Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 11681] Qt Wireshark - On OS X rapid back-to-back Cmd-D to

Date: Sun, 08 Nov 2015 01:05:36 +0000

Comment # 1 on bug 11681 from
OS X Crash report dump:

> :               Wireshark [6057]
> Path:                  /Applications/Wireshark.app/Contents/MacOS/Wireshark
> Identifier:            org.wireshark.Wireshark
> Version:               2.1.0-446-g23dd596 (2.1.0-446-g23dd596)
> Code Type:             X86-64 (Native)
> Parent Process:        bash [6056]
> Responsible:           Terminal [5010]
> User ID:               501
> 
> Date/Time:             2015-11-07 18:53:26.342 -0500
> OS Version:            Mac OS X 10.10.5 (14F1021)
> Report Version:        11
> Anonymous UUID:        A350FC94-1E0D-D9CF-BAAB-41F52DE1633C
> 
> Sleep/Wake UUID:       B12E08BD-A4FE-4E25-AFE8-10DBEA35C195
> 
> Time Awake Since Boot: 260000 seconds
> Time Since Wake:       1200 seconds
> 
> Crashed Thread:        0  Dispatch queue: com.apple.main-thread
> 
> Exception Type:        EXC_BAD_ACCESS (SIGSEGV)
> Exception Codes:       EXC_I386_GPFLT
> 
> Application Specific Information:
> Performing @selector(itemFired:) from sender NSMenuItem 0x7ffe637d7f00
> 
> Thread 0 Crashed:: Dispatch queue: com.apple.main-thread
> 0   org.wireshark.Wireshark       	0x000000010de37248 PacketListModel::flushVisibleRows() + 156
> 1   org.wireshark.Wireshark       	0x000000010dfd1905 PacketListModel::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 401
> 2   QtCore                        	0x0000000112f92c5b QObject::event(QEvent*) + 747
> 3   QtWidgets                     	0x000000010e62fffc QApplicationPrivate::notify_helper(QObject*, QEvent*) + 300
> 4   QtWidgets                     	0x000000010e632abb QApplication::notify(QObject*, QEvent*) + 6187
> 5   QtCore                        	0x0000000112f664b7 QCoreApplicationPrivate::sendPostedEvents(QObject*, int, QThreadData*) + 631
> 6   libqcocoa.dylib               	0x0000000115e74f06 0x115e55000 + 130822
> 7   libqcocoa.dylib               	0x0000000115e742ef 0x115e55000 + 127727
> 8   org.wireshark.Wireshark       	0x000000010de19d8a MainWindow::captureFileReadStarted(QString const&) + 338
> 9   org.wireshark.Wireshark       	0x000000010dfcf457 MainWindow::captureFileRescanStarted() + 59
> 10  org.wireshark.Wireshark       	0x000000010dfccf88 MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 2024
> 11  QtCore                        	0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 12  org.wireshark.Wireshark       	0x000000010dcb6b55 CaptureFile::captureFileEvent(int, void*) + 703
> 13  org.wireshark.Wireshark       	0x000000010dc84a11 rescan_packets + 433
> 14  org.wireshark.Wireshark       	0x000000010de15845 MainWindow::redissectPackets() + 67
> 15  org.wireshark.Wireshark       	0x000000010dfcd16f MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 2511
> 16  QtCore                        	0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 17  org.wireshark.Wireshark       	0x000000010de2effd PacketList::ignoreFrame() + 99
> 18  org.wireshark.Wireshark       	0x000000010dfcd6fe MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 3934
> 19  org.wireshark.Wireshark       	0x000000010dfcf26a MainWindow::qt_metacall(QMetaObject::Call, int, void**) + 78
> 20  QtCore                        	0x0000000112f9996f QMetaObject::activate(QObject*, int, int, void**) + 1359
> 21  QtWidgets                     	0x000000010e6281d4 QAction::activate(QAction::ActionEvent) + 260
> 22  QtWidgets                     	0x000000010e62865f 0x10e603000 + 153183
> 23  QtCore                        	0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 24  libqcocoa.dylib               	0x0000000115e7838f 0x115e55000 + 144271
> 25  libsystem_trace.dylib         	0x00007fff93824cd7 _os_activity_initiate + 75
> 26  com.apple.AppKit              	0x00007fff87146eb1 -[NSApplication sendAction:to:from:] + 452
> 27  com.apple.AppKit              	0x00007fff87146c4e -[NSMenuItem _corePerformAction] + 382
> 28  com.apple.AppKit              	0x00007fff8714697c -[NSCarbonMenuImpl performActionWithHighlightingForItemAtIndex:] + 114
> 29  libsystem_trace.dylib         	0x00007fff93824cd7 _os_activity_initiate + 75
> 30  com.apple.AppKit              	0x00007fff871458ad -[NSMenu performKeyEquivalent:] + 359
> 31  com.apple.AppKit              	0x00007fff87144a6f -[NSApplication _handleKeyEquivalent:] + 920
> 32  com.apple.AppKit              	0x00007fff8704f83a -[NSApplication sendEvent:] + 4080
> 33  libqcocoa.dylib               	0x0000000115e77f6e 0x115e55000 + 143214
> 34  libqcocoa.dylib               	0x0000000115e7407d 0x115e55000 + 127101
> 35  org.wireshark.Wireshark       	0x000000010de51454 update_progress_dlg + 132
> 36  org.wireshark.Wireshark       	0x000000010dc84bca rescan_packets + 874
> 37  org.wireshark.Wireshark       	0x000000010de15845 MainWindow::redissectPackets() + 67
> 38  org.wireshark.Wireshark       	0x000000010dfcd16f MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 2511
> 39  QtCore                        	0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 40  org.wireshark.Wireshark       	0x000000010de2effd PacketList::ignoreFrame() + 99
> 41  org.wireshark.Wireshark       	0x000000010dfcd6fe MainWindow::qt_static_metacall(QObject*, QMetaObject::Call, int, void**) + 3934
> 42  org.wireshark.Wireshark       	0x000000010dfcf26a MainWindow::qt_metacall(QMetaObject::Call, int, void**) + 78
> 43  QtCore                        	0x0000000112f9996f QMetaObject::activate(QObject*, int, int, void**) + 1359
> 44  QtWidgets                     	0x000000010e6281d4 QAction::activate(QAction::ActionEvent) + 260
> 45  QtWidgets                     	0x000000010e62865f 0x10e603000 + 153183
> 46  QtCore                        	0x0000000112f99b6f QMetaObject::activate(QObject*, int, int, void**) + 1871
> 47  libqcocoa.dylib               	0x0000000115e7838f 0x115e55000 + 144271
> 48  libsystem_trace.dylib         	0x00007fff93824cd7 _os_activity_initiate + 75
> 49  com.apple.AppKit              	0x00007fff87146eb1 -[NSApplication sendAction:to:from:] + 452
> 50  com.apple.AppKit              	0x00007fff87146c4e -[NSMenuItem _corePerformAction] + 382
> 51  com.apple.AppKit              	0x00007fff8714697c -[NSCarbonMenuImpl performActionWithHighlightingForItemAtIndex:] + 114
> 52  libsystem_trace.dylib         	0x00007fff93824cd7 _os_activity_initiate + 75
> 53  com.apple.AppKit              	0x00007fff871458ad -[NSMenu performKeyEquivalent:] + 359
> 54  com.apple.AppKit              	0x00007fff87144a6f -[NSApplication _handleKeyEquivalent:] + 920
> 55  com.apple.AppKit              	0x00007fff8704f83a -[NSApplication sendEvent:] + 4080
> 56  libqcocoa.dylib               	0x0000000115e77f6e 0x115e55000 + 143214
> 57  com.apple.AppKit              	0x00007fff86f78b68 -[NSApplication run] + 711
> 58  libqcocoa.dylib               	0x0000000115e745e4 0x115e55000 + 128484
> 59  QtCore                        	0x0000000112f629ad QEventLoop::exec(QFlags<QEventLoop::ProcessEventsFlag>) + 381
> 60  QtCore                        	0x0000000112f65ee7 QCoreApplication::exec() + 359
> 61  org.wireshark.Wireshark       	0x000000010dc7d09a main + 5450
> 62  org.wireshark.Wireshark       	0x000000010dc7b4f4 start + 52


You are receiving this mail because:
  • You are watching all bug changes.