Share via

Random Restarts. No BSOD

Razlin99 0 Reputation points
2026-02-07T18:41:10.4833333+00:00

So in the past couple days I have started getting random crashes. Always with the Kernel_Security_Check_Failure(139). It doesnt happen all the time just randomly. First It only happened during gaming. Now it just happened when I was watching a Youtube video. Below is the dump file.


KERNEL_SECURITY_CHECK_FAILURE (139)

A kernel component has corrupted a critical data structure. The corruption

could potentially allow a malicious user to gain control of this machine.

Arguments:

Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).

Arg2: ffff980630ec7390, Address of the trap frame for the exception that caused the BugCheck

Arg3: ffff980630ec72e8, Address of the exception record for the exception that caused the BugCheck

Arg4: 0000000000000000, Reserved

Debugging Details:


KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec

Value: 1187

Key  : Analysis.Elapsed.mSec

Value: 4779

Key  : Analysis.IO.Other.Mb

Value: 0

Key  : Analysis.IO.Read.Mb

Value: 1

Key  : Analysis.IO.Write.Mb

Value: 27

Key  : Analysis.Init.CPU.mSec

Value: 890

Key  : Analysis.Init.Elapsed.mSec

Value: 51594

Key  : Analysis.Memory.CommitPeak.Mb

Value: 89

Key  : Analysis.Version.DbgEng

Value: 10.0.29507.1001

Key  : Analysis.Version.Description

Value: 10.2511.5.1 amd64fre

Key  : Analysis.Version.Ext

Value: 1.2511.5.1

Key  : Bugcheck.Code.LegacyAPI

Value: 0x139

Key  : Bugcheck.Code.TargetModel

Value: 0x139

Key  : Dump.Attributes.AsUlong

Value: 0x21008

Key  : Dump.Attributes.DiagDataWrittenToHeader

Value: 1

Key  : Dump.Attributes.ErrorCode

Value: 0x0

Key  : Dump.Attributes.KernelGeneratedTriageDump

Value: 1

Key  : Dump.Attributes.LastLine

Value: Dump completed successfully.

Key  : Dump.Attributes.ProgressPercentage

Value: 0

Key  : FailFast.Name

Value: CORRUPT_LIST_ENTRY

Key  : FailFast.Type

Value: 3

Key  : Failure.Bucket

Value: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad

Key  : Failure.Exception.Code

Value: 0xc0000409

Key  : Failure.Exception.Record

Value: 0xffff980630ec72e8

Key  : Failure.Hash

Value: {ed5e39b6-1654-8c70-b89a-e53845af0b01}

BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffff980630ec7390

BUGCHECK_P3: ffff980630ec72e8

BUGCHECK_P4: 0

FILE_IN_CAB: 020726-5812-01.dmp

DUMP_FILE_ATTRIBUTES: 0x21008

Kernel Generated Triage Dump

FAULTING_THREAD: ffffc0855ebf5140

TRAP_FRAME: ffff980630ec7390 -- (.trap 0xffff980630ec7390)

NOTE: The trap frame does not contain all registers.

Some register values may be zeroed or incorrect.

rax=ffffc0851e61f910 rbx=0000000000000000 rcx=0000000000000003

rdx=ffffc0851e61f990 rsi=0000000000000000 rdi=0000000000000000

rip=fffff804891cb6ce rsp=ffff980630ec7520 rbp=ffffb006320441a0

r8=ffffc0851e61f910 r9=0000000000000000 r10=0000000000000003

r11=0000000000000008 r12=0000000000000000 r13=0000000000000000

r14=0000000000000000 r15=0000000000000000

iopl=0 nv up ei pl nz na pe nc

dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da:

fffff804`891cb6ce cd29 int 29h

Resetting default scope

EXCEPTION_RECORD: ffff980630ec72e8 -- (.exr 0xffff980630ec72e8)

ExceptionAddress: fffff804891cb6ce (dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x00000000000001da)

ExceptionCode: c0000409 (Security check failure or stack buffer overrun)

ExceptionFlags: 00000001

NumberParameters: 1

Parameter[0]: 0000000000000003

Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1 (!blackboxwinlogon)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:

ffff980630ec7068 fffff804d66be7e9 : 0000000000000139 0000000000000003 ffff980630ec7390 ffff980630ec72e8 : nt!KeBugCheckEx

ffff980630ec7070 fffff804d66bedf2 : 0000000000000001 fffff8048d7c703e 0000000000000100 0000000800605a40 : nt!KiBugCheckDispatch+0x69

ffff980630ec71b0 fffff804d66bca28 : 0000800501094000 ffff980630ec74b0 ffffc0856b8ee000 fffff8048921cc9d : nt!KiFastFailDispatch+0xb2

ffff980630ec7390 fffff804891cb6ce : ffffb005da485788 ffffb006320441a0 ffffb0062cd29230 ffffb0063d87e1a0 : nt!KiRaiseSecurityCheckFailure+0x368

ffff980630ec7520 fffff804891c9a7c : ffffb005da485788 ffffb006320441a0 ffffb005eab360c0 ffffb0063878fb20 : dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+0x1da

ffff980630ec7560 fffff80489207ff2 : 0000000000000100 ffffb0062cd29230 0000000000000000 0000000000000000 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeListWithFix+0x258

ffff980630ec7640 fffff80489241a2d : 0000000000000000 ffff980630ec78b0 0000000000000000 ffff980630ec7a78 : dxgmms2!CVirtualAddressAllocator::AddVaRangeToVadRangeList+0x4f2

ffff980630ec7700 fffff804892108e8 : ffff980630ec7a78 ffff980630ec7a78 ffff980630ec78b0 ffffb0060ce3b7f0 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x24d

ffff980630ec77b0 fffff8048920fb15 : ffffb005e3078730 ffffb005e7a1b520 ffffb00610acf000 ffffb005e7a1b520 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0xa00

ffff980630ec79b0 fffff80489221571 : ffffb00610acf000 ffff980630ec7ac9 fffff8048918e490 ffffc0856b8f7c20 : dxgmms2!VidMmSubmitPacket+0xb5

ffff980630ec7a10 fffff804d6489dda : ffffc0855ebf5101 fffff80489220e00 ffff880164ed2100 066fe47fbd9bbf02 : dxgmms2!VidMmWorkerThreadProc+0x681

ffff980630ec7b30 fffff804d66ab904 : ffff880164ed2180 ffffc0855ebf5140 fffff804d6489d80 ffffc08557acc090 : nt!PspSystemThreadStartup+0x5a

ffff980630ec7b80 0000000000000000 : ffff980630ec8000 ffff980630ec1000 0000000000000000 0000000000000000 : nt!KiStartSystemThread+0x34

SYMBOL_NAME: dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad+1da

MODULE_NAME: dxgmms2

IMAGE_NAME: dxgmms2.sys

IMAGE_VERSION: 10.0.26100.7705

STACK_COMMAND: .process /r /p 0xffffc085186eb040; .thread 0xffffc0855ebf5140 ; kb

BUCKET_ID_FUNC_OFFSET: 1da

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_dxgmms2!CVirtualAddressAllocator::RemoveVaRangeFromVad

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ed5e39b6-1654-8c70-b89a-e53845af0b01}

Followup: MachineOwner


Windows for home | Windows 11 | Gaming
{count} votes

1 answer

Sort by: Most helpful
  1. VARADHARAJAN K 9,596 Reputation points Volunteer Moderator
    2026-02-09T17:13:59.91+00:00

    @Razlin99 , Update directx and update latest gaphics driver. Update latest bios firmware

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.