I have a X99 extreme 4 board running Windows 10, I'm getting BSOD errors that read...
"DRIVER_IRQL_NOT_LESS_OR_EQUAL (e1i63x64.sys)"
So I googled the error and some are suggesting it's a driver issue for the Gigabit Ethernet. Just wondering if you had any thoughts on how to fix that. Could the driver that came with my board outdated? I pasted the dump file below if that is any help. Thanks
Microsoft (R) Windows Debugger Version 10.0.10586.567 X86 Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Larry\Desktop\121115-7375-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 10586 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 10586.17.amd64fre.th2_release.151121-2308 Machine Name: Kernel base = 0xfffff800`9fa1c000 PsLoadedModuleList = 0xfffff800`9fcfac70 Debug session time: Fri Dec 11 05:54:59.085 2015 (UTC - 6:00) System Uptime: 0 days 6:32:38.743 Loading Kernel Symbols ............................................................... ................................................................ ......................... Loading User Symbols Loading unloaded module list ............. ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {ffffe001a7ff2000, 80000001004009e3, ffffd0002ad95480, 4}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+3a90e )
Followup: MachineOwner ---------
4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe001a7ff2000, Virtual address for the attempted execute. Arg2: 80000001004009e3, PTE contents. Arg3: ffffd0002ad95480, (reserved) Arg4: 0000000000000004, (reserved)
Debugging Details: ------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P2.00
BIOS_DATE: 06/01/2015
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X99 Extreme4
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: ffffe001a7ff2000
BUGCHECK_P2: 80000001004009e3
BUGCHECK_P3: ffffd0002ad95480
BUGCHECK_P4: 4
CPU_COUNT: c
CPU_MHZ: ce3
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3f
CPU_STEPPING: 2
CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 36'00000000 (cache) 36'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: LARRY-PC
ANALYSIS_SESSION_TIME: 12-11-2015 18:27:16.0675
ANALYSIS_VERSION: 10.0.10586.567 x86fre
TRAP_FRAME: ffffd0002ad95480 -- (.trap 0xffffd0002ad95480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000 rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000 r8=000000000000002e r9=0000000000000000 r10=fffff801b56b5070 r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffe001`a7ff2000 58 pop rax Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8009fba7a0e to fffff8009fb5e760
STACK_TEXT: ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14 ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000 ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 737539d4f994049cb64eded0b751ffe1ea1ce1c2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+3a90e fffff800`9fba7a0e cc int 3
FAULT_INSTR_CODE: 3345cccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3a90e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 565189c8
IMAGE_VERSION: 10.0.10586.17
BUCKET_ID_FUNC_OFFSET: 3a90e
FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_
PRIMARY_PROBLEM_CLASS: 0xFC_nt!_??_::FNODOBFM::_string_
TARGET_TIME: 2015-12-11T11:54:59.000Z
OSBUILD: 10586
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-11-22 03:24:24
BUILDDATESTAMP_STR: 151121-2308
BUILDLAB_STR: th2_release
BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308
ANALYSIS_SESSION_ELAPSED_TIME: 233d2
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980}
Followup: MachineOwner ---------
4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe001a7ff2000, Virtual address for the attempted execute. Arg2: 80000001004009e3, PTE contents. Arg3: ffffd0002ad95480, (reserved) Arg4: 0000000000000004, (reserved)
Debugging Details: ------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P2.00
BIOS_DATE: 06/01/2015
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X99 Extreme4
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: ffffe001a7ff2000
BUGCHECK_P2: 80000001004009e3
BUGCHECK_P3: ffffd0002ad95480
BUGCHECK_P4: 4
CPU_COUNT: c
CPU_MHZ: ce3
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3f
CPU_STEPPING: 2
CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 36'00000000 (cache) 36'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: LARRY-PC
ANALYSIS_SESSION_TIME: 12-11-2015 18:29:41.0028
ANALYSIS_VERSION: 10.0.10586.567 x86fre
TRAP_FRAME: ffffd0002ad95480 -- (.trap 0xffffd0002ad95480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000 rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000 r8=000000000000002e r9=0000000000000000 r10=fffff801b56b5070 r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffe001`a7ff2000 58 pop rax Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8009fba7a0e to fffff8009fb5e760
STACK_TEXT: ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14 ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000 ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 737539d4f994049cb64eded0b751ffe1ea1ce1c2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+3a90e fffff800`9fba7a0e cc int 3
FAULT_INSTR_CODE: 3345cccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3a90e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 565189c8
IMAGE_VERSION: 10.0.10586.17
BUCKET_ID_FUNC_OFFSET: 3a90e
FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_
PRIMARY_PROBLEM_CLASS: 0xFC_nt!_??_::FNODOBFM::_string_
TARGET_TIME: 2015-12-11T11:54:59.000Z
OSBUILD: 10586
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-11-22 03:24:24
BUILDDATESTAMP_STR: 151121-2308
BUILDLAB_STR: th2_release
BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308
ANALYSIS_SESSION_ELAPSED_TIME: 24023
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980}
Followup: MachineOwner ---------
4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc) An attempt was made to execute non-executable memory. The guilty driver is on the stack trace (and is typically the current instruction pointer). When possible, the guilty driver's name (Unicode string) is printed on the bugcheck screen and saved in KiBugCheckDriver. Arguments: Arg1: ffffe001a7ff2000, Virtual address for the attempted execute. Arg2: 80000001004009e3, PTE contents. Arg3: ffffd0002ad95480, (reserved) Arg4: 0000000000000004, (reserved)
Debugging Details: ------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10586.17.amd64fre.th2_release.151121-2308
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P2.00
BIOS_DATE: 06/01/2015
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X99 Extreme4
BASEBOARD_VERSION:
DUMP_TYPE: 2
BUGCHECK_P1: ffffe001a7ff2000
BUGCHECK_P2: 80000001004009e3
BUGCHECK_P3: ffffd0002ad95480
BUGCHECK_P4: 4
CPU_COUNT: c
CPU_MHZ: ce3
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 3f
CPU_STEPPING: 2
CPU_MICROCODE: 6,3f,2,0 (F,M,S,R) SIG: 36'00000000 (cache) 36'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: LARRY-PC
ANALYSIS_SESSION_TIME: 12-11-2015 18:32:08.0538
ANALYSIS_VERSION: 10.0.10586.567 x86fre
TRAP_FRAME: ffffd0002ad95480 -- (.trap 0xffffd0002ad95480) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff801b5679f01 rbx=0000000000000000 rcx=ffffe001a7ff2000 rdx=00000000ff070000 rsi=0000000000000000 rdi=0000000000000000 rip=ffffe001a7ff2000 rsp=ffffd0002ad95618 rbp=fffff801ff070000 r8=000000000000002e r9=0000000000000000 r10=fffff801b56b5070 r11=ffffd0002ad95590 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ffffe001`a7ff2000 58 pop rax Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8009fba7a0e to fffff8009fb5e760
STACK_TEXT: ffffd000`2ad951d8 fffff800`9fba7a0e : 00000000`000000fc ffffe001`a7ff2000 80000001`004009e3 ffffd000`2ad95480 : nt!KeBugCheckEx ffffd000`2ad951e0 fffff800`9fb7de14 : ffffe001`00000000 ffffe001`a7e7a000 00000000`00000000 fffff801`b514f0b7 : nt! ?? ::FNODOBFM::`string'+0x3a90e ffffd000`2ad95220 fffff800`9fa5517c : 00000000`00000011 00000000`00000000 ffffd000`2ad95480 fffff801`b515145d : nt! ?? ::FNODOBFM::`string'+0x10d14 ffffd000`2ad95310 fffff800`9fb679bc : 00000000`00000000 00000000`ff070000 00000000`00000000 fffff801`b508e1fb : nt!MmAccessFault+0x62c ffffd000`2ad95480 ffffe001`a7ff2000 : ffffe001`a7fe0000 00000000`00000000 fffff801`b5061a10 00000000`00000003 : nt!KiPageFault+0x13c ffffd000`2ad95618 ffffe001`a7fe0000 : 00000000`00000000 fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 : 0xffffe001`a7ff2000 ffffd000`2ad95620 00000000`00000000 : fffff801`b5061a10 00000000`00000003 ffffd000`2ad95701 ffffe001`a7fe0000 : 0xffffe001`a7fe0000
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 737539d4f994049cb64eded0b751ffe1ea1ce1c2
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a1a2052a110b3c1cafaa1636a8b2cc2199c38e4
THREAD_SHA1_HASH_MOD: f08ac56120cad14894587db086f77ce277bfae84
FOLLOWUP_IP: nt! ?? ::FNODOBFM::`string'+3a90e fffff800`9fba7a0e cc int 3
FAULT_INSTR_CODE: 3345cccc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+3a90e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 565189c8
IMAGE_VERSION: 10.0.10586.17
BUCKET_ID_FUNC_OFFSET: 3a90e
FAILURE_BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_
BUCKET_ID: 0xFC_nt!_??_::FNODOBFM::_string_
PRIMARY_PROBLEM_CLASS: 0xFC_nt!_??_::FNODOBFM::_string_
TARGET_TIME: 2015-12-11T11:54:59.000Z
OSBUILD: 10586
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2015-11-22 03:24:24
BUILDDATESTAMP_STR: 151121-2308
BUILDLAB_STR: th2_release
BUILDOSVER_STR: 10.0.10586.17.amd64fre.th2_release.151121-2308
ANALYSIS_SESSION_ELAPSED_TIME: 23238
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xfc_nt!_??_::fnodobfm::_string_
FAILURE_ID_HASH: {a715e467-86e4-97ce-e0a9-37223e080980}
Followup: MachineOwner ---------
|