Zitat von Yasuo Ohgaki <[EMAIL PROTECTED]>:

> > 0x4055778f in _efree (ptr=0x83476e4)
> >     at /home/jan/software/php4/Zend/zend_alloc.c:229
> > 229             REMOVE_POINTER_FROM_LIST(p);
> > (gdb) bt
> > #0  0x4055778f in _efree (ptr=0x83476e4)
> >     at /home/jan/software/php4/Zend/zend_alloc.c:229
> > #1  0x405664a1 in _zval_dtor (zvalue=0x83456bc)
> >     at /home/jan/software/php4/Zend/zend_variables.c:44
> > #2  0x4055e4c1 in _zval_ptr_dtor (zval_ptr=0x40605714)
> >     at /home/jan/software/php4/Zend/zend_execute_API.c:293
> > #3  0x4057516d in execute (op_array=0x835c0c4)
> 
> If you could tell us what execute() is trying to execute,
> it would be useful.

(gdb) frame 3
#3  0x4057516d in execute (op_array=0x8353ebc)
    at /home/jan/software/php4/Zend/zend_execute_locks.h:26
26                      zval_ptr_dtor(&EG(garbage)[--EG(garbage_ptr)]);
(gdb) print (char
*)(executor_globals.function_state_ptr->function)->common.function_name
$1 = 0x82f313c "flist"

flist() is the function mentioned earlier, that segfaults while returning to
the calling function.
 
> Did you read my email? (and the URL?)
> http://bugs.php.net/bugs-generating-backtrace.php

Sorry, I didn't know that it has been updated with instructions on how to
locate the segfaulting function.

Jan.

--
http://www.horde.org - The Horde Project
http://www.ammma.de - discover your knowledge
http://www.tip4all.de - Deine private Tippgemeinschaft

-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to