I have a problem with latest CVS in the past several days. Every app locking up. Any suggestions where should I look. It's not a dead loop. Something happening, according to trace.
Here is the trace where I think the problem starts:
0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=0040f8d5 0009:Call user32.IsWindowVisible(00010021) ret=00444671 0009:Call kernel32._EnterSysLevel(4071cc58) ret=406c6793 0009:trace:win32:_EnterSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count before 0 0009:trace:win32:_EnterSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count after 1 0009:Ret kernel32._EnterSysLevel() retval=400d9d20 ret=406c6793 0009:Call kernel32._LeaveSysLevel(4071cc58) ret=406c67b3 0009:trace:win32:_LeaveSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count before 1 0009:trace:win32:_LeaveSysLevel (0x4071cc58, level 2): thread 9 (fs 008f, pid 2321) count after 0 0009:Ret kernel32._LeaveSysLevel() retval=00000063 ret=406c67b3 0009:Ret user32.IsWindowVisible() retval=00000000 ret=00444671 0009:Call ntdll.RtlEnterCriticalSection(41370830) ret=0040b6c4 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=0040b6c4 0009:trace:seh:EXC_RtlRaiseException code=c0000005 flags=0 addr=0x40eeb2 0009:trace:seh:EXC_RtlRaiseException info[0]=00000000 0009:trace:seh:EXC_RtlRaiseException info[1]=0000000c 0009: queue_exception_event( first=1, record={context={flags=00000000,eax=00000000,ebx=00457bec,ecx=400f8600,edx=400f2c30,esi=413710cc,edi=00457bec,ebp=40592d04,eip=0040eeb2,esp=40592ce4,eflags=00010246,cs=0023,ds=002b,es=002b,fs=008f,gs=004f,dr0=00000000,dr1=00000000,dr2=00000000,dr3=00000000,dr6=00000000,dr7=00000000,float={00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000}},rec={code=c0000005,flags=0,rec=(nil),addr=0x40eeb2,params={0,c}} ) 0009: queue_exception_event() = 0 { handle=(nil) } 0009:trace:seh:EXC_CallHandler calling handler at 0x40f106 code=c0000005 flags=0 0009:trace:seh:EXC_CallHandler handler returned 1 0009:trace:seh:EXC_CallHandler calling handler at 0x43cfa8 code=c0000005 flags=0 0009:trace:seh:EXC_CallHandler handler returned 1 0009:trace:seh:EXC_CallHandler calling handler at 0x43cfe0 code=c0000005 flags=0 0009:trace:seh:EXC_CallHandler handler returned 1 0009:trace:seh:EXC_CallHandler calling handler at 0x43d000 code=c0000005 flags=0 0009:trace:seh:EXC_CallHandler handler returned 1 0009:trace:seh:EXC_CallHandler calling handler at 0x402ffd code=c0000005 flags=0 0009:Call user32.LoadStringA(00400000,0000ffd0,40480334,00000400) ret=00405712 0009:trace:resource:LoadStringA instance = 0x400000, id = ffd0, buffer = 40480334, length = 1024 0009:Call ntdll.RtlAllocateHeap(40240000,00000000,00000800) ret=406e9eb6 0009:trace:heap:RtlAllocateHeap (0x40240000,00000002,00000800): returning 4027d068 0009:Ret ntdll.RtlAllocateHeap() retval=4027d068 ret=406e9eb6 0009:trace:resource:LoadStringW instance = 0x400000, id = ffd0, buffer = 4027d068, length = 1024 0009:Call kernel32.FindResourceW(00400000,00000ffe,00000006) ret=406e9d4d 0009:trace:resource:RES_FindResource2 (0x400000, 00000006, 00000ffe, 0000, W, PE) 0009:Ret kernel32.FindResourceW() retval=00468998 ret=406e9d4d 0009:Call kernel32.LoadResource(00400000,00468998) ret=406e9d5c 0009:trace:resource:RES_LoadResource (0x400000, 0x468998, PE) 0009:Ret kernel32.LoadResource() retval=0046c6f0 ret=406e9d5c 0009:Call kernel32.LockResource(0046c6f0) ret=406e9d6a 0009:trace:resource:LockResource (0x46c6f0) 0009:Ret kernel32.LockResource() retval=0046c6f0 ret=406e9d6a 0009:trace:resource:LoadStringW strlen = 4 0009:trace:resource:LoadStringW L"Read" loaded ! 0009:Call kernel32.WideCharToMultiByte(00000000,00000000,4027d068 L"Read",00000004,40480334,000003ff,00000000,00000000) ret=406e9eee 0009:Ret kernel32.WideCharToMultiByte() retval=00000004 ret=406e9eee 0009:trace:resource:LoadStringA "Read" loaded ! 0009:Call ntdll.RtlFreeHeap(40240000,00000000,4027d068) ret=406e9f43 0009:trace:heap:RtlFreeHeap (0x40240000,00000002,4027d068): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=406e9f43 0009:Ret user32.LoadStringA() retval=00000004 ret=00405712 0009:Call kernel32.VirtualQuery(0040eeb2,404808a4,0000001c) ret=0040a8c0 0009:Ret kernel32.VirtualQuery() retval=0000001c ret=0040a8c0 0009:Call kernel32.GetModuleFileNameA(00400000,4048079f,00000105) ret=0040a8e2 0009:trace:heap:RtlAllocateHeap (0x40240000,00000002,00000210): returning 4027d068 0009:trace:string:lstrcpynW (0x4027d068, L"F:\wine\Virtual_Listview\virtuallistview.exe", 261) 0009:trace:module:GetModuleFileNameW L"F:\wine\Virtual_Listview\virtuallistview.exe" 0009:trace:heap:RtlFreeHeap (0x40240000,00000002,4027d068): returning TRUE 0009:Ret kernel32.GetModuleFileNameA() retval=0000002c ret=0040a8e2 0009:Call user32.LoadStringA(00400000,0000ffdb,4048032c,00000400) ret=00405712 0009:trace:resource:LoadStringA instance = 0x400000, id = ffdb, buffer = 4048032c, length = 1024 0009:Call ntdll.RtlAllocateHeap(40240000,00000000,00000800) ret=406e9eb6 0009:trace:heap:RtlAllocateHeap (0x40240000,00000002,00000800): returning 4027d068 0009:Ret ntdll.RtlAllocateHeap() retval=4027d068 ret=406e9eb6 0009:trace:resource:LoadStringW instance = 0x400000, id = ffdb, buffer = 4027d068, length = 1024 0009:Call kernel32.FindResourceW(00400000,00000ffe,00000006) ret=406e9d4d 0009:trace:resource:RES_FindResource2 (0x400000, 00000006, 00000ffe, 0000, W, PE) 0009:Ret kernel32.FindResourceW() retval=00468998 ret=406e9d4d 0009:Call kernel32.LoadResource(00400000,00468998) ret=406e9d5c 0009:trace:resource:RES_LoadResource (0x400000, 0x468998, PE) 0009:Ret kernel32.LoadResource() retval=0046c6f0 ret=406e9d5c 0009:Call kernel32.LockResource(0046c6f0) ret=406e9d6a 0009:trace:resource:LockResource (0x46c6f0) 0009:Ret kernel32.LockResource() retval=0046c6f0 ret=406e9d6a 0009:trace:resource:LoadStringW strlen = 63 0009:trace:resource:LoadStringW L"Access violation at address %p in module '%s'. %s of address %p" loaded ! 0009:Call kernel32.WideCharToMultiByte(00000000,00000000,4027d068 L"Access violation at address %p in module '%s'. %s of address %p",0000003f,4048032c,000003ff,00000000,00000000) ret=406e9eee 0009:Ret kernel32.WideCharToMultiByte() retval=0000003f ret=406e9eee 0009:trace:resource:LoadStringA "Access violation at address %p in module '%s'. %s of address %p" loaded ! 0009:Call ntdll.RtlFreeHeap(40240000,00000000,4027d068) ret=406e9f43 0009:trace:heap:RtlFreeHeap (0x40240000,00000002,4027d068): returning TRUE 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=406e9f43 0009:Ret user32.LoadStringA() retval=0000003f ret=00405712 0009:Call ntdll.RtlUnwind(40592d30,00403217,404809c8,00000000) ret=00403217 fs=008f eax=404809c8 ebx=4048090c ecx=0040eeb2 edx=40592d30 esi=404809c8 edi=400dbcc1 ebp=40480928 esp=404808d8 ds=002b es=002b gs=0000 flags=00000246 0009:trace:seh:EXC_RtlUnwind code=c0000005 flags=2