ASRock.com Homepage
Forum Home Forum Home > Technical Support > Intel Motherboards
  New Posts New Posts RSS Feed - Problem with my Gigabit Ethernet port ?
  FAQ FAQ  Forum Search Search  Events   Register Register  Login Login

Problem with my Gigabit Ethernet port ?

 Post Reply Post Reply
Author
Message
critz1184 View Drop Down
Newbie
Newbie


Joined: 12 Dec 2015
Location: usa
Status: Offline
Points: 3
Post Options Post Options   Thanks (0) Thanks(0)   Quote critz1184 Quote  Post ReplyReply Direct Link To This Post Topic: Problem with my Gigabit Ethernet port ?
    Posted: 12 Dec 2015 at 8:45am
I have a X99 extreme 4 board running Windows 10, I'm getting BSOD errors that read...

"DRIVER_IRQL_NOT_LESS_OR_EQUAL (e1i63x64.sys)"

So I googled the error and some are suggesting it's a driver issue for the Gigabit Ethernet. Just wondering if you had any thoughts on how to fix that. Could the driver that came with my board outdated? I pasted the dump file below if that is any help. Thanks




Microsoft (R) Windows Debugger Version 10.0.10586.567 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Larry\Desktop\121115-7375-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 10586 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 10586.17.amd64fre.th2_release.151121-2308
Machine Name:
Kernel base = 0xfffff800`9fa1c000 PsLoadedModuleList = 0xfffff800`9fcfac70
Debug session time: Fri Dec 11 05:54:59.085 2015 (UTC - 6:00)
System Uptime: 0 days 6:32:38.743
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck FC, {ffffe001a7ff2000, 80000001004009e3, ffffd0002ad95480, 4}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3a90e )

Followup:     MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe001a7ff2000, Virtual address for the attempted execute.
Arg2: 80000001004009e3, PTE contents.
Arg3: ffffd0002ad95480, (reserved)
Arg4: 0000000000000004, (reserved)

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10586.17.amd64fre.th2_release.151121-2308

SYSTEM_PRODUCT_NAME:  To Be Filled By O.E.M.

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  P2.00

BIOS_DATE:  06/01/2015

BASEBOARD_MANUFACTURER:  ASRock

BASEBOARD_PRODUCT:  X99 Extreme4

BASEBOARD_VERSION:                        

DUMP_TYPE:  2

BUGCHECK_P1: ffffe001a7ff2000

BUGCHECK_P2: 80000001004009e3

BUGCHECK_P3: ffffd0002ad95480

BUGCHECK_P4: 4

CPU_COUNT: c

CPU_MHZ: ce3

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 36'00000000 (cache) 36'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  LARRY-PC

ANALYSIS_SESSION_TIME:  12-11-2015 18:27:16.0675

ANALYSIS_VERSION: 10.0.10586.567 x86fre

TRAP_FRAME:  ffffd0002ad95480 -- (.trap 0xffffd0002ad95480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000
rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000
 r8=000000000000002e  r9=0000000000000000 r10=fffff801b56b5070
r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffe001`a7ff2000 58              pop     rax
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009fba7a0e to fffff8009fb5e760

STACK_TEXT:  
ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx
ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e
ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14
ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c
ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c
ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000
ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000


STACK_COMMAND:  kb

THREAD_SHA1_HASH_MOD_FUNC:  737539d4f994049cb64eded0b751ffe1ea1ce1c2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+3a90e
fffff800`9fba7a0e cc              int     3

FAULT_INSTR_CODE:  3345cccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+3a90e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  565189c8

IMAGE_VERSION:  10.0.10586.17

BUCKET_ID_FUNC_OFFSET:  3a90e

FAILURE_BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0xFC_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2015-12-11T11:54:59.000Z

OSBUILD:  10586

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-11-22 03:24:24

BUILDDATESTAMP_STR:  151121-2308

BUILDLAB_STR:  th2_release

BUILDOSVER_STR:  10.0.10586.17.amd64fre.th2_release.151121-2308

ANALYSIS_SESSION_ELAPSED_TIME: 233d2

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {a715e467-86e4-97ce-e0a9-37223e080980}

Followup:     MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe001a7ff2000, Virtual address for the attempted execute.
Arg2: 80000001004009e3, PTE contents.
Arg3: ffffd0002ad95480, (reserved)
Arg4: 0000000000000004, (reserved)

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10586.17.amd64fre.th2_release.151121-2308

SYSTEM_PRODUCT_NAME:  To Be Filled By O.E.M.

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  P2.00

BIOS_DATE:  06/01/2015

BASEBOARD_MANUFACTURER:  ASRock

BASEBOARD_PRODUCT:  X99 Extreme4

BASEBOARD_VERSION:                        

DUMP_TYPE:  2

BUGCHECK_P1: ffffe001a7ff2000

BUGCHECK_P2: 80000001004009e3

BUGCHECK_P3: ffffd0002ad95480

BUGCHECK_P4: 4

CPU_COUNT: c

CPU_MHZ: ce3

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 36'00000000 (cache) 36'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  LARRY-PC

ANALYSIS_SESSION_TIME:  12-11-2015 18:29:41.0028

ANALYSIS_VERSION: 10.0.10586.567 x86fre

TRAP_FRAME:  ffffd0002ad95480 -- (.trap 0xffffd0002ad95480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000
rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000
 r8=000000000000002e  r9=0000000000000000 r10=fffff801b56b5070
r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffe001`a7ff2000 58              pop     rax
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009fba7a0e to fffff8009fb5e760

STACK_TEXT:  
ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx
ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e
ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14
ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c
ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c
ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000
ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000


STACK_COMMAND:  kb

THREAD_SHA1_HASH_MOD_FUNC:  737539d4f994049cb64eded0b751ffe1ea1ce1c2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+3a90e
fffff800`9fba7a0e cc              int     3

FAULT_INSTR_CODE:  3345cccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+3a90e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  565189c8

IMAGE_VERSION:  10.0.10586.17

BUCKET_ID_FUNC_OFFSET:  3a90e

FAILURE_BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0xFC_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2015-12-11T11:54:59.000Z

OSBUILD:  10586

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-11-22 03:24:24

BUILDDATESTAMP_STR:  151121-2308

BUILDLAB_STR:  th2_release

BUILDOSVER_STR:  10.0.10586.17.amd64fre.th2_release.151121-2308

ANALYSIS_SESSION_ELAPSED_TIME: 24023

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {a715e467-86e4-97ce-e0a9-37223e080980}

Followup:     MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory.  The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffe001a7ff2000, Virtual address for the attempted execute.
Arg2: 80000001004009e3, PTE contents.
Arg3: ffffd0002ad95480, (reserved)
Arg4: 0000000000000004, (reserved)

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  10586.17.amd64fre.th2_release.151121-2308

SYSTEM_PRODUCT_NAME:  To Be Filled By O.E.M.

SYSTEM_SKU:  To Be Filled By O.E.M.

SYSTEM_VERSION:  To Be Filled By O.E.M.

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  P2.00

BIOS_DATE:  06/01/2015

BASEBOARD_MANUFACTURER:  ASRock

BASEBOARD_PRODUCT:  X99 Extreme4

BASEBOARD_VERSION:                        

DUMP_TYPE:  2

BUGCHECK_P1: ffffe001a7ff2000

BUGCHECK_P2: 80000001004009e3

BUGCHECK_P3: ffffd0002ad95480

BUGCHECK_P4: 4

CPU_COUNT: c

CPU_MHZ: ce3

CPU_VENDOR:  GenuineIntel

CPU_FAMILY: 6

CPU_MODEL: 3f

CPU_STEPPING: 2

CPU_MICROCODE: 6,3f,2,0 (F,M,S,R)  SIG: 36'00000000 (cache) 36'00000000 (init)

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0xFC

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

ANALYSIS_SESSION_HOST:  LARRY-PC

ANALYSIS_SESSION_TIME:  12-11-2015 18:32:08.0538

ANALYSIS_VERSION: 10.0.10586.567 x86fre

TRAP_FRAME:  ffffd0002ad95480 -- (.trap 0xffffd0002ad95480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000
rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000
 r8=000000000000002e  r9=0000000000000000 r10=fffff801b56b5070
r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
ffffe001`a7ff2000 58              pop     rax
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8009fba7a0e to fffff8009fb5e760

STACK_TEXT:  
ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx
ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e
ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14
ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c
ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c
ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000
ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000


STACK_COMMAND:  kb

THREAD_SHA1_HASH_MOD_FUNC:  737539d4f994049cb64eded0b751ffe1ea1ce1c2

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4

THREAD_SHA1_HASH_MOD:  f08ac56120cad14894587db086f77ce277bfae84

FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+3a90e
fffff800`9fba7a0e cc              int     3

FAULT_INSTR_CODE:  3345cccc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+3a90e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  565189c8

IMAGE_VERSION:  10.0.10586.17

BUCKET_ID_FUNC_OFFSET:  3a90e

FAILURE_BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

BUCKET_ID:  0xFC_nt!_??_::FNODOBFM::_string_

PRIMARY_PROBLEM_CLASS:  0xFC_nt!_??_::FNODOBFM::_string_

TARGET_TIME:  2015-12-11T11:54:59.000Z

OSBUILD:  10586

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  784

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS Personal

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  2015-11-22 03:24:24

BUILDDATESTAMP_STR:  151121-2308

BUILDLAB_STR:  th2_release

BUILDOSVER_STR:  10.0.10586.17.amd64fre.th2_release.151121-2308

ANALYSIS_SESSION_ELAPSED_TIME: 23238

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0xfc_nt!_??_::fnodobfm::_string_

FAILURE_ID_HASH:  {a715e467-86e4-97ce-e0a9-37223e080980}

Followup:     MachineOwner
---------
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down

Forum Software by Web Wiz Forums® version 12.04
Copyright ©2001-2021 Web Wiz Ltd.

This page was generated in 4.125 seconds.