==14438== Memcheck, a memory error detector ==14438== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==14438== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info ==14438== Command: python3 pyside2544.py ==14438== ==14438== ==14438== Invalid read of size 16 ==14438== at 0x1CBC280B: (anonymous namespace)::clonePrivate(QVariant::Private const&) (qvariant.cpp:304) ==14438== by 0x1CBC7A2C: QVariant::QVariant(QVariant const&) (qvariant.cpp:542) ==14438== by 0x1C6F2B7E: QDBusVariant::variant() const (qdbusextratypes.h:141) ==14438== by 0x1C6F8C3E: Sbk_QDBusVariantFunc_variant (qdbusvariant_wrapper.cpp:229) ==14438== by 0x25FA3D: ??? (in /usr/bin/python3.10) ==14438== by 0x250CF9: _PyEval_EvalFrameDefault (in /usr/bin/python3.10) ==14438== by 0x257C13: _PyObject_FastCallDictTstate (in /usr/bin/python3.10) ==14438== by 0x26CA63: ??? (in /usr/bin/python3.10) ==14438== by 0x258A1B: _PyObject_MakeTpCall (in /usr/bin/python3.10) ==14438== by 0x251095: _PyEval_EvalFrameDefault (in /usr/bin/python3.10) ==14438== by 0x2479C5: ??? (in /usr/bin/python3.10) ==14438== by 0x33D255: PyEval_EvalCode (in /usr/bin/python3.10) ==14438== Address 0x2000 is not stack'd, malloc'd or (recently) free'd ==14438== ==14438== ==14438== Process terminating with default action of signal 11 (SIGSEGV) ==14438== Access not within mapped region at address 0x2000 ==14438== at 0x1CBC280B: (anonymous namespace)::clonePrivate(QVariant::Private const&) (qvariant.cpp:304) ==14438== by 0x1CBC7A2C: QVariant::QVariant(QVariant const&) (qvariant.cpp:542) ==14438== by 0x1C6F2B7E: QDBusVariant::variant() const (qdbusextratypes.h:141) ==14438== by 0x1C6F8C3E: Sbk_QDBusVariantFunc_variant (qdbusvariant_wrapper.cpp:229) ==14438== by 0x25FA3D: ??? (in /usr/bin/python3.10) ==14438== by 0x250CF9: _PyEval_EvalFrameDefault (in /usr/bin/python3.10) ==14438== by 0x257C13: _PyObject_FastCallDictTstate (in /usr/bin/python3.10) ==14438== by 0x26CA63: ??? (in /usr/bin/python3.10) ==14438== by 0x258A1B: _PyObject_MakeTpCall (in /usr/bin/python3.10) ==14438== by 0x251095: _PyEval_EvalFrameDefault (in /usr/bin/python3.10) ==14438== by 0x2479C5: ??? (in /usr/bin/python3.10) ==14438== by 0x33D255: PyEval_EvalCode (in /usr/bin/python3.10) ==14438== If you believe this happened as a result of a stack ==14438== overflow in your program's main thread (unlikely but ==14438== possible), you can try to increase the size of the ==14438== main thread stack using the --main-stacksize= flag. ==14438== The main thread stack size used in this run was 8388608. ==14438==