Hello!!!
WE HAVE THE VERY SAME PROBLEM:
my system is:
AMD FX-8350
Gigabyte 990FXA-UD3 - the same problem persists on ASROCK 970 Pro 3
Corsair 2x8GB kits
Intensity Pro and Decklink SDI
Asus HD 7850
ssd
1TB HDD
Windows 7 SP1 64bit
Issues persist on Wirecast, Adobe flash media encoder, and in Blackmagick Media express as well
WE'VE DESTROYED 3 SETS OF RAM 2X8GB already with THESE BSOD ISSUES THAT WE'VE GET FROM BLACKMAGIC DRIVERS AND MOTHERBOARDS INTEROPERABILITY PROBLEMS.
So for a moment we've discovered that the issues are generated due to BM driver problems. At least so says windows verifier. We've contacted both: 2 times Gigabyte support - and get any normal answer to our issues, just the standard stuff "check the supported memory"
, Blackmagic support - they provided with outdated supported hardware link
We've tested the system with other video card HD 5770, with no luck. Still the BSOD persists.
Never the less we've also tested system without the BM cards, and the system worked just fine.
If well get any solutions well post.
Good luck BSOD brotherhood
P.S. I just forgot to mention, we've got two identical sets... Irony isn't it?
UPDATE 1: The fault is generated when only Intensity Pro is on the motherboard. DeckLink SDI seams to function properly when installed solely.
UPDATE 2: Sad news from BM Support - AMD CHIP-SETS ARE NOT SUPPORTED!!! "Of course it is not worth mentioning in recommendations!!!!"
- Code: Select all
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\062113-17565-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.18113.amd64fre.win7sp1_gdr.130318-1533
Machine Name:
Kernel base = 0xfffff800`02a0d000 PsLoadedModuleList = 0xfffff800`02c50670
Debug session time: Fri Jun 21 11:11:13.671 2013 (UTC + 3:00)
System Uptime: 0 days 0:01:26.013
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 76, {0, fffffa8011485b30, 83e, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+17dd6 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: fffffa8011485b30, Process address.
Arg3: 000000000000083e, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
Issue a !search over all of physical memory for the current process pointer.
This will yield at least one MDL which points to it. Then do another !search
for each MDL found, this will yield the IRP(s) that point to it, revealing
which driver is leaking the pages.
Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system
will save stack traces so the guilty driver can be easily identified.
When you enable this flag, if the driver commits the error again you will
see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
which can identify the offending driver(s).
Debugging Details:
------------------
PROCESS_NAME: MediaExpress.e
DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x76
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002dbd989 to fffff80002a82c00
STACK_TEXT:
fffff880`08d888f8 fffff800`02dbd989 : 00000000`00000076 00000000`00000000 fffffa80`11485b30 00000000`0000083e : nt!KeBugCheckEx
fffff880`08d88900 fffff800`02d3c677 : fffffa80`11485b30 fffffa80`06cfa950 fffffa80`00000000 fffffa80`00000002 : nt! ?? ::NNGAKEGL::`string'+0x17dd6
fffff880`08d88940 fffff800`02a8be44 : 00000000`00000000 fffffa80`11485b30 fffffa80`11485b00 fffff800`02e124f5 : nt!PspProcessDelete+0x177
fffff880`08d889a0 fffff800`02b89709 : fffffa80`11485b30 fffffa80`081ef000 fffffa80`081efd08 fffffa80`081efd00 : nt!ObfDereferenceObject+0xd4
fffff880`08d88a00 fffff800`02ed6cce : fffffa80`0000020c fffffa80`082bc000 fffffa80`11485b30 fffffa80`081efd08 : nt!MmFreeAccessPfnBuffer+0x29
fffff880`08d88a30 fffff800`02ef83f0 : fffffa80`115ecb01 00000000`00000080 fffffa80`06cfb040 fffff800`02c0fe48 : nt!PfpFlushBuffers+0x23e
fffff880`08d88ad0 fffff800`02d20ede : ffffffff`ff676980 fffffa80`115ecb50 fffff880`08d88c70 fffffa80`115ecb50 : nt!PfTLoggingWorker+0xe0
fffff880`08d88c00 fffff800`02a73906 : fffff800`02bfde80 fffffa80`115ecb50 fffff800`02c0bcc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`08d88c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+17dd6
fffff800`02dbd989 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+17dd6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0x76_MediaExpress.e_nt!_??_::NNGAKEGL::_string_+17dd6
BUCKET_ID: X64_0x76_MediaExpress.e_nt!_??_::NNGAKEGL::_string_+17dd6
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: fffffa8011485b30, Process address.
Arg3: 000000000000083e, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
Issue a !search over all of physical memory for the current process pointer.
This will yield at least one MDL which points to it. Then do another !search
for each MDL found, this will yield the IRP(s) that point to it, revealing
which driver is leaking the pages.
Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system
will save stack traces so the guilty driver can be easily identified.
When you enable this flag, if the driver commits the error again you will
see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
which can identify the offending driver(s).
Debugging Details:
------------------
PROCESS_NAME: MediaExpress.e
DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x76
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002dbd989 to fffff80002a82c00
STACK_TEXT:
fffff880`08d888f8 fffff800`02dbd989 : 00000000`00000076 00000000`00000000 fffffa80`11485b30 00000000`0000083e : nt!KeBugCheckEx
fffff880`08d88900 fffff800`02d3c677 : fffffa80`11485b30 fffffa80`06cfa950 fffffa80`00000000 fffffa80`00000002 : nt! ?? ::NNGAKEGL::`string'+0x17dd6
fffff880`08d88940 fffff800`02a8be44 : 00000000`00000000 fffffa80`11485b30 fffffa80`11485b00 fffff800`02e124f5 : nt!PspProcessDelete+0x177
fffff880`08d889a0 fffff800`02b89709 : fffffa80`11485b30 fffffa80`081ef000 fffffa80`081efd08 fffffa80`081efd00 : nt!ObfDereferenceObject+0xd4
fffff880`08d88a00 fffff800`02ed6cce : fffffa80`0000020c fffffa80`082bc000 fffffa80`11485b30 fffffa80`081efd08 : nt!MmFreeAccessPfnBuffer+0x29
fffff880`08d88a30 fffff800`02ef83f0 : fffffa80`115ecb01 00000000`00000080 fffffa80`06cfb040 fffff800`02c0fe48 : nt!PfpFlushBuffers+0x23e
fffff880`08d88ad0 fffff800`02d20ede : ffffffff`ff676980 fffffa80`115ecb50 fffff880`08d88c70 fffffa80`115ecb50 : nt!PfTLoggingWorker+0xe0
fffff880`08d88c00 fffff800`02a73906 : fffff800`02bfde80 fffffa80`115ecb50 fffff800`02c0bcc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`08d88c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+17dd6
fffff800`02dbd989 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+17dd6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 5147d9c6
FAILURE_BUCKET_ID: X64_0x76_MediaExpress.e_nt!_??_::NNGAKEGL::_string_+17dd6
BUCKET_ID: X64_0x76_MediaExpress.e_nt!_??_::NNGAKEGL::_string_+17dd6
Followup: MachineOwner
---------