(gdb) *break zif_strlen*
Breakpoint 1 at 0xa7a8a4: file /home/derick/dev/php/php-src.git/Zend/zend_builtin_functions.c, line 570.
(gdb) *cont*
Continuing.
Breakpoint 1, zif_strlen (execute_data=0x7f6259816b60, return_value=0x7f6259816b40) at /home/derick/dev/php/php-src.git/Zend/zend_builtin_functions.c:570
570        ZEND_PARSE_PARAMETERS_START(1, 1)
(gdb) *source /home/derick/dev/php/php-src.git/.gdbinit*
(gdb) *zbacktrace*
[0x7f6259816360] strlen("slide.ezt") [internal function]
[0x7f6259816210] ezcTemplate->process("slide.ezt") /home/httpd/pres2/vendor/zetacomponents/template/src/template.php:308 
[0x7f6259816130] Presentation->display("25") /home/httpd/pres2/show2.php:224 
[0x7f6259816030] (main) /home/httpd/pres2/show2.php:154 
(gdb) *bt full*
#0  zif_strlen (execute_data=0x7f6259816360, return_value=0x7f6259816340) at /home/derick/dev/php/php-src.git/Zend/zend_builtin_functions.c:570
        _num_args = 1486543680
        _arg = 0x100000001
        error_code = 0
        _max_num_args = 32610
        _expected_type = Z_EXPECTED_BOOL
        _error = 0x0
        _optional = 0 '\000'
        _flags = 0
        _min_num_args = 42916368
        _i = 32610
        _real_arg = 0x7fffecd445e0
        s = 0x10e30b0
        __PRETTY_FUNCTION__ = "zif_strlen"
#1  0x0000000000aba7fb in execute_internal (execute_data=0x7f6259816360, return_value=0x7f6259816340)
    at /home/derick/dev/php/php-src.git/Zend/zend_execute.c:2053
No locals.
#2  0x00007f62587aa0d4 in php_uopz_execute_internal (execute_data=0x7f6259816360, return_value=0x7f6259816340) at /tmp/pear/temp/uopz/src/executors.c:56
No locals.
#3  0x00007f62595beab4 in xdebug_execute_internal (current_execute_data=0x7f6259816360, return_value=0x7f6259816340)
    at /home/derick/dev/php/derickr-xdebug/xdebug.c:2169
        edata = 0x7f6259816360
        fse = 0x28eda10
        do_return = 0
        function_nr = 151
        restore_error_handler_situation = 0
        tmp_error_cb = 0x0
#4  0x0000000000abd0a1 in ZEND_DO_FCALL_SPEC_HANDLER () at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:844
        should_change_scope = 0
        call = 0x7f6259816360
        fbc = 0x289cac0
        object = 0x7f6253a8ef80
        ret = 0x7f6259816340
        __PRETTY_FUNCTION__ = "ZEND_DO_FCALL_SPEC_HANDLER"
#5  0x0000000000abf6d1 in ZEND_USER_OPCODE_SPEC_HANDLER () at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:1568
        ret = 2
#6  0x0000000000abbf05 in execute_ex (ex=0x7f6259816210) at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:414
        orig_opline = 0x7f6253e6b6c0
        orig_execute_data = 0x7f6259816130
#7  0x00007f62587aa105 in php_uopz_execute (execute_data=0x7f6259816210) at /tmp/pear/temp/uopz/src/executors.c:61
No locals.
#8  0x00007f62595be51c in xdebug_execute_ex (execute_data=0x7f6259816210) at /home/derick/dev/php/derickr-xdebug/xdebug.c:2007
        op_array = 0x59816210
        edata = 0x7f625980b338
        dummy = 0x7f62587a9e55 <uopz_return_handler+74>
        fse = 0x91
        xfse = 0x2ae2100
        magic_cookie = 0x0
        do_return = 32610
        function_nr = 1501651248
        le = 0x200000001
        code_coverage_func_info = {class = 0x15980ae00 <error: Cannot access memory at address 0x15980ae00>, function = 0x7f62598161e0 "\200\267\207Yb\177", 
          type = 1501606712, internal = 32610}
        code_coverage_function_name = 0x0
        code_coverage_file_name = 0x0
#9  0x0000000000abceeb in ZEND_DO_FCALL_SPEC_HANDLER () at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:800
        call = 0x7f6259816210
        fbc = 0x7f625980b338
        object = 0x7f6253a8ef80
        ret = 0x7f62598161e0
        __PRETTY_FUNCTION__ = "ZEND_DO_FCALL_SPEC_HANDLER"
#10 0x0000000000abf6d1 in ZEND_USER_OPCODE_SPEC_HANDLER () at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:1568
        ret = 2
#11 0x0000000000abbf05 in execute_ex (ex=0x7f6259816130) at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:414
        orig_opline = 0x7f6253e6cd80
        orig_execute_data = 0x7f6259816030
#12 0x00007f62587aa105 in php_uopz_execute (execute_data=0x7f6259816130) at /tmp/pear/temp/uopz/src/executors.c:61
No locals.
#13 0x00007f62595be51c in xdebug_execute_ex (execute_data=0x7f6259816130) at /home/derick/dev/php/derickr-xdebug/xdebug.c:2007
        op_array = 0x59816130
        edata = 0x7f6259805e48
        dummy = 0x7f62587a9e55 <uopz_return_handler+74>
        fse = 0x73
        xfse = 0x28eef70
        magic_cookie = 0x0
        do_return = 32610
        function_nr = 1501650992
        le = 0x100000001
        code_coverage_func_info = {class = 0x159805ab0 <error: Cannot access memory at address 0x159805ab0>, function = 0x7f62598160f0 "@A\207Yb\177", 
          type = 1501584968, internal = 32610}
        code_coverage_function_name = 0x0
        code_coverage_file_name = 0x0
#14 0x0000000000abceeb in ZEND_DO_FCALL_SPEC_HANDLER () at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:800
        call = 0x7f6259816130
        fbc = 0x7f6259805e48
        object = 0x7f62598044c0
        ret = 0x7f62598160f0
        __PRETTY_FUNCTION__ = "ZEND_DO_FCALL_SPEC_HANDLER"
#15 0x0000000000abf6d1 in ZEND_USER_OPCODE_SPEC_HANDLER () at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:1568
        ret = 2
#16 0x0000000000abbf05 in execute_ex (ex=0x7f6259816030) at /home/derick/dev/php/php-src.git/Zend/zend_vm_execute.h:414
        orig_opline = 0x0
        orig_execute_data = 0x0
#17 0x00007f62587aa105 in php_uopz_execute (execute_data=0x7f6259816030) at /tmp/pear/temp/uopz/src/executors.c:61
No locals.
#18 0x00007f62595be51c in xdebug_execute_ex (execute_data=0x7f6259816030) at /home/derick/dev/php/derickr-xdebug/xdebug.c:2007
---Type <return> to continue, or q <return> to quit---