https://bugs.kde.org/show_bug.cgi?id=426899
Matt Fagnani <matthew.fagn...@utoronto.ca> changed: What |Removed |Added ---------------------------------------------------------------------------- URL| |https://bugzilla.redhat.com | |/show_bug.cgi?id=1881915 --- Comment #1 from Matt Fagnani <matthew.fagn...@utoronto.ca> --- I ran valgrind --log-file=valgrind-kstars-1.txt kstars An invalid read at the address 0x8 and segmentation fault occurred in operator-> at qscopedpointer.h:118 in qt5-qtbase-5.15.1-1.fc33.x86_64. ==3954== Memcheck, a memory error detector ==3954== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==3954== Using Valgrind-3.16.1 and LibVEX; rerun with -h for copyright info ==3954== Command: kstars ==3954== Parent PID: 2717 ==3954== ==3954== Invalid read of size 8 ==3954== at 0x6C1CE5B: operator-> (qscopedpointer.h:118) ==3954== by 0x6C1CE5B: qGetPtrHelper<QScopedPointer<QObjectData> > (qglobal.h:1135) ==3954== by 0x6C1CE5B: d_func (qobject.h:132) ==3954== by 0x6C1CE5B: get (qobject_p.h:339) ==3954== by 0x6C1CE5B: void doActivate<false>(QObject*, int, void**) (qobject.cpp:3768) ==3954== by 0x64B5EE1: QGuiApplication::screenAdded(QScreen*) (moc_qguiapplication.cpp:389) ==3954== by 0x195CF697: QtWaylandClient::QWaylandDisplay::handleScreenInitialized(QtWaylandClient::QWaylandScreen*) (qwaylanddisplay.cpp:281) ==3954== by 0x195DC622: QtWaylandClient::QWaylandScreen::maybeInitialize() (qwaylandscreen.cpp:97) ==3954== by 0x485EB0F: ffi_call_unix64 (unix64.S:76) ==3954== by 0x485E0A2: ffi_call (ffi64.c:525) ==3954== by 0x1968F8FD: wl_closure_invoke.constprop.0 (connection.c:1018) ==3954== by 0x1968FFCA: dispatch_event.isra.0 (wayland-client.c:1445) ==3954== by 0x1969019B: UnknownInlinedFun (wayland-client.c:1591) ==3954== by 0x1969019B: wl_display_dispatch_queue_pending (wayland-client.c:1833) ==3954== by 0x195CFD84: QtWaylandClient::QWaylandDisplay::forceRoundTrip() (qwaylanddisplay.cpp:476) ==3954== by 0x195D7513: QtWaylandClient::QWaylandDisplay::registry_global(unsigned int, QString const&, unsigned int) (qwaylanddisplay.cpp:351) ==3954== by 0x195EA88E: QtWayland::wl_registry::handle_global(void*, wl_registry*, unsigned int, char const*, unsigned int) (qwayland-wayland.cpp:94) ==3954== Address 0x8 is not stack'd, malloc'd or (recently) free'd ==3954== ==3954== ==3954== Process terminating with default action of signal 11 (SIGSEGV): dumping core ==3954== Access not within mapped region at address 0x8 ==3954== at 0x6C1CE5B: operator-> (qscopedpointer.h:118) ==3954== by 0x6C1CE5B: qGetPtrHelper<QScopedPointer<QObjectData> > (qglobal.h:1135) ==3954== by 0x6C1CE5B: d_func (qobject.h:132) ==3954== by 0x6C1CE5B: get (qobject_p.h:339) ==3954== by 0x6C1CE5B: void doActivate<false>(QObject*, int, void**) (qobject.cpp:3768) ==3954== by 0x64B5EE1: QGuiApplication::screenAdded(QScreen*) (moc_qguiapplication.cpp:389) ==3954== by 0x195CF697: QtWaylandClient::QWaylandDisplay::handleScreenInitialized(QtWaylandClient::QWaylandScreen*) (qwaylanddisplay.cpp:281) ==3954== by 0x195DC622: QtWaylandClient::QWaylandScreen::maybeInitialize() (qwaylandscreen.cpp:97) ==3954== by 0x485EB0F: ffi_call_unix64 (unix64.S:76) ==3954== by 0x485E0A2: ffi_call (ffi64.c:525) ==3954== by 0x1968F8FD: wl_closure_invoke.constprop.0 (connection.c:1018) ==3954== by 0x1968FFCA: dispatch_event.isra.0 (wayland-client.c:1445) ==3954== by 0x1969019B: UnknownInlinedFun (wayland-client.c:1591) ==3954== by 0x1969019B: wl_display_dispatch_queue_pending (wayland-client.c:1833) ==3954== by 0x195CFD84: QtWaylandClient::QWaylandDisplay::forceRoundTrip() (qwaylanddisplay.cpp:476) ==3954== by 0x195D7513: QtWaylandClient::QWaylandDisplay::registry_global(unsigned int, QString const&, unsigned int) (qwaylanddisplay.cpp:351) ==3954== by 0x195EA88E: QtWayland::wl_registry::handle_global(void*, wl_registry*, unsigned int, char const*, unsigned int) (qwayland-wayland.cpp:94) ==3954== If you believe this happened as a result of a stack ==3954== overflow in your program's main thread (unlikely but ==3954== possible), you can try to increase the size of the ==3954== main thread stack using the --main-stacksize= flag. ==3954== The main thread stack size used in this run was 8388608. ==3954== ==3954== HEAP SUMMARY: ==3954== in use at exit: 462,865 bytes in 8,031 blocks ==3954== total heap usage: 9,700 allocs, 1,669 frees, 826,505 bytes allocated ==3954== ==3954== LEAK SUMMARY: ==3954== definitely lost: 0 bytes in 0 blocks ==3954== indirectly lost: 0 bytes in 0 blocks ==3954== possibly lost: 160 bytes in 2 blocks ==3954== still reachable: 462,705 bytes in 8,029 blocks ==3954== suppressed: 0 bytes in 0 blocks ==3954== Rerun with --leak-check=full to see details of leaked memory ==3954== ==3954== For lists of detected and suppressed errors, rerun with: -s ==3954== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) -- You are receiving this mail because: You are watching all bug changes.