Vincent Stoessel wrote:

> (gdb) run -X
> Starting program: /usr/local/apache/bin/httpd -X
> 
> Program received signal SIGSEGV, Segmentation fault.
> 0x2ac73f51 in execute (op_array=0xd) at ./zend_execute.c:1120
> 1120                                                            
>AI_USE_PTR(Ts[opline->result.u.var].var);
> (gdb) bt
> #0  0x2ac73f51 in execute (op_array=0xd) at ./zend_execute.c:1120
> #1  0x2acbb4f0 in php_if_mgd_oop_parameter_search (ht=135725600, 
>return_value=0x2acbb4f0, this_ptr=0x81701e0, return_value_used=2147481928)
>     at parameter.c:237
> #2  0x2acb0ec6 in php_if_mgd_get_midgard (ht=135725600, return_value=0x2acbb4f0, 
>this_ptr=0x81701e0, return_value_used=2147481928) at midgard.c:601

Ehm, OK. Does anyone know how to get reliable backtraces from gdb?
Because the above (mgd_get_midgard calling mgd_oop_parameter_search
calling execute) simply is not possible.

Maybe this (http://www.php.net/bugs-generating-backtrace.php) page is
right but most binary installs won't have this.

Emile


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to