php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #56465 crach on exception throw
Submitted: 2005-07-25 03:26 UTC Modified: 2006-02-27 07:24 UTC
From: dima at snaiper dot no-ip dot com Assigned:
Status: No Feedback Package: apd (PECL)
PHP Version: 5.0.3 OS: win xp
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: dima at snaiper dot no-ip dot com
New email:
PHP Version: OS:

 

 [2005-07-25 03:26 UTC] dima at snaiper dot no-ip dot com
Description:
------------
I have php 5.0.4 installed on my win xp machine.

I use apd to override some built in function, for better comptability with my framework, but i found very ugly bug.

My php.ini settings
zend_extension_ts = "E:\Develop\bin\php\ext\php_apd.dll"
apd.dumpdir = "E:\Develop\bin\php\tmp\"
apd.statement_trace = 1

Php crashes with error:
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

When:
1. php apd module loaded
2. exception handler overloaded through set_exception_handler
3. throw exception without try {} catch constuction.

Reproduce code:
---------------
function catcher(exception $e) {
	var_dump($e);
}

set_exception_handler("catcher");
throw new exception("aaa",E_USER_NOTICE);

Expected result:
----------------
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

CGI Error
The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are:

Actual result:
--------------
object(Exception)#1 (6) { ["message:protected"]=> string(3) "aaa" ["string:private"]=> string(0) "" ["code:protected"]=> int(1024) ["file:protected"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line:protected"]=> int(26) ["trace:private"]=> array(1) { [0]=> array(3) { ["file"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line"]=> int(26) ["function"]=> string(7) "unknown" } } }

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2005-10-23 10:58 UTC] mike@php.net
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read
http://bugs.php.net/bugs-generating-backtrace.php

Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PECL better.


 [2006-02-27 07:24 UTC] mike@php.net
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Open". Thank you.


 [2006-05-06 21:30 UTC] spaze-bugs at exploited dot cz
Still persists in PHP 5.1.4, the backtrace is in #6686
http://pecl.php.net/bugs/bug.php?id=6686
 
PHP Copyright © 2001-2020 The PHP Group
All rights reserved.
Last updated: Fri Jan 24 02:01:25 2020 UTC