https://bugs.kde.org/show_bug.cgi?id=465872

--- Comment #22 from Jiri Slaby <jirisl...@gmail.com> ---
(In reply to Jiri Slaby from comment #21)
> ep is corrupted:
> 1639        if (QQmlEngine *qmlEngine = that->engine()->qmlEngine()) {
> 1640            QQmlEnginePrivate *ep = QQmlEnginePrivate::get(qmlEngine);
> 1641            if (ep && ep->propertyCapture) {
> 1642                    qDebug() << __func__ << ep << ep->propertyCapture;
> 1643                ep->propertyCapture->captureProperty(that->object(), -1,
> role->index, /*doNotify=*/ false);
> 1644            }
> 1645        }
> 
> This prints:
> virtualGet 0xb706dff0 0x8dc35e5b
...
> Many values/pointers are 0x8dc35e5b or -1879038348/0x90002674 or
> 0xc483ffe0/-997982240 or their combination. That is obviously bogus.

Ah, because it's not ep at that location -- 0xb706dff0 is code, not data:
> (gdb) x/24x 0xb706dff0
> 0xb706dff0 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc>:        0x39e85356    
>   0x81ffe0f8      0x1a1265c3      0x04ec8300
> 0xb706e000 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+16>:     0x1424748b    
>   0x4074f685      0x8d08ec83      0xed9c9483
> 0xb706e010 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+32>:     0xe85650ff    
>   0xffe076c8      0x8910c483      0x24448bc2
> 0xb706e020 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+48>:     0x75d28510    
>   0x04c4830b      0x8dc35e5b      0x90002674
> 0xb706e030 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+64>:     0x5608ec83    
>   0x5756e850      0xc483ffe0      0x04c48310
> 0xb706e040 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+80>:     0x8dc35e5b    
>   0x90002674      0xd9ebc031      0x0026748d

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to