|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #56465 crach on exception throw
Submitted: 2005-07-25 03:26 UTC Modified: 2006-02-27 07:24 UTC
From: dima at snaiper dot no-ip dot com Assigned:
Status: No Feedback Package: apd (PECL)
PHP Version: 5.0.3 OS: win xp
Private report: No CVE-ID: None
View Add Comment Developer Edit
Anyone can comment on a bug. Have a simpler test case? Does it work for you on a different platform? Let us know!
Just going to say 'Me too!'? Don't clutter the database with that please — but make sure to vote on the bug!
Your email address:
Solve the problem:
32 - 11 = ?
Subscribe to this entry?

 [2005-07-25 03:26 UTC] dima at snaiper dot no-ip dot com
I have php 5.0.4 installed on my win xp machine.

I use apd to override some built in function, for better comptability with my framework, but i found very ugly bug.

My php.ini settings
zend_extension_ts = "E:\Develop\bin\php\ext\php_apd.dll"
apd.dumpdir = "E:\Develop\bin\php\tmp\"
apd.statement_trace = 1

Php crashes with error:
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

1. php apd module loaded
2. exception handler overloaded through set_exception_handler
3. throw exception without try {} catch constuction.

Reproduce code:
function catcher(exception $e) {

throw new exception("aaa",E_USER_NOTICE);

Expected result:
Instructon by adress 0x1003b8ec call to memory adress "0x00000054". Memory cant be read.

CGI Error
The specified CGI application misbehaved by not returning a complete set of HTTP headers. The headers it did return are:

Actual result:
object(Exception)#1 (6) { ["message:protected"]=> string(3) "aaa" ["string:private"]=> string(0) "" ["code:protected"]=> int(1024) ["file:protected"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line:protected"]=> int(26) ["trace:private"]=> array(1) { [0]=> array(3) { ["file"]=> string(33) "E:\Develop\wwwroot\dphp\index.php" ["line"]=> int(26) ["function"]=> string(7) "unknown" } } }


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2005-10-23 10:58 UTC]
Thank you for this bug report. To properly diagnose the problem, we
need a backtrace to see what is happening behind the scenes. To
find out how to generate a backtrace, please read

Once you have generated a backtrace, please submit it to this bug
report and change the status back to "Open". Thank you for helping
us make PECL better.

 [2006-02-27 07:24 UTC]
No feedback was provided. The bug is being suspended because
we assume that you are no longer experiencing the problem.
If this is not the case and you are able to provide the
information that was requested earlier, please do so and
change the status of the bug back to "Open". Thank you.

 [2006-05-06 21:30 UTC] spaze-bugs at exploited dot cz
Still persists in PHP 5.1.4, the backtrace is in #6686
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Sat May 25 16:01:29 2024 UTC