What would cause the following bug check 1A in the following crash?
Thanks,
Ken
****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {777, 5bba, 1, 85dbb3ff}
Probably caused by : memory_corruption ( nt!MmUnlockCachedPage+53 )
Followup: MachineOwner
nt!RtlpBreakWithStatusInstruction:
804df1c0 cc int 3
1: kd> !analyze -v
****************************************************************************
***
*
*
* Bugcheck Analysis
*
*
*
****************************************************************************
***
MEMORY_MANAGEMENT (1a)
Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 00000777, The caller is unlocking a system cache address that is not
currently locked. (This address was either never mapped or
is being unlocked twice.)
Arg2: 00005bba
Arg3: 00000001
Arg4: 85dbb3ff
Debugging Details:
BUGCHECK_STR: 0x1a_777
DEFAULT_BUCKET_ID: DRIVER_FAULT
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from 80542289 to 804df1c0
STACK_TEXT:
f78e2868 80542289 00000003 00000777 00000000
nt!RtlpBreakWithStatusInstruction
f78e28b4 80543108 00000003 80c89970 c02176ec nt!KiBugCheckDebugBreak+0x19
f78e2c1c 805435b9 0000001a 00000777 00005bba nt!KeBugCheck2+0x4a8
f78e2c3c 8054c573 0000001a 00000777 00005bba nt!KeBugCheckEx+0x19
f78e2c5c 8052325f 85dbb3ff 85d9a10c 85d9a0b4 nt!MmUnlockCachedPage+0x53
f78e2c7c 80506385 00d9a0b4 00000000 00000000 nt!CcFreeActiveVacb+0x6b
f78e2d00 804fcfda 85cac020 00000000 00000001 nt!CcFlushCache+0x195
f78e2d40 804f22ae 85eeb620 80582d80 85edea78 nt!CcWriteBehind+0x116
f78e2d80 804eebdb 85edea78 00000000 85eeb620 nt!CcWorkerThread+0x12c
f78e2dac 8059b35e 85edea78 00000000 00000000 nt!ExpWorkerThread+0xe9
f78e2ddc 805008e6 804eeb10 00000000 00000000 nt!PspSystemThreadStartup+0x2e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
FOLLOWUP_IP:
nt!MmUnlockCachedPage+53
8054c573 6683f902 cmp cx,0x2
SYMBOL_STACK_INDEX: 4
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!MmUnlockCachedPage+53
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 3e8015c6
STACK_COMMAND: kb
IMAGE_NAME: memory_corruption
BUCKET_ID: 0x1a_777_nt!MmUnlockCachedPage+53
Followup: MachineOwner