ID: 27614 User updated by: jan at horde dot org Reported By: jan at horde dot org Status: Bogus Bug Type: Documentation problem PHP Version: Irrelevant New Comment:
Hm, when I try the described method to analyze the backtrace in http://bugs.php.net/bug.php?id=27611, I get the following: (gdb) bt ... #6 0x4071f478 in zend_do_fcall_handler (execute_data=0xbfe01420, opline=0x4181f374, op_array=0x4182052c) at /home/jan/cvs/php5/Zend/zend_execute.c:2781 #7 0x4071b122 in execute (op_array=0x4182052c) at /home/jan/cvs/php5/Zend/zend_execute.c:1339 ... (gdb) frame 7 #7 0x4071b122 in execute (op_array=0x4182052c) at /home/jan/cvs/php5/Zend/zend_execute.c:1339 1339 if (EX(opline)->handler(&execute_data, EX(opline), op_array TSRMLS_CC)) { (gdb) print (char *)(executor_globals.function_state_ptr->function)->common.function_name Address of symbol "executor_globals" is unknown. Previous Comments: ------------------------------------------------------------------------ [2004-03-16 09:59:31] [EMAIL PROTECTED] excutor_globals exists just fine, you really must be doing something wrong ;-) ------------------------------------------------------------------------ [2004-03-16 09:57:58] jan at horde dot org Yes, but print (char *)(executor_globals.function_state_ptr->function)->common.function_name doesn't work because executor_globals does not exist. ------------------------------------------------------------------------ [2004-03-16 09:51:21] [EMAIL PROTECTED] Generating a backtrace for PHP 4 or 5 is the same. http://news.php.net/article.php?group=php.internals&article=8536 ------------------------------------------------------------------------ [2004-03-16 04:50:29] jan at horde dot org Description: ------------ The instructions on http://bugs.php.net/bugs-generating-backtrace.php how to find out the function call that causes a stacktrace does not work with PHP 5. ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=27614&edit=1