http://bugs.winehq.org/show_bug.cgi?id=3329
Summary: Google Earth does not start up ("hangs") Product: Wine Version: CVS Platform: PC URL: http://kh.google.com/download/earth/index.html OS/Version: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: wine-binary AssignedTo: wine-bugs@winehq.org ReportedBy: xerox_xerox2000@yahoo.co.uk
With current cvs Google Earth seems to install fine, allthough a lot of error messages appear in the console. However, when i try to run GoogleEarth the application doesn't start up. I'll attach last 1000 lines of a +relay trace. It always ends with these lines:
0009:Call kernel32.lstrcpynW(7fe05d78,7d1102c0 L"Initializing",00000023) ret=7f76ada0 0009:Ret kernel32.lstrcpynW() retval=7fe05d78 ret=7f76ada0 0009:Call kernel32.98(7f80a220) ret=7f7bf699 0009:Call ntdll.NtCurrentTeb() ret=7fd0ea1d 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7fd0ea1d 0009:Call ntdll.RtlLeaveCriticalSection(7f80a220) ret=7fd0eb4a 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd0eb4a 0009:Ret kernel32.98() retval=00000000 ret=7f7bf699 0009:Ret user32.DefWindowProcW() retval=0000000c ret=39d0f7b3 0009:Call kernel32.lstrcpynA(7fa5f7d8,7f7df7ce "WM_GETTEXT",0000003c) ret=7f7afa14 0009:Ret kernel32.lstrcpynA() retval=7fa5f7d8 ret=7f7afa14 0009:Call kernel32.GetCurrentThreadId() ret=7f7ca5d7 0009:Ret kernel32.GetCurrentThreadId() retval=00000009 ret=7f7ca5d7 0009:Ret window proc 0x39d03939 (hwnd=0x10026,msg=WM_GETTEXT,wp=00000023,lp=7fe05d78) retval=0000000c 0009:Call ntdll.NtCurrentTeb() ret=7f780161 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7f780161 0009:Call kernel32.94(7f80a220) ret=7f7bf6ba 0009:Ret kernel32.94() retval=00000009 ret=7f7bf6ba 0009:Call ntdll.NtCurrentTeb() ret=7f780161 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7f780161 0009:Call kernel32.97(7f80a220) ret=7f7bf678 0009:Call ntdll.NtCurrentTeb() ret=7fd0ea1d 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7fd0ea1d 0009:Call ntdll.RtlEnterCriticalSection(7f80a220) ret=7fd0e96f 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd0e96f 0009:Ret kernel32.97() retval=7fd8df20 ret=7f7bf678 0009:Call kernel32.98(7f80a220) ret=7f7bf699 0009:Call ntdll.NtCurrentTeb() ret=7fd0ea1d 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7fd0ea1d 0009:Call ntdll.RtlLeaveCriticalSection(7f80a220) ret=7fd0eb4a 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd0eb4a 0009:Ret kernel32.98() retval=00000000 ret=7f7bf699 0009:Call kernel32.97(7f80a220) ret=7f7bf678 0009:Call ntdll.NtCurrentTeb() ret=7fd0ea1d 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7fd0ea1d 0009:Call ntdll.RtlEnterCriticalSection(7f80a220) ret=7fd0e96f 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7fd0e96f 0009:Ret kernel32.97() retval=7fd8df20 ret=7f7bf678 0009:Call kernel32.GetCurrentProcessId() ret=7f7c579d 0009:Ret kernel32.GetCurrentProcessId() retval=00000008 ret=7f7c579d 0009:Call kernel32.98(7f80a220) ret=7f7bf699 0009:Call ntdll.NtCurrentTeb() ret=7fd0ea1d 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7fd0ea1d 0009:Call ntdll.RtlLeaveCriticalSection(7f80a220) ret=7fd0eb4a 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7fd0eb4a 0009:Ret kernel32.98() retval=00000000 ret=7f7bf699 0009:Call kernel32.GetCurrentThreadId() ret=7f79fa30 0009:Ret kernel32.GetCurrentThreadId() retval=00000009 ret=7f79fa30 0009:Call kernel32.GetCurrentProcessId() ret=7f79fa5e 0009:Ret kernel32.GetCurrentProcessId() retval=00000008 ret=7f79fa5e 0009:Call kernel32.94(7f80a220) ret=7f7bf6ba 0009:Ret kernel32.94() retval=00000009 ret=7f7bf6ba 0009:Call kernel32.GetTickCount() ret=7f79f4df 0009:Ret kernel32.GetTickCount() retval=000017aa ret=7f79f4df 0009:Call ntdll.NtCurrentTeb() ret=7f79dd2b 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7f79dd2b 0009:Call kernel32.48(7fa5f948) ret=7f79f2d8 0009:Ret kernel32.48() retval=7fa5f818 ret=7f79f2d8 0009:Call winex11.drv.MsgWaitForMultipleObjectsEx(00000001,7fa5f954,ffffffff,000000ff,00000000) ret=7f79f2f7 0009:Call kernel32.TlsGetValue(00000000) ret=7ebf2870 0009:Call ntdll.NtCurrentTeb() ret=7fcfc6f1 0009:Ret ntdll.NtCurrentTeb() retval=7fffc000 ret=7fcfc6f1 0009:Ret kernel32.TlsGetValue() retval=7fdb6950 ret=7ebf2870 0009:Call ntdll.RtlEnterCriticalSection(7ec33420) ret=7ec0df29 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7ec0df29 0009:Call ntdll.RtlLeaveCriticalSection(7ec33420) ret=7ec0df4a 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7ec0df4a 0009:Call ntdll.RtlEnterCriticalSection(7ec33420) ret=7ec0df29 0009:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=7ec0df29 0009:Call ntdll.RtlLeaveCriticalSection(7ec33420) ret=7ec0df4a 0009:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=7ec0df4a 0009:Call kernel32.WaitForMultipleObjectsEx(00000002,7fa5f6e0,00000000,ffffffff,00000000) ret=7ebf298e 0009:Call ntdll.NtWaitForMultipleObjects(00000002,7fa5f50c,00000000,00000000,00000000) ret=7fd0ba56
Anyone know how to dig deeper?