Tidy crashes due to access violation

I have just discovered and downloaded HTML Tidy yesterday, and now i have
been testing it on some ASP files. I have run into a problem, which I have
been able to pinpoint to some ASP code in an INPUT tag (see example below).
I have not found anything on this in the archives.

When I run tidy on this file, it crashes with an access violation
application error.


<%@ LANGUAGE="JSCRIPT" %>

<html>
<HEAD>
<title>Tidy application error</title>
<body>
<form>
  <INPUT TYPE="submit" <% if (Session("MSIE4")) Response.Write("disabled")
%> VALUE="Ok" NAME="submit">
</form>
</body>
</html>


I can even remove all the code from within the <% %> and still get the
crash! Is is so that Tidy can not handle ASP code in this context. I know
it
can handle attribute values, but this attribute (DISABLED) is not of the
form <name>="<value>". Could this be the reason for the crash, or have I
made a mistake somewhere?


Best regards,

Joakim Holm


ADDITIONAL INFO
===============

This is my current config file:

// Configuration file for the Tidy utility.
tidy-mark: yes
markup: yes
wrap-asp: no
tab-size: 4
indent: auto
indent-spaces: 2
indent-attributes: no
output-xhtml: no
doctype: loose           // Default is auto
char-encoding: ascii
uppercase-tags: yes      // Default is no
uppercase-attributes: yes     // Default is no
clean: no
logical-emphasis: no
enclose-text: yes        // Default is no
write-back: no
error-file: tidy_errors.log


This is the output in the error log file if it is of any help:

Application exception occurred:
        App:  (pid=483)        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: ELN-NT
        User Name: jhm
        Number of Processors: 1
        Processor Type: x86 Family 6 Model 5 Stepping 3
        Windows Version: 4.0
        Current Build: 1381
        Service Pack: 5
        Current Type: Uniprocessor Free
        Registered Organization: AB Dagens Nyheter
        Registered Owner: .

*----> Task List <----*
   0 Idle.exe
   2 System.exe
  27 SMSS.exe
  37 CSRSS.exe
  43 WINLOGON.exe
  47 SERVICES.exe
  50 LSASS.exe
  76 SPOOLSS.exe
  93 TKSCHNTS.exe
  19 cpqalert.exe
  95 METHWNT.exe
 101 NTGUARD.exe
 103 BRAD32.exe
 111 Rosnmgr.exe
 119 RPCSS.exe
 126 TAPISRV.exe
 135 PSTORES.exe
 112 mstask.exe
 159 Win32sl.exe
 185 cpqdmi.exe
 352 NDDEAGNT.exe
 271 EXPLORER.exe
 393 systray.exe
 251 Winmsuit.exe
 457 LOADWC.exe
 131 chkadmin.exe
 415 NTACMON.exe
 438 realplay.exe
 418 tsystray.exe
 431 WINHLP32.exe
 207 DeskTray.exe
 223 IEXPLORE.exe
 319 DDHELP.exe
 297 AcroRd32.exe
  79 winampa.exe
 132 DEVENV.exe
 176 netscape.exe
 409 Icq.exe
 474 IEXPLORE.exe
 274 OUTLOOK.exe
 458 winword.exe
 512 CMD.exe
 265 MDM.exe
 209 notepad.exe
 243 IEXPLORE.exe
 483 tidy.exe
  31 DRWTSN32.exe
   0 _Total.exe

(00400000 - 00400000)
(77f60000 - 77fbe000) dll\ntdll.dbg
(77f00000 - 77f5e000) dll\kernel32.dbg

State Dump for Thread Id 0x15e

eax=00000000 ebx=00000000 ecx=004378f0 edx=00433b6e esi=00437950edi=00000001pl nz na po
nc
cs=001b  ss=0023  ds=0023  es=0023  fs=0038  gs=0000
function: <nosymbols>
        0040f4ca 90               nop
        0040f4cb 90               nop
        0040f4cc 90               nop
        0040f4cd 90               nop
        0040f4ce 90               nop
        0040f4cf 90               nop
        0040f4d0 53               push    ebx
        0040f4d1 8b5c240c         mov     ebx,[esp+0xc]=????????
        0040f4d5 55               push    ebp
        0040f4d6 56               push    esi
FAULT ->0040f4d7 0fbe03           movsx   eax,byte ptr [ebx]
ds:00000000=??
        0040f4da 57               push    edi
        0040f4db 8b7c2414         mov     edi,[esp+0x14]=????????
        0040f4df 50               push    eax
        0040f4e0 0fbe37           movsx   esi,byte ptr [edi]
ds:00000001=??
        0040f4e3 e81851ffff       call    00404600
        0040f4e8 56               push    esi
        0040f4e9 8be8             mov     ebp,eax
        0040f4eb e81051ffff       call    00404600
        0040f4f0 83c408           add     esp,0x8
        0040f4f3 3bc5             cmp     eax,ebp
        0040f4f5 7522             jnz     0040f519

*----> Stack Back Trace <----*

FramePtr ReturnAd Param#1  Param#2  Param#3  Param#4  Function Name
00437a20 00000000 00000000 00000000 00000000 004378b0 <nosymbols>
00000000 00000000 00000000 00000000 00000000 00000000 !<nosymbols>*----> Raw Stack Dump <----*
0012fdd0  50 79 43 00 20 7a 43 00 - b0 78 43 00 b2 13 40 00  PyC.
zC..xC...@.
0012fde0  f0 78 43 00 00 00 00 00 - b0 78 43 00 b0 78 43 00
.xC......xC..xC.
0012fdf0  b0 7c 43 00 20 7a 43 00 - 28 14 40 00 b0 7c 43 00  .|C.
zC.(.@..|C.
0012fe00  20 7a 43 00 b0 78 43 00 - 20 7a 43 00 b0 78 43 00   zC..xC.
zC..xC.
0012fe10  b0 78 43 00 b0 7c 43 00 - 8a 17 40 00 b0 7c 43 00
.xC..|C...@..|C.
0012fe20  20 7a 43 00 b0 78 43 00 - 00 00 00 00 1f 00 00 00
zC..xC.........
0012fe30  b0 7c 43 00 49 61 40 00 - b0 7c 43 00 20 7a 43 00  .|C.Ia@..|C.
zC.
0012fe40  b0 7c 43 00 00 00 00 00 - 70 7a 43 00 00 00 00 00
.|C.....pzC.....
0012fe50  00 00 00 00 e0 8a 40 00 - 00 00 00 00 00 00 00 00
......@.........
0012fe60  b0 7c 43 00 00 00 00 00 - c0 7a 43 00 00 00 00 00
.|C......zC.....
0012fe70  01 00 00 00 f4 88 40 00 - b0 7c 43 00 70 7a 43 00
......@..|C.pzC.
0012fe80  00 00 00 00 70 7a 43 00 - 07 b3 40 00 b0 7c 43 00
....pzC...@..|C.
0012fe90  70 7a 43 00 00 00 00 00 - c0 7a 43 00 70 7a 43 00
pzC......zC.pzC.
0012fea0  b0 7c 43 00 00 00 00 00 - 00 00 00 00 f0 7b 43 00
.|C..........{C.00
......@..|C..zC.
0012fec0  00 00 00 00 c0 7a 43 00 - d0 b8 40 00 b0 7c 43 00
.....zC...@..|C.
0012fed0  c0 7a 43 00 00 00 00 00 - f0 7b 43 00 c0 7a 43 00
.zC......{C..zC.00
.|C..{C.....p|C.00
......@..|C..{C.00
....p|C..{C...C.

Received on Friday, 24 March 2000 14:14:27 UTC