yasintekin
Yoctopat
- Katılım
- 21 Ocak 2026
- Mesajlar
- 4
Daha fazla
- Cinsiyet
- Erkek
- RAM
- 48
- SSD veya HDD modeli
- WD BLUE SNS 5100 500GB VE
- Ekran kartı
- NVİDİA RTX 5060 8GB
- Anakart
- MONSTER TULPAR T7 V26.2
- İşlemci
- İNTEL CORE İ7 13620H
Minidump Rapor Linki: Yeni klasör (2).zip
Monster Tulpar T7 v26.2 KERNEL_SECURITY_CHECK_FAILURE (139) dxgmms2.sys hatası alıyorum. Sistemim 48 GB RAM, Intel Core i7 13620H 13. işlemci, NVIDIA RTX 5060 8 GB ekran kartı ve 1.5 TB SSD.
Monster Tulpar T7 v26.2 KERNEL_SECURITY_CHECK_FAILURE (139) dxgmms2.sys hatası alıyorum. Sistemim 48 GB RAM, Intel Core i7 13620H 13. işlemci, NVIDIA RTX 5060 8 GB ekran kartı ve 1.5 TB SSD.
Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
Could potentially allow a malicious user to gain Control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i. E. Double remove).
Arg2: Ffffdd0bBA347390, Address of the trap frame for the exception that caused the BugCheck
Arg3: Ffffdd0bBA3472E8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key: Analysis. CPU. MSec
Value: 1359
Key: Analysis. Elapsed. MSec
Value: 5583
Key: Analysis. IO. Other. MB
Value: 0
Key: Analysis. IO. Read. MB
Value: 1
Key: Analysis. IO. Write. MB
Value: 26
Key: Analysis. Init. CPU. MSec
Value: 765
Key: Analysis. Init. Elapsed. MSec
Value: 38964
Key: Analysis. Memory.commitPeak. MB
Value: 89
Key: Analysis. Version. DbgEng
Value: 10.0.29482.1003
Key: Analysis. Version. Description
Value: 10.2509.29.03 AMD64fre
Key: Analysis. Version. Ext
Value: 1.2509.29.3
Key: Bugcheck. Code. LegacyAPI
Value: 0x139
Key: Bugcheck. Code. TargetModel
Value: 0x139
Key: Dump. Attributes. AsUlong
Value: 0x21808
Key: Dump. Attributes. DiagDataWrittenToHeader
Value: 1
Key: Dump. Attributes. ErrorCode
Value: 0x0
Key: Dump. Attributes. KernelGeneratedTriageDump
Value: 1
Key: Dump. Attributes. LastLine
Value: Dump completed successfully.
Key: Dump. Attributes. ProgressPercentage
Value: 0
Key: FailFast. Name
Value: CORRUPT_LIST_ENTRY
Key: FailFast. Type
Value: 3
Key: Failure. Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad
Key: Failure. Exception. Code
Value: 0xc0000409
Key: Failure. Exception. Record
Value: 0xffffdd0bba3472e8
Key: Failure. Hash
Value: {ED5E39B6-1654-8C70-B89a-E53845AF0b01}
Key: Hypervisor. Enlightenments. ValueHex
Value: 0x7417df84
Key: Hypervisor. Flags. AnyHypervisorPresent
Value: 1
Key: Hypervisor. Flags. ApicEnlightened
Value: 0
Key: Hypervisor. Flags. ApicVirtualizationAvailable
Value: 1
Key: Hypervisor. Flags. AsyncMemoryHint
Value: 0
Key: Hypervisor. Flags. CoreSchedulerRequested
Value: 0
Key: Hypervisor. Flags. CpuManager
Value: 1
Key: Hypervisor. Flags. DeprecateAutoEoi
Value: 1
Key: Hypervisor. Flags. DynamicCpuDisabled
Value: 1
Key: Hypervisor. Flags. Epf
Value: 0
Key: Hypervisor. Flags. ExtendedProcessorMasks
Value: 1
Key: Hypervisor. Flags. HardwareMbecAvailable
Value: 1
Key: Hypervisor. Flags. MaxBankNumber
Value: 0
Key: Hypervisor. Flags. MemoryZeroingControl
Value: 0
Key: Hypervisor. Flags. NoExtendedRangeFlush
Value: 0
Key: Hypervisor. Flags. NoNonArchCoreSharing
Value: 1
Key: Hypervisor. Flags. Phase0InitDone
Value: 1
Key: Hypervisor. Flags. PowerSchedulerQos
Value: 0
Key: Hypervisor. Flags. RootScheduler
Value: 0
Key: Hypervisor. Flags. SynicAvailable
Value: 1
Key: Hypervisor. Flags. UseQpcBias
Value: 0
Key: Hypervisor. Flags. Value
Value: 55185662
Key: Hypervisor. Flags. ValueHex
Value: 0x34a10fe
Key: Hypervisor. Flags. VpAssistPage
Value: 1
Key: Hypervisor. Flags. VsmAvailable
Value: 1
Key: Hypervisor. RootFlags. AccessStats
Value: 1
Key: Hypervisor. RootFlags. CrashdumpEnlightened
Value: 1
Key: Hypervisor. RootFlags. CreateVirtualProcessor
Value: 1
Key: Hypervisor. RootFlags. DisableHyperthreading
Value: 0
Key: Hypervisor. RootFlags. HostTimelineSync
Value: 1
Key: Hypervisor. RootFlags. HypervisorDebuggingEnabled
Value: 0
Key: Hypervisor. RootFlags. IsHyperV
Value: 1
Key: Hypervisor. RootFlags. LivedumpEnlightened
Value: 1
Key: Hypervisor. RootFlags. MapDeviceInterrupt
Value: 1
Key: Hypervisor. RootFlags. MceEnlightened
Value: 1
Key: Hypervisor. RootFlags. Nested
Value: 0
Key: Hypervisor. RootFlags. StartLogicalProcessor
Value: 1
Key: Hypervisor. RootFlags. Value
Value: 1015
Key: Hypervisor. RootFlags. ValueHex
Value: 0x3f7
Key: WER. System. BIOSRevision
Value: 7.6.0.0
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: Ffffdd0bBA347390
BUGCHECK_P3: Ffffdd0bBA3472E8
BUGCHECK_P4: 0
FILE_IN_CAB: 012226-17343-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DUMP_FILE_ATTRIBUTES: 0x21808
Kernel Generated Triage Dump
FAULTING_THREAD: FffFE28E22Ebe180
TRAP_FRAME: Ffffdd0bBA347390 -- (.trap 0xffffdd0bba347390)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = fffFE28E2C11ec50 rbx = 0000000000000000 rcx = 0000000000000003
Rdx = fffFE28E2C11ecd0 rsi = 0000000000000000 rdi = 0000000000000000
Rip = fffFF8067C52b74e rsp = ffffdd0bBA347520 rbp = fffFC00FF57ba700
R8 = fffFE28E2C11ec50 R9 = fffFC00FF5D6cbe8 R10 = 0000000000000003
R11 = 0000000000000008 R12 = 0000000000000000 R13 = 0000000000000000
R14 = 0000000000000000 R15 = 0000000000000000
İopl = 0 nv up ei ng nzna pe cy
Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x1'da:
Fffff806'7C52B74E CD29 int 29h
Resetting default scope
EXCEPTION_RECORD: Ffffdd0bBA3472E8 -- (.exr 0xffffdd0bba3472e8)
ExceptionAddress: FffFF8067C52b74e (dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x00000000000001da)
ExceptionCode: C0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y n tabanl bir arabelle in ta t n alg lad. Bu ta ma, k t niyetli bir kullan C n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.
EXCEPTION_CODE_STR: C0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
Ffffdd0b'BA347068 fffff806'C6cb60e9: 00000000'00000139 00000000'00000003 ffffdd0b'BA347390 ffffdd0b'BA3472E8: NT! KeBugCheckEx
Ffffdd0b'BA347070 fffff806'C6cb66F2: 00000000'00000001 fffff806'7613703E 00000000'00000000 ffffdd0b'BA3473C0: NT! KiBugCheckDispatch+0x69
Ffffdd0b'BA3471B0 fffff806'C6cb4328: 00008005'014b0000 ffffdd0b'BA3474B0 ffffe28e'22F69000 fffff806'7C57DC39: NT! KiFastFailDispatch+0xb2
Ffffdd0b'BA347390 fffff806'7C52B74E: Ffffc00F'F5784428 ffffc00F'F57ba700 ffffc00F'e9b3a080 ffffc00F'F579E820: NT! KiRaiseSecurityCheckFailure+0x368
Ffffdd0b'BA347520 fffff806'7C529AE6: Ffffc00F'F5784428 ffffc00F'F57ba700 00000000'00000000 ffffc00F'ebcd27a0: Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x1'da
Ffffdd0b'BA347560 fffff806'7C5686C5: 00000000'00000100 ffffc00F'e9b3a080 00000000'00000000 00000000'00000000: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeListWithFix+0x272
Ffffdd0b'BA347640 fffff806'7C5A232D: 00000000'00000000 ffffdd0b'BA3478B0 00000000'00000000 ffffdd0b'BA347A78: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeList+0x50D
Ffffdd0b'BA347700 fffff806'7C571840: Ffffdd0b'BA347A78 ffffdd0b'BA347A78 ffffdd0b'BA3478B0 ffffc00F'F5e4a1b0: Dxgmms2! VIDMM_GLOBAL: CommitVirtualAddressRangeSystemCommand+0x24D
Ffffdd0b'BA3477B0 fffff806'7C570A45: Ffffe28e'22F69000 ffffc00F'E8780CC0 ffffc00F'DC68C000 ffffc00F'E8780CC0: Dxgmms2! VIDMM_GLOBAL: ProcessDeferredCommand+0xa0C
Ffffdd0b'BA3479B0 fffff806'7C5821EF: Ffffc00F'E8780CC0 ffffdd0b'BA347AC9 fffff806'7C4ee5D0 ffffe28e'22F72C20: Dxgmms2! VidMmSubmitPacket+0xb5
Ffffdd0b'BA347A10 fffff806'C6a8C4'da: Ffffe28e'22ebe101 fffff806'7C581B00 ffff9180'E2651100 066FE47F'B19bbd02: Dxgmms2! VidMmWorkerThreadProc+0x69F
Ffffdd0b'BA347B30 fffff806'C6ca32D4: Ffff9180'E2651180 ffffe28e'22ebe180 fffff806'C6a8C480 fdbb9F15'FF48D233: NT! PspSystemThreadStartup+0x5a
Ffffdd0b'BA347B80 00000000'00000000: Ffffdd0b'BA348000 ffffdd0b'BA341000 00000000'00000000 00000000'00000000: NT! KiStartSystemThread+0x34
SYMBOL_NAME: Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+1'da
MODULE_NAME: Dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.26100.7623
STACK_COMMAND: Process /r /p 0xffffe28e114db040;.thread 0xffffe28e22ebe180; KB
BUCKET_ID_FUNC_OFFSET: 1'da
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad
OSPLATFORM_TYPE: X64
OSNAME: Windows 10
FAILURE_ID_HASH: {ED5E39B6-1654-8C70-B89a-E53845AF0b01}
Followup: MachineOwner
---------
2: Kd>.process /r /p 0xffffe28e114db040;.thread 0xffffe28e22ebe180; KB
Implicit process is now ffffe28e'114dB040
Loading User Symbols
Implicit thread is now ffffe28e'22ebe180
*** Stack trace for last set context - .thread/.cxr resets it
# RetAddr: Args to Child: Call Site
00 fffff806'C6cb60e9: 00000000'00000139 00000000'00000003 ffffdd0b'BA347390 ffffdd0b'BA3472E8: NT! KeBugCheckEx
01 fffff806'C6cb66F2: 00000000'00000001 fffff806'7613703E 00000000'00000000 ffffdd0b'BA3473C0: NT! KiBugCheckDispatch+0x69
02 fffff806'C6cb4328: 00008005'014b0000 ffffdd0b'BA3474B0 ffffe28e'22F69000 fffff806'7C57DC39: NT! KiFastFailDispatch+0xb2
03 fffff806'7C52B74E: Ffffc00F'F5784428 ffffc00F'F57ba700 ffffc00F'e9b3a080 ffffc00F'F579E820: NT! KiRaiseSecurityCheckFailure+0x368
04 fffff806'7C529AE6: Ffffc00F'F5784428 ffffc00F'F57ba700 00000000'00000000 ffffc00F'ebcd27a0: Dxgmms2! CVirtualAddressAllocator: RemoveVaRangeFromVad+0x1'da
05 fffff806'7C5686C5: 00000000'00000100 ffffc00F'e9b3a080 00000000'00000000 00000000'00000000: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeListWithFix+0x272
06 fffff806'7C5A232D: 00000000'00000000 ffffdd0b'BA3478B0 00000000'00000000 ffffdd0b'BA347A78: Dxgmms2! CVirtualAddressAllocator: AddVaRangeToVadRangeList+0x50D
07 fffff806'7C571840: Ffffdd0b'BA347A78 ffffdd0b'BA347A78 ffffdd0b'BA3478B0 ffffc00F'F5e4a1b0: Dxgmms2! VIDMM_GLOBAL: CommitVirtualAddressRangeSystemCommand+0x24D
08 fffff806'7C570A45: Ffffe28e'22F69000 ffffc00F'E8780CC0 ffffc00F'DC68C000 ffffc00F'E8780CC0: Dxgmms2! VIDMM_GLOBAL: ProcessDeferredCommand+0xa0C
09 fffff806'7C5821EF: Ffffc00F'E8780CC0 ffffdd0b'BA347AC9 fffff806'7C4ee5D0 ffffe28e'22F72C20: Dxgmms2! VidMmSubmitPacket+0xb5
0A fffff806'C6a8C4'da: Ffffe28e'22ebe101 fffff806'7C581B00 ffff9180'E2651100 066FE47F'B19bbd02: Dxgmms2! VidMmWorkerThreadProc+0x69F
0B fffff806'C6ca32D4: Ffff9180'E2651180 ffffe28e'22ebe180 fffff806'C6a8C480 fdbb9F15'FF48D233: NT! PspSystemThreadStartup+0x5a
0C 00000000'00000000: Ffffdd0b'BA348000 ffffdd0b'BA341000 00000000'00000000 00000000'00000000: NT! KiStartSystemThread+0x34