KERNEL_SECURITY_CHECK_FAILURE (139) hatası

yasintekin

Yoctopat
Katılım
21 Ocak 2026
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
RAM
48
SSD veya HDD modeli
WD BLUE SNS 5100 500GB VE
Ekran kartı
NVİDİA RTX 5060 8GB
Anakart
MONSTER TULPAR T7 V26.2
İşlemci
İNTEL CORE İ7 13620H
Minidump Rapor Linki: Yeni klasör (2).zip

Monster Tulpar T7 v26.2 KERNEL_SECURITY_CHECK_FAILURE (139) dxgmms2.sys hatası alıyorum. Sistemim 48 GB RAM, Intel Core i7 13620H 13. işlemci, NVIDIA RTX 5060 8 GB ekran kartı ve 1.5 TB SSD.

Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
Could potentially allow a malicious user to gain Control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i. E. Double remove).
Arg2: Ffffdd0bBA347390, Address of the trap frame for the exception that caused the BugCheck
Arg3: Ffffdd0bBA3472E8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------

KEY_VALUES_STRING: 1

Key: Analysis. CPU. MSec
Value: 1359

Key: Analysis. Elapsed. MSec
Value: 5583

Key: Analysis. IO. Other. MB
Value: 0

Key: Analysis. IO. Read. MB
Value: 1

Key: Analysis. IO. Write. MB
Value: 26

Key: Analysis. Init. CPU. MSec
Value: 765

Key: Analysis. Init. Elapsed. MSec
Value: 38964

Key: Analysis. Memory.commitPeak. MB
Value: 89

Key: Analysis. Version. DbgEng
Value: 10.0.29482.1003

Key: Analysis. Version. Description
Value: 10.2509.29.03 AMD64fre

Key: Analysis. Version. Ext
Value: 1.2509.29.3

Key: Bugcheck. Code. LegacyAPI
Value: 0x139

Key: Bugcheck. Code. TargetModel
Value: 0x139

Key: Dump. Attributes. AsUlong
Value: 0x21808

Key: Dump. Attributes. DiagDataWrittenToHeader
Value: 1

Key: Dump. Attributes. ErrorCode
Value: 0x0

Key: Dump. Attributes. KernelGeneratedTriageDump
Value: 1

Key: Dump. Attributes. LastLine
Value: Dump completed successfully.

Key: Dump. Attributes. ProgressPercentage
Value: 0

Key: FailFast. Name
Value: CORRUPT_LIST_ENTRY

Key: FailFast. Type
Value: 3

Key: Failure. Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad

Key: Failure. Exception. Code
Value: 0xc0000409

Key: Failure. Exception. Record
Value: 0xffffdd0bba3472e8

Key: Failure. Hash
Value: {ED5E39B6-1654-8C70-B89a-E53845AF0b01}

Key: Hypervisor. Enlightenments. ValueHex
Value: 0x7417df84

Key: Hypervisor. Flags. AnyHypervisorPresent
Value: 1

Key: Hypervisor. Flags. ApicEnlightened
Value: 0

Key: Hypervisor. Flags. ApicVirtualizationAvailable
Value: 1

Key: Hypervisor. Flags. AsyncMemoryHint
Value: 0

Key: Hypervisor. Flags. CoreSchedulerRequested
Value: 0

Key: Hypervisor. Flags. CpuManager
Value: 1

Key: Hypervisor. Flags. DeprecateAutoEoi
Value: 1

Key: Hypervisor. Flags. DynamicCpuDisabled
Value: 1

Key: Hypervisor. Flags. Epf
Value: 0

Key: Hypervisor. Flags. ExtendedProcessorMasks
Value: 1

Key: Hypervisor. Flags. HardwareMbecAvailable
Value: 1

Key: Hypervisor. Flags. MaxBankNumber
Value: 0

Key: Hypervisor. Flags. MemoryZeroingControl
Value: 0

Key: Hypervisor. Flags. NoExtendedRangeFlush
Value: 0

Key: Hypervisor. Flags. NoNonArchCoreSharing
Value: 1

Key: Hypervisor. Flags. Phase0InitDone
Value: 1

Key: Hypervisor. Flags. PowerSchedulerQos
Value: 0

Key: Hypervisor. Flags. RootScheduler
Value: 0

Key: Hypervisor. Flags. SynicAvailable
Value: 1

Key: Hypervisor. Flags. UseQpcBias
Value: 0

Key: Hypervisor. Flags. Value
Value: 55185662

Key: Hypervisor. Flags. ValueHex
Value: 0x34a10fe

Key: Hypervisor. Flags. VpAssistPage
Value: 1

Key: Hypervisor. Flags. VsmAvailable
Value: 1

Key: Hypervisor. RootFlags. AccessStats
Value: 1

Key: Hypervisor. RootFlags. CrashdumpEnlightened
Value: 1

Key: Hypervisor. RootFlags. CreateVirtualProcessor
Value: 1

Key: Hypervisor. RootFlags. DisableHyperthreading
Value: 0

Key: Hypervisor. RootFlags. HostTimelineSync
Value: 1

Key: Hypervisor. RootFlags. HypervisorDebuggingEnabled
Value: 0

Key: Hypervisor. RootFlags. IsHyperV
Value: 1

Key: Hypervisor. RootFlags. LivedumpEnlightened
Value: 1

Key: Hypervisor. RootFlags. MapDeviceInterrupt
Value: 1

Key: Hypervisor. RootFlags. MceEnlightened
Value: 1

Key: Hypervisor. RootFlags. Nested
Value: 0

Key: Hypervisor. RootFlags. StartLogicalProcessor
Value: 1

Key: Hypervisor. RootFlags. Value
Value: 1015

Key: Hypervisor. RootFlags. ValueHex
Value: 0x3f7

Key: WER. System. BIOSRevision
Value: 7.6.0.0

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: Ffffdd0bBA347390

BUGCHECK_P3: Ffffdd0bBA3472E8

BUGCHECK_P4: 0

FILE_IN_CAB: 012226-17343-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump

FAULTING_THREAD: FffFE28E22Ebe180

TRAP_FRAME: Ffffdd0bBA347390 -- (.trap 0xffffdd0bba347390)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFE28E2C11ec50 rbx = 0000000000000000 rcx = 0000000000000003
Rdx = fffFE28E2C11ecd0 rsi = 0000000000000000 rdi = 0000000000000000
Rip = fffFF8067C52b74e rsp = ffffdd0bBA347520 rbp = fffFC00FF57ba700
R8 = fffFE28E2C11ec50 R9 = fffFC00FF5D6cbe8 R10 = 0000000000000003
R11 = 0000000000000008 R12 = 0000000000000000 R13 = 0000000000000000
R14 = 0000000000000000 R15 = 0000000000000000
İopl = 0 nv up ei ng nzna pe cy
Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x1'da:
Fffff806'7C52B74E CD29 int 29h
Resetting default scope

EXCEPTION_RECORD: Ffffdd0bBA3472E8 -- (.exr 0xffffdd0bba3472e8)
ExceptionAddress: FffFF8067C52b74e (dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x00000000000001da)
ExceptionCode: C0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1 (!blackboxwinlogon)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad. Bu ta ma, k t niyetli bir kullan C n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR: C0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
Ffffdd0b'BA347068 fffff806'C6cb60e9: 00000000'00000139 00000000'00000003 ffffdd0b'BA347390 ffffdd0b'BA3472E8: NT! KeBugCheckEx
Ffffdd0b'BA347070 fffff806'C6cb66F2: 00000000'00000001 fffff806'7613703E 00000000'00000000 ffffdd0b'BA3473C0: NT! KiBugCheckDispatch+0x69
Ffffdd0b'BA3471B0 fffff806'C6cb4328: 00008005'014b0000 ffffdd0b'BA3474B0 ffffe28e'22F69000 fffff806'7C57DC39: NT! KiFastFailDispatch+0xb2
Ffffdd0b'BA347390 fffff806'7C52B74E: Ffffc00F'F5784428 ffffc00F'F57ba700 ffffc00F'e9b3a080 ffffc00F'F579E820: NT! KiRaiseSecurityCheckFailure+0x368
Ffffdd0b'BA347520 fffff806'7C529AE6: Ffffc00F'F5784428 ffffc00F'F57ba700 00000000'00000000 ffffc00F'ebcd27a0: Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x1'da
Ffffdd0b'BA347560 fffff806'7C5686C5: 00000000'00000100 ffffc00F'e9b3a080 00000000'00000000 00000000'00000000: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeListWithFix+0x272
Ffffdd0b'BA347640 fffff806'7C5A232D: 00000000'00000000 ffffdd0b'BA3478B0 00000000'00000000 ffffdd0b'BA347A78: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeList+0x50D
Ffffdd0b'BA347700 fffff806'7C571840: Ffffdd0b'BA347A78 ffffdd0b'BA347A78 ffffdd0b'BA3478B0 ffffc00F'F5e4a1b0: Dxgmms2! VIDMM_GLOBAL: CommitVirtualAddressRangeSystemCommand+0x24D
Ffffdd0b'BA3477B0 fffff806'7C570A45: Ffffe28e'22F69000 ffffc00F'E8780CC0 ffffc00F'DC68C000 ffffc00F'E8780CC0: Dxgmms2! VIDMM_GLOBAL: ProcessDeferredCommand+0xa0C
Ffffdd0b'BA3479B0 fffff806'7C5821EF: Ffffc00F'E8780CC0 ffffdd0b'BA347AC9 fffff806'7C4ee5D0 ffffe28e'22F72C20: Dxgmms2! VidMmSubmitPacket+0xb5
Ffffdd0b'BA347A10 fffff806'C6a8C4'da: Ffffe28e'22ebe101 fffff806'7C581B00 ffff9180'E2651100 066FE47F'B19bbd02: Dxgmms2! VidMmWorkerThreadProc+0x69F
Ffffdd0b'BA347B30 fffff806'C6ca32D4: Ffff9180'E2651180 ffffe28e'22ebe180 fffff806'C6a8C480 fdbb9F15'FF48D233: NT! PspSystemThreadStartup+0x5a
Ffffdd0b'BA347B80 00000000'00000000: Ffffdd0b'BA348000 ffffdd0b'BA341000 00000000'00000000 00000000'00000000: NT! KiStartSystemThread+0x34

SYMBOL_NAME: Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+1'da

MODULE_NAME: Dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.26100.7623

STACK_COMMAND: Process /r /p 0xffffe28e114db040;.thread 0xffffe28e22ebe180; KB

BUCKET_ID_FUNC_OFFSET: 1'da

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad

OSPLATFORM_TYPE: X64

OSNAME: Windows 10

FAILURE_ID_HASH: {ED5E39B6-1654-8C70-B89a-E53845AF0b01}

Followup: MachineOwner
---------

2: Kd>.process /r /p 0xffffe28e114db040;.thread 0xffffe28e22ebe180; KB
Implicit process is now ffffe28e'114dB040
Loading User Symbols

Implicit thread is now ffffe28e'22ebe180
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr: Args to Child: Call Site
00 fffff806'C6cb60e9: 00000000'00000139 00000000'00000003 ffffdd0b'BA347390 ffffdd0b'BA3472E8: NT! KeBugCheckEx
01 fffff806'C6cb66F2: 00000000'00000001 fffff806'7613703E 00000000'00000000 ffffdd0b'BA3473C0: NT! KiBugCheckDispatch+0x69
02 fffff806'C6cb4328: 00008005'014b0000 ffffdd0b'BA3474B0 ffffe28e'22F69000 fffff806'7C57DC39: NT! KiFastFailDispatch+0xb2
03 fffff806'7C52B74E: Ffffc00F'F5784428 ffffc00F'F57ba700 ffffc00F'e9b3a080 ffffc00F'F579E820: NT! KiRaiseSecurityCheckFailure+0x368
04 fffff806'7C529AE6: Ffffc00F'F5784428 ffffc00F'F57ba700 00000000'00000000 ffffc00F'ebcd27a0: Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x1'da
05 fffff806'7C5686C5: 00000000'00000100 ffffc00F'e9b3a080 00000000'00000000 00000000'00000000: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeListWithFix+0x272
06 fffff806'7C5A232D: 00000000'00000000 ffffdd0b'BA3478B0 00000000'00000000 ffffdd0b'BA347A78: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeList+0x50D
07 fffff806'7C571840: Ffffdd0b'BA347A78 ffffdd0b'BA347A78 ffffdd0b'BA3478B0 ffffc00F'F5e4a1b0: Dxgmms2! VIDMM_GLOBAL: CommitVirtualAddressRangeSystemCommand+0x24D
08 fffff806'7C570A45: Ffffe28e'22F69000 ffffc00F'E8780CC0 ffffc00F'DC68C000 ffffc00F'E8780CC0: Dxgmms2! VIDMM_GLOBAL: ProcessDeferredCommand+0xa0C
09 fffff806'7C5821EF: Ffffc00F'E8780CC0 ffffdd0b'BA347AC9 fffff806'7C4ee5D0 ffffe28e'22F72C20: Dxgmms2! VidMmSubmitPacket+0xb5
0A fffff806'C6a8C4'da: Ffffe28e'22ebe101 fffff806'7C581B00 ffff9180'E2651100 066FE47F'B19bbd02: Dxgmms2! VidMmWorkerThreadProc+0x69F
0B fffff806'C6ca32D4: Ffff9180'E2651180 ffffe28e'22ebe180 fffff806'C6a8C480 fdbb9F15'FF48D233: NT! PspSystemThreadStartup+0x5a
0C 00000000'00000000: Ffffdd0b'BA348000 ffffdd0b'BA341000 00000000'00000000 00000000'00000000: NT! KiStartSystemThread+0x34
 
Evet ulaşabiliyorum
Hangi durumlarda hata veriyor

BIOS üzerinden entegre grafiği kapatıp sürücüleri temiz çekilde tekrar kurmayı dene.
Windows güvenliği ayarlarından da çekirdek yalıtımın menüsünden bellek bütünlüğünü açıksa kapat.
 
Son düzenleme:

Sürücüleri DDU ile silip tekrar yükledim 2 kere format attım bellek tanılama yaptım SSD testi yaptım sorunsuz çalışıyor ama tekrar bu hatayı alıyorum
 

Bu konuyu görüntüleyen kullanıcılar

  • Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…