Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:8477 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 63258 invoked by uid 1010); 11 Mar 2004 07:29:10 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 63234 invoked from network); 11 Mar 2004 07:29:09 -0000 Received: from unknown (HELO mail.de-punkt.de) (62.4.81.205) by pb1.pair.com with SMTP; 11 Mar 2004 07:29:09 -0000 Received: (qmail 15058 invoked by uid 508); 11 Mar 2004 07:29:09 -0000 Received: from sb@sebastian-bergmann.de by webby by uid 511 with qmail-scanner-1.16 (f-prot: 3.12. spamassassin: 2.60. Clear:. Processed in 10.447929 secs); 11 Mar 2004 07:29:09 -0000 Received: from unknown (HELO wopr) (80.142.24.169) by mail.de-punkt.de with SMTP; 11 Mar 2004 07:28:58 -0000 Received: from localhost [127.0.0.1] by wopr (192.168.2.100) (userid 8) with Hamster-NewsToMail-Gate (Classic Hamster Version 2.0 Build 2.0.2.2) ; Thu, 11 Mar 2004 08:28:25 +0100 Date: Thu, 11 Mar 2004 08:28:25 +0100 Organization: www.sebastian-bergmann.de User-Agent: Mozilla Thunderbird 0.5 (Windows/20040207) X-Accept-Language: en-us, en To: internals@lists.php.net Sender: admin Lines: 39 X-Qmail-Scanner-Message-ID: <107899014452615013@webby> Subject: Segfault in zend_get_executed_lineno with APD on Windows From: sebastian@php.net (Sebastian Bergmann) Message-ID: I wanted to play with APD a bit but current HEAD/HEAD segfaults on Windows for tracing-enabled script execution: zend_get_executed_lineno(void * * * 0x00702990) line 338 + 23 bytes log_time(void * * * 0x00702990) line 424 + 26 bytes trace_function_exit(char * 0x00a15420) line 399 + 9 bytes apd_execute(_zend_op_array * 0x0085e588, void * * * 0x00702990) line 519 + 9 bytes zend_do_fcall_common_helper(_zend_execute_data * 0x0012f814, _zend_op * 0x00a11170, _zend_op_array * 0x0085e248, void * * * 0x00702990) line 2677 + 33 bytes zend_do_fcall_by_name_handler(_zend_execute_data * 0x0012f814, _zend_op * 0x00a11170, _zend_op_array * 0x0085e248, void * * * 0x00702990) line 2759 + 21 bytes execute(_zend_op_array * 0x0085e248, void * * * 0x00702990) line 1339 + 23 bytes apd_execute(_zend_op_array * 0x0085e248, void * * * 0x00702990) line 518 + 16 bytes zend_do_fcall_common_helper(_zend_execute_data * 0x0012fa0c, _zend_op * 0x009c0b18, _zend_op_array * 0x0082f468, void * * * 0x00702990) line 2677 + 33 bytes zend_do_fcall_by_name_handler(_zend_execute_data * 0x0012fa0c, _zend_op * 0x009c0b18, _zend_op_array * 0x0082f468, void * * * 0x00702990) line 2759 + 21 bytes execute(_zend_op_array * 0x0082f468, void * * * 0x00702990) line 1339 + 23 bytes apd_execute(_zend_op_array * 0x0082f468, void * * * 0x00702990) line 518 + 16 bytes zend_execute_scripts(int 8, void * * * 0x00702990, _zval_struct * * 0x00000000, int 3) line 1041 + 33 bytes php_execute_script(_zend_file_handle * 0x0012ff3c, void * * * 0x00702990) line 1650 + 27 bytes main(int 1, char * * 0x00702580) line 1561 + 19 bytes mainCRTStartup() line 338 + 17 bytes -- Sebastian Bergmann http://sebastian-bergmann.de/ http://phpOpenTracker.de/ Das Buch zu PHP 5: http://professionelle-softwareentwicklung-mit-php5.de/