Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:39494 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 81034 invoked from network); 31 Jul 2008 08:51:42 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 31 Jul 2008 08:51:42 -0000 Authentication-Results: pb1.pair.com smtp.mail=santi@usansolo.net; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=santi@usansolo.net; sender-id=pass Received-SPF: pass (pb1.pair.com: domain usansolo.net designates 82.194.80.171 as permitted sender) X-PHP-List-Original-Sender: santi@usansolo.net X-Host-Fingerprint: 82.194.80.171 relayout02-q02.dns-servicios.com Linux 2.6 Received: from [82.194.80.171] ([82.194.80.171:37515] helo=relayout02-q02.dns-servicios.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id EA/C4-60033-E1D71984 for ; Thu, 31 Jul 2008 04:51:42 -0400 Received: from relayout02-redir.dns-servicios.com (relayout02-redir.dns-servicios.com [82.194.80.175]) by relayout02.dns-servicios.com (Postfix) with ESMTP id 4B032A7036E for ; Thu, 31 Jul 2008 10:51:39 +0200 (CEST) Received: from linux11.dns-servicios.com (linux11.dns-servicios.com [82.194.66.135]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by relayout02-dsp.dns-servicios.com (Postfix) with ESMTPS id D61703908CB for ; Thu, 31 Jul 2008 10:51:36 +0200 (CEST) Received: from [85.85.26.225] (port=60943 helo=powerbook.local) by linux11.dns-servicios.com with esmtpa (Exim 4.69) (envelope-from ) id 1KOTsn-0006JA-4V for internals@lists.php.net; Thu, 31 Jul 2008 10:51:37 +0200 Message-ID: <48917D1B.2050206@usansolo.net> Date: Thu, 31 Jul 2008 10:51:39 +0200 User-Agent: Thunderbird 2.0.0.16 (Macintosh/20080707) MIME-Version: 1.0 To: internals@lists.php.net Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-RelayOut-Watermark: 1218099096.92598@vEc9fauheZdbROR1nCFtNg X-RelayOut-Information: AntiSPAM and AntiVIRUS on relayout02 X-RelayOut: Found to be clean X-RelayOut-SpamCheck: no es spam, SpamAssassin (no almacenado, puntaje=0, requerido 7) X-RelayOut-From: santi@usansolo.net X-Spam-Status: No Subject: Still "zend_mm_heap corrupted" error in PHP 5.2.6 From: santi@usansolo.net (Santi Saez) Dear Srs, We are having some "zend_mm_heap corrupted" errors followed by a "Segmentation fault (11)" in our Apache2 + PHP 5.2.6 servers. There are few information about this "bug" in internet: * #40479 -> http://bugs.php.net/bug.php?id=40479 * #43295 -> http://bugs.php.net/bug.php?id=43295 I have applied all proposed patches, tested with PHP 5.2.5 and 5.2.6.. and I still have the error :-/ Anyone has more info about this, or how to solve/prevent? I'm also looking for a method to get more info about this crash: what virtualhost + PHP scripts generate it and the timestamp, for example. What can I do to get more info? Searching in the source code, I see that this message only is printed by the zend_mm_panic() function in "Zend/zend_alloc.c" file, anyideas to hack this function to get more info? static void zend_mm_panic(const char *message) { fprintf(stderr, "%s\n", message); #if ZEND_DEBUG && defined(HAVE_KILL) && defined(HAVE_GETPID) kill(getpid(), SIGSEGV); #endif exit(1); } Is there any macro o similar to get the URL, virtualhost or PHP script/path? Thanks!! Regards, --Santi Saez