Well, at it again after the new bf5 update, bsod
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
FAULTING_IP:
nt!KiExecuteAllDpcs+257
fffff800`6ad87297 448bf0 mov r14d,eax
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at "0x%08lx" referenced memory at "0x%08lx". The memory could not be "%s".
BUGCHECK_STR: 0x1e_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: bfv.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: ffffc58200000001 -- (.exr 0xffffc58200000001)
Cannot read Exception record @ ffffc58200000001
TRAP_FRAME: ffffc582488be8e0 -- (.trap 0xffffc582488be8e0)
Unable to read trap frame at ffffc582`488be8e0
LAST_CONTROL_TRANSFER: from fffff8006aeeb91a to fffff8006ae53690
CONTEXT: 48038941c6ff49c0 -- (.cxr 0x48038941c6ff49c0)
Unable to read context, Win32 error 0n30
STACK_TEXT:
fffff20d`bba36ad8 fffff800`6aeeb91a : 00000000`0000001e ffffffff`c0000005 fffff800`6ad87297 00000000`00000000 : nt!KeBugCheckEx
fffff20d`bba36ae0 fffff800`6ae5bf3d : fffff800`6b09b000 fffff800`6acaa000 00058560`00953000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
fffff20d`bba36b20 fffff800`6ad09e46 : fffff20d`bba36c50 fffff20d`bba37110 00000000`00000000 fffff20d`bba37a28 : nt!RtlpExecuteHandlerForException+0xd
fffff20d`bba36b50 fffff800`6ad0b943 : fffff20d`bba37a28 fffff20d`bba37770 fffff20d`bba37a28 ffffdf81`663a0180 : nt!RtlDispatchException+0x416
fffff20d`bba37240 fffff800`6ae64342 : ffffc582`00000001 fffff20d`bba37970 ffffc582`488be8e0 fffff801`dbd1a23f : nt!KiDispatchException+0x1f3
fffff20d`bba378f0 fffff800`6ae60a9c : 00000000`00000000 00000000`00000000 00000022`00000001 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff20d`bba37ad0 fffff800`6ad87297 : fffff801`dbc7ec41 ffffdf81`663a2f80 ffffc582`489d7980 ffffdf81`663a0180 : nt!KiGeneralProtectionFault+0x2dc
fffff20d`bba37c60 fffff800`6ad8697b : ffffdf81`663a0180 08c2a9fc`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs+0x257
fffff20d`bba37da0 fffff800`6ae5a5e5 : 7401ffd8`527675f3 ffffdf81`663a0180 fffff20d`c10c7a80 ffffdf81`6630dc80 : nt!KiRetireDpcList+0x1db
fffff20d`bba37fb0 fffff800`6ae5a3e0 : 00000001`0465a8d8 fffff800`6ac214e6 00000000`0098967f 00000000`f9c5f000 : nt!KxRetireDpcList+0x5
fffff20d`c10c79c0 fffff800`6ae59d15 : 00000000`000000b7 fffff800`6ae55011 00000000`f9c5be40 ffffdf81`6630dc80 : nt!KiDispatchInterruptContinue
fffff20d`c10c79f0 fffff800`6ae55011 : 00000000`f9c5be40 ffffdf81`6630dc80 00000000`00000001 00000001`04602440 : nt!KiDpcInterruptBypass+0x25
fffff20d`c10c7a00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
FOLLOWUP_IP:
nt!KiExecuteAllDpcs+257
fffff800`6ad87297 448bf0 mov r14d,eax
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: nt!KiExecuteAllDpcs+257
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5bdaa393
STACK_COMMAND: .cxr 0x48038941c6ff49c0 ; kb
FAILURE_BUCKET_ID: X64_0x1e_c0000005_nt!KiExecuteAllDpcs+257
BUCKET_ID: X64_0x1e_c0000005_nt!KiExecuteAllDpcs+257
Followup: MachineOwner