Wireshark-bugs: [Wireshark-bugs] [Bug 11681] Qt Wireshark - On OS X rapid back-to-back Cmd-D to
Date: Sun, 08 Nov 2015 01:05:36 +0000
Comment # 1
on bug 11681
from Jim Young
OS X Crash report dump:
> : Wireshark [6057]
> Path: /Applications/Wireshark.app/Contents/MacOS/Wireshark
> Identifier: org.wireshark.Wireshark
> Version: 2.1.0-446-g23dd596 (2.1.0-446-g23dd596)
> Code Type: X86-64 (Native)
> Parent Process: bash [6056]
> Responsible: Terminal [5010]
> User ID: 501
>
> Date/Time: 2015-11-07 18:53:26.342 -0500
> OS Version: Mac OS X 10.10.5 (14F1021)
> Report Version: 11
> Anonymous UUID: A350FC94-1E0D-D9CF-BAAB-41F52DE1633C
>
> Sleep/Wake UUID: B12E08BD-A4FE-4E25-AFE8-10DBEA35C195
>
> Time Awake Since Boot: 260000 seconds
> Time Since Wake: 1200 seconds
>
> Crashed Thread: 0 Dispatch queue: com.apple.main-thread
>
> Exception Type: EXC_BAD_ACCESS (SIGSEGV)
> Exception Codes: EXC_I386_GPFLT
>
> Application Specific Information:
> Performing @selector(itemFired:) from sender NSMenuItem 0x7ffe637d7f00
>
> Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
> 0 org.wireshark.Wireshark 0x000000010de37248 PacketListModel::flushVisibleRows() + 156
> 1 org.wireshark.Wireshark 0x000000010dfd1905 PacketListModel::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 401
> 2 QtCore 0x0000000112f92c5b QObject::event(QEvent*) + 747
> 3 QtWidgets 0x000000010e62fffc QApplicationPrivate::notify_helper(QObject*, QEvent*) + 300
> 4 QtWidgets 0x000000010e632abb QApplication::notify(QObject*, QEvent*) + 6187
> 5 QtCore 0x0000000112f664b7 QCoreApplicationPrivate::sendPostedEvents(QObject*, int, QThreadData*) + 631
> 6 libqcocoa.dylib 0x0000000115e74f06 0x115e55000 + 130822
> 7 libqcocoa.dylib 0x0000000115e742ef 0x115e55000 + 127727
> 8 org.wireshark.Wireshark 0x000000010de19d8a MainWindow::captureFileReadStarted(QString const&) + 338
> 9 org.wireshark.Wireshark 0x000000010dfcf457 MainWindow::captureFileRescanStarted() + 59
> 10 org.wireshark.Wireshark 0x000000010dfccf88 MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 2024
> 11 QtCore 0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 12 org.wireshark.Wireshark 0x000000010dcb6b55 CaptureFile::captureFileEvent(int, void*) + 703
> 13 org.wireshark.Wireshark 0x000000010dc84a11 rescan_packets + 433
> 14 org.wireshark.Wireshark 0x000000010de15845 MainWindow::redissectPackets() + 67
> 15 org.wireshark.Wireshark 0x000000010dfcd16f MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 2511
> 16 QtCore 0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 17 org.wireshark.Wireshark 0x000000010de2effd PacketList::ignoreFrame() + 99
> 18 org.wireshark.Wireshark 0x000000010dfcd6fe MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 3934
> 19 org.wireshark.Wireshark 0x000000010dfcf26a MainWindow::qt_metacall(QMetaObject::Call, int, void**) + 78
> 20 QtCore 0x0000000112f9996f QMetaObject::activate(QObject*, int, int, void**) + 1359
> 21 QtWidgets 0x000000010e6281d4 QAction::activate(QAction::ActionEvent) + 260
> 22 QtWidgets 0x000000010e62865f 0x10e603000 + 153183
> 23 QtCore 0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 24 libqcocoa.dylib 0x0000000115e7838f 0x115e55000 + 144271
> 25 libsystem_trace.dylib 0x00007fff93824cd7 _os_activity_initiate + 75
> 26 com.apple.AppKit 0x00007fff87146eb1 -[NSApplication sendAction:to:from:] + 452
> 27 com.apple.AppKit 0x00007fff87146c4e -[NSMenuItem _corePerformAction] + 382
> 28 com.apple.AppKit 0x00007fff8714697c -[NSCarbonMenuImpl performActionWithHighlightingForItemAtIndex:] + 114
> 29 libsystem_trace.dylib 0x00007fff93824cd7 _os_activity_initiate + 75
> 30 com.apple.AppKit 0x00007fff871458ad -[NSMenu performKeyEquivalent:] + 359
> 31 com.apple.AppKit 0x00007fff87144a6f -[NSApplication _handleKeyEquivalent:] + 920
> 32 com.apple.AppKit 0x00007fff8704f83a -[NSApplication sendEvent:] + 4080
> 33 libqcocoa.dylib 0x0000000115e77f6e 0x115e55000 + 143214
> 34 libqcocoa.dylib 0x0000000115e7407d 0x115e55000 + 127101
> 35 org.wireshark.Wireshark 0x000000010de51454 update_progress_dlg + 132
> 36 org.wireshark.Wireshark 0x000000010dc84bca rescan_packets + 874
> 37 org.wireshark.Wireshark 0x000000010de15845 MainWindow::redissectPackets() + 67
> 38 org.wireshark.Wireshark 0x000000010dfcd16f MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 2511
> 39 QtCore 0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 40 org.wireshark.Wireshark 0x000000010de2effd PacketList::ignoreFrame() + 99
> 41 org.wireshark.Wireshark 0x000000010dfcd6fe MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 3934
> 42 org.wireshark.Wireshark 0x000000010dfcf26a MainWindow::qt_metacall(QMetaObject::Call, int, void**) + 78
> 43 QtCore 0x0000000112f9996f QMetaObject::activate(QObject*, int, int, void**) + 1359
> 44 QtWidgets 0x000000010e6281d4 QAction::activate(QAction::ActionEvent) + 260
> 45 QtWidgets 0x000000010e62865f 0x10e603000 + 153183
> 46 QtCore 0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 47 libqcocoa.dylib 0x0000000115e7838f 0x115e55000 + 144271
> 48 libsystem_trace.dylib 0x00007fff93824cd7 _os_activity_initiate + 75
> 49 com.apple.AppKit 0x00007fff87146eb1 -[NSApplication sendAction:to:from:] + 452
> 50 com.apple.AppKit 0x00007fff87146c4e -[NSMenuItem _corePerformAction] + 382
> 51 com.apple.AppKit 0x00007fff8714697c -[NSCarbonMenuImpl performActionWithHighlightingForItemAtIndex:] + 114
> 52 libsystem_trace.dylib 0x00007fff93824cd7 _os_activity_initiate + 75
> 53 com.apple.AppKit 0x00007fff871458ad -[NSMenu performKeyEquivalent:] + 359
> 54 com.apple.AppKit 0x00007fff87144a6f -[NSApplication _handleKeyEquivalent:] + 920
> 55 com.apple.AppKit 0x00007fff8704f83a -[NSApplication sendEvent:] + 4080
> 56 libqcocoa.dylib 0x0000000115e77f6e 0x115e55000 + 143214
> 57 com.apple.AppKit 0x00007fff86f78b68 -[NSApplication run] + 711
> 58 libqcocoa.dylib 0x0000000115e745e4 0x115e55000 + 128484
> 59 QtCore 0x0000000112f629ad QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) + 381
> 60 QtCore 0x0000000112f65ee7 QCoreApplication::exec() + 359
> 61 org.wireshark.Wireshark 0x000000010dc7d09a main + 5450
> 62 org.wireshark.Wireshark 0x000000010dc7b4f4 start + 52
You are receiving this mail because:
- You are watching all bug changes.
- References:
- Prev by Date: [Wireshark-bugs] [Bug 11681] New: Qt Wireshark - On OS X rapid back-to-back Cmd-D to Ignore/Unignore packet will trigger crash
- Next by Date: [Wireshark-bugs] [Bug 8801] Selecting multiple packets not working
- Previous by thread: [Wireshark-bugs] [Bug 11681] New: Qt Wireshark - On OS X rapid back-to-back Cmd-D to Ignore/Unignore packet will trigger crash
- Next by thread: [Wireshark-bugs] [Bug 11681] Qt Wireshark - On OS X rapid back-to-back Cmd-D to Ignore/Unignore packet will trigger crash
- Index(es):