@Razlin99 , Update directx and update latest gaphics driver. Update latest bios firmware
Random Restarts. No BSOD
So in the past couple days I have started getting random crashes. Always with the Kernel_Security_Check_Failure(139). It doesnt happen all the time just randomly. First It only happened during gaming. Now it just happened when I was watching a Youtube video. Below is the dump file.
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffff980630ec7390, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffff980630ec72e8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved
Debugging Details:
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1187
Key : Analysis.Elapsed.mSec
Value: 4779
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 1
Key : Analysis.IO.Write.Mb
Value: 27
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 51594
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.Version.DbgEng
Value: 10.0.29507.1001
Key : Analysis.Version.Description
Value: 10.2511.5.1 amd64fre
Key : Analysis.Version.Ext
Value: 1.2511.5.1
Key : Bugcheck.Code.LegacyAPI
Value: 0x139
Key : Bugcheck.Code.TargetModel
Value: 0x139
Key : Dump.Attributes.AsUlong
Value: 0x21008
Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1
Key : Dump.Attributes.ErrorCode
Value: 0x0
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Dump.Attributes.LastLine
Value: Dump completed successfully.
Key : Dump.Attributes.ProgressPercentage
Value: 0
Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY
Key : FailFast.Type
Value: 3
Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad
Key : Failure.Exception.Code
Value: 0xc0000409
Key : Failure.Exception.Record
Value: 0xffff980630ec72e8
Key : Failure.Hash
Value: {ed5e39b6-1654-8c70-b89a-e53845af0b01}
BUGCHECK_CODE: 139
BUGCHECK_P1: 3
BUGCHECK_P2: ffff980630ec7390
BUGCHECK_P3: ffff980630ec72e8
BUGCHECK_P4: 0
FILE_IN_CAB: 020726-5812-01.dmp
DUMP_FILE_ATTRIBUTES: 0x21008
Kernel Generated Triage Dump
FAULTING_THREAD: ffffc0855ebf5140
TRAP_FRAME: ffff980630ec7390 -- (.trap 0xffff980630ec7390)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc0851e61f910 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc0851e61f990 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804891cb6ce rsp=ffff980630ec7520 rbp=ffffb006320441a0
r8=ffffc0851e61f910 r9=0000000000000000 r10=0000000000000003
r11=0000000000000008 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da:
fffff804`891cb6ce cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffff980630ec72e8 -- (.exr 0xffff980630ec72e8)
ExceptionAddress: fffff804891cb6ce (dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x00000000000001da)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1 (!blackboxwinlogon)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
EXCEPTION_STR: 0xc0000409
STACK_TEXT:
ffff980630ec7068 fffff804d66be7e9 : 0000000000000139 0000000000000003 ffff980630ec7390 ffff980630ec72e8 : nt!KeBugCheckEx
ffff980630ec7070 fffff804d66bedf2 : 0000000000000001 fffff8048d7c703e 0000000000000100 0000000800605a40 : nt!KiBugCheckDispatch+0x69
ffff980630ec71b0 fffff804d66bca28 : 0000800501094000 ffff980630ec74b0 ffffc0856b8ee000 fffff8048921cc9d : nt!KiFastFailDispatch+0xb2
ffff980630ec7390 fffff804891cb6ce : ffffb005da485788 ffffb006320441a0 ffffb0062cd29230 ffffb0063d87e1a0 : nt!KiRaiseSecurityCheckFailure+0x368
ffff980630ec7520 fffff804891c9a7c : ffffb005da485788 ffffb006320441a0 ffffb005eab360c0 ffffb0063878fb20 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da
ffff980630ec7560 fffff80489207ff2 : 0000000000000100 ffffb0062cd29230 0000000000000000 0000000000000000 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeListWithFix+0x258
ffff980630ec7640 fffff80489241a2d : 0000000000000000 ffff980630ec78b0 0000000000000000 ffff980630ec7a78 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeList+0x4f2
ffff980630ec7700 fffff804892108e8 : ffff980630ec7a78 ffff980630ec7a78 ffff980630ec78b0 ffffb0060ce3b7f0 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x24d
ffff980630ec77b0 fffff8048920fb15 : ffffb005e3078730 ffffb005e7a1b520 ffffb00610acf000 ffffb005e7a1b520 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xa00
ffff980630ec79b0 fffff80489221571 : ffffb00610acf000 ffff980630ec7ac9 fffff8048918e490 ffffc0856b8f7c20 : dxgmms2!VidMmSubmitPacket+0xb5
ffff980630ec7a10 fffff804d6489dda : ffffc0855ebf5101 fffff80489220e00 ffff880164ed2100 066fe47fbd9bbf02 : dxgmms2!VidMmWorkerThreadProc+0x681
ffff980630ec7b30 fffff804d66ab904 : ffff880164ed2180 ffffc0855ebf5140 fffff804d6489d80 ffffc08557acc090 : nt!PspSystemThreadStartup+0x5a
ffff980630ec7b80 0000000000000000 : ffff980630ec8000 ffff980630ec1000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x34
SYMBOL_NAME: dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+1da
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.26100.7705
STACK_COMMAND: .process /r /p 0xffffc085186eb040; .thread 0xffffc0855ebf5140 ; kb
BUCKET_ID_FUNC_OFFSET: 1da
FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ed5e39b6-1654-8c70-b89a-e53845af0b01}
Followup: MachineOwner
Windows for home | Windows 11 | Gaming
1 answer
Sort by: Most helpful
-
VARADHARAJAN K 9,596 Reputation points Volunteer Moderator2026-02-09T17:13:59.91+00:00