each php function is executed by the internal function "execute()"
please include the details about this frames also (configure php with
--enable-debug first) e.g.:
(gdb) frame 6
output...
(gdb) print (char *)(executor_globals.function_state_ptr->function)-
>common.function_name
output...

with this information you can see which php-command causing the seg fault
-> http://bugs.php.net/bugs-generating-backtrace.php

g. martin luethi

> Program received signal SIGSEGV, Segmentation fault.
> 0xffffffff7bacedcc in zend_parse_arg_impl (arg=0x1003853c0,
> va=0xffffffff7ffe3a88, spec=0xffffffff7ffe3a58)
>     at /root/build/php-4.3.4/Zend/zend_API.c:259
> 259                                                     *p = Z_LVAL_PP(arg);
> (gdb) bt
> #0  0xffffffff7bacedcc in zend_parse_arg_impl (arg=0x1003853c0,
> va=0xffffffff7ffe3a88, spec=0xffffffff7ffe3a58)
>     at /root/build/php-4.3.4/Zend/zend_API.c:259
> #1  0xffffffff7bacfa54 in zend_parse_arg (arg_num=4, arg=0x1003853c0,
> va=0xffffffff7ffe3a88,
>     spec=0xffffffff7ffe3a58, quiet=0) at
> /root/build/php-4.3.4/Zend/zend_API.c:439
> #2  0xffffffff7bacff40 in zend_parse_va_args (num_args=0,
> type_spec=0xffffffff7bb6906c "ll",
>     va=0xffffffff7ffe3a88, flags=0) at
> /root/build/php-4.3.4/Zend/zend_API.c:524
> #3  0xffffffff7bad032c in zend_parse_parameters (num_args=4,
> type_spec=0xffffffff7bb69068 "ssz|ll")
>     at /root/build/php-4.3.4/Zend/zend_API.c:551
> #4  0xffffffff7b9493cc in php_pcre_match (ht=4, return_value=0x1008c4c00,
> this_ptr=0x0, return_value_used=0,
>     global=1) at /root/build/php-4.3.4/ext/pcre/php_pcre.c:375
> #5  0xffffffff7b94a464 in zif_preg_match_all (ht=4,
> return_value=0x1008c4c00, this_ptr=0x0, return_value_used=0)
>     at /root/build/php-4.3.4/ext/pcre/php_pcre.c:608
> #6  0xffffffff7baea870 in execute (op_array=0x1008ac610) at
> /root/build/php-4.3.4/Zend/zend_execute.c:1616
> #7  0xffffffff7baeabe4 in execute (op_array=0x100884bd0) at
> /root/build/php-4.3.4/Zend/zend_execute.c:1660
> #8  0xffffffff7baeabe4 in execute (op_array=0x1003a07b0) at
> /root/build/php-4.3.4/Zend/zend_execute.c:1660
> #9  0xffffffff7baeabe4 in execute (op_array=0x1003af0a0) at
> /root/build/php-4.3.4/Zend/zend_execute.c:1660
> #10 0xffffffff7baeabe4 in execute (op_array=0x10038f220) at
> /root/build/php-4.3.4/Zend/zend_execute.c:1660
> #11 0xffffffff7bacde24 in zend_execute_scripts (type=8, retval=0x0,
> file_count=3)
>     at /root/build/php-4.3.4/Zend/zend.c:884
> #12 0xffffffff7ba6dd08 in php_execute_script
> (primary_file=0xffffffff7fffef30)
>     at /root/build/php-4.3.4/main/main.c:1729
> #13 0xffffffff7baf3914 in php_handler (r=0x10037df10)
>     at /root/build/php-4.3.4/sapi/apache2handler/sapi_apache2.c:537
> #14 0x00000001000ac8a0 in ap_run_handler ()
> #15 0x00000001000ad798 in ap_invoke_handler ()
> #16 0x000000010007b6d0 in ap_process_request ()
> #17 0x00000001000712e4 in ap_process_http_connection ()
> #18 0x00000001000c55b8 in ap_run_process_connection ()
> #19 0x00000001000c5c18 in ap_process_connection ()
> #20 0x00000001000a8e28 in child_main ()
> #21 0x00000001000a9030 in make_child ()
> #22 0x00000001000a92a4 in startup_children ()
> #23 0x00000001000a9da8 in ap_mpm_run ()
> #24 0x00000001000b79d8 in main ()
> (gdb) quit
> [EMAIL PROTECTED] httpd]

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to