Hi,

I have a crash at sqlite (encryption extension). Here is code:

     sequence_t SQLiteDataFile::lastSequence(const string& keyStoreName)
const {
        sequence_t seq = 0;
        compile(_getLastSeqStmt, "SELECT lastSeq FROM kvmeta WHERE name=?");
        UsingStatement u(_getLastSeqStmt);
        _getLastSeqStmt->bindNoCopy(1, keyStoreName);
        if (_getLastSeqStmt->executeStep())   //// <-- crash here
            seq = (int64_t)_getLastSeqStmt->getColumn(0);
        return seq;
    }
It happens only once and I still can't reproduce. Here is brief stack trace
(detailed stacktrace in the attachment).

00000004`ce1f9ba8 00007ff7`6f4efcd4 : 000001a7`cab470c0
00000000`00000021 cccccccc`00000000 cccccccc`cccccccc :
VCRUNTIME140D!MoveSmall+0x68
00000004`ce1f9bb0 00007ff7`6f5247b9 : 000001a7`cb51d900
cccccccc`cccccccc cccccccc`cccccccc cccccccc`cccccccc :
CortexService!sqlite3VdbeExec+0x3b54
00000004`ce1faa50 00007ff7`6f499a43 : 000001a7`cb51d900
cccccccc`cccccccc cccccccc`cccccccc cccccccc`cccccccc :
CortexService!sqlite3Step+0x1d9
00000004`ce1faa90 00007ff7`6f653002 : 000001a7`cb51d900
cccccccc`cccccccc cccccccc`cccccccc cccccccc`cccccccc :
CortexService!sqlite3_step+0x93
00000004`ce1fab00 00007ff7`6f5fdcd5 : 000001a7`cb675f90
000001a7`00000001 000001a7`cb3e4c00 cccccccc`cccccccc :
CortexService!SQLite::Statement::executeStep+0x72
00000004`ce1fabc0 00007ff7`6f65d083 : 000001a7`cb301d50
000001a7`cb3e4c00 cccccccc`cccccccc cccccccc`cccccccc :
CortexService!litecore::SQLiteDataFile::lastSequence+0xc5
00000004`ce1fac60 00007ff7`6f65d773 : 000001a7`cb3e4bf0
000001a7`00000005 000001a7`cbedb4d4 cccccccc`0000000c :

FAULTING_SOURCE_LINE:  f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm

FAULTING_SOURCE_FILE:  f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm

FAULTING_SOURCE_LINE_NUMBER:  226

FAULTING_SOURCE_CODE:
No source found for 'f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm'


Can you please give some suggestions when this can happen and maybe
how to fix it?

Thanks in advance!

Tham
Microsoft (R) Windows Debugger Version 10.0.18972.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File 
[C:\Users\Tham\Downloads\24ff4711-7801-422b-bbfb-79915bec7d22.dmp]
User Mini Dump File: Only registers, stack and portions of memory are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
DBGHELP: Symbol Search Path: 
cache*;SRV*https://msdl.microsoft.com/download/symbols
Symbol search path is: srv*
Executable search path is: 
Windows 10 Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: SingleUserTS
10.0.14393.206 (rs1_release.160915-0644)
Machine Name:
Debug session time: Tue Sep 17 16:55:19.000 2019 (UTC + 7:00)
System Uptime: not available
Process Uptime: 0 days 0:13:14.000
................................................................
...............
This dump file has an exception of interest stored in it.
The stored exception information can be accessed via .ecxr.
(2944.1f4): Access violation - code c0000005 (first/second chance not available)
For analysis of this file, run !analyze -v
SYMSRV:  BYINDEX: 0x1
         C:\ProgramData\Dbg\sym
         ntdll.dll
         5825887F1d1000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\ntdll.dll\5825887F1d1000\ntdll.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ntdll.dll\5825887F1d1000\ntdll.dll - OK
DBGENG:  C:\ProgramData\Dbg\sym\ntdll.dll\5825887F1d1000\ntdll.dll - Mapped 
image memory
SYMSRV:  BYINDEX: 0x2
         C:\ProgramData\Dbg\sym
         ntdll.pdb
         4E0AC1E0213F4DB5BE3D07B0A54565C01
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\ntdll.pdb\4E0AC1E0213F4DB5BE3D07B0A54565C01\ntdll.pdb
SYMSRV:  RESULT: 0x00000000
DBGHELP: ntdll - public symbols  
        
C:\ProgramData\Dbg\sym\ntdll.pdb\4E0AC1E0213F4DB5BE3D07B0A54565C01\ntdll.pdb
SYMSRV:  BYINDEX: 0x3
         C:\ProgramData\Dbg\sym
         KERNELBASE.dll
         582588E621d000
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\KERNELBASE.dll\582588E621d000\KERNELBASE.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\KERNELBASE.dll\582588E621d000\KERNELBASE.dll - 
OK
Map C:\Windows\System32\KERNELBASE.dll:
  Image region 400:cf200 does not fit in mapping
DBGENG:  KERNELBASE.dll - Partial symbol image load missing image info
DBGHELP: Module is not fully loaded into memory.
DBGHELP: Searching for symbols using debugger-provided data.
SYMSRV:  BYINDEX: 0x4
         C:\ProgramData\Dbg\sym
         kernelbase.pdb
         2797F41DA1EB4D39A25C73C95BC7C7901
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\kernelbase.pdb\2797F41DA1EB4D39A25C73C95BC7C7901\kernelbase.pdb
SYMSRV:  RESULT: 0x00000000
*** WARNING: Unable to verify timestamp for KERNELBASE.dll
DBGHELP: KERNELBASE - public symbols  
        
C:\ProgramData\Dbg\sym\kernelbase.pdb\2797F41DA1EB4D39A25C73C95BC7C7901\kernelbase.pdb
ntdll!NtWaitForSingleObject+0x14:
00007ffa`4ed46154 c3              ret
0:004> !reload /i CortexService.exe
SYMSRV:  BYINDEX: 0xD
         C:\ProgramData\Dbg\sym
         CortexService.exe
         5D7F5C5A1e29000
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\CortexService.exe\5D7F5C5A1e29000\CortexService.exe
SYMSRV:  RESULT: 0x00000000
DBGHELP: 
C:\ProgramData\Dbg\sym\CortexService.exe\5D7F5C5A1e29000\CortexService.exe - OK
DBGENG:  
C:\ProgramData\Dbg\sym\CortexService.exe\5D7F5C5A1e29000\CortexService.exe - 
Mapped image memory
SYMSRV:  BYINDEX: 0xE
         C:\ProgramData\Dbg\sym
         CortexService.pdb
         102E688E21BF4B8B88CF9D2C5B71B3B21
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\CortexService.pdb\102E688E21BF4B8B88CF9D2C5B71B3B21\CortexService.pdb
SYMSRV:  RESULT: 0x00000000
*** WARNING: Unable to verify checksum for CortexService.exe
DBGHELP: CortexService - private symbols & lines 
        
C:\ProgramData\Dbg\sym\CortexService.pdb\102E688E21BF4B8B88CF9D2C5B71B3B21\CortexService.pdb
0:004> !analyze -v
*******************************************************************************
*                                                                             *
*                        Exception Analysis                                   *
*                                                                             *
*******************************************************************************

SYMSRV:  BYINDEX: 0x13
         C:\ProgramData\Dbg\sym
         ole32.dll
         584A7A91137000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\ole32.dll\584A7A91137000\ole32.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\ole32.dll\584A7A91137000\ole32.dll - OK
Map C:\Windows\System32\ole32.dll:
  Image region 400:b5800 does not fit in mapping
DBGENG:  ole32.dll - Partial symbol image load missing image info
DBGHELP: Module is not fully loaded into memory.
DBGHELP: Searching for symbols using debugger-provided data.
SYMSRV:  BYINDEX: 0x14
         C:\ProgramData\Dbg\sym
         ole32.pdb
         B11945F174DE4A4EBE0198C88C602FC11
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\ole32.pdb\B11945F174DE4A4EBE0198C88C602FC11\ole32.pdb
SYMSRV:  RESULT: 0x00000000
*** WARNING: Unable to verify timestamp for ole32.dll
DBGHELP: ole32 - private symbols & lines 
        
C:\ProgramData\Dbg\sym\ole32.pdb\B11945F174DE4A4EBE0198C88C602FC11\ole32.pdb
SYMSRV:  BYINDEX: 0x15
         C:\ProgramData\Dbg\sym
         sechost.dll
         57899A7C59000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\sechost.dll\57899A7C59000\sechost.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\sechost.dll\57899A7C59000\sechost.dll - OK
DBGENG:  C:\ProgramData\Dbg\sym\sechost.dll\57899A7C59000\sechost.dll - Mapped 
image memory
SYMSRV:  BYINDEX: 0x16
         C:\ProgramData\Dbg\sym
         sechost.pdb
         30CA1E056912444989DB781BE1F7AE5C1
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\sechost.pdb\30CA1E056912444989DB781BE1F7AE5C1\sechost.pdb
SYMSRV:  RESULT: 0x00000000
DBGHELP: sechost - public symbols  
        
C:\ProgramData\Dbg\sym\sechost.pdb\30CA1E056912444989DB781BE1F7AE5C1\sechost.pdb
SYMSRV:  BYINDEX: 0x17
         C:\ProgramData\Dbg\sym
         hid.dll
         57899B70c000
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll - path not 
found
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dl_ - path not 
found
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\file.ptr - path not 
found
SYMSRV:  RESULT: 0x80070003
SYMSRV:  BYINDEX: 0x18
         C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
         hid.dll
         57899B70c000
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll - path not 
found
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dl_ - path not 
found
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\file.ptr - path not 
found
SYMSRV:  HTTPGET: /download/symbols/hid.dll/57899B70c000/hid.dll
SYMSRV:  HttpQueryInfo: 801900c8 - HTTP_STATUS_OK
SYMSRV:  hid.dll from https://msdl.microsoft.com/download/symbols: 34816 bytes 
copied      
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll cached to 
C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll
DBGHELP: C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll - OK
DBGENG:  C:\ProgramData\Dbg\sym\hid.dll\57899B70c000\hid.dll - Mapped image 
memory
SYMSRV:  BYINDEX: 0x19
         C:\ProgramData\Dbg\sym
         hid.pdb
         FEE041D863674D13B519A2DA7B4333681
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pdb - path 
not found
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pd_ - path 
not found
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\file.ptr - 
path not found
SYMSRV:  RESULT: 0x80070003
SYMSRV:  BYINDEX: 0x1A
         C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
         hid.pdb
         FEE041D863674D13B519A2DA7B4333681
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pdb - path 
not found
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pd_ - path 
not found
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\file.ptr - 
path not found
SYMSRV:  HTTPGET: 
/download/symbols/hid.pdb/FEE041D863674D13B519A2DA7B4333681/hid.pdb
SYMSRV:  HttpQueryInfo: 801900c8 - HTTP_STATUS_OK
SYMSRV:  hid.pdb from https://msdl.microsoft.com/download/symbols: 52224 bytes 
copied      
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pdb
SYMSRV:  RESULT: 0x00000000
DBGHELP: 
C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pdb cached 
to C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pdb
DBGHELP: hid - public symbols  
        C:\ProgramData\Dbg\sym\hid.pdb\FEE041D863674D13B519A2DA7B4333681\hid.pdb
SYMSRV:  BYINDEX: 0x1B
         C:\ProgramData\Dbg\sym
         winmm.dll
         57899AE323000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\winmm.dll\57899AE323000\winmm.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\winmm.dll\57899AE323000\winmm.dll - OK
DBGENG:  C:\ProgramData\Dbg\sym\winmm.dll\57899AE323000\winmm.dll - Mapped 
image memory
SYMSRV:  BYINDEX: 0x1C
         C:\ProgramData\Dbg\sym
         winmm.pdb
         379C88EA10984BE8A1E1D72B4C0A836E1
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\winmm.pdb\379C88EA10984BE8A1E1D72B4C0A836E1\winmm.pdb
SYMSRV:  RESULT: 0x00000000
DBGHELP: winmm - public symbols  
        
C:\ProgramData\Dbg\sym\winmm.pdb\379C88EA10984BE8A1E1D72B4C0A836E1\winmm.pdb
SYMSRV:  BYINDEX: 0x1D
         C:\ProgramData\Dbg\sym
         mswsock.dll
         57899A815c000
SYMSRV:  PATH: C:\ProgramData\Dbg\sym\mswsock.dll\57899A815c000\mswsock.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: C:\ProgramData\Dbg\sym\mswsock.dll\57899A815c000\mswsock.dll - OK
DBGENG:  C:\ProgramData\Dbg\sym\mswsock.dll\57899A815c000\mswsock.dll - Mapped 
image memory
SYMSRV:  BYINDEX: 0x1E
         C:\ProgramData\Dbg\sym
         mswsock.pdb
         3ECFE529FA4746D98F4633C33EE460691
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\mswsock.pdb\3ECFE529FA4746D98F4633C33EE460691\mswsock.pdb
SYMSRV:  RESULT: 0x00000000
DBGHELP: mswsock - public symbols  
        
C:\ProgramData\Dbg\sym\mswsock.pdb\3ECFE529FA4746D98F4633C33EE460691\mswsock.pdb
SYMSRV:  BYINDEX: 0x1F
         C:\ProgramData\Dbg\sym
         BluetoothApis.dll
         5801A8D523000
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll - file 
not found
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dl_ - file 
not found
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\file.ptr - 
file not found
SYMSRV:  RESULT: 0x80070002
SYMSRV:  BYINDEX: 0x20
         C:\ProgramData\Dbg\sym*https://msdl.microsoft.com/download/symbols
         BluetoothApis.dll
         5801A8D523000
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll - file 
not found
SYMSRV:  UNC: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dl_ - file 
not found
SYMSRV:  UNC: C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\file.ptr - 
file not found
SYMSRV:  HTTPGET: 
/download/symbols/BluetoothApis.dll/5801A8D523000/BluetoothApis.dll
SYMSRV:  HttpQueryInfo: 801900c8 - HTTP_STATUS_OK
SYMSRV:  BluetoothApis.dll from https://msdl.microsoft.com/download/symbols: 
120832 bytes copied      
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll
SYMSRV:  RESULT: 0x00000000
DBGHELP: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll cached 
to C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll
DBGHELP: 
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll - OK
DBGENG:  
C:\ProgramData\Dbg\sym\BluetoothApis.dll\5801A8D523000\BluetoothApis.dll - 
Mapped image memory
SYMSRV:  BYINDEX: 0x21
         C:\ProgramData\Dbg\sym
         BluetoothApis.pdb
         1782341B160E404A8EF83F8C369B06521
SYMSRV:  PATH: 
C:\ProgramData\Dbg\sym\BluetoothApis.pdb\1782341B160E404A8EF83F8C369B06521\BluetoothApis.pdb
SYMSRV:  RESULT: 0x00000000
DBGHELP: BluetoothApis - public symbols  
        
C:\ProgramData\Dbg\sym\BluetoothApis.pdb\1782341B160E404A8EF83F8C369B06521\BluetoothApis.pdb
DBGHELP: VCRUNTIME140D is not source indexed

KEY_VALUES_STRING: 1

    Key  : AV.Dereference
    Value: NullPtr

    Key  : AV.Fault
    Value: Read

    Key  : Analysis.CPU.Sec
    Value: 1

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-ICB5G90

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.Sec
    Value: 8

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 236

    Key  : Analysis.System
    Value: CreateObject

    Key  : Timeline.Process.Start.DeltaSec
    Value: 794


CONTEXT:  (.ecxr)
rax=000001a7cbed7ea0 rbx=0000000000000000 rcx=00007ffa4908177f
rdx=0000000000000000 rsi=00000004ce1fae08 rdi=00000004ce1faa40
rip=00007ffa4908177f rsp=00000004ce1f9ba8 rbp=0000000000000000
 r8=0000000000000001  r9=00007ffa49080000 r10=0000000000000000
r11=000001a7cbed7ea0 r12=000000000057005e r13=0000000000000401
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
cs=0033  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
VCRUNTIME140D!MoveSmall+0x68:
00007ffa`4908177f 0fb60a          movzx   ecx,byte ptr [rdx] 
ds:00000000`00000000=??
Resetting default scope

EXCEPTION_RECORD:  (.exr -1)
ExceptionAddress: 00007ffa4908177f (VCRUNTIME140D!MoveSmall+0x0000000000000068)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000

PROCESS_NAME:  CortexService.exe

READ_ADDRESS:  0000000000000000 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory 
at 0x%p. The memory could not be %s.

EXCEPTION_CODE_STR:  c0000005

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

STACK_TEXT:  
00000004`ce1f9ba8 00007ff7`6f4efcd4 : 000001a7`cab470c0 00000000`00000021 
cccccccc`00000000 cccccccc`cccccccc : VCRUNTIME140D!MoveSmall+0x68
00000004`ce1f9bb0 00007ff7`6f5247b9 : 000001a7`cb51d900 cccccccc`cccccccc 
cccccccc`cccccccc cccccccc`cccccccc : CortexService!sqlite3VdbeExec+0x3b54
00000004`ce1faa50 00007ff7`6f499a43 : 000001a7`cb51d900 cccccccc`cccccccc 
cccccccc`cccccccc cccccccc`cccccccc : CortexService!sqlite3Step+0x1d9
00000004`ce1faa90 00007ff7`6f653002 : 000001a7`cb51d900 cccccccc`cccccccc 
cccccccc`cccccccc cccccccc`cccccccc : CortexService!sqlite3_step+0x93
00000004`ce1fab00 00007ff7`6f5fdcd5 : 000001a7`cb675f90 000001a7`00000001 
000001a7`cb3e4c00 cccccccc`cccccccc : 
CortexService!SQLite::Statement::executeStep+0x72
00000004`ce1fabc0 00007ff7`6f65d083 : 000001a7`cb301d50 000001a7`cb3e4c00 
cccccccc`cccccccc cccccccc`cccccccc : 
CortexService!litecore::SQLiteDataFile::lastSequence+0xc5
00000004`ce1fac60 00007ff7`6f65d773 : 000001a7`cb3e4bf0 000001a7`00000005 
000001a7`cbedb4d4 cccccccc`0000000c : 
CortexService!litecore::SQLiteKeyStore::lastSequence+0x63
00000004`ce1faca0 00007ff7`6f64c440 : 000001a7`cb3e4bf0 00000004`ce1fae30 
00000004`ce1fae40 00000004`ce1fae50 : 
CortexService!litecore::SQLiteKeyStore::set+0x263
00000004`ce1fad40 00007ff7`6f5ca868 : 000001a7`cb3d08f0 000001a7`caa95c70 
cccccccc`cccccccc cccccccc`cccccccc : 
CortexService!litecore::VersionedDocument::save+0x240
00000004`ce1faeb0 00007ff7`6f5ca9db : 000001a7`cb3d0840 000001a7`00000014 
cccccccc`cccccccc cccccccc`cccccccc : 
CortexService!c4Internal::TreeDocument::save+0x98
00000004`ce1faef0 00007ff7`6f5c9d91 : 000001a7`cb3d0840 00000004`ce1fb680 
000001a7`cb9824d0 cccccccc`cccccc01 : 
CortexService!c4Internal::TreeDocument::saveNewRev+0xab
00000004`ce1fafb0 00007ff7`6f6ebe73 : 000001a7`cb3d0840 00000004`ce1fb680 
00000004`ce1fb370 cccccccc`cccccc00 : 
CortexService!c4Internal::TreeDocument::putNewRevision+0x281
00000004`ce1fb1d0 00007ff7`6f74d882 : 000001a7`ca934550 00000004`ce1fb680 
00000000`00000000 00000004`ce1fb7c0 : CortexService!c4doc_put+0x6a3
00000004`ce1fb400 00007ff7`6f74b25f : 000001a7`cab185e0 00000004`ce1fb910 
00000004`ce1fb870 00007ff7`00000129 : 
CortexService!Emotiv::Common::CouchBaseNative::CouchDatabaseNative::saveDocument+0x642
00000004`ce1fb830 00007ff7`6f12a3ba : 000001a7`cab185e0 00000004`ce1fb910 
00000004`ce1fb948 00000004`00000129 : 
CortexService!Emotiv::Common::CouchBaseNative::CouchDatabaseNative::saveDocument+0xaf
00000004`ce1fb8b0 00007ff7`6f116d97 : 000001a7`caa5c960 00000004`ce1fba40 
00000004`ce1fba01 00000004`ce1fbad0 : 
CortexService!Cortex::Storage::CouchBase::CouchDriver::saveDoc+0xba
00000004`ce1fb980 00007ff7`6f116f8f : 000001a7`caa255e0 00000004`ce1fbb40 
00007ffa`1f839808 00007ffa`1eceb4c9 : 
CortexService!Cortex::Storage::NoSQL::MetaDocumentUpdater::saveChanges+0x347
00000004`ce1fbb20 00007ff7`6f117f6c : 000001a7`caa255e0 00007ffa`00000002 
00007ffa`1f839701 00007ffa`1ed2ddda : 
CortexService!Cortex::Storage::NoSQL::MetaDocumentUpdater::onDatabaseUpdated+0xaf
00000004`ce1fbbe0 00007ff7`6f117a87 : 00007ff7`6f116ee0 000001a7`caa255e0 
000001a7`cbd92dc0 00007ffa`1ecd7693 : 
CortexService!QtPrivate::FunctorCall<QtPrivate::IndexesList<>,QtPrivate::List<>,void,void
 (__cdecl Cortex::Storage::NoSQL::MetaDocumentUpdater::*)(void) 
__ptr64>::call+0x1c
00000004`ce1fbc20 00007ff7`6f11834e : 00007ff7`6f116ee0 000001a7`caa255e0 
000001a7`cbd92dc0 00007ffa`1ecdd38a : 
CortexService!QtPrivate::FunctionPointer<void (__cdecl 
Cortex::Storage::NoSQL::MetaDocumentUpdater::*)(void) 
__ptr64>::call<QtPrivate::List<>,void>+0x27
00000004`ce1fbc50 00007ffa`1f134ef2 : 000001a7`00000001 000001a7`caa63740 
000001a7`caa255e0 000001a7`cbd92dc0 : CortexService!QtPrivate::QSlotObject<void 
(__cdecl Cortex::Storage::NoSQL::MetaDocumentUpdater::*)(void) 
__ptr64,QtPrivate::List<>,void>::impl+0x8e
00000004`ce1fbca0 00007ffa`1f184b20 : 000001a7`caa63740 000001a7`caa255e0 
000001a7`cbd92dc0 00007ffa`1f18b791 : 
Qt5Cored!QtPrivate::QSlotObjectBase::call+0x42
00000004`ce1fbcf0 00007ffa`1f17cc9f : 000001a7`cb66b3b0 000001a7`caa255e0 
000001a7`caa5c960 00007ffa`00000003 : 
Qt5Cored!QMetaCallEvent::placeMetaCall+0x40
00000004`ce1fbd40 00007ffa`1f11cab3 : 000001a7`caa255e0 000001a7`cb66b3b0 
ffffffff`00000000 00007ffa`1ecce406 : Qt5Cored!QObject::event+0x15f
00000004`ce1fc070 00007ffa`1f11e44f : 000001a7`caa255e0 000001a7`cb66b3b0 
000001a7`00000000 00007ffa`1ecf26b4 : 
Qt5Cored!QCoreApplicationPrivate::notify_helper+0xd3
00000004`ce1fc0d0 00007ffa`1f119da1 : 000001a7`caa255e0 000001a7`cb66b3b0 
000001a7`caaf9f40 ffffffff`fffffffe : Qt5Cored!doNotify+0x7f
00000004`ce1fc130 00007ffa`1f11b9c0 : 000001a7`caa4f250 000001a7`caa255e0 
000001a7`cb66b3b0 00000004`ce1fc1c0 : Qt5Cored!QCoreApplication::notify+0x31
00000004`ce1fc160 00007ffa`1f1194c2 : 000001a7`caa255e0 000001a7`cb66b3b0 
000001a7`cb548cd0 000001a7`cb548ce8 : 
Qt5Cored!QCoreApplication::notifyInternal2+0x120
00000004`ce1fc1e0 00007ffa`1f11d507 : 000001a7`caa255e0 000001a7`cb66b3b0 
00007ffa`00000000 000001a7`caaf9f40 : Qt5Cored!QCoreApplication::sendEvent+0x42
00000004`ce1fc210 00007ffa`1f1e737a : 00000000`00000000 00007ffa`00000000 
000001a7`caaf9f40 00000004`cd992000 : 
Qt5Cored!QCoreApplicationPrivate::sendPostedEvents+0x4a7
00000004`ce1fc340 00007ffa`1f1e4e80 : 000001a7`ca9326d0 00000000`00000000 
00000004`ce1fc3b9 00000000`00000000 : 
Qt5Cored!QEventDispatcherWin32::sendPostedEvents+0x2a
00000004`ce1fc380 00007ffa`4ccd1c24 : 00000000`0057005e 00007ffa`00000401 
00000000`00000000 00000000`00000000 : Qt5Cored!qt_internal_proc+0x6a0
00000004`ce1fc520 00007ffa`4ccd156c : 000001a7`ca7a8e10 00007ffa`1ec96f4f 
00000000`0057005e 00000004`cd9a3800 : user32!UserCallWinProcCheckWow+0x274
00000004`ce1fc680 00007ffa`1f1e580e : 00000004`ce1fc770 00000000`00000000 
00000004`ce1fc770 00000000`00000000 : user32!DispatchMessageWorker+0x1ac
00000004`ce1fc700 00007ffa`1f115d4d : 000001a7`ca9326d0 00007ffa`00000024 
00000004`ce1ff98c 00007ffa`00000024 : 
Qt5Cored!QEventDispatcherWin32::processEvents+0x5fe
00000004`ce1ff8f0 00007ffa`1f115f9f : 00000004`ce1ffa48 00000004`00000024 
00000004`00000020 000001a7`cab15258 : Qt5Cored!QEventLoop::processEvents+0x6d
00000004`ce1ff940 00007ffa`1ed1ca7f : 00000004`ce1ffa48 00000000`00000000 
000001a7`caaf9f78 00007ffa`1ece7e13 : Qt5Cored!QEventLoop::exec+0x19f
00000004`ce1ffa00 00007ffa`1ed1c9b3 : 000001a7`ca934d98 000001a7`ca934d98 
000001a7`caa0fd80 00000004`ce1ffaa8 : Qt5Cored!QThread::exec+0xbf
00000004`ce1ffa70 00007ffa`1ed20f73 : 000001a7`ca934d98 000001a7`ca92f300 
00000000`00000000 00000000`00000000 : Qt5Cored!QThread::run+0x13
00000004`ce1ffaa0 00007ffa`4cc18364 : 000001a7`ca934d98 00000000`00000000 
00000000`00000000 00000000`00000000 : Qt5Cored!QThreadPrivate::start+0x183
00000004`ce1ffb40 00007ffa`4ed070d1 : 00000000`00000000 00000000`00000000 
00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0x14
00000004`ce1ffb70 00000000`00000000 : 00000000`00000000 00000000`00000000 
00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


FAULTING_SOURCE_LINE:  f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm

FAULTING_SOURCE_FILE:  f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm

FAULTING_SOURCE_LINE_NUMBER:  226

FAULTING_SOURCE_CODE:  
No source found for 'f:\dd\vctools\crt\vcruntime\src\string\amd64\memcpy.asm'


SYMBOL_NAME:  VCRUNTIME140D!MoveSmall+68

MODULE_NAME: VCRUNTIME140D

IMAGE_NAME:  VCRUNTIME140D.dll

STACK_COMMAND:  ~4s ; .ecxr ; kb

FAILURE_BUCKET_ID:  NULL_POINTER_READ_c0000005_VCRUNTIME140D.dll!MoveSmall

OS_VERSION:  10.0.14393.206

BUILDLAB_STR:  rs1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {30065e77-650d-8d28-83b6-0da3f6ff330f}

Followup:     MachineOwner
---------

_______________________________________________
sqlite-users mailing list
sqlite-users@mailinglists.sqlite.org
http://mailinglists.sqlite.org/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to