I am not new to programming or debugging, you cant see the call stack without debugging...
Above is after the fault,
below is before it:
> Bommerd.
exe!Bommer
::removePartFromBOM(QTreeWidgetItem * subpart
=0x02a50420,
int col
=0) Line
1562 C
++ Bommerd.
exe!Bommer
::qt_metacall(QMetaObject::Call _c
=InvokeMetaMethod,
int _id
=17,
void * * _a
=0x0012c1d0
) Line
129 + 0x1a bytes C
++ QtCored4.dll!671ccae1()
[Frames below may be incorrect and/or missing, no symbols loaded for QtCored4.dll]
QtCored4.dll!671e4386()
QtCored4.dll!672654f0()
QtGuid4.dll!657e9622()
msvcr90d.dll!_unlock(int locknum=0) Line 376 C
> Bommerd.exe!Bommer::removePartFromBOM(QTreeWidgetItem * subpart=0x02a50420, int col=0) Line 1562 C++
Bommerd.exe!Bommer::qt_metacall(QMetaObject::Call _c=InvokeMetaMethod, int _id=17, void * * _a=0x0012c1d0) Line 129 + 0x1a bytes C++
QtCored4.dll!671ccae1()
[Frames below may be incorrect and/or missing, no symbols loaded for QtCored4.dll]
QtCored4.dll!671e4386()
QtCored4.dll!672654f0()
QtGuid4.dll!657e9622()
msvcr90d.dll!_unlock(int locknum=0) Line 376 C
To copy to clipboard, switch view to plain text mode
and just before "idle" mode (ie in the moc file)
> Bommerd.
exe!Bommer
::qt_metacall(QMetaObject::Call _c
=InvokeMetaMethod,
int _id
=17,
void * * _a
=0x0012c1d0
) Line
129 + 0x1a bytes C
++ QtCored4.dll!671ccae1()
[Frames below may be incorrect and/or missing, no symbols loaded for QtCored4.dll]
QtCored4.dll!671e4386()
QtCored4.dll!672654f0()
QtGuid4.dll!657e9622()
msvcr90d.dll!_unlock(int locknum=0) Line 376 C
> Bommerd.exe!Bommer::qt_metacall(QMetaObject::Call _c=InvokeMetaMethod, int _id=17, void * * _a=0x0012c1d0) Line 129 + 0x1a bytes C++
QtCored4.dll!671ccae1()
[Frames below may be incorrect and/or missing, no symbols loaded for QtCored4.dll]
QtCored4.dll!671e4386()
QtCored4.dll!672654f0()
QtGuid4.dll!657e9622()
msvcr90d.dll!_unlock(int locknum=0) Line 376 C
To copy to clipboard, switch view to plain text mode
Bookmarks