Question ALL Nvidia Drivers Causes BSOD

Sir Friksy

Commendable
Jul 29, 2021
13
0
1,510
I have been struggling with BSODs for a long time. I ran some tests, and I concluded that the cause for the blue screens appears to be the drivers of my 3060. If I clean uninstall it using DDU I no longer have problems, but my games don't run properly as well.
I've tried many reinstalling other versions, but the problem persists.
Here is my specs and DUMP files:
Windows version: Windows 11
Hardware: B450 AORUS M, Gigabyte Technology Co., Ltd.
CPU: AMD Ryzen 5 3600 6-Core Processor 8664, level: 23
Processor count: 12 logical processors, active mask: 4095
RAM: 16332.5MB
GPU: NVIDIA GeForce RTX 3060


DUMP:

************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : true
AllowNugetExeUpdate : true
AllowNugetMSCredentialProviderInstall : true
AllowParallelInitializationOfLocalRepositories : true

-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.156 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25921.1001 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\120223-8812-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22621 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Kernel base = 0xfffff801`11e00000 PsLoadedModuleList = 0xfffff801`12a134a0
Debug session time: Sat Dec 2 21:36:54.117 2023 (UTC - 8:00)
System Uptime: 0 days 4:39:43.738
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`004be018). Type ".hh dbgerr001" for details
Loading unloaded module list
............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`12216980 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe307`eb310450=0000000000000139
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffe307eb310770, Address of the trap frame for the exception that caused the BugCheck
Arg3: ffffe307eb3106c8, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2171

Key : Analysis.Elapsed.mSec
Value: 2889

Key : Analysis.IO.Other.Mb
Value: 7

Key : Analysis.IO.Read.Mb
Value: 12

Key : Analysis.IO.Write.Mb
Value: 36

Key : Analysis.Init.CPU.mSec
Value: 233

Key : Analysis.Init.Elapsed.mSec
Value: 12285

Key : Analysis.Memory.CommitPeak.Mb
Value: 84

Key : Bugcheck.Code.LegacyAPI
Value: 0x139

Key : Dump.Attributes.AsUlong
Value: 1008

Key : Dump.Attributes.DiagDataWrittenToHeader
Value: 1

Key : Dump.Attributes.ErrorCode
Value: 0

Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1

Key : Dump.Attributes.LastLine
Value: Dump completed successfully.

Key : Dump.Attributes.ProgressPercentage
Value: 0

Key : FailFast.Name
Value: CORRUPT_LIST_ENTRY

Key : FailFast.Type
Value: 3

Key : Failure.Bucket
Value: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

Key : Failure.Hash
Value: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}


BUGCHECK_CODE: 139

BUGCHECK_P1: 3

BUGCHECK_P2: ffffe307eb310770

BUGCHECK_P3: ffffe307eb3106c8

BUGCHECK_P4: 0

FILE_IN_CAB: 120223-8812-01.dmp

DUMP_FILE_ATTRIBUTES: 0x1008
Kernel Generated Triage Dump

TRAP_FRAME: ffffe307eb310770 -- (.trap 0xffffe307eb310770)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb0893498f1a0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb089321ca1a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80112288812 rsp=ffffe307eb310900 rbp=8000002713e362f9
r8=0000002713e13314 r9=fffff80111e00000 r10=fffff8010e755d80
r11=ffffb2fc45400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!KiInsertTimerTable+0x211c12:
fffff801`12288812 cd29 int 29h
Resetting default scope

EXCEPTION_RECORD: ffffe307eb3106c8 -- (.exr 0xffffe307eb3106c8)
ExceptionAddress: fffff80112288812 (nt!KiInsertTimerTable+0x0000000000211c12)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: explorer.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.

EXCEPTION_CODE_STR: c0000409

EXCEPTION_PARAMETER1: 0000000000000003

EXCEPTION_STR: 0xc0000409

STACK_TEXT:
ffffe307`eb310448 fffff801`1222bfa9 : 00000000`00000139 00000000`00000003 ffffe307`eb310770 ffffe307`eb3106c8 : nt!KeBugCheckEx
ffffe307`eb310450 fffff801`1222c532 : 00000000`00000006 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffe307`eb310590 fffff801`1222a306 : ffffb089`00000040 ffffb089`34ec68c0 00000000`00000000 fffff801`12063ae7 : nt!KiFastFailDispatch+0xb2
ffffe307`eb310770 fffff801`12288812 : ffffb089`32afb901 00000000`00000000 00000000`00000000 ffff6ada`10db6274 : nt!KiRaiseSecurityCheckFailure+0x346
ffffe307`eb310900 fffff801`1206f9b8 : ffffb089`3498f080 00000027`00000000 00000000`0027d24c fffff801`12010087 : nt!KiInsertTimerTable+0x211c12
ffffe307`eb310980 fffff801`12074079 : 00000000`00000000 00000000`00000001 ffffb089`000000f8 80000005`96077a35 : nt!KiCommitThreadWait+0x2c8
ffffe307`eb310a30 fffff801`124e6630 : 00000000`00000000 00000000`00000000 00000000`06a08800 00000000`00000002 : nt!KeDelayExecutionThread+0xf9
ffffe307`eb310ab0 fffff801`1222b6e8 : ffffe307`eb310b60 00000000`0094f7a0 80000000`00000000 00000000`00000000 : nt!NtDelayExecution+0x60
ffffe307`eb310ae0 00007ff8`4e2cf9f4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`0094f878 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`4e2cf9f4


SYMBOL_NAME: nt!KiInsertTimerTable+211c12

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.22621.2715

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 211c12

FAILURE_BUCKET_ID: 0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiInsertTimerTable

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f89e8bcc-9d62-a3aa-7602-6fa1ac774850}

Followup: MachineOwner
---------