php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #15071 fatal error in php.exe with xslt_process()
Submitted: 2002-01-16 12:49 UTC Modified: 2002-01-27 00:27 UTC
From: gbabb at datajunction dot com Assigned:
Status: Not a bug Package: XSLT related
PHP Version: 4.1.1 OS: Windows 2000
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: gbabb at datajunction dot com
New email:
PHP Version: OS:

 

 [2002-01-16 12:49 UTC] gbabb at datajunction dot com
when i attempted to execute this code

$xmlstring = join('', file('person.xml'));
$xslstring = join('', file('person.xsl'));
//echo $xslstring;
// call the XSLT processor directly

$xh = xslt_create() or die("No XSLT handler available: aborted.");


xslt_process($xh, $xmlstring, $xslstring,$result);

// output the result
echo $result;

PHP crashed and it wrote this to Dr Watson

Application exception occurred:
        App:  (pid=1640)
        When: 1/16/2002 @ 11:37:08.653
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: GBABB
        User Name: SYSTEM
        Number of Processors: 1
        Processor Type: x86 Family 5 Model 8 Stepping 12
        Windows 2000 Version: 5.0
        Current Build: 2195
        Service Pack: 2
        Current Type: Uniprocessor Free
        Registered Organization: Data Junction Corporation
        Registered Owner: IT Services

*----> Task List <----*
   0 Idle.exe
   8 System.exe
 140 SMSS.exe
 164 CSRSS.exe
 160 WINLOGON.exe
 212 SERVICES.exe
 224 LSASS.exe
 380 svchost.exe
 408 spoolsv.exe
 452 Apache.exe
 472 defwatch.exe
 488 svchost.exe
 524 mysqld-nt.exe
 588 rtvscan.exe
 616 Apache.exe
 868 regsvc.exe
 880 mstask.exe
 892 WinMgmt.exe
 956 inetinfo.exe
1144 explorer.exe
1232 MSGSYS.exe
1276 vptray.exe
1284 qttask.exe
1304 winampa.exe
1340 winmysqladmin.e.exe
1372 Eudora.exe
1528 Autorun.exe
 260 TextPad.exe
 284 IEXPLORE.exe
 112 IEXPLORE.exe
 420 NTVDM.exe
1316 IEXPLORE.exe
1640 php.exe
 980 DRWTSN32.exe
   0 _Total.exe

(00400000 - 00405000) 
(77F80000 - 77FFB000) 
(10000000 - 10135000) 
(77E80000 - 77F35000) 
(77E10000 - 77E74000) 
(77F40000 - 77F7C000) 
(75050000 - 75058000) 
(75030000 - 75043000) 
(78000000 - 78046000) 
(77DB0000 - 77E0B000) 
(77D40000 - 77DAC000) 
(75020000 - 75028000) 
(77A50000 - 77B3A000) 
(779B0000 - 77A4B000) 
(1F7F0000 - 1F825000) 
(76B30000 - 76B6E000) 
(70BD0000 - 70C1C000) 
(716F0000 - 7177A000) 
(782F0000 - 78532000) 
(1F8E0000 - 1F8F6000) 
(00B80000 - 00B8B000) 
(00B90000 - 00C05000) 
(00C10000 - 00C79000) 
(00C80000 - 00C98000) 
(55300000 - 55375000) 
(00CA0000 - 00CA8000) 
(00CB0000 - 00CDF000) 
(00CE0000 - 00D4D000) 

State Dump for Thread Id 0x66c

eax=3a6c7378 ebx=0000023f ecx=00000000 edx=00000003 esi=00ac37e8 edi=0012f6a8
eip=00cb2138 esp=0012f440 ebp=0012f6e0 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000206


function: <nosymbols>
        00cb211b 8906             mov     [esi],eax              ds:00ac37e8=00ad5488
        00cb211d ff74241c         push    dword ptr [esp+0x1c]   ss:00baca13=c08504c4
        00cb2121 50               push    eax
        00cb2122 e805e70100       call    00cd082c
        00cb2127 83660800         and    dword ptr [esi+0x8],0x0 ds:01540dba=????????
        00cb212b 895e04           mov     [esi+0x4],ebx          ds:01540dba=????????
        00cb212e 8b4708           mov     eax,[edi+0x8]          ds:00bacc7a=42c72456
        00cb2131 83c414           add     esp,0x14
        00cb2134 85c0             test    eax,eax
        00cb2136 7405             jz      00cbaa3d
FAULT ->00cb2138 897008           mov     [eax+0x8],esi          ds:3b14494a=????????
        00cb213b eb03             jmp     00cbaa40
        00cb213d 897704           mov     [edi+0x4],esi          ds:00bacc7a=42c72456
        00cb2140 011f             add     [edi],ebx              ds:0012f6a8=0a0d3e65
        00cb2142 897708           mov     [edi+0x8],esi          ds:00bacc7a=42c72456
        00cb2145 5f               pop     edi
        00cb2146 5e               pop     esi
        00cb2147 5b               pop     ebx
        00cb2148 c20800           ret     0x8
        00cb214b 55               push    ebp
        00cb214c 8bec             mov     ebp,esp
        00cb214e 51               push    ecx

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
0012F6E0 00CC7DE4 00000002 00000057 00AC40B0 0012F784 !<nosymbols> 
0012F71C 00CC91B2 00000002 00000057 00AC40B0 0012F784 !SDOM_getDisposeCallback 
0012F734 00CC9510 005176E8 00000002 00000057 00AC40B0 !SDOM_getDisposeCallback 
0012F79C 00CC3775 005176E8 00AC2A88 00AC2C0C 00AC2C08 !SDOM_getDisposeCallback 
0012F7DC 00CC3971 005176E8 00AC2C0C 00AC40A8 00000001 !<nosymbols> 
0012F810 00CC2CFC 005176E8 00AC2C0C 0012F888 0012F864 !<nosymbols> 
0012F8A0 00CC531B 005176E8 00A47650 00A45A48 00CA6400 !<nosymbols> 
0012F8C4 00CA1F34 00AC2C08 00A47650 00A45A48 00CA6400 !SablotRunProcessor 
00A47380 00AC2C08 00000001 00A475B8 00050005 00080100 !<nosymbols> 
00A46CF0 00000000 00000000 00000000 00000000 00000000 <nosymbols> 

*----> Raw Stack Dump <----*
0012f440  84 f4 12 00 9c f6 12 00 - a8 ad cd 00 cb 28 cb 00  .............(..
0012f450  84 f4 12 00 3f 02 00 00 - 9c f6 12 00 fd 28 cb 00  ....?........(..
0012f460  84 f4 12 00 3f 02 00 00 - 2e 45 02 78 e8 76 51 00  ....?....E.x.vQ.
0012f470  7d 7b cc 00 84 f4 12 00 - 02 00 00 00 e8 76 51 00  }{...........vQ.
0012f480  01 00 00 00 50 61 72 73 - 69 6e 67 20 27 3c 3f 78  ....Parsing '<?x
0012f490  6d 6c 20 76 65 72 73 69 - 6f 6e 3d 22 31 2e 30 22  ml version="1.0"
0012f4a0  3f 3e 0d 0a 0d 0a 3c 78 - 73 6c 3a 2f 73 74 79 6c  ?>....<xsl:/styl
0012f4b0  65 73 68 65 65 74 20 76 - 65 72 73 69 6f 6e 3d 22  esheet version="
0012f4c0  31 2e 30 22 0d 0a 78 6d - 6c 6e 73 3a 78 73 6c 3d  1.0"..xmlns:xsl=
0012f4d0  22 68 74 74 70 3a 2f 2f - 77 77 77 2e 77 33 2e 6f  "http://www.w3.o
0012f4e0  72 67 2f 31 39 39 39 2f - 58 53 4c 2f 54 72 61 6e  rg/1999/XSL/Tran
0012f4f0  73 66 6f 72 6d 22 3e 0d - 0a 0d 0a 3c 78 73 6c 3a  sform">....<xsl:
0012f500  74 65 6d 70 6c 61 74 65 - 20 6d 61 74 63 68 3d 22  template match="
0012f510  2f 22 3e 0d 0a 0d 0a 09 - 3c 68 74 6d 6c 3e 0d 0a  /">.....<html>..
0012f520  09 3c 68 65 61 64 3e 0d - 0a 09 3c 2f 68 65 61 64  .<head>...</head
0012f530  3e 0d 0a 09 3c 62 6f 64 - 79 3e 0d 0a 09 3c 68 31  >...<body>...<h1
0012f540  3e 43 6f 6e 74 61 63 74 - 20 69 6e 66 6f 72 6d 61  >Contact informa
0012f550  74 69 6f 6e 20 66 6f 72 - 20 3c 62 3e 3c 78 73 6c  tion for <b><xsl
0012f560  3a 76 61 6c 75 65 2d 6f - 66 20 73 65 6c 65 63 74  :value-of select
0012f570  3d 22 6d 65 2f 6e 61 6d - 65 22 20 2f 3e 3c 2f 62  ="me/name" /></b

State Dump for Thread Id 0x674

eax=00470650 ebx=00000000 ecx=002f3468 edx=00000000 esi=00f5ff68 edi=77e156ce
eip=77e1325c esp=00f5ff24 ebp=00f5ff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000             efl=00000246


function: TranslateMessageEx
        77e1323a 0f8500c40200     jne     EnumDesktopWindows+0xd88 (77e3f640)
        77e13240 33c0             xor     eax,eax
        77e13242 c20800           ret     0x8
        77e13245 ff742408         push    dword ptr [esp+0x8]    ss:019dd4f7=????????
        77e13249 51               push    ecx
        77e1324a e8b7370000       call    GetKeyState+0x92 (77e16a06)
        77e1324f ebf1             jmp     DialogBoxIndirectParamAorW+0x6ba (77e1eb42)
        77e13251 b89a110000       mov     eax,0x119a
        77e13256 8d542404         lea     edx,[esp+0x4]          ss:019dd4f7=????????
        77e1325a cd2e             int     2e
        77e1325c c21000           ret     0x10

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00F5FF44 100AC635 00F5FF68 00000000 00000000 00000000 user32!TranslateMessageEx 
00F5FFB4 77E8758A 00AC29E8 FFFFFFFF 0012FC1C 00AC29E8 !zend_timeout 
00F5FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetFilePointer 

========================================================================================================================

the same thing happens when i use 

$result = xslt_process($xh, $xmlstring, $xslstring);

    this seems to be the proper syntax according to the documentation.


finally, my php.ini extensions
;extension=php_bz2.dll
;extension=php_ctype.dll
;extension=php_cpdf.dll
;extension=php_curl.dll
;extension=php_cybercash.dll
;extension=php_db.dll
;extension=php_dba.dll
;extension=php_dbase.dll
;extension=php_dbx.dll
extension=php_domxml.dll
;extension=php_dotnet.dll
;extension=php_exif.dll
;extension=php_fbsql.dll
;extension=php_fdf.dll
;extension=php_filepro.dll
extension=php_gd.dll
;extension=php_gettext.dll
;extension=php_hyperwave.dll
;extension=php_iconv.dll
;extension=php_ifx.dll
;extension=php_iisfunc.dll
;extension=php_imap.dll
;extension=php_ingres.dll
;extension=php_interbase.dll
;extension=php_java.dll
;extension=php_ldap.dll
;extension=php_mbstring.dll
;extension=php_mcrypt.dll
;extension=php_mhash.dll
;extension=php_ming.dll
;extension=php_mssql.dll
;extension=php_oci8.dll
;extension=php_openssl.dll
;extension=php_oracle.dll
extension=php_pdf.dll
;extension=php_pgsql.dll
;extension=php_printer.dll
;extension=php_sablot.dll
;extension=php_shmop.dll
;extension=php_snmp.dll
;extension=php_sockets.dll
;extension=php_sybase_ct.dll
extension=php_xslt.dll
;extension=php_yaz.dll
;extension=php_zlib.dll



grant babb

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [2002-01-27 00:27 UTC] sterling@php.net
a) you've misunderstood xslt_process() syntax.
b) this is a sablotron bug, not a php bug.
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Fri Apr 19 21:01:30 2024 UTC