Zitat von Yasuo Ohgaki <[EMAIL PROTECTED]>: > > 0x4055778f in _efree (ptr=0x83476e4) > > at /home/jan/software/php4/Zend/zend_alloc.c:229 > > 229 REMOVE_POINTER_FROM_LIST(p); > > (gdb) bt > > #0 0x4055778f in _efree (ptr=0x83476e4) > > at /home/jan/software/php4/Zend/zend_alloc.c:229 > > #1 0x405664a1 in _zval_dtor (zvalue=0x83456bc) > > at /home/jan/software/php4/Zend/zend_variables.c:44 > > #2 0x4055e4c1 in _zval_ptr_dtor (zval_ptr=0x40605714) > > at /home/jan/software/php4/Zend/zend_execute_API.c:293 > > #3 0x4057516d in execute (op_array=0x835c0c4) > > If you could tell us what execute() is trying to execute, > it would be useful.
(gdb) frame 3 #3 0x4057516d in execute (op_array=0x8353ebc) at /home/jan/software/php4/Zend/zend_execute_locks.h:26 26 zval_ptr_dtor(&EG(garbage)[--EG(garbage_ptr)]); (gdb) print (char *)(executor_globals.function_state_ptr->function)->common.function_name $1 = 0x82f313c "flist" flist() is the function mentioned earlier, that segfaults while returning to the calling function. > Did you read my email? (and the URL?) > http://bugs.php.net/bugs-generating-backtrace.php Sorry, I didn't know that it has been updated with instructions on how to locate the segfaulting function. Jan. -- http://www.horde.org - The Horde Project http://www.ammma.de - discover your knowledge http://www.tip4all.de - Deine private Tippgemeinschaft -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php