Problem with my Gigabit Ethernet port ? |
Post Reply |
Author | |
critz1184
Newbie Joined: 12 Dec 2015 Location: usa Status: Offline Points: 3 |
Post Options
Thanks(0)
Posted: 12 Dec 2015 at 8:45am |
I have a X99 extreme 4 board running Windows 10, I'm getting BSOD errors that read...
"DRIVER_IRQL_NOT_LESS_OR_EQUAL (e1i63x64.sys)" So I googled the error and some are suggesting it's a driver issue for the Gigabit Ethernet. Just wondering if you had any thoughts on how to fix that. Could the driver that came with my board outdated? I pasted the dump file below if that is any help. Thanks Microsoft (R) Windows Debugger Version 10.0.10586.567 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\Larry\Desktop\121115-7375-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 10586 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 10586.17.amd64fre.th2_release.151121-2308 Machine Name: Kernel base = 0xfffff800`9fa1c000 PsLoadedModuleList = 0xfffff800`9fcfac70 Debug session time: Fri Dec 11 05:54:59.085 2015 (UTC - 6:00) System Uptime: 0 days 6:32:38.743 Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck FC, {ffffe001a7ff2000, 80000001004009e3, ffffd0002ad95480, 4} Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3a90e ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe001a7ff2000, Virtual address for the attempted execute. Arg2: 80000001004009e3, PTE contents. Arg3: ffffd0002ad95480, (reserved) Arg4: 0000000000000004, (reserved) Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308 SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M. SYSTEM_SKU: To Be Filled By O.E.M. SYSTEM_VERSION: To Be Filled By O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: P2.00 BIOS_DATE: 06/01/2015 BASEBOARD_MANUFACTURER: ASRock BASEBOARD_PRODUCT: X99 Extreme4 BASEBOARD_VERSION: DUMP_TYPE: 2 BUGCHECK_P1: ffffe001a7ff2000 BUGCHECK_P2: 80000001004009e3 BUGCHECK_P3: ffffd0002ad95480 BUGCHECK_P4: 4 CPU_COUNT: c CPU_MHZ: ce3 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3f CPU_STEPPING: 2 CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 36'00000000 (cache) 36'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: LARRY-PC ANALYSIS_SESSION_TIME: 12-11-2015 18:27:16.0675 ANALYSIS_VERSION: 10.0.10586.567 x86fre TRAP_FRAME: ffffd0002ad95480 -- (.trap 0xffffd0002ad95480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000 rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000 r8=000000000000002e r9=0000000000000000 r10=fffff801b56b5070 r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffe001`a7ff2000 58 pop rax Resetting default scope LAST_CONTROL_TRANSFER: from fffff8009fba7a0e to fffff8009fb5e760 STACK_TEXT: ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14 ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000 ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 737539d4f994049cb64eded0b751ffe1ea1ce1c2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4 THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84 FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+3a90e fffff800`9fba7a0e cc int 3 FAULT_INSTR_CODE: 3345cccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3a90e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 565189c8 IMAGE_VERSION: 10.0.10586.17 BUCKET_ID_FUNC_OFFSET: 3a90e FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ PRIMARY_PROBLEM_CLASS: 0xFC_nt!_??_::FNODOBFM::_string_ TARGET_TIME: 2015-12-11T11:54:59.000Z OSBUILD: 10586 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2015-11-22 03:24:24 BUILDDATESTAMP_STR: 151121-2308 BUILDLAB_STR: th2_release BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308 ANALYSIS_SESSION_ELAPSED_TIME: 233d2 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_ FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980} Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe001a7ff2000, Virtual address for the attempted execute. Arg2: 80000001004009e3, PTE contents. Arg3: ffffd0002ad95480, (reserved) Arg4: 0000000000000004, (reserved) Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308 SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M. SYSTEM_SKU: To Be Filled By O.E.M. SYSTEM_VERSION: To Be Filled By O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: P2.00 BIOS_DATE: 06/01/2015 BASEBOARD_MANUFACTURER: ASRock BASEBOARD_PRODUCT: X99 Extreme4 BASEBOARD_VERSION: DUMP_TYPE: 2 BUGCHECK_P1: ffffe001a7ff2000 BUGCHECK_P2: 80000001004009e3 BUGCHECK_P3: ffffd0002ad95480 BUGCHECK_P4: 4 CPU_COUNT: c CPU_MHZ: ce3 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3f CPU_STEPPING: 2 CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 36'00000000 (cache) 36'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: LARRY-PC ANALYSIS_SESSION_TIME: 12-11-2015 18:29:41.0028 ANALYSIS_VERSION: 10.0.10586.567 x86fre TRAP_FRAME: ffffd0002ad95480 -- (.trap 0xffffd0002ad95480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000 rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000 r8=000000000000002e r9=0000000000000000 r10=fffff801b56b5070 r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffe001`a7ff2000 58 pop rax Resetting default scope LAST_CONTROL_TRANSFER: from fffff8009fba7a0e to fffff8009fb5e760 STACK_TEXT: ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14 ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000 ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 737539d4f994049cb64eded0b751ffe1ea1ce1c2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4 THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84 FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+3a90e fffff800`9fba7a0e cc int 3 FAULT_INSTR_CODE: 3345cccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3a90e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 565189c8 IMAGE_VERSION: 10.0.10586.17 BUCKET_ID_FUNC_OFFSET: 3a90e FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ PRIMARY_PROBLEM_CLASS: 0xFC_nt!_??_::FNODOBFM::_string_ TARGET_TIME: 2015-12-11T11:54:59.000Z OSBUILD: 10586 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2015-11-22 03:24:24 BUILDDATESTAMP_STR: 151121-2308 BUILDLAB_STR: th2_release BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308 ANALYSIS_SESSION_ELAPSED_TIME: 24023 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_ FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980} Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe001a7ff2000, Virtual address for the attempted execute. Arg2: 80000001004009e3, PTE contents. Arg3: ffffd0002ad95480, (reserved) Arg4: 0000000000000004, (reserved) Debugging Details: ------------------ DUMP_CLASS: 1 DUMP_QUALIFIER: 400 BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308 SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M. SYSTEM_SKU: To Be Filled By O.E.M. SYSTEM_VERSION: To Be Filled By O.E.M. BIOS_VENDOR: American Megatrends Inc. BIOS_VERSION: P2.00 BIOS_DATE: 06/01/2015 BASEBOARD_MANUFACTURER: ASRock BASEBOARD_PRODUCT: X99 Extreme4 BASEBOARD_VERSION: DUMP_TYPE: 2 BUGCHECK_P1: ffffe001a7ff2000 BUGCHECK_P2: 80000001004009e3 BUGCHECK_P3: ffffd0002ad95480 BUGCHECK_P4: 4 CPU_COUNT: c CPU_MHZ: ce3 CPU_VENDOR: GenuineIntel CPU_FAMILY: 6 CPU_MODEL: 3f CPU_STEPPING: 2 CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 36'00000000 (cache) 36'00000000 (init) CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0xFC PROCESS_NAME: dwm.exe CURRENT_IRQL: 0 ANALYSIS_SESSION_HOST: LARRY-PC ANALYSIS_SESSION_TIME: 12-11-2015 18:32:08.0538 ANALYSIS_VERSION: 10.0.10586.567 x86fre TRAP_FRAME: ffffd0002ad95480 -- (.trap 0xffffd0002ad95480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000 rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000 r8=000000000000002e r9=0000000000000000 r10=fffff801b56b5070 r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffe001`a7ff2000 58 pop rax Resetting default scope LAST_CONTROL_TRANSFER: from fffff8009fba7a0e to fffff8009fb5e760 STACK_TEXT: ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14 ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000 ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000 STACK_COMMAND: kb THREAD_SHA1_HASH_MOD_FUNC: 737539d4f994049cb64eded0b751ffe1ea1ce1c2 THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4 THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84 FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+3a90e fffff800`9fba7a0e cc int 3 FAULT_INSTR_CODE: 3345cccc SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3a90e FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe DEBUG_FLR_IMAGE_TIMESTAMP: 565189c8 IMAGE_VERSION: 10.0.10586.17 BUCKET_ID_FUNC_OFFSET: 3a90e FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_ PRIMARY_PROBLEM_CLASS: 0xFC_nt!_??_::FNODOBFM::_string_ TARGET_TIME: 2015-12-11T11:54:59.000Z OSBUILD: 10586 OSSERVICEPACK: 0 SERVICEPACK_NUMBER: 0 OS_REVISION: 0 SUITE_MASK: 784 PRODUCT_TYPE: 1 OSPLATFORM_TYPE: x64 OSNAME: Windows 10 OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal OS_LOCALE: USER_LCID: 0 OSBUILD_TIMESTAMP: 2015-11-22 03:24:24 BUILDDATESTAMP_STR: 151121-2308 BUILDLAB_STR: th2_release BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308 ANALYSIS_SESSION_ELAPSED_TIME: 23238 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_ FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980} Followup: MachineOwner --------- |
|
Post Reply | |
Tweet
|
Forum Jump | Forum Permissions You cannot post new topics in this forum You cannot reply to topics in this forum You cannot delete your posts in this forum You cannot edit your posts in this forum You cannot create polls in this forum You cannot vote in polls in this forum |