php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #1137 php.exe crashes (dr. watson reports access violation) on PDF_open()
Submitted: 1999-02-10 17:54 UTC Modified: 1999-11-05 03:28 UTC
From: mledet at cs dot uno dot edu Assigned:
Status: Closed Package: Reproducible Crash
PHP Version: 3.0.6 OS: Windows NT Server 4.0 sp3
Private report: No CVE-ID: None
 [1999-02-10 17:54 UTC] mledet at cs dot uno dot edu
<?php
echo "<html><body>Start";
$info = PDF_get_info();
$fd = fopen("C:/temp/temp.pdf", "w+");
$pfd = PDF_open($fd, $info);
PDF_close($pfd);
fclose($fd);
?>

Only extension is PHP3_pdflib.dll

Dr. Watson Log follows.....


Application exception occurred:
        App:  (pid=63)
        When: 2/10/1999 @ 16:37:21.750
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: MARS
        User Name: Administrator
        Number of Processors: 1
        Processor Type: x86 Family 5 Model 2 Stepping 12
        Windows Version: 4.0
        Current Build: 1381
        Current Type: Uniprocessor Free
        Registered Organization: Spire Network Services
        Registered Owner: Russo

*----> Task List <----*
   0 Idle.exe
   2 System.exe
  22 smss.exe
  28 csrss.exe
  36 winlogon.exe
  43 services.exe
  46 lsass.exe
  74 spoolss.exe
  97 Apache.exe
 105 Apache.exe
 107 named.exe
  47 nddeagnt.exe
 166 llssrv.exe
 173 LOCATOR.exe
 184 RpcSs.exe
  84 Explorer.exe
 192 tcpsvcs.exe
 198 tapisrv.exe
 174 rasman.exe
 110 aim.exe
 230 rassrv.exe
 236 netscape.exe
  71 NOTEPAD.exe
 221 WinEdit.exe
 249 ntvdm.exe
 239 CMD.exe
  63 php.exe
 248 drwtsn32.exe
   0 _Total.exe

(00400000 - 00400000) 
(77f60000 - 77fbc000) dll\ntdll.dbg
(776d0000 - 776d8000) dll\wsock32.dbg
(776b0000 - 776c2000) dll\ws2_32.dbg
(78000000 - 78000000) 
(77f00000 - 77f5e000) dll\kernel32.dbg
(77e70000 - 77ec4000) dll\user32.dbg
(77ed0000 - 77efc000) dll\gdi32.dbg
(77dc0000 - 77dfe000) dll\advapi32.dbg
(77e10000 - 77e62000) dll\rpcrt4.dbg
(776a0000 - 776a6000) dll\ws2help.dbg
(77b20000 - 77bd2000) dll\ole32.dbg
(65340000 - 653d2000) c:\oa\rwin32\oleaut32.dll
(6a980000 - 6a9b4000) odbc32.dbg
(77bf0000 - 77c3f000) dll\comctl32.dbg
(77c40000 - 77d7c000) dll\shell32.dbg
(77d80000 - 77db2000) dll\comdlg32.dbg
(77a90000 - 77a9b000) dll\version.dbg
(779c0000 - 779c8000) dll\lz32.dbg
(04a00000 - 04a13000) ..\RES\US\ODBCLAN\\ndebug32\ODBCINT.dll
(10000000 - 10000000) 
(74ff0000 - 74ffc000) dll\rnr20.dbg

State Dump for Thread Id 0x10d

eax=00000000 ebx=01550000 ecx=00000d01 edx=77fa55b0 esi=0046bd50 edi=00000000
eip=77f6cc66 esp=0012ed84 ebp=0012ede4 iopl=0         nv up ei ng nz ac po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000296


function: RtlpWaitForCriticalSection
        77f6cc42 e920010000       jmp     RtlpWaitForCriticalSection+0x196 (77f6cd67)
        77f6cc47 803d7859fa7701                                        ds:77fa5978=01
                                  cmp     byte ptr [fltused+0xca8 (77fa5978)],0x1
        77f6cc4e 1bc0             sbb     eax,eax
        77f6cc50 25c05afa77       and     eax,0x77fa5ac0
        77f6cc55 837e1000         cmp   dword ptr [esi+0x10],0x0 ds:020da756=????????
        77f6cc59 8945fc           mov     [ebp-0x4],eax          ss:01d9d7ea=????????
        77f6cc5c 7506             jnz     RtlpWaitForCriticalSection+0x93 (77f6cc64)
        77f6cc5e 56               push    esi
        77f6cc5f e804feffff       call RtlSetCriticalSectionSpinCount+0x70 (77f6ca68)
        77f6cc64 8b06             mov     eax,[esi]              ds:0046bd50=00000000
FAULT ->77f6cc66 ff4010           inc     dword ptr [eax+0x10]   ds:01c6ea06=????????
        77f6cc69 8b06             mov     eax,[esi]              ds:0046bd50=00000000
        77f6cc6b ff75fc           push    dword ptr [ebp-0x4]    ss:01d9d7ea=????????
        77f6cc6e 6a00             push    0x0
        77f6cc70 ff4014           inc     dword ptr [eax+0x14]   ds:01c6ea06=????????
        77f6cc73 ff7610           push    dword ptr [esi+0x10]   ds:020da756=????????
        77f6cc76 e825b5ffff       call    NtWaitForSingleObject (77f681a0)
        77f6cc7b 3d02010000       cmp     eax,0x102
        77f6cc80 0f85b2000000     jne     RtlpWaitForCriticalSection+0x167 (77f6cd38)
        77f6cc86 57               push    edi
        77f6cc87 683ccbf677       push    0x77f6cb3c
        77f6cc8c e8c7940000       call    DbgPrint (77f76158)

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012ede4 77f67456 0046bd50 10009224 0046bd50 10009605 ntdll!RtlpWaitForCriticalSection 
00000000 00000000 00000000 00000000 00000000 00000000 ntdll!RtlEnterCriticalSection 

*----> Raw Stack Dump <----*
0012ed84  e0 f3 47 00 30 bd 46 00 - 40 00 55 01 00 02 00 00  ..G.0.F.@.U.....
0012ed94  fc ed 12 00 60 52 44 00 - e4 04 00 00 20 02 00 00  ....`RD..... ...
0012eda4  bc ed 12 00 3f 00 00 00 - 9a ae 23 01 15 00 00 00  ....?.....#.....
0012edb4  04 00 00 00 00 00 00 00 - 38 00 55 01 00 00 00 00  ........8.U.....
0012edc4  d0 ee 47 00 d8 21 01 00 - be 03 00 00 09 00 00 00  ..G..!..........
0012edd4  00 00 00 00 f5 92 00 10 - 00 00 34 01 00 00 00 00  ..........4.....
0012ede4  00 00 00 00 56 74 f6 77 - 50 bd 46 00 24 92 00 10  ....Vt.wP.F.$...
0012edf4  50 bd 46 00 05 96 00 10 - 30 bd 46 00 e0 f3 47 00  P.F.....0.F...G.
0012ee04  40 0f 35 01 09 44 00 10 - 30 bd 46 00 01 00 00 00  @.5..D..0.F.....
0012ee14  30 bd 46 00 70 f8 42 00 - 01 00 00 00 03 00 00 00  0.F.p.B.........
0012ee24  84 f8 42 00 01 00 00 00 - 84 f8 42 00 e0 f3 47 00  ..B.......B...G.
0012ee34  01 00 00 00 44 ee 12 00 - c1 15 00 10 dd 15 00 10  ....D...........
0012ee44  30 bd 46 00 40 0f 35 01 - d8 ee 12 00 00 00 00 00  0.F.@.5.........
0012ee54  30 ff 12 00 18 ef 12 00 - 10 11 25 01 30 27 25 01  0.........%.0'%.
0012ee64  52 77 42 00 01 00 00 00 - f0 e4 47 00 e0 f3 47 00  RwB.......G...G.
0012ee74  60 f3 47 00 00 80 ff ff - 65 01 00 00 c3 c0 42 00  `.G.....e.....B.
0012ee84  d8 ee 12 00 1c ff 12 00 - aa 5a 24 01 01 00 00 00  .........Z$.....
0012ee94  02 00 00 00 10 00 00 00 - f8 e3 46 00 df ff ff ff  ..........F.....
0012eea4  20 00 00 00 10 7e 24 01 - 10 bd 46 00 10 bd 46 00   ....~$...F...F.
0012eeb4  8d 83 42 00 01 00 01 00 - 88 00 00 00 50 2a 25 01  ..B.........P*%.



Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [1999-11-05 03:28 UTC] steinm at cvs dot php dot net
This is known a long time. Since pdflib 0.6 is way outdated
it won't be fixed. Newer version pdflib are likely to work.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue Apr 30 07:01:28 2024 UTC