https://bugs.kde.org/show_bug.cgi?id=374568

--- Comment #3 from RJVB <rjvber...@gmail.com> ---
As you noted, the backtrace is strange and almost suggests that the sanitiser
itself is causing side-effects. It seems highly unlikely that a Qt event would
cause a jump directly into config_file.cpp's loadImage()!
Wouldn't be the first time that a measurement instrument changes the measured
observables (or that a bug jumps elsewhere when you try to look at it).

I don't see how the original hack can be bad, either. It just subclasses
QMenuBar with an additional wrapper to be able to call QMenuBar::event(). Maybe
it's related to using a C-style case, or a struct instead of a class HackedMenu
but the main difference there should just be that all "struct members" are
public, no? But you could try with `class HackedMenu` too, and with
dynamic_cast<HackedMenu*>(menu)->send(event).

Not that I'm against simplifying the code as you propose, but I'd like to be
able to understand why the sanitiser trips over it. What does that sanitiser do
anyway,

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to