http://bugs.winehq.org/show_bug.cgi?id=13896
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |focht@gmx.net Component|wmi&wbemprox |-unknown
--- Comment #26 from Anastasius Focht focht@gmx.net 2011-12-14 07:43:53 CST --- Hello,
the initial bootstrapper downloads another client (after selecting language) and starts it.
--- snip --- C:\Program Files (x86)\Everest Poker\cstart-tmp.exe /wait 34 /clone --- snip ---
Using the infrastructure from bug 20651 (WMI/WBEM core infrastructure) it shows:
--- snip --- ... 0025:fixme:wbemprox:wbem_locator_ConnectServer 0x147158, L"\\.\ROOT\SecurityCenter", (null), (null), (null), 0x00000000, (null), (nil), 0x33fba4) 0025:fixme:wbemprox:wbem_services_CancelAsyncCall stub 0x146698-> 0x146698 0025:fixme:wbemprox:wbem_services_ExecQuery stub 0x146698: L"WQL" L"SELECT * FROM AntiVirusProduct" 32, (nil), 0x33f6ac 0025:fixme:wbemprox:enum_class_object_Next stub:0x146718: timeout=0, wanted interfacecount:1,ppObjects:0x33f6b4 0025:fixme:wbemprox:wbem_class_obj_Get 0x1466b0->, name L"displayName", pVal 0x33f690, pType (nil), plavour (nil),stub 0025:trace:seh:raise_exception code=c0000005 flags=0 addr=0x2005f385 ip=2005f385 tid=0025 0025:trace:seh:raise_exception info[0]=00000001 0025:trace:seh:raise_exception info[1]=00000000 0025:trace:seh:raise_exception eax=00000000 ebx=2006654c ecx=00000000 edx=7bcdab68 esi=0083586b edi=00836c81 0025:trace:seh:raise_exception ebp=0033f660 esp=0033f618 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010202 0025:trace:seh:call_vectored_handlers calling handler at 0x68c04f26 code=c0000005 flags=0 0025:trace:seh:call_vectored_handlers handler at 0x68c04f26 returned 0 0025:trace:seh:call_stack_handlers calling handler at 0x101e8755 code=c0000005 flags=0 0025:Call KERNEL32.GetLastError() ret=78ab06a2 0025:Ret KERNEL32.GetLastError() retval=000000b7 ret=78ab06a2 --- snip ---
Information about this class:
http://www.scriptinternals.com/new/us/support/Internal/WMI_AntiVirusProduct....
Although questionable the app seems to use this WMI query only for client statistics (logging).
Failure to connect to SecurityCenter or failed queries against existing infrastructure is harmless and can be safely ignored -> no WMI bug.
The client stays at splash and no further action is seen (appears to be hung). But be patient ... After ~1 min Wine Internet Exploder pops up:
--- snip --- 0025:trace:process:create_process_impl app L"C:\Program Files (x86)\Internet Explorer\iexplore.exe" cmdline L""C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://account.everestpoker.com:443/account/submitWinClient.action?requeste..." --- snip ---
Additionally a message box is shown in foreground, stating: "The game root is currently down for maintenance. Please try again later"
With 'winetricks -q ie7' the client creates an empty browser window besides the splash (CLSID_InternetExplorer -> shell docobject view) with no further action seen.
Back to builtin only: using Winspector tool one can see _two_ embedded browser top level windows: one for the splash (x11 managed) and one is hidden - most likely the main gui. Using Winspector one can inspect the properties ... this top level window has no WS_VISIBLE style set. Maybe there is some event/hook/protocol/scheme missing, making this window visible.
Regards