Getting BSOD with error message "PROCESS_HAS_LOCKED_PAGES" almost daily. Had enough and tried re-installing windows 10. Cannot get it to boot from USB or DVD. After selecting boot device, windows logo is showing and then just a black screen... nothing happens.
Tried changing BIOS to legacy, turned off secure boot.. same thing.
Please help me.
Minidump content below:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff803`f0c0f000 PsLoadedModuleList = 0xfffff803`f0f5b660
Debug session time: Mon Nov 20 17:34:40.057 2017 (UTC - 5:00)
System Uptime: 0 days 5:17:08.709
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: ffffb3836aefb080, Process address.
Arg3: 0000000000000002, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
Issue a !search over all of physical memory for the current process pointer.
This will yield at least one MDL which points to it. Then do another !search
for each MDL found, this will yield the IRP(s) that point to it, revealing
which driver is leaking the pages.
Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system
will save stack traces so the guilty driver can be easily identified.
When you enable this flag, if the driver commits the error again you will
see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
which can identify the offending driver(s).
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
PROCESS_NAME: backgroundTask
DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76
BUGCHECK_STR: 0x76
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff803f121a6ad to fffff803f0d7b580
STACK_TEXT:
ffffa301`ce1317c8 fffff803`f121a6ad : 00000000`00000076 00000000`00000000 ffffb383`6aefb080 00000000`00000002 : nt!KeBugCheckEx
ffffa301`ce1317d0 fffff803`f0cb69f8 : ffffb383`6aefb080 ffffb383`6aefb050 ffffb383`69b2b7c0 ffffb383`00000000 : nt!MmDeleteProcessAddressSpace+0x1458f9
ffffa301`ce131820 fffff803`f10bc32e : ffffb383`6aefb050 ffffb383`6aefb050 ffffb383`6aefb050 00000000`00000000 : nt!PspProcessDelete+0x198
ffffa301`ce1318c0 fffff803`f0c72f56 : 00000000`00000000 00000000`00000000 ffffb383`6aefb050 ffffb383`6aefb080 : nt!ObpRemoveObjectRoutine+0x7e
ffffa301`ce131920 fffff803`f10b2152 : ffffb383`66a85540 ffff9083`fef8b000 ffff9083`fef8b000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc6
ffffa301`ce131960 fffff803`f10b412b : 00000000`00000000 00000000`00000000 00000000`c0000001 ffffb383`69295f00 : nt!ObCloseHandleTableEntry+0x272
ffffa301`ce131aa0 fffff803`f0d86413 : ffffb383`69b2b7c0 00000284`87a66bb0 00000000`00000000 00000000`00000000 : nt!NtClose+0xcb
ffffa301`ce131b00 00007ff9`65105584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ef`5a07f758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff9`65105584
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmDeleteProcessAddressSpace+1458f9
fffff803`f121a6ad cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmDeleteProcessAddressSpace+1458f9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 59fa9d38
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x76_backgroundTask_nt!MmDeleteProcessAddressSpace+1458f9
BUCKET_ID: X64_0x76_backgroundTask_nt!MmDeleteProcessAddressSpace+1458f9
Followup: MachineOwner
---------
Tried changing BIOS to legacy, turned off secure boot.. same thing.
Please help me.
Minidump content below:
Crash Dump Analysis provided by OSR Open Systems Resources, Inc. (http://www.osr.com)
Online Crash Dump Analysis Service
See http://www.osronline.com for more information
Windows 8 Kernel Version 15063 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff803`f0c0f000 PsLoadedModuleList = 0xfffff803`f0f5b660
Debug session time: Mon Nov 20 17:34:40.057 2017 (UTC - 5:00)
System Uptime: 0 days 5:17:08.709
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PROCESS_HAS_LOCKED_PAGES (76)
Caused by a driver not cleaning up correctly after an I/O.
Arguments:
Arg1: 0000000000000000, Locked memory pages found in process being terminated.
Arg2: ffffb3836aefb080, Process address.
Arg3: 0000000000000002, Number of locked pages.
Arg4: 0000000000000000, Pointer to driver stacks (if enabled) or 0 if not.
Issue a !search over all of physical memory for the current process pointer.
This will yield at least one MDL which points to it. Then do another !search
for each MDL found, this will yield the IRP(s) that point to it, revealing
which driver is leaking the pages.
Otherwise, set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory
Management\TrackLockedPages to a DWORD 1 value and reboot. Then the system
will save stack traces so the guilty driver can be easily identified.
When you enable this flag, if the driver commits the error again you will
see a different bugcheck - DRIVER_LEFT_LOCKED_PAGES_IN_PROCESS (0xCB) -
which can identify the offending driver(s).
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
PROCESS_NAME: backgroundTask
DEFAULT_BUCKET_ID: DRIVER_FAULT_0x76
BUGCHECK_STR: 0x76
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff803f121a6ad to fffff803f0d7b580
STACK_TEXT:
ffffa301`ce1317c8 fffff803`f121a6ad : 00000000`00000076 00000000`00000000 ffffb383`6aefb080 00000000`00000002 : nt!KeBugCheckEx
ffffa301`ce1317d0 fffff803`f0cb69f8 : ffffb383`6aefb080 ffffb383`6aefb050 ffffb383`69b2b7c0 ffffb383`00000000 : nt!MmDeleteProcessAddressSpace+0x1458f9
ffffa301`ce131820 fffff803`f10bc32e : ffffb383`6aefb050 ffffb383`6aefb050 ffffb383`6aefb050 00000000`00000000 : nt!PspProcessDelete+0x198
ffffa301`ce1318c0 fffff803`f0c72f56 : 00000000`00000000 00000000`00000000 ffffb383`6aefb050 ffffb383`6aefb080 : nt!ObpRemoveObjectRoutine+0x7e
ffffa301`ce131920 fffff803`f10b2152 : ffffb383`66a85540 ffff9083`fef8b000 ffff9083`fef8b000 00000000`00000000 : nt!ObfDereferenceObjectWithTag+0xc6
ffffa301`ce131960 fffff803`f10b412b : 00000000`00000000 00000000`00000000 00000000`c0000001 ffffb383`69295f00 : nt!ObCloseHandleTableEntry+0x272
ffffa301`ce131aa0 fffff803`f0d86413 : ffffb383`69b2b7c0 00000284`87a66bb0 00000000`00000000 00000000`00000000 : nt!NtClose+0xcb
ffffa301`ce131b00 00007ff9`65105584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ef`5a07f758 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7ff9`65105584
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmDeleteProcessAddressSpace+1458f9
fffff803`f121a6ad cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmDeleteProcessAddressSpace+1458f9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 59fa9d38
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x76_backgroundTask_nt!MmDeleteProcessAddressSpace+1458f9
BUCKET_ID: X64_0x76_backgroundTask_nt!MmDeleteProcessAddressSpace+1458f9
Followup: MachineOwner
---------