file", has_arg = 1, flag = 0x0,
            val = 102}, {name = 0x4230ea "recursive", has_arg = 0, flag = 0x0,
            val = 114}, {name = 0x4230f4 "quiet", has_arg = 0, flag = 0x0,
            val = 113}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
#5  0x0000000000412e30 in main (argc=2, argv=0x7f7fffffdce0) at main.c:855
        i = 3
        command = 0x631c60 <cmd+96>
        ambiguous = 0
        chroot_path = 0x0
        rootdir = 0x0
        jail_str = 0x0
        len = 5
        ch = -1 '\377'
        debug = 1
        version = 0
        ret = 0
        plugins_enabled = true
        plugin_found = false
        show_commands = false
        activation_test = false
        init_flags = (unknown: 0)
        c = 0x7f7ff4f6c260 <__stack_chk_guard>
        conffile = 0x0
        reposdir = 0x0
        save_argv = 0x7f7fffffdce0
        j = 0
        longopts = {{name = 0x4281fd "debug", has_arg = 0, flag = 0x0,
            val = 100}, {name = 0x428203 "chroot", has_arg = 1, flag = 0x0,
            val = 99}, {name = 0x4272d3 "config", has_arg = 1, flag = 0x0,
            val = 67}, {name = 0x42820a "repo-conf-dir", has_arg = 1,
            flag = 0x0, val = 82}, {name = 0x428218 "rootdir", has_arg = 1,
            flag = 0x0, val = 114}, {name = 0x428220 "list", has_arg = 0,
            flag = 0x0, val = 108}, {name = 0x4277e5 "version", has_arg = 0,
            flag = 0x0, val = 118}, {name = 0x428225 "option", has_arg = 1,
            flag = 0x0, val = 111}, {name = 0x42822c "only-ipv4", has_arg = 0,
            flag = 0x0, val = 52}, {name = 0x428236 "only-ipv6", has_arg = 0,
            flag = 0x0, val = 54}, {name = 0x0, has_arg = 0, flag = 0x0,
            val = 0}}
        __func__ = "main"