|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #56465 crach on exception throw
Submitted: 2005-07-25 03:26 UTC Modified: 2006-02-27 07:24 UTC
From: dima at snaiper dot no-ip dot com Assigned:
Status: No Feedback Package: apd (PECL)
PHP Version: 5.0.3 OS: win xp
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Bug Type:
From: dima at snaiper dot no-ip dot com
New email:
PHP Version: OS:


 [2005-07-25 03:26 UTC] dima at snaiper dot no-ip dot com
I have php 5.0.4 installed on my win xp machine.

I use apd to override some built in function, for better comptability with my framework, but i found very ugly bug.

My php.ini settings
zend_extension_ts = "E:\Develop\bin\php\ext\php_apd.dll"
apd.dumpdir = "E:\Develop\bin\php\tmp\"
apd.statement_trace = 1

Php crashes with error:
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

1. php apd module loaded
2. exception handler overloaded through set_exception_handler
3. throw exception without try {} catch constuction.

Reproduce code:
function catcher(exception $e) {

throw new exception("aaa",E_USER_NOTICE);

Expected result:
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

CGI Error
The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are:

Actual result:
object(Exception)#1 (6) { ["message:protected"]=> string(3) "aaa" ["string:private"]=> string(0) "" ["code:protected"]=> int(1024) ["file:protected"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line:protected"]=> int(26) ["trace:private"]=> array(1) { [0]=> array(3) { ["file"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line"]=> int(26) ["function"]=> string(7) "unknown" } } }


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2005-10-23 10:58 UTC]
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read

Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PECL better.

 [2006-02-27 07:24 UTC]
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Open". Thank you.

 [2006-05-06 21:30 UTC] spaze-bugs at exploited dot cz
Still persists in PHP 5.1.4, the backtrace is in #6686
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Wed May 22 23:01:31 2024 UTC