BugCheck in nt!CcFlushCache+0x195

What would cause the following bug check 1A in the following crash?

Thanks,

Ken

****************************************************************************
***

*
*

* Bugcheck Analysis
*

*
*

****************************************************************************
***

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {777, 5bba, 1, 85dbb3ff}

Probably caused by : memory_corruption ( nt!MmUnlockCachedPage+53 )

Followup: MachineOwner


nt!RtlpBreakWithStatusInstruction:

804df1c0 cc int 3

1: kd> !analyze -v

****************************************************************************
***

*
*

* Bugcheck Analysis
*

*
*

****************************************************************************
***

MEMORY_MANAGEMENT (1a)

Any other values for parameter 1 must be individually examined.

Arguments:

Arg1: 00000777, The caller is unlocking a system cache address that is not

currently locked. (This address was either never mapped or

is being unlocked twice.)

Arg2: 00005bba

Arg3: 00000001

Arg4: 85dbb3ff

Debugging Details:


BUGCHECK_STR: 0x1a_777

DEFAULT_BUCKET_ID: DRIVER_FAULT

CURRENT_IRQL: 2

LAST_CONTROL_TRANSFER: from 80542289 to 804df1c0

STACK_TEXT:

f78e2868 80542289 00000003 00000777 00000000
nt!RtlpBreakWithStatusInstruction

f78e28b4 80543108 00000003 80c89970 c02176ec nt!KiBugCheckDebugBreak+0x19

f78e2c1c 805435b9 0000001a 00000777 00005bba nt!KeBugCheck2+0x4a8

f78e2c3c 8054c573 0000001a 00000777 00005bba nt!KeBugCheckEx+0x19

f78e2c5c 8052325f 85dbb3ff 85d9a10c 85d9a0b4 nt!MmUnlockCachedPage+0x53

f78e2c7c 80506385 00d9a0b4 00000000 00000000 nt!CcFreeActiveVacb+0x6b

f78e2d00 804fcfda 85cac020 00000000 00000001 nt!CcFlushCache+0x195

f78e2d40 804f22ae 85eeb620 80582d80 85edea78 nt!CcWriteBehind+0x116

f78e2d80 804eebdb 85edea78 00000000 85eeb620 nt!CcWorkerThread+0x12c

f78e2dac 8059b35e 85edea78 00000000 00000000 nt!ExpWorkerThread+0xe9

f78e2ddc 805008e6 804eeb10 00000000 00000000 nt!PspSystemThreadStartup+0x2e

00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16

FOLLOWUP_IP:

nt!MmUnlockCachedPage+53

8054c573 6683f902 cmp cx,0x2

SYMBOL_STACK_INDEX: 4

FOLLOWUP_NAME: MachineOwner

SYMBOL_NAME: nt!MmUnlockCachedPage+53

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 3e8015c6

STACK_COMMAND: kb

IMAGE_NAME: memory_corruption

BUCKET_ID: 0x1a_777_nt!MmUnlockCachedPage+53

Followup: MachineOwner