Çözüldü Mavi ekran hatası ile Samsung Magician'ın alakası nedir?

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.

Anil99

Centipat
Katılım
16 Ekim 2021
Mesajlar
8
Çözümler
1
Daha fazla  
Cinsiyet
Erkek

Selamlar,

Bir cevap daha gördüm buna benzer. Bu hata ile Samsung Magician'ın alakası nedir?
 
Son düzenleyen: Moderatör:
Çözüm
Öncelikle mavi ekran hatasının nedeni her kullanıcıda aynı olmaz, hata alıyorsanız konu oluşturun ve dump dosyalarını bizimle paylaşın.

Burada Samsung Magician'ın alakası da dumplardan çıkardığımız bir sonuçtur.
[CODE title="Dump dökümü"]UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd2803edc6e70
Arg3: ffff8000964d9000
Arg4: fffff80537eb23bd

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3296

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 28161

Key : Analysis.Init.CPU.mSec
Value: 437

Key : Analysis.Init.Elapsed.mSec
Value: 59468

Key : Analysis.Memory.CommitPeak.Mb
Value: 97


DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffd2803edc6e70

BUGCHECK_P3: ffff8000964d9000

BUGCHECK_P4: fffff80537eb23bd

STACK_OVERFLOW: Stack Limit: ffff8000964d9000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8054eb791ab was blamed for the stack overflow. It is using 1904 bytes of stack total in 17 instances (likely recursion).

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

SYMBOL_NAME: netr28ux!RTUSBBulkRxComplete+25b

MODULE_NAME: netr28ux

IMAGE_NAME: netr28ux.sys

IMAGE_VERSION: 5.1.22.0

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 25b

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_netr28ux!RTUSBBulkRxComplete

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e35b7ab6-4473-9343-fc91-1e68508dca27}

Followup: MachineOwner[/CODE]

Bu dosya içeriğine lm komutunu uyugladığımızda çıkan modüllere bakalım.

Kod:
Unloaded modules:
fffff805`4dac0000 fffff805`4e282000   vgk.sys
fffff805`8d730000 fffff805`8d738000   magdrvamd64.
fffff805`93700000 fffff805`9370d000   AppleLowerFi
fffff805`937a0000 fffff805`937af000   WpdUpFltr.sy
fffff805`93740000 fffff805`93795000   WUDFRd.sys
fffff805`93710000 fffff805`93731000   WinUSB.SYS
fffff805`930c0000 fffff805`930cf000   hiber_storpo
fffff805`930d0000 fffff805`93103000   hiber_storah
fffff805`93110000 fffff805`9312e000   hiber_dumpfv
fffff805`92600000 fffff805`9293c000   BEDaisy.sys
fffff805`92d40000 fffff805`930b6000   navagio.sys
fffff805`92940000 fffff805`92d3a000   xhunter1.sys
fffff805`91ab0000 fffff805`91dec000   BEDaisy.sys
fffff805`93380000 fffff805`936f6000   navagio.sys
fffff805`91600000 fffff805`919fa000   xhunter1.sys
fffff805`8d730000 fffff805`8d738000   magdrvamd64.
fffff805`93b80000 fffff805`93b8d000   AppleLowerFi
fffff805`93c20000 fffff805`93c2f000   WpdUpFltr.sy
fffff805`93bc0000 fffff805`93c15000   WUDFRd.sys
fffff805`93b90000 fffff805`93bb1000   WinUSB.SYS
fffff805`93c30000 fffff805`93c3f000   hiber_storpo
fffff805`93c40000 fffff805`93c73000   hiber_storah
fffff805`93c80000 fffff805`93c9e000   hiber_dumpfv
fffff805`93f00000 fffff805`9423c000   BEDaisy.sys
fffff805`93800000 fffff805`93b76000   navagio.sys
fffff805`93400000 fffff805`937fa000   xhunter1.sys
fffff805`8d730000 fffff805`8d738000   magdrvamd64.
fffff805`8d730000 fffff805`8d73f000   hiber_storpo
fffff805`4ca20000 fffff805`4ca53000   hiber_storah
fffff805`4caf0000 fffff805`4cb0e000   hiber_dumpfv
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4cb10000 fffff805`4cb24000   vwifimp.sys
fffff805`8d740000 fffff805`8d74f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4caf0000 fffff805`4cb04000   vwifimp.sys
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4ca40000 fffff805`4ca54000   vwifimp.sys
fffff805`8d740000 fffff805`8d74f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4ca20000 fffff805`4ca34000   vwifimp.sys
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4cbe0000 fffff805`4cbf4000   vwifimp.sys
fffff805`8d740000 fffff805`8d74f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4cb60000 fffff805`4cb74000   vwifimp.sys

magdrvamd64. dosyasını görebiliyoruz burada. Bu dosyanın açıklaması da Samsung Magician'dır. :)

Bence bu konudaki ana neden Magician değil BIOS'un beta sürümde olması. Magician kaldır dememin tek nedeni işimi sağlama almak.

Umarım anlamışsınızdır.
Öncelikle mavi ekran hatasının nedeni her kullanıcıda aynı olmaz, hata alıyorsanız konu oluşturun ve dump dosyalarını bizimle paylaşın.

Burada Samsung Magician'ın alakası da dumplardan çıkardığımız bir sonuçtur.
[CODE title="Dump dökümü"]UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd2803edc6e70
Arg3: ffff8000964d9000
Arg4: fffff80537eb23bd

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3296

Key : Analysis.DebugAnalysisManager
Value: Create

Key : Analysis.Elapsed.mSec
Value: 28161

Key : Analysis.Init.CPU.mSec
Value: 437

Key : Analysis.Init.Elapsed.mSec
Value: 59468

Key : Analysis.Memory.CommitPeak.Mb
Value: 97


DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump

BUGCHECK_CODE: 7f

BUGCHECK_P1: 8

BUGCHECK_P2: ffffd2803edc6e70

BUGCHECK_P3: ffff8000964d9000

BUGCHECK_P4: fffff80537eb23bd

STACK_OVERFLOW: Stack Limit: ffff8000964d9000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8054eb791ab was blamed for the stack overflow. It is using 1904 bytes of stack total in 17 instances (likely recursion).

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

SYMBOL_NAME: netr28ux!RTUSBBulkRxComplete+25b

MODULE_NAME: netr28ux

IMAGE_NAME: netr28ux.sys

IMAGE_VERSION: 5.1.22.0

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 25b

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_netr28ux!RTUSBBulkRxComplete

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {e35b7ab6-4473-9343-fc91-1e68508dca27}

Followup: MachineOwner[/CODE]

Bu dosya içeriğine lm komutunu uyugladığımızda çıkan modüllere bakalım.

Kod:
Unloaded modules:
fffff805`4dac0000 fffff805`4e282000   vgk.sys
fffff805`8d730000 fffff805`8d738000   magdrvamd64.
fffff805`93700000 fffff805`9370d000   AppleLowerFi
fffff805`937a0000 fffff805`937af000   WpdUpFltr.sy
fffff805`93740000 fffff805`93795000   WUDFRd.sys
fffff805`93710000 fffff805`93731000   WinUSB.SYS
fffff805`930c0000 fffff805`930cf000   hiber_storpo
fffff805`930d0000 fffff805`93103000   hiber_storah
fffff805`93110000 fffff805`9312e000   hiber_dumpfv
fffff805`92600000 fffff805`9293c000   BEDaisy.sys
fffff805`92d40000 fffff805`930b6000   navagio.sys
fffff805`92940000 fffff805`92d3a000   xhunter1.sys
fffff805`91ab0000 fffff805`91dec000   BEDaisy.sys
fffff805`93380000 fffff805`936f6000   navagio.sys
fffff805`91600000 fffff805`919fa000   xhunter1.sys
fffff805`8d730000 fffff805`8d738000   magdrvamd64.
fffff805`93b80000 fffff805`93b8d000   AppleLowerFi
fffff805`93c20000 fffff805`93c2f000   WpdUpFltr.sy
fffff805`93bc0000 fffff805`93c15000   WUDFRd.sys
fffff805`93b90000 fffff805`93bb1000   WinUSB.SYS
fffff805`93c30000 fffff805`93c3f000   hiber_storpo
fffff805`93c40000 fffff805`93c73000   hiber_storah
fffff805`93c80000 fffff805`93c9e000   hiber_dumpfv
fffff805`93f00000 fffff805`9423c000   BEDaisy.sys
fffff805`93800000 fffff805`93b76000   navagio.sys
fffff805`93400000 fffff805`937fa000   xhunter1.sys
fffff805`8d730000 fffff805`8d738000   magdrvamd64.
fffff805`8d730000 fffff805`8d73f000   hiber_storpo
fffff805`4ca20000 fffff805`4ca53000   hiber_storah
fffff805`4caf0000 fffff805`4cb0e000   hiber_dumpfv
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4cb10000 fffff805`4cb24000   vwifimp.sys
fffff805`8d740000 fffff805`8d74f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4caf0000 fffff805`4cb04000   vwifimp.sys
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4ca40000 fffff805`4ca54000   vwifimp.sys
fffff805`8d740000 fffff805`8d74f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4ca20000 fffff805`4ca34000   vwifimp.sys
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4cbe0000 fffff805`4cbf4000   vwifimp.sys
fffff805`8d740000 fffff805`8d74f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`8d730000 fffff805`8d73f000   vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000   netr28ux.sys
fffff805`4cb60000 fffff805`4cb74000   vwifimp.sys

magdrvamd64. dosyasını görebiliyoruz burada. Bu dosyanın açıklaması da Samsung Magician'dır. :)

Bence bu konudaki ana neden Magician değil BIOS'un beta sürümde olması. Magician kaldır dememin tek nedeni işimi sağlama almak.

Umarım anlamışsınızdır.
 
Son düzenleme:
Çözüm
Samsung Magician içindeki bazı dosyalar Kernel düzeyde çalışmaktadır. O dosyalar içerisinde hata meydana gelirse olası mavi ekran sorunları baş gösterebilir.
Kernel düzeyde çalışan programlar çoğunlukla "Anti Cheat" yazılımları oluyor. O yüzden de dediğin gibi bu lm çıktısında en çok bunları görüyoruz.

"Anti Cheat"lerin de çekirdek düzeyde çalışması anlaşılabilir bir durum.

Örnek:
 
Öncelikle mavi ekran hatasının nedeni her kullanıcıda aynı olmaz, hata alıyorsanız konu oluşturun ve dump dosyalarını bizimle paylaşın.

Burada Samsung Magician'ın alakası da dumplardan çıkardığımız bir sonuçtur.
[CODE title="Dump dökümü"]UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind.
that the kernel isn't allowed to have/catch (bound trap) or that.
is always instant death (double fault). The first number in the.
BugCheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these.
traps are. Here is a *portion* of those codes:
If kv shows a taskGate.
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe.
use .trap on that value.
Else.
.trap on the appropriate frame will show where the trap was taken.
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif.
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffffd2803edc6e70.
Arg3: ffff8000964d9000.
Arg4: fffff80537eb23bd.

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3296.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 28161.

Key : Analysis.Init.CPU.mSec
Value: 437.

Key : Analysis.Init.Elapsed.mSec
Value: 59468.

Key : Analysis.Memory.CommitPeak.Mb
Value: 97.

DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.

BUGCHECK_CODE: 7f.

BUGCHECK_P1: 8

BUGCHECK_P2: ffffd2803edc6e70.

BUGCHECK_P3: ffff8000964d9000.

BUGCHECK_P4: fffff80537eb23bd.

STACK_OVERFLOW: Stack Limit: ffff8000964d9000. Use (kF) and (!stackusage) to investigate stack usage.

STACKUSAGE_FUNCTION: The function at address 0xfffff8054eb791ab was blamed for the stack overflow. It is using 1904 bytes of stack total in 17 instances (likely recursion).

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

SYMBOL_NAME: netr28ux!RTUSBBulkRxComplete+25b

MODULE_NAME: netr28ux.

IMAGE_NAME: netr28ux.sys

IMAGE_VERSION: 5.1.22.0

STACK_COMMAND: .thread ; .cxr ; kb.

BUCKET_ID_FUNC_OFFSET: 25b.

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_RECURSION_netr28ux!RTUSBBulkRxComplete

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {e35b7ab6-4473-9343-fc91-1e68508dca27}

Followup: MachineOwner[/CODE]

Bu dosya içeriğine lm komutunu uyugladığımızda çıkan modüllere bakalım.

Kod:
Unloaded modules:
fffff805`4dac0000 fffff805`4e282000 vgk.sys
fffff805`8d730000 fffff805`8d738000 magdrvamd64.
fffff805`93700000 fffff805`9370d000 AppleLowerFi.
fffff805`937a0000 fffff805`937af000 WpdUpFltr.sy
fffff805`93740000 fffff805`93795000 WUDFRd.sys
fffff805`93710000 fffff805`93731000 WinUSB.SYS
fffff805`930c0000 fffff805`930cf000 hiber_storpo.
fffff805`930d0000 fffff805`93103000 hiber_storah.
fffff805`93110000 fffff805`9312e000 hiber_dumpfv.
fffff805`92600000 fffff805`9293c000 BEDaisy.sys
fffff805`92d40000 fffff805`930b6000 navagio.sys
fffff805`92940000 fffff805`92d3a000 xhunter1.sys
fffff805`91ab0000 fffff805`91dec000 BEDaisy.sys
fffff805`93380000 fffff805`936f6000 navagio.sys
fffff805`91600000 fffff805`919fa000 xhunter1.sys
fffff805`8d730000 fffff805`8d738000 magdrvamd64.
fffff805`93b80000 fffff805`93b8d000 AppleLowerFi.
fffff805`93c20000 fffff805`93c2f000 WpdUpFltr.sy
fffff805`93bc0000 fffff805`93c15000 WUDFRd.sys
fffff805`93b90000 fffff805`93bb1000 WinUSB.SYS
fffff805`93c30000 fffff805`93c3f000 hiber_storpo.
fffff805`93c40000 fffff805`93c73000 hiber_storah.
fffff805`93c80000 fffff805`93c9e000 hiber_dumpfv.
fffff805`93f00000 fffff805`9423c000 BEDaisy.sys
fffff805`93800000 fffff805`93b76000 navagio.sys
fffff805`93400000 fffff805`937fa000 xhunter1.sys
fffff805`8d730000 fffff805`8d738000 magdrvamd64.
fffff805`8d730000 fffff805`8d73f000 hiber_storpo.
fffff805`4ca20000 fffff805`4ca53000 hiber_storah.
fffff805`4caf0000 fffff805`4cb0e000 hiber_dumpfv.
fffff805`8d730000 fffff805`8d73f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`4cb10000 fffff805`4cb24000 vwifimp.sys
fffff805`8d740000 fffff805`8d74f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`4caf0000 fffff805`4cb04000 vwifimp.sys
fffff805`8d730000 fffff805`8d73f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`4ca40000 fffff805`4ca54000 vwifimp.sys
fffff805`8d740000 fffff805`8d74f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`4ca20000 fffff805`4ca34000 vwifimp.sys
fffff805`8d730000 fffff805`8d73f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`4cbe0000 fffff805`4cbf4000 vwifimp.sys
fffff805`8d740000 fffff805`8d74f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`8d730000 fffff805`8d73f000 vwifibus.sys
fffff805`4ea60000 fffff805`4ec8a000 netr28ux.sys
fffff805`4cb60000 fffff805`4cb74000 vwifimp.sys

magdrvamd64. dosyasını görebiliyoruz burada. Bu dosyanın açıklaması da Samsung Magician'dır. :)

Bence bu konudaki ana neden Magician değil BIOS'un beta sürümde olması. Magician kaldır dememin tek nedeni işimi sağlama almak.

Umarım anlamışsınızdır.

Bayağı detaylı yazmışsınız ben de detaylıca araştıracağım teşekkür ederim.
 

Geri
Yukarı