Warning: Permanently added '10.47.90.51' (RSA) to the list of known hosts. ==18532== Memcheck, a memory error detector ==18532== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==18532== Using Valgrind-3.19.0 and LibVEX; rerun with -h for copyright info ==18532== Command: /bin/pacmanager -t /run/pac/home/kgledits/src/main/cvise2/testfile.pac -d ==18532== 0 => Error: Insufficient arguments ==18532== Thread 2: ==18532== Invalid read of size 8 ==18532== at 0x4A9B180: QV4::Heap::QObjectMethod::ensureMethodsCache() [clone .part.0] (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4AA2E9F: QV4::QObjectMethod::callInternal(QV4::Value const*, QV4::Value const*, int) const (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4ABE45F: QV4::Runtime::CallName::call(QV4::ExecutionEngine*, int, QV4::Value*, int) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4AEF6FB: QV4::Moth::VME::interpret(QV4::JSTypesStackFrame*, QV4::ExecutionEngine*, char const*) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4AF2C5F: QV4::Moth::VME::exec(QV4::JSTypesStackFrame*, QV4::ExecutionEngine*) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4A5AB97: QV4::ArrowFunction::virtualCall(QV4::FunctionObject const*, QV4::Value const*, QV4::Value const*, int) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4A03217: QJSValue::call(QList const&) const (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x116B1F: ProxyAutoConf::findProxyForUrl(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&) (in /bin/pacmanager) ==18532== by 0x113A1B: Service::processUrl(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&) (in /bin/pacmanager) ==18532== by 0x1165CB: std::__future_base::_Task_setter, std::allocator > >, std::__future_base::_Result_base::_Deleter>, std::thread::_Invoker, std::allocator > (Service::*)(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&), Service*, std::__cxx11::basic_string, std::allocator >, std::__cxx11::basic_string, std::allocator > > >, std::__cxx11::basic_string, std::allocator > >::operator()() const (in /bin/pacmanager) ==18532== by 0x1166EB: std::_Function_handler (), std::__future_base::_Task_setter, std::allocator > >, std::__future_base::_Result_base::_Deleter>, std::thread::_Invoker, std::allocator > (Service::*)(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&), Service*, std::__cxx11::basic_string, std::allocator >, std::__cxx11::basic_string, std::allocator > > >, std::__cxx11::basic_string, std::allocator > > >::_M_invoke(std::_Any_data const&) (in /bin/pacmanager) ==18532== by 0x11421F: std::__future_base::_State_baseV2::_M_do_set(std::function ()>*, bool*) (in /bin/pacmanager) ==18532== Address 0x0 is not stack'd, malloc'd or (recently) free'd ==18532== ==18532== ==18532== Process terminating with default action of signal 11 (SIGSEGV) ==18532== Access not within mapped region at address 0x0 ==18532== at 0x4A9B180: QV4::Heap::QObjectMethod::ensureMethodsCache() [clone .part.0] (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4AA2E9F: QV4::QObjectMethod::callInternal(QV4::Value const*, QV4::Value const*, int) const (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4ABE45F: QV4::Runtime::CallName::call(QV4::ExecutionEngine*, int, QV4::Value*, int) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4AEF6FB: QV4::Moth::VME::interpret(QV4::JSTypesStackFrame*, QV4::ExecutionEngine*, char const*) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4AF2C5F: QV4::Moth::VME::exec(QV4::JSTypesStackFrame*, QV4::ExecutionEngine*) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4A5AB97: QV4::ArrowFunction::virtualCall(QV4::FunctionObject const*, QV4::Value const*, QV4::Value const*, int) (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x4A03217: QJSValue::call(QList const&) const (in /lib/libQt6Qml.so.6.2.3) ==18532== by 0x116B1F: ProxyAutoConf::findProxyForUrl(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&) (in /bin/pacmanager) ==18532== by 0x113A1B: Service::processUrl(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&) (in /bin/pacmanager) ==18532== by 0x1165CB: std::__future_base::_Task_setter, std::allocator > >, std::__future_base::_Result_base::_Deleter>, std::thread::_Invoker, std::allocator > (Service::*)(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&), Service*, std::__cxx11::basic_string, std::allocator >, std::__cxx11::basic_string, std::allocator > > >, std::__cxx11::basic_string, std::allocator > >::operator()() const (in /bin/pacmanager) ==18532== by 0x1166EB: std::_Function_handler (), std::__future_base::_Task_setter, std::allocator > >, std::__future_base::_Result_base::_Deleter>, std::thread::_Invoker, std::allocator > (Service::*)(std::__cxx11::basic_string, std::allocator > const&, std::__cxx11::basic_string, std::allocator > const&), Service*, std::__cxx11::basic_string, std::allocator >, std::__cxx11::basic_string, std::allocator > > >, std::__cxx11::basic_string, std::allocator > > >::_M_invoke(std::_Any_data const&) (in /bin/pacmanager) ==18532== by 0x11421F: std::__future_base::_State_baseV2::_M_do_set(std::function ()>*, bool*) (in /bin/pacmanager) ==18532== If you believe this happened as a result of a stack ==18532== overflow in your program's main thread (unlikely but ==18532== possible), you can try to increase the size of the ==18532== main thread stack using the --main-stacksize= flag. ==18532== The main thread stack size used in this run was 8388608. ==18532== ==18532== HEAP SUMMARY: ==18532== in use at exit: 171,453 bytes in 705 blocks ==18532== total heap usage: 4,487 allocs, 3,782 frees, 847,817 bytes allocated ==18532== ==18532== LEAK SUMMARY: ==18532== definitely lost: 0 bytes in 0 blocks ==18532== indirectly lost: 0 bytes in 0 blocks ==18532== possibly lost: 2,892 bytes in 10 blocks ==18532== still reachable: 168,561 bytes in 695 blocks ==18532== of which reachable via heuristic: ==18532== newarray : 2,184 bytes in 10 blocks ==18532== suppressed: 0 bytes in 0 blocks ==18532== Rerun with --leak-check=full to see details of leaked memory ==18532== ==18532== For lists of detected and suppressed errors, rerun with: -s ==18532== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0)