Process info:
Cmd line: map-server.exe
Platform: Windows OS version 6.1 build 7600
Exception:
0xc0000005 EXCEPTION_ACCESS_VIOLATION at location 0x58E525EC reading from location 0x04FDF610
Registers:
eax=04fdf610 ebx=7ffdf000 ecx=04fdf610 edx=00000000 esi=0012f674 edi=0012f8a0
eip=58e525ec esp=0012f660 ebp=0012f664 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010293
Stacktrace:
#0 0x58E525EC in strnlen+0x2C ()
#1 0x58C3148A in map_vendingstat_npcshop_sub+0x12A (nd=(struct npc_data*)0x0A0E9C04 <bytes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ap=(char*)0x0012FAB4 "") at d:\hercules\hercules\src\plugins\autoloottype.c:45
45 SQL->EscapeStringLen(map->mysql_handle, map_esc, map->list[nd->bl.m].name, strnlen(map->list[nd->bl.m].name,MAP_NAME_LENGTH));
shop_esc = (char[161]){0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00'}
map_esc = (char[25]){0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00'}
buf = (struct StringBuf*)0x0A154914 <bytes:BC339705FF37970500080000>
name = (char[24]){0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00'}
name_esc = (char[49]){0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00',0 '\x00'}
n_ptr = (int*)0x0012FCC0 11
i = (int)-858993460
n = (int)11
#2 0x00730E92 in map_vforeachnpc+0x102 (func=(<TODO typename of symtag 13>*)0x58C31140 <unknown data length>, args=(char*)0x0012FAAC "\x14I\x15\n\xC0\xFC\x12") at d:\hercules\hercules\src\map\map.c:2001
2001 ret = func(nd, argscopy);
ret = (int)0
nd = (struct npc_data*)0x0A0E9C04 <bytes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
argscopy = (char*)0x0012FAAC "\x14I\x15\n\xC0\xFC\x12"
bl = (struct block_list*)0x0A0E9C04 <bytes:00000000000000007FB18E06FFFF00000000000080000000>
iter = (struct DBIterator*)0x0623BF64 <bytes:58C65C0034085D002F085D006A095D00F2B35C001FB45C00FFE75C00>
#3 0x00730FAC in map_foreachnpc+0x3C (func=(<TODO typename of symtag 13>*)0x58C31140 <unknown data length>) at d:\hercules\hercules\src\map\map.c:2017
2017 map->vforeachnpc(func, args);
args = (char*)0x0012FAAC "\x14I\x15\n\xC0\xFC\x12"
#4 0x58C31C4F in map_vendingstat_tosql_timer+0x4CF (tid=(int)98, tick=(long long)3309456, id=(int)0, data=(int)0) at d:\hercules\hercules\src\plugins\autoloottype.c:122
122 map->foreachnpc(map_vendingstat_npcshop_sub, buf, &n);
buf = (struct StringBuf*)0x0A154914 <bytes:BC339705FF37970500080000>
sd = (struct map_session_data*)0x00000000 <invalid memory>
n = (int)11
iter = (struct s_mapiterator*)0x06073D98 <bytes:>
#5 0x0060BD5A in do_timer+0x53A (tick=(long long)3309498) at d:\hercules\hercules\src\common\timer.c:393
393 timer_data[tid].func(tid, timer_data[tid].tick, timer_data[tid].id, timer_data[tid].data);
tid = (int)98
diff = (long long)-42
#6 0x005E1F95 in main+0x1E5 (argc=(int)1, argv=(char**)0x00381C00) at d:\hercules\hercules\src\common\core.c:359
359 next = timer->do_timer(timer->gettick_nocache());
next = (int)50
#7 0x0090E919 in __tmainCRTStartup+0x129 () at f:\dd\vctools\crt_bld\self_x86\crt\src\crt0.c:278
mainret = (int)0
managedapp = (int)0
initret = (int)0
#8 0x0090E7DF in mainCRTStartup+0xF () at f:\dd\vctools\crt_bld\self_x86\crt\src\crt0.c:189
#9 0x75881174 in BaseThreadInitThunk+0x12 ()
#10 0x76E5B3F5 in RtlInitializeExceptionChain+0x63 ()
#11 0x76E5B3C8 in RtlInitializeExceptionChain+0x36 ()
Loaded modules:
0x00400000 D:\hercules\Hercules\map-server.exe (0.0.0.0, 21651456 bytes)
0x76E00000 C:\Windows\System32\ntdll.dll (6.1.7600.16385, 1294336 bytes)
0x75830000 C:\Windows\System32\kernel32.dll (6.1.7600.16385, 868352 bytes)
0x75030000 C:\Windows\System32\KERNELBASE.dll (6.1.7600.16385, 303104 bytes)
0x76F40000 C:\Windows\System32\ws2_32.dll (6.1.7600.16385, 217088 bytes)
0x75AF0000 C:\Windows\System32\msvcrt.dll (7.0.7600.16385, 704512 bytes)
0x76F80000 C:\Windows\System32\rpcrt4.dll (6.1.7600.16385, 659456 bytes)
0x75AB0000 C:\Windows\System32\nsi.dll (6.1.7600.16385, 24576 bytes)
0x10000000 D:\hercules\Hercules\libmysql.dll (0.0.0.0, 1462272 bytes)
0x72D10000 C:\Windows\System32\wsock32.dll (6.1.7600.16385, 28672 bytes)
0x75F10000 C:\Windows\System32\advapi32.dll (6.1.7600.16385, 655360 bytes)
0x75EF0000 C:\Windows\System32\sechost.dll (6.1.7600.16385, 102400 bytes)
0x00160000 D:\hercules\Hercules\zlib1.dll (1.2.7.0, 81920 bytes)
0x002F0000 D:\hercules\Hercules\pcre3.dll (8.30.910.0, 159744 bytes)
0x74A00000 C:\Windows\System32\cryptsp.dll (6.1.7600.16385, 90112 bytes)
0x74770000 C:\Windows\System32\rsaenh.dll (6.1.7600.16385, 241664 bytes)
0x74ED0000 C:\Windows\System32\CRYPTBASE.dll (6.1.7600.16385, 49152 bytes)
0x731B0000 C:\Windows\System32\nlaapi.dll (6.1.7600.16385, 65536 bytes)
0x749C0000 C:\Windows\System32\mswsock.dll (6.1.7600.16385, 245760 bytes)
0x75690000 C:\Windows\System32\user32.dll (6.1.7600.16385, 823296 bytes)
0x75910000 C:\Windows\System32\gdi32.dll (6.1.7600.16385, 319488 bytes)
0x75820000 C:\Windows\System32\lpk.dll (6.1.7600.16385, 40960 bytes)
0x75E50000 C:\Windows\System32\usp10.dll (1.626.7600.16385, 643072 bytes)
0x75250000 C:\Windows\System32\imm32.dll (6.1.7600.16385, 126976 bytes)
0x75960000 C:\Windows\System32\msctf.dll (6.1.7600.16385, 835584 bytes)
0x74880000 C:\Windows\System32\dnsapi.dll (6.1.7600.16385, 278528 bytes)
0x73320000 C:\Windows\System32\winrnr.dll (6.1.7600.16385, 32768 bytes)
0x72B60000 C:\Windows\System32\NapiNSP.dll (6.1.7600.16385, 65536 bytes)
0x72B40000 C:\Windows\System32\pnrpnsp.dll (6.1.7600.16385, 73728 bytes)
0x72B30000 C:\Windows\System32\wshbth.dll (6.1.7600.16385, 53248 bytes)
0x70A50000 C:\Program Files\Bonjour\mdnsNSP.dll (2.0.4.0, 151552 bytes)
0x72C50000 C:\Windows\System32\IPHLPAPI.DLL (6.1.7600.16385, 114688 bytes)
0x72EA0000 C:\Windows\System32\winnsi.dll (6.1.7600.16385, 28672 bytes)
0x70A20000 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL (7.250.4232.0, 159744 bytes)
0x75440000 C:\Windows\System32\psapi.dll (6.1.7600.16385, 20480 bytes)
0x75760000 C:\Windows\System32\shlwapi.dll (6.1.7600.16385, 356352 bytes)
0x715F0000 C:\Windows\System32\FWPUCLNT.DLL (6.1.7600.16385, 229376 bytes)
0x70B60000 C:\Windows\System32\rasadhlp.dll (6.1.7600.16385, 24576 bytes)
0x04000000 D:\hercules\Hercules\plugins\HPMHooking.dll (0.0.0.0, 13803520 bytes)
0x6C420000 D:\hercules\Hercules\plugins\itemmap.dll (0.0.0.0, 339968 bytes)
0x58DE0000 C:\Windows\System32\MSVCR100D.dll (10.0.30319.1, 1515520 bytes)
0x58DB0000 D:\hercules\Hercules\plugins\dbghelpplug.dll (0.0.0.0, 139264 bytes)
0x58C20000 D:\hercules\Hercules\plugins\autoloottype.dll (0.0.0.0, 339968 bytes)
0x744A0000 C:\Windows\System32\WSHTCPIP.DLL (6.1.7600.16385, 20480 bytes)
0x58990000 D:\hercules\Hercules\dbghelp.dll (6.12.2.633, 1314816 bytes)
0x73BB0000 C:\Windows\System32\powrprof.dll (6.1.7600.16385, 151552 bytes)
0x75CA0000 C:\Windows\System32\setupapi.dll (6.1.7600.16385, 1691648 bytes)
0x75000000 C:\Windows\System32\cfgmgr32.dll (6.1.7600.16385, 159744 bytes)
0x755B0000 C:\Windows\System32\oleaut32.dll (6.1.7600.16385, 585728 bytes)
0x75450000 C:\Windows\System32\ole32.dll (6.1.7600.16385, 1425408 bytes)
0x75230000 C:\Windows\System32\devobj.dll (6.1.7600.16385, 73728 bytes)