https://bugs.kde.org/show_bug.cgi?id=465872
--- Comment #22 from Jiri Slaby <jirisl...@gmail.com> --- (In reply to Jiri Slaby from comment #21) > ep is corrupted: > 1639 if (QQmlEngine *qmlEngine = that->engine()->qmlEngine()) { > 1640 QQmlEnginePrivate *ep = QQmlEnginePrivate::get(qmlEngine); > 1641 if (ep && ep->propertyCapture) { > 1642 qDebug() << __func__ << ep << ep->propertyCapture; > 1643 ep->propertyCapture->captureProperty(that->object(), -1, > role->index, /*doNotify=*/ false); > 1644 } > 1645 } > > This prints: > virtualGet 0xb706dff0 0x8dc35e5b ... > Many values/pointers are 0x8dc35e5b or -1879038348/0x90002674 or > 0xc483ffe0/-997982240 or their combination. That is obviously bogus. Ah, because it's not ep at that location -- 0xb706dff0 is code, not data: > (gdb) x/24x 0xb706dff0 > 0xb706dff0 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc>: 0x39e85356 > 0x81ffe0f8 0x1a1265c3 0x04ec8300 > 0xb706e000 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+16>: 0x1424748b > 0x4074f685 0x8d08ec83 0xed9c9483 > 0xb706e010 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+32>: 0xe85650ff > 0xffe076c8 0x8910c483 0x24448bc2 > 0xb706e020 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+48>: 0x75d28510 > 0x04c4830b 0x8dc35e5b 0x90002674 > 0xb706e030 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+64>: 0x5608ec83 > 0x5756e850 0xc483ffe0 0x04c48310 > 0xb706e040 <_ZN20QQmlDelayedCallQueue11qt_metacastEPKc+80>: 0x8dc35e5b > 0x90002674 0xd9ebc031 0x0026748d -- You are receiving this mail because: You are watching all bug changes.