Vincent Stoessel wrote:
> (gdb) run -X
> Starting program: /usr/local/apache/bin/httpd -X
>
> Program received signal SIGSEGV, Segmentation fault.
> 0x2ac73f51 in execute (op_array=0xd) at ./zend_execute.c:1120
> 1120
>AI_USE_PTR(Ts[opline->result.u.var].var);
> (gdb) bt
> #0 0x2ac73f51 in execute (op_array=0xd) at ./zend_execute.c:1120
> #1 0x2acbb4f0 in php_if_mgd_oop_parameter_search (ht=135725600,
>return_value=0x2acbb4f0, this_ptr=0x81701e0, return_value_used=2147481928)
> at parameter.c:237
> #2 0x2acb0ec6 in php_if_mgd_get_midgard (ht=135725600, return_value=0x2acbb4f0,
>this_ptr=0x81701e0, return_value_used=2147481928) at midgard.c:601
Ehm, OK. Does anyone know how to get reliable backtraces from gdb?
Because the above (mgd_get_midgard calling mgd_oop_parameter_search
calling execute) simply is not possible.
Maybe this (http://www.php.net/bugs-generating-backtrace.php) page is
right but most binary installs won't have this.
Emile
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]