Jays2Kings / DS4Windows

Like those other ds4tools, but sexier
3k stars 1.45k forks source link

BSOD when rapidly(~once every second) trying to "Hide DS4 Controller" #40

Open brianj64 opened 9 years ago

brianj64 commented 9 years ago

I tried to make it run exclusively but it never worked not even after closing everything that i could possibly close without shutting down my PC.

Then i kept trying to make it exclusive which it failed, then after that i tried it again after less than a second a BSOD happened.

Even though this was because i was trying too fast a BSOD is never good

I've used the online dump analyzer and this is the result

brianj64 commented 9 years ago

Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com) Online Crash Dump Analysis Service See http://www.osronline.com for more information Windows 8 Kernel Version 10240 MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 10240.16412.amd64fre.th1.150729-1800 Machine Name: Kernel base = 0xfffff8003d611000 PsLoadedModuleList = 0xfffff8003d936030 Debug session time: Sat Aug 8 12:21:09.799 2015 (UTC - 4:00) System Uptime: 0 days 23:47:11.471


DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000020, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff80120cb4dd2, address which referenced memory

Debugging Details:

TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2

READ_ADDRESS: unable to get nt!MmSpecialPoolStart unable to get nt!MmSpecialPoolEnd unable to get nt!MmPagedPoolEnd unable to get nt!MmNonPagedPoolStart unable to get nt!MmSizeOfNonPagedPoolInBytes 0000000000000020

CURRENT_IRQL: 2

FAULTING_IP: xusb22!DriverGlobals::NotifyFocusChange+4e fffff801`20cb4dd2 488b4e20 mov rcx,qword ptr [rsi+20h]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: AV

PROCESS_NAME: System

BAD_PAGES_DETECTED: 140c8

TRAP_FRAME: ffffd00029808880 -- (.trap 0xffffd00029808880) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=ffffe0014072d200 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80120cb4dd2 rsp=ffffd00029808a10 rbp=0000000000001ee8 r8=0000000000001ee8 r9=0000000000000000 r10=7fffc001b9357660 r11=ffffd00029808a00 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na po nc xusb22!DriverGlobals::NotifyFocusChange+0x4e: fffff80120cb4dd2 488b4e20 mov rcx,qword ptr [rsi+20h] ds:0000000000000020=???????????????? Resetting default scope

LAST_CONTROL_TRANSFER: from fffff8003d768ba9 to fffff8003d75e220

STACK_TEXT:
ffffd00029808738 fffff8003d768ba9 : 000000000000000a 0000000000000020 0000000000000002 0000000000000000 : nt!KeBugCheckEx ffffd00029808740 fffff8003d7673c8 : 0000000000000000 fffff8003d762c56 ffffc001b8051b30 ffffe0014f6be840 : nt!KiBugCheckDispatch+0x69 ffffd00029808880 fffff80120cb4dd2 : ffffc001b78b8370 ffffc001b78b8350 ffffe0014072d190 fffff8011cb6dc0e : nt!KiPageFault+0x248 ffffd00029808a10 fffff80120cc12cc : 0000000000001ee8 ffffc001b9712e98 ffffc001b9357610 ffffc001b78b8368 : xusb22!DriverGlobals::NotifyFocusChange+0x4e ffffd00029808a80 fffff8003db4f04f : ffffffffffffffff ffffc00100000001 ffffc001b9712e98 ffffe001000009ab : xusb22!FocusChangedCallback+0x7c ffffd00029808ac0 fffff8003dd05fd5 : 0000000000000000 fffff8003dd05fac ffffe0013b24fa28 fffff8003db1ab34 : nt!ExpWnfDispatchKernelSubscription+0x1e7 ffffd00029808b40 fffff8003d689769 : fffff8003d9ea340 fffff8003db1ab34 fffff8003d9ea200 fffff8003d9ea340 : nt!ExpWnfWorkItemRoutine+0x29 ffffd00029808b70 fffff8003d6f6698 : ffffe0013b23c040 0000000000000080 fffff8003d9ea340 ffffe0014f6be840 : nt!ExpWorkerThread+0xe9 ffffd00029808c00 fffff8003d763306 : ffffd001606a7180 ffffe0014f6be840 ffffe00141519840 ffffe0013b475020 : nt!PspSystemThreadStartup+0x58 ffffd00029808c60 0000000000000000 : ffffd00029809000 ffffd00029803000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x16

STACK_COMMAND: kb

SYMBOL_NAME: PAGE_NOT_ZERO

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME: Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP: 0

BUCKET_ID: PAGE_NOT_ZERO

Followup: MachineOwner