php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #56465 crach on exception throw
Submitted: 2005-07-25 03:26 UTC Modified: 2006-02-27 07:24 UTC
From: dima at snaiper dot no-ip dot com Assigned:
Status: No Feedback Package: apd (PECL)
PHP Version: 5.0.3 OS: win xp
Private report: No CVE-ID: None
 [2005-07-25 03:26 UTC] dima at snaiper dot no-ip dot com
Description:
------------
I have php 5.0.4 installed on my win xp machine.

I use apd to override some built in function, for better comptability with my framework, but i found very ugly bug.

My php.ini settings
zend_extension_ts = "E:\Develop\bin\php\ext\php_apd.dll"
apd.dumpdir = "E:\Develop\bin\php\tmp\"
apd.statement_trace = 1

Php crashes with error:
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

When:
1. php apd module loaded
2. exception handler overloaded through set_exception_handler
3. throw exception without try {} catch constuction.

Reproduce code:
---------------
function catcher(exception $e) {
	var_dump($e);
}

set_exception_handler("catcher");
throw new exception("aaa",E_USER_NOTICE);

Expected result:
----------------
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

CGI Error
The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are:

Actual result:
--------------
object(Exception)#1 (6) { ["message:protected"]=> string(3) "aaa" ["string:private"]=> string(0) "" ["code:protected"]=> int(1024) ["file:protected"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line:protected"]=> int(26) ["trace:private"]=> array(1) { [0]=> array(3) { ["file"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line"]=> int(26) ["function"]=> string(7) "unknown" } } }

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2005-10-23 10:58 UTC] mike@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php

Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PECL better.


 [2006-02-27 07:24 UTC] mike@php.net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Open". Thank you.


 [2006-05-06 21:30 UTC] spaze-bugs at exploited dot cz
Still persists in PHP 5.1.4, the backtrace is in #6686
http://pecl.php.net/bugs/bug.php?id=6686
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat Dec 21 14:01:32 2024 UTC