Bug 219066

Summary: kdeinit4.exe crash initialization XP
Product: [Unmaintained] kde-windows Reporter: Werner Llacer <wllacer>
Component: generalAssignee: KDE-Windows <kde-windows>
Status: RESOLVED WORKSFORME    
Severity: crash CC: chad.albert, ps_ml, wllacer
Priority: NOR    
Version: unspecified   
Target Milestone: ---   
Platform: Microsoft Windows   
OS: Microsoft Windows   
Latest Commit: Version Fixed In:
Sentry Crash Report:

Description Werner Llacer 2009-12-17 14:01:53 UTC
Version:            (using KDE 4.3.4)
OS:                MS Windows
Installed from:    MS Windows

Fresh instalation of KDE 4.3.4 under MS Windows XP SP3 (also fresh reinstalled)
Environment variables KDEDIRS and PATH set. MSVC*90 present

assistant.exe and lskat.exe work flawlessly
When opening most KDE applications they crash (or work only partially) with a MS window pointing to Kdeinit4.exe. Following info can be gleaned from MS info

AppName: kdeinit4.exe	 AppVer: 0.0.0.0	 ModName: ntdll.dll
ModVer: 5.1.2600.5755	 Offset: 000131be

Code 0xc0000005 <-- LOOKS LIKE A DLL IS MISSING, but which?
Flags 0x00000000
Record 0x0000000 ....
Address 0x000000007c9231be

dbus-daemon.exe keeps on running

KDeinit4.exe executed standalone crashes the same way
Comment 1 Werner Llacer 2009-12-18 20:04:34 UTC
I just upgraded an XP SP2 machine to 4.3.4 and the problem DOES NOT appear. I've rechecked the environment and (beyond third party products) I only see one noticeable change:

In the working instalation KDE is installed on a C:\KDE4 directory but in the offending machine it is installed under "C:\Archivos de Programa\KDE" (is my corporate workstation and I try to keep all software under %ProgramFiles%, this time in spanish) ¿Could the whitespace have any influence in this error?  
Can't check until Monday (or later) in the troublesome machine
Comment 2 Werner Llacer 2009-12-21 12:24:08 UTC
Installation directory changed to no avail
Comment 3 Chad 2010-02-03 20:34:53 UTC
I am also experiencing this on Vista x64 and Win7 x64.  I am running the 32 bit version of KDE 4.3.95.  Below is what I get from the Windows appcrash window.

Problem signature:
  Problem Event Name:	APPCRASH
  Application Name:	kdeinit4.exe
  Application Version:	0.0.0.0
  Application Timestamp:	4b575d1c
  Fault Module Name:	ntdll.dll
  Fault Module Version:	6.1.7600.16385
  Fault Module Timestamp:	4a5bdb3b
  Exception Code:	c0000005
  Exception Offset:	000391b3
  OS Version:	6.1.7600.2.0.0.256.4
  Locale ID:	1033
  Additional Information 1:	0a9e
  Additional Information 2:	0a9e372d3b4ad19135b953a78882e789
  Additional Information 3:	0a9e
  Additional Information 4:	0a9e372d3b4ad19135b953a78882e789

The only error information I get when I profile it in depends happens is at the very end.  The error is

Second chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x775E91B3 by thread 1.

Below is the entire output from the depends profiling.

Warning: At least one delay-load dependency module was not found.
Warning: At least one module has an unresolved import due to a missing export function in a delay-load dependent module.

--------------------------------------------------------------------------------
Starting profile on 2/3/2010 at 1:28:57 PM

Operating System: Microsoft Windows NT/2000/XP/2003/Vista based Enterprise (64-bit), version 6.01.7600
Program Executable: c:\program files (x86)\kde\bin\KDEINIT4.EXE
Program Arguments: 
Starting Directory: C:\Program Files (x86)\KDE\bin\
Search Path: C:\Program Files (x86)\MiKTeX 2.8\miktex\bin;C:\Program Files\ImageMagick;C:\Windows\System32\;C:\Windows\;C:\Windows\System32\Wbem;C:\Program Files (x86)\gtk2\bin;C:\Program Files (x86)\mlt\bin;C:\Program Files (x86)\OpenLibraries\bin;C:\Program Files (x86)\gnuwin32\bin;C:\Program Files (x86)\Java\jdk1.6.0_17\jre\bin;C:\Program Files (x86)\Nmap;C:\Program Files (x86)\sox;C:\Program Files (x86)\SMPlayer\mplayer;C:\Program Files (x86)\xpdf;C:\Program Files (x86)\xpdf;C:\Program Files (x86)\FFmpeg for Audacity;C:\Program Files\gs\gs8.64\bin;C:\strawberry\perl\bin;C:\Program Files (x86)\MySQL\MySQL Workbench 5.2 OSS;C:\strawberry\c\bin;C:\Program Files (x86)\Nmap;C:\Program Files (x86)\OpenVPN\bin;C:\Program Files (x86)\CVSNT\;C:\Program Files (x86)\Nmap

Options Selected:
     Simulate ShellExecute by inserting any App Paths directories into the PATH environment variable.
     Log DllMain calls for process attach and process detach messages.
     Hook the process to gather more detailed dependency information.
     Log LoadLibrary function calls.
     Log GetProcAddress function calls.
     Log thread information.
     Use simple thread numbers instead of actual thread IDs.
     Log debug output messages.
     Automatically open and profile child processes.
--------------------------------------------------------------------------------

Started "KDEINIT4.EXE" (process 0x2148) at address 0x00400000 by thread 1.  Successfully hooked module.
Loaded "NTDLL.DLL" at address 0x775B0000 by thread 1.  Successfully hooked module.
Loaded "KERNEL32.DLL" at address 0x76910000 by thread 1.  Successfully hooked module.
Loaded "KERNELBASE.DLL" at address 0x768C0000 by thread 1.  Successfully hooked module.
DllMain(0x768C0000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNELBASE.DLL" called by thread 1.
DllMain(0x768C0000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNELBASE.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76910000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called by thread 1.
DllMain(0x76910000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 1 (0x1) by thread 1.
Injected "DEPENDS.DLL" at address 0x08370000 by thread 1.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called by thread 1.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 (0x1) by thread 1.
Loaded "KDECORE.DLL" at address 0x10000000 by thread 1.  Successfully hooked module.
Loaded "QTCORE4.DLL" at address 0x67000000 by thread 1.  Successfully hooked module.
Loaded "USER32.DLL" at address 0x770B0000 by thread 1.  Successfully hooked module.
Loaded "GDI32.DLL" at address 0x76AA0000 by thread 1.  Successfully hooked module.
Loaded "LPK.DLL" at address 0x76B70000 by thread 1.  Successfully hooked module.
Loaded "USP10.DLL" at address 0x75180000 by thread 1.  Successfully hooked module.
Loaded "MSVCRT.DLL" at address 0x77000000 by thread 1.  Successfully hooked module.
Loaded "ADVAPI32.DLL" at address 0x76680000 by thread 1.  Successfully hooked module.
Loaded "SECHOST.DLL" at address 0x76B50000 by thread 1.  Successfully hooked module.
Loaded "RPCRT4.DLL" at address 0x758E0000 by thread 1.  Successfully hooked module.
Loaded "SSPICLI.DLL" at address 0x75120000 by thread 1.  Successfully hooked module.
Loaded "CRYPTBASE.DLL" at address 0x75110000 by thread 1.  Successfully hooked module.
Loaded "OLE32.DLL" at address 0x76B80000 by thread 1.  Successfully hooked module.
Loaded "WS2_32.DLL" at address 0x75410000 by thread 1.  Successfully hooked module.
Loaded "NSI.DLL" at address 0x77580000 by thread 1.  Successfully hooked module.
Loaded "MSVCP90.DLL" at address 0x66120000 by thread 1.  Successfully hooked module.
Loaded "MSVCR90.DLL" at address 0x66AB0000 by thread 1.  Successfully hooked module.
Loaded "QTNETWORK4.DLL" at address 0x64000000 by thread 1.  Successfully hooked module.
Loaded "QTDBUS4.DLL" at address 0x00140000 by thread 1.  Successfully hooked module.
Loaded "QTXML4.DLL" at address 0x61000000 by thread 1.  Successfully hooked module.
Loaded "DBUS-1.DLL" at address 0x001C0000 by thread 1.  Successfully hooked module.
Loaded "KDEWIN.DLL" at address 0x00300000 by thread 1.  Successfully hooked module.
Loaded "SHELL32.DLL" at address 0x759D0000 by thread 1.  Successfully hooked module.
Loaded "SHLWAPI.DLL" at address 0x76620000 by thread 1.  Successfully hooked module.
Loaded "NETAPI32.DLL" at address 0x74C00000 by thread 1.  Successfully hooked module.
Loaded "NETUTILS.DLL" at address 0x74BF0000 by thread 1.  Successfully hooked module.
Loaded "SRVCLI.DLL" at address 0x74A20000 by thread 1.  Successfully hooked module.
Loaded "WKSCLI.DLL" at address 0x74A10000 by thread 1.  Successfully hooked module.
Loaded "SAMCLI.DLL" at address 0x747C0000 by thread 1.  Successfully hooked module.
Loaded "BZIP2.DLL" at address 0x68440000 by thread 1.  Successfully hooked module.
Loaded "INTL.DLL" at address 0x69000000 by thread 1.  Successfully hooked module.
Loaded "PSAPI.DLL" at address 0x76D40000 by thread 1.  Successfully hooked module.
Entrypoint reached. All implicit modules have been loaded.
DllMain(0x77000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "MSVCRT.DLL" called by thread 1.
DllMain(0x77000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "MSVCRT.DLL" returned 1 (0x1) by thread 1.
DllMain(0x75180000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "USP10.DLL" called by thread 1.
LoadLibraryA("gdi32.dll") called from "USP10.DLL" at address 0x75196890 by thread 1.
LoadLibraryA("gdi32.dll") returned 0x76AA0000 by thread 1.
GetProcAddress(0x76AA0000 [GDI32.DLL], "GetCharABCWidthsI") called from "USP10.DLL" at address 0x751968C5 and returned 0x76ABAFF8 by thread 1.
DllMain(0x75180000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "USP10.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76B70000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "LPK.DLL" called by thread 1.
DllMain(0x76B70000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "LPK.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76AA0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "GDI32.DLL" called by thread 1.
DllMain(0x76AA0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "GDI32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x75110000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "CRYPTBASE.DLL" called by thread 1.
DllMain(0x75110000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "CRYPTBASE.DLL" returned 1 (0x1) by thread 1.
DllMain(0x75120000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SSPICLI.DLL" called by thread 1.
DllMain(0x75120000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SSPICLI.DLL" returned 1 (0x1) by thread 1.
DllMain(0x758E0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "RPCRT4.DLL" called by thread 1.
DllMain(0x758E0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "RPCRT4.DLL" returned 1972348673 (0x758FA701) by thread 1.
DllMain(0x76B50000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SECHOST.DLL" called by thread 1.
DllMain(0x76B50000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SECHOST.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76680000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "ADVAPI32.DLL" called by thread 1.
DllMain(0x76680000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "ADVAPI32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x770B0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "USER32.DLL" called by thread 1.
LoadLibraryW("C:\Windows\system32\IMM32.DLL") called from "USER32.DLL" at address 0x770CC2B5 by thread 1.
Loaded "IMM32.DLL" at address 0x75720000 by thread 1.  Successfully hooked module.
Loaded "MSCTF.DLL" at address 0x75340000 by thread 1.  Successfully hooked module.
DllMain(0x75340000, DLL_PROCESS_ATTACH, 0x00000000) in "MSCTF.DLL" called by thread 1.
DllMain(0x75340000, DLL_PROCESS_ATTACH, 0x00000000) in "MSCTF.DLL" returned 1 (0x1) by thread 1.
DllMain(0x75720000, DLL_PROCESS_ATTACH, 0x00000000) in "IMM32.DLL" called by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmWINNLSEnableIME") called from "USER32.DLL" at address 0x770CB776 and returned 0x7573F637 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmWINNLSGetEnableStatus") called from "USER32.DLL" at address 0x770CB78B and returned 0x7573F65E by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSendIMEMessageExW") called from "USER32.DLL" at address 0x770CB7A0 and returned 0x7573F8EC by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSendIMEMessageExA") called from "USER32.DLL" at address 0x770CB7B5 and returned 0x7573F907 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIMPGetIMEW") called from "USER32.DLL" at address 0x770CB7CA and returned 0x7573FB65 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIMPGetIMEA") called from "USER32.DLL" at address 0x770CB7DF and returned 0x7573FB99 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIMPQueryIMEW") called from "USER32.DLL" at address 0x770CB7F4 and returned 0x7573F9CA by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIMPQueryIMEA") called from "USER32.DLL" at address 0x770CB809 and returned 0x7573FAD6 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIMPSetIMEW") called from "USER32.DLL" at address 0x770CB81E and returned 0x7573F746 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIMPSetIMEA") called from "USER32.DLL" at address 0x770CB833 and returned 0x7573F86E by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmAssociateContext") called from "USER32.DLL" at address 0x770CB848 and returned 0x75733691 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmEscapeA") called from "USER32.DLL" at address 0x770CB85D and returned 0x75739327 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmEscapeW") called from "USER32.DLL" at address 0x770CB872 and returned 0x757395A9 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetCompositionStringA") called from "USER32.DLL" at address 0x770CB887 and returned 0x75737A37 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetCompositionStringW") called from "USER32.DLL" at address 0x770CB89C and returned 0x7573420D by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetCompositionWindow") called from "USER32.DLL" at address 0x770CB8B1 and returned 0x75732DF9 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetContext") called from "USER32.DLL" at address 0x770CB8C6 and returned 0x75732004 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetDefaultIMEWnd") called from "USER32.DLL" at address 0x770CB8DB and returned 0x75731F1D by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmIsIME") called from "USER32.DLL" at address 0x770CB8F0 and returned 0x75732FC8 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmReleaseContext") called from "USER32.DLL" at address 0x770CB905 and returned 0x75732122 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmRegisterClient") called from "USER32.DLL" at address 0x770CB91A and returned 0x7573135E by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetCompositionFontW") called from "USER32.DLL" at address 0x770CB92F and returned 0x757368C8 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetCompositionFontA") called from "USER32.DLL" at address 0x770CB944 and returned 0x7573682C by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetCompositionFontW") called from "USER32.DLL" at address 0x770CB959 and returned 0x75733966 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetCompositionFontA") called from "USER32.DLL" at address 0x770CB96E and returned 0x75736964 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetCompositionWindow") called from "USER32.DLL" at address 0x770CB983 and returned 0x757338D8 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmNotifyIME") called from "USER32.DLL" at address 0x770CB998 and returned 0x75733BB9 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmLockIMC") called from "USER32.DLL" at address 0x770CB9AD and returned 0x75731DDD by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmUnlockIMC") called from "USER32.DLL" at address 0x770CB9C2 and returned 0x75731D89 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmLoadIME") called from "USER32.DLL" at address 0x770CB9D7 and returned 0x757318F9 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetOpenStatus") called from "USER32.DLL" at address 0x770CB9EC and returned 0x75733FF4 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmFreeLayout") called from "USER32.DLL" at address 0x770CBA01 and returned 0x757397EF by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmActivateLayout") called from "USER32.DLL" at address 0x770CBA16 and returned 0x75738DF5 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetCandidateWindow") called from "USER32.DLL" at address 0x770CBA2B and returned 0x75732E3C by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetCandidateWindow") called from "USER32.DLL" at address 0x770CBA40 and returned 0x75733E03 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmConfigureIMEW") called from "USER32.DLL" at address 0x770CBA55 and returned 0x7573913F by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetConversionStatus") called from "USER32.DLL" at address 0x770CBA6A and returned 0x75732469 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetConversionStatus") called from "USER32.DLL" at address 0x770CBA7F and returned 0x75733EE7 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetStatusWindowPos") called from "USER32.DLL" at address 0x770CBA94 and returned 0x75736A7C by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetImeInfoEx") called from "USER32.DLL" at address 0x770CBAA9 and returned 0x757314F0 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmLockImeDpi") called from "USER32.DLL" at address 0x770CBABE and returned 0x75731FA5 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmUnlockImeDpi") called from "USER32.DLL" at address 0x770CBAD3 and returned 0x75731F58 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetOpenStatus") called from "USER32.DLL" at address 0x770CBAE8 and returned 0x75733DD0 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetActiveContext") called from "USER32.DLL" at address 0x770CBAFD and returned 0x757321D1 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmTranslateMessage") called from "USER32.DLL" at address 0x770CBB12 and returned 0x7573F27F by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmLoadLayout") called from "USER32.DLL" at address 0x770CBB27 and returned 0x75739E79 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmProcessKey") called from "USER32.DLL" at address 0x770CBB3C and returned 0x75733A6A by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmPutImeMenuItemsIntoMappedFile") called from "USER32.DLL" at address 0x770CBB51 and returned 0x75744E96 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmGetProperty") called from "USER32.DLL" at address 0x770CBB66 and returned 0x75733C1B by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetCompositionStringA") called from "USER32.DLL" at address 0x770CBB7B and returned 0x757383C2 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSetCompositionStringW") called from "USER32.DLL" at address 0x770CBB90 and returned 0x757383E9 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmEnumInputContext") called from "USER32.DLL" at address 0x770CBBA5 and returned 0x7573320A by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "ImmSystemHandler") called from "USER32.DLL" at address 0x770CBBBA and returned 0x7573B1CF by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmTIMActivate") called from "USER32.DLL" at address 0x770CBBCB and returned 0x75731807 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmRestoreToolbarWnd") called from "USER32.DLL" at address 0x770CBBDC and returned 0x75745114 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmHideToolbarWnd") called from "USER32.DLL" at address 0x770CBBED and returned 0x7574514B by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmDispatchDefImeMessage") called from "USER32.DLL" at address 0x770CBBFE and returned 0x75731611 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmNotify") called from "USER32.DLL" at address 0x770CBC0F and returned 0x75731346 by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmSetDefaultRemoteKeyboardLayout") called from "USER32.DLL" at address 0x770CBC20 and returned 0x757453CC by thread 1.
GetProcAddress(0x75720000 [IMM32.DLL], "CtfImmGetCompatibleKeyboardLayout") called from "USER32.DLL" at address 0x770CBC31 and returned 0x757453DC by thread 1.
DllMain(0x75720000, DLL_PROCESS_ATTACH, 0x00000000) in "IMM32.DLL" returned 1 (0x1) by thread 1.
LoadLibraryW("C:\Windows\system32\IMM32.DLL") returned 0x75720000 by thread 1.
GetProcAddress(0x76B70000 [LPK.DLL], "LpkTabbedTextOut") called from "GDI32.DLL" at address 0x76AB6970 and returned 0x76B748A0 by thread 1.
GetProcAddress(0x76B70000 [LPK.DLL], "LpkPSMTextOut") called from "GDI32.DLL" at address 0x76AB697B and returned 0x76B71430 by thread 1.
GetProcAddress(0x76B70000 [LPK.DLL], "LpkDrawTextEx") called from "GDI32.DLL" at address 0x76AB6986 and returned 0x76B713D0 by thread 1.
GetProcAddress(0x76B70000 [LPK.DLL], "LpkEditControl") called from "GDI32.DLL" at address 0x76AB6991 and returned 0x76B77000 by thread 1.
DllMain(0x770B0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "USER32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76B80000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "OLE32.DLL" called by thread 1.
DllMain(0x76B80000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "OLE32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x77580000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "NSI.DLL" called by thread 1.
DllMain(0x77580000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "NSI.DLL" returned 1 (0x1) by thread 1.
DllMain(0x75410000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "WS2_32.DLL" called by thread 1.
DllMain(0x75410000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "WS2_32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x66AB0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "MSVCR90.DLL" called by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "FlsAlloc") called from "MSVCR90.DLL" at address 0x66AD3ACC and returned 0x76921F22 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "FlsGetValue") called from "MSVCR90.DLL" at address 0x66AD3AD9 and returned 0x7692123D by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "FlsSetValue") called from "MSVCR90.DLL" at address 0x66AD3AE6 and returned 0x769218E4 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "FlsFree") called from "MSVCR90.DLL" at address 0x66AD3AF3 and returned 0x76923954 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD35E2 and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "DecodePointer") called from "MSVCR90.DLL" at address 0x66AD3667 and returned 0x775E9BD5 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "DecodePointer") called from "MSVCR90.DLL" at address 0x66AD3667 and returned 0x775E9BD5 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD379B and returned 0x775F0E5B by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "DecodePointer") called from "MSVCR90.DLL" at address 0x66AD37AB and returned 0x775E9BD5 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "IsProcessorFeaturePresent") called from "MSVCR90.DLL" at address 0x66B334FB and returned 0x76924F3A by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "FindActCtxSectionStringW") called from "MSVCR90.DLL" at address 0x66AD2822 and returned 0x7692B5D5 by thread 1.
DllMain(0x66AB0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "MSVCR90.DLL" returned 1 (0x1) by thread 1.
DllMain(0x66120000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "MSVCP90.DLL" called by thread 1.
DllMain(0x66120000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "MSVCP90.DLL" returned 1 (0x1) by thread 1.
DllMain(0x67000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTCORE4.DLL" called by thread 1.
DllMain(0x67000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTCORE4.DLL" returned 1 (0x1) by thread 1.
DllMain(0x64000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTNETWORK4.DLL" called by thread 1.
DllMain(0x64000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTNETWORK4.DLL" returned 1 (0x1) by thread 1.
DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTXML4.DLL" called by thread 1.
DllMain(0x61000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTXML4.DLL" returned 1 (0x1) by thread 1.
DllMain(0x001C0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "DBUS-1.DLL" called by thread 1.
DllMain(0x001C0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "DBUS-1.DLL" returned 1 (0x1) by thread 1.
DllMain(0x00140000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTDBUS4.DLL" called by thread 1.
DllMain(0x00140000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "QTDBUS4.DLL" returned 1 (0x1) by thread 1.
DllMain(0x00300000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "KDEWIN.DLL" called by thread 1.
DllMain(0x00300000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "KDEWIN.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76620000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SHLWAPI.DLL" called by thread 1.
DllMain(0x76620000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SHLWAPI.DLL" returned 1 (0x1) by thread 1.
DllMain(0x759D0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SHELL32.DLL" called by thread 1.
DllMain(0x759D0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SHELL32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x74BF0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "NETUTILS.DLL" called by thread 1.
DllMain(0x74BF0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "NETUTILS.DLL" returned 1 (0x1) by thread 1.
DllMain(0x74A20000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SRVCLI.DLL" called by thread 1.
DllMain(0x74A20000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SRVCLI.DLL" returned 1 (0x1) by thread 1.
DllMain(0x74A10000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "WKSCLI.DLL" called by thread 1.
DllMain(0x74A10000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "WKSCLI.DLL" returned 1 (0x1) by thread 1.
DllMain(0x74C00000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "NETAPI32.DLL" called by thread 1.
DllMain(0x74C00000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "NETAPI32.DLL" returned 1 (0x1) by thread 1.
DllMain(0x747C0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SAMCLI.DLL" called by thread 1.
DllMain(0x747C0000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "SAMCLI.DLL" returned 1 (0x1) by thread 1.
DllMain(0x68440000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "BZIP2.DLL" called by thread 1.
DllMain(0x68440000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "BZIP2.DLL" returned 1 (0x1) by thread 1.
DllMain(0x69000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "INTL.DLL" called by thread 1.
DllMain(0x69000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "INTL.DLL" returned 1 (0x1) by thread 1.
DllMain(0x10000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "KDECORE.DLL" called by thread 1.
LoadLibraryW("kernel32") called from "QTCORE4.DLL" at address 0x670D9469 by thread 1.
LoadLibraryW("kernel32") returned 0x76910000 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "AttachConsole") called from "QTCORE4.DLL" at address 0x670D9B3A and returned 0x769C68CA by thread 1.
DllMain(0x10000000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "KDECORE.DLL" returned 1 (0x1) by thread 1.
DllMain(0x76D40000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "PSAPI.DLL" called by thread 1.
DllMain(0x76D40000, DLL_PROCESS_ATTACH, 0x00D9FD24) in "PSAPI.DLL" returned 1 (0x1) by thread 1.
LoadLibraryExA("SspiCli.dll", 0x00000000, 0x00000000) called from "ADVAPI32.DLL" at address 0x7669BDD5 by thread 1.
LoadLibraryExA("SspiCli.dll", 0x00000000, 0x00000000) returned 0x75120000 by thread 1.
GetProcAddress(0x75120000 [SSPICLI.DLL], "GetUserNameExW") called from "ADVAPI32.DLL" at address 0x7669BE39 and returned 0x7513A365 by thread 1.
Loaded "SAMLIB.DLL" at address 0x73700000 by thread 1.  Successfully hooked module.
DllMain(0x73700000, DLL_PROCESS_ATTACH, 0x00000000) in "SAMLIB.DLL" called by thread 1.
DllMain(0x73700000, DLL_PROCESS_ATTACH, 0x00000000) in "SAMLIB.DLL" returned 1 (0x1) by thread 1.
Thread 2 started in "NTDLL.DLL" at address 0x77611C7F.
Thread 3 started in "NTDLL.DLL" at address 0x77612C91.
Second chance exception 0xC0000005 (Access Violation) occurred in "NTDLL.DLL" at address 0x775E91B3 by thread 1.
GetProcAddress(0x76910000 [KERNEL32.DLL], "DecodePointer") called from "MSVCR90.DLL" at address 0x66AD3667 and returned 0x775E9BD5 by thread 3.
GetProcAddress(0x76910000 [KERNEL32.DLL], "DecodePointer") called from "MSVCR90.DLL" at address 0x66AD3667 and returned 0x775E9BD5 by thread 3.
GetProcAddress(0x76910000 [KERNEL32.DLL], "EncodePointer") called from "MSVCR90.DLL" at address 0x66AD379B and returned 0x775F0E5B by thread 3.
GetProcAddress(0x76910000 [KERNEL32.DLL], "DecodePointer") called from "MSVCR90.DLL" at address 0x66AD37AB and returned 0x775E9BD5 by thread 3.
Thread 3 exited with code -1073741819 (0xC0000005).
Thread 1 exited with code -1073741819 (0xC0000005).
Exited "KDEINIT4.EXE" (process 0x2148) with code -1073741819 (0xC0000005) by thread 2.
Comment 4 Patrick Spendrin 2010-02-20 01:16:16 UTC
@Chad: please remove MikTeX from your path and try again. If you want to use MikTex, you might also need to take out KDE from the path (that is kind of recommended to not disturb other programs). If this doesn't fix the bug please please please report here!
Comment 5 Jekyll Wu 2013-07-03 03:15:14 UTC
Please try KDE 4.10.2 to see whether the problem still exits.
Comment 6 Werner Llacer 2013-07-16 22:47:10 UTC
Hi Jekyll
Sorry about the delay.
 Seems that you have reopened the ticket. Are you interested to reproduce it on XP or rather as a general check?
I've no access now to the original environment (both XP, the computer and myself have been retired in this timeframe), although i hava  somewhere a copy of XP i could fire up in a virtual machine (but IIRC it was the setup that worked), and i have both Vista and W7 machines available where to test
Comment 7 Werner Llacer 2013-07-18 12:23:14 UTC
I tested it on two random W7 laptops (one with Starter other with Home Premium edition) using the MSVC build.  
Both work
Comment 8 Christoph Feck 2013-08-11 10:55:55 UTC
Thanks for the update. Can this be closed?
Comment 9 Chad 2013-08-12 14:10:02 UTC
Fine by me to close it.

Christoph Feck <christoph@maxiom.de> wrote:


https://bugs.kde.org/show_bug.cgi?id=219066

--- Comment #8 from Christoph Feck <christoph@maxiom.de> ---
Thanks for the update. Can this be closed?

--
You are receiving this mail because:
You voted for the bug.
You are on the CC list for the bug.

DID YOU KNOW:
HEALTHCAREfirst's experience in providing solutions for over 1000
home health and hospice agencies resulted in the creation of
Web-available software and services to maximize operational
efficiencies. HEALTHCAREfirst can provide FULL SERVICE SOLUTIONS,
including; Web-available software for agency management and point
of care clinical data capture, electronic communications with
physicians, billing services and coding services (in any combination).

CONFIDENTIALITY NOTICE:
This e-mail message, including any attachments, is for the sole use
of the intended recipient(s) and may contain confidential and
privileged information. Any unauthorized review, use, disclosure or
distribution is prohibited. If you are not the intended recipient,
please contact the sender by reply e-mail and destroy all copies of
the original message. The integrity and security of this message
cannot be guaranteed over Internet.