From: Kurt on 8 Jun 2005 08:37 Today one of the two servers went down again. Error looks the same. /PAE is off, but system still loads ntkrpamp.exe. I guess because it is a two-processor-system. I expect the second server to go down any moment now... Kurt "Vera Noest [MVP]" wrote: > Enterprise Edition should not need the /PAE switch with 4 GB, only > when you have more then 4 GB. > Can you test if this also occurs when you boot without the /PAE > switch (and thus don't load the ntkrpamp.exe but the standard > ntoskrnl.exe)? > > -- > Vera Noest > MCSE, CCEA, Microsoft MVP - Terminal Server > http://hem.fyristorg.com/vera/IT > --- please respond in newsgroup, NOT by private email --- > > "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote on > 28 maj 2005 in microsoft.public.windows.terminal_services: > > > Yes, with PAE > > 4 GB RAM > > > > Kurt > > > > > > "Vera Noest [MVP]" wrote: > > > >> So you are booting with the /PAE switch? > >> How much RAM does this server have? > >> > >> -- > >> Vera Noest > >> MCSE, CCEA, Microsoft MVP - Terminal Server > >> http://hem.fyristorg.com/vera/IT > >> --- please respond in newsgroup, NOT by private email --- > >> > >> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote > >> on 27 maj 2005 in microsoft.public.windows.terminal_services: > >> > >> > After installing SP1 on my 2 Windows 2003 Server Enterprise > >> > Edition, running terminal services in App Mode, they have > >> > both stopped and rebooted several times. In 8 weeks time > >> > there has been 4-5 such incidents per server. > >> > > >> > In the system event log: > >> > > >> > Event ID: 1001 > >> > > >> > The computer has rebooted from a bugcheck. The bugcheck was: > >> > 0x000000ab (0x00000007, 0x00002e40, 0x00000000, 0x00000084). > >> > A dump was saved in: C:\WINDOWS\MEMORY.DMP. > >> > > >> > Event ID: 1003 > >> > > >> > Error code 000000ab, parameter1 00000007, parameter2 > >> > 00002e40, parameter3 00000000, parameter4 00000084. > >> > > >> > From Windbg: > >> > > >> > Microsoft (R) Windows Debugger Version 6.1.0017.2 > >> > Copyright (c) Microsoft Corporation. All rights reserved. > >> > > >> > > >> > Loading Dump File [C:\WINDOWS\MEMORY.DMP] > >> > Kernel Summary Dump File: Only kernel address space is > >> > available > >> > > >> > Symbol search path is: > >> > SRV*c:\debug*http://msdl.microsoft.com/download/symbols > >> > Executable search path is: Windows Server 2003 Kernel Version > >> > 3790 (Service Pack 1) MP (4 procs) Free x86 compatible > >> > Product: Server, suite: Enterprise TerminalServer > >> > Built by: 3790.srv03_sp1_rtm.050324-1447 > >> > Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8 > >> > Debug session time: Thu May 26 13:16:13 2005 > >> > System Uptime: 8 days 3:32:08.381 > >> > Loading Kernel Symbols > >> > .............................................................. > >> > ... ..................................................... > >> > Loading unloaded module list .... > >> > Loading User Symbols > >> > PEB is paged out (Peb = 7ffde00c). Type ".hh dbgerr001" for > >> > details > >> > ************************************************************** > >> > *** ************** * > >> > > >> > > >> > * > >> > * Bugcheck Analysis > >> > > >> > > >> > * > >> > * > >> > > >> > > >> > * > >> > ************************************************************** > >> > *** ************** > >> > > >> > Use !analyze -v to get detailed debugging information. > >> > > >> > BugCheck AB, {7, 2e40, 0, 84} > >> > > >> > Probably caused by : ntkrpamp.exe ( > >> > nt!MiCheckSessionPoolAllocations+107 ) > >> > > >> > Followup: MachineOwner > >> > --------- > >> > > >> > 2: kd> !analyze -v;r;kv;lmtn; > >> > ************************************************************** > >> > *** ************** * > >> > > >> > > >> > * > >> > * Bugcheck Analysis > >> > > >> > > >> > * > >> > * > >> > > >> > > >> > * > >> > ************************************************************** > >> > *** ************** > >> > > >> > SESSION_HAS_VALID_POOL_ON_EXIT (ab) > >> > Caused by a session driver not freeing its pool allocations > >> > prior to a session unload. This indicates a bug in > >> > win32k.sys, atmfd.dll, rdpdd.dll or a video driver. > >> > Arguments: > >> > Arg1: 00000007, session ID > >> > Arg2: 00002e40, number of paged pool bytes that are leaking > >> > Arg3: 00000000, number of nonpaged pool bytes that are > >> > leaking Arg4: 00000084, total number of paged and nonpaged > >> > allocations that are leaking. > >> > nonpaged allocations are in the upper half of this word, > >> > paged allocations are in the lower half of this word. > >> > > >> > Debugging Details: > >> > ------------------ > >> > > >> > > >> > DEFAULT_BUCKET_ID: DRIVER_FAULT > >> > > >> > BUGCHECK_STR: 0xAB > >> > > >> > CURRENT_IRQL: 0 > >> > > >> > LAST_CONTROL_TRANSFER: from 8092ea6f to 80827451 > >> > > >> > STACK_TEXT: > >> > b72d4c24 8092ea6f 000000ab 00000007 00002e40 > >> > nt!KeBugCheckEx+0x1b b72d4c68 809ab017 8aa67aa8 8aa67aa8 > >> > 00000000 nt!MiCheckSessionPoolAllocations+0x107 > >> > b72d4ce8 8084c1a7 8aa67aa8 00000000 8a172398 > >> > nt!MiDereferenceSessionFinal+0x183 > >> > b72d4d04 8094b539 8aa67aa8 8a172398 8a1725d8 > >> > nt!MmCleanProcessAddressSpace+0x6b > >> > b72d4d8c 8094b68d 00000000 00000000 8a172398 > >> > nt!PspExitThread+0x5f1 b72d4da4 80948bc0 8a172398 00000000 > >> > 00000001 nt!PspTerminateThreadByPointer+0x4b > >> > b72d4ddc 8088d4d2 bf92b562 8a0abf30 00000000 > >> > nt!PspSystemThreadStartup+0x3c 00000000 00000000 00000000 > >> > 00000000 00000000 nt!KiThreadStartup+0x16 > >> > > >> > > >> > FOLLOWUP_IP: > >> > nt!MiCheckSessionPoolAllocations+107 > >> > 8092ea6f 5f pop edi > >> > > >> > FOLLOWUP_NAME: MachineOwner > >> > > >> > SYMBOL_NAME: nt!MiCheckSessionPoolAllocations+107 > >> > > >> > MODULE_NAME: nt > >> > > >> > IMAGE_NAME: ntkrpamp.exe > >> > > >> > DEBUG_FLR_IMAGE_TIMESTAMP: 42435b14 > >> > > >> > STACK_COMMAND: kb > >> > > >> > BUCKET_ID: 0xAB_nt!MiCheckSessionPoolAllocations+107 > >> > > >> > Followup: MachineOwner > >> > --------- > >> > > >> > eax=f772f13c ebx=00002e40 ecx=00000000 edx=c0602f80 > >> > esi=f772f120 edi=c0602f78 eip=80827451 esp=b72d4c0c > >> > ebp=b72d4c24 iopl=0 > >> > nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023 > >> > fs=0030 gs=0000 efl=00000286 nt!KeBugCheckEx+1b: > >> > 80827451 5d pop ebp > >> > ChildEBP RetAddr Args to Child > >> > b72d4c24 8092ea6f 000000ab 00000007 00002e40 > >> > nt!KeBugCheckEx+0x1b b72d4c68 809ab017 8aa67aa8 8aa67aa8 > >> > 00000000 nt!MiCheckSessionPoolAllocations+0x107 > >> > b72d4ce8 8084c1a7 8aa67aa8 00000000 8a172398 > >> > nt!MiDereferenceSessionFinal+0x183 > >> > b72d4d04 8094b539 8aa67aa8 8a172398 8a1725d8 > >> > nt!MmCleanProcessAddressSpace+0x6b > >> > b72d4d8c 8094b68d 00000000 00000000 8a172398 > >> > nt!PspExitThread+0x5f1 b72d4da4 80948bc0 8a172398 00000000 > >> > 00000001 nt!PspTerminateThreadByPointer+0x4b > >> > b72d4ddc 8088d4d2 bf92b562 8a0abf30 00000000 > >> > nt!PspSystemThreadStartup+0x3c 00000000 00000000 00000000 > >> > 00000000 00000000 nt!KiThreadStartup+0x16 start end > >> > module name 80800000 80a53000 nt Timestamp: Fri > >> > Mar 25 01:28:04 2005 (42435B14) Checksum: 0023D043 > >> > 80a53000 80a7f000 hal Timestamp: Fri Mar 25 > >> > 01:28:37 2005 (42435B35) Checksum: 0001FB39 > >> > b8c87000 b8cb2000 RDPWD Timestamp: Fri Mar 25 > >> > 01:27:16 2005 (42435AE4) Checksum: 0002FD6D > >> > b8d02000 b8d19700 nvcoaft51 Timestamp: Wed Dec 01 > >> > 11:55:40 2004 (41ADA32C) Checksum: 000257A2 > >> > b8dc2000 b8dcd000 TDTCP Timestamp: Fri Mar 25 > >> > 01:27:15 2005 (42435AE3) Checksum: 000102E8 > >> > b9102000 b912c000 Fastfat Timestamp: Fri Mar 25 > >> > 01:40:20 2005 (42435DF4) Checksum: 0002934F > >> > b9294000 b92f3000 srv Timestamp: Fri Mar 25 > >> > 01:40:19 2005 (42435DF3) Checksum: 0005C6BC > >> > b95cf000 b95d22c0 ndiskio Timestamp: Tue May 13 > >> > 11:38:13 2003 (3EC0BD05) Checksum: 00007C02 > >> > b96b3000 b96c8000 Cdfs Timestamp: Fri Mar 25 > >> > 01:40:55 2005 (42435E17) Checksum: 0001AFD3 > >> > b96c8000 b96d9000 Fips Timestamp: Fri Mar 25 > >> > 01:40:33 2005 (42435E01) Checksum: 00015AC8 > >> > b96d9000 b974f000 mrxsmb Timestamp: Fri Mar 25 > >> > 01:41:13 2005 (42435E29) Checksum: 00074260 > >> > b9777000 b97a7000 rdbss Timestamp: Fri Mar 25 > >> > 01:40:49 2005 (42435E11) Checksum: 0002ED8F > >> > b9847000 b9871000 afd Timestamp: Fri Mar 25 > >> > 01:40:43 2005 (42435E0B) Checksum: 00025408 > >> > b9871000 b98a2000 netbt Timestamp: Fri Mar 25 > >> > 01:40:31 2005 (42435DFF) Checksum: 0002C5B2 > >> > b98a2000 b9903000 tcpip Timestamp: Fri Mar 25 > >> > 01:40:31 2005 (42435DFF) Checksum: 0005606F > >> > b9903000 b991c000 ipsec Timestamp: Fri Mar 25 > >> > 01:40:49 2005 (42435E11) Checksum: 00016439 > >> > b998c000 b99a0000 usbhub Timestamp: Fri Mar 25 > >> > 01:30:46 2005 (42435BB6) Checksum: 00013E34 > >> > b9b08000 b9b48000 update Timestamp: Fri Mar 25 > >> > 01:40:27 2005 (42435DFB) Checksum: 00042AB3 > >> > b9b70000 b9ba7000 rdpdr Timestamp: Fri Mar 25 > >> > 01:30:20 2005 (42435B9C) Checksum: 00037A18 > >> > b9bd2000 b9c28000 wlbs Timestamp: Fri Mar 25 > >> > 01:40:15 2005 (42435DEF) Checksum: 000317A6 > >> > b9c28000 b9c3b000 raspptp Timestamp: Fri Mar 25 > >> > 01:40:43 2005 (42435E0B) Checksum: 00012D1F > >> > b9c3b000 b9c55000 ndiswan Timestamp: Fri Mar 25 > >> > 01:40:46 2005 (42435E0E) Checksum: 00024A0E > >> > b9c55000 b9c6a000 rasl2tp Timestamp: Fri Mar 25 > >> > 01:40:29 2005 (42435DFD) Checksum: 00015B39 > >> > b9c6a000 b9c97700 q57xp32 Timestamp: Thu May 20 > >> > 18:44:36 2004 (40ACE074) Checksum: 0002E3AB > >> > b9c98000 b9cc2000 USBPORT Timestamp: Fri Mar 25 > >> > 01:30:43 2005 (42435BB3) Checksum: 00023E74 > >> > b9cc2000 b9cea000 ks Timestamp: Fri Mar 25 > >> > 01:41:03 2005 (42435E1F) Checksum: 000250E7 > >> > b9cea000 b9cfe000 redbook Timestamp: Fri Mar 25 > >> > 01:28:46 2005 (42435B3E) Checksum: 000165A1 > >> > b9cfe000 b9d13000 cdrom Timestamp: Fri Mar 25 > >> > 01:28:57 2005 (42435B49) Checksum: 0000FC12 > >> > b9d13000 b9d28000 serial Timestamp: Fri Mar 25 > >> > 01:28:29 2005 (42435B2D) Checksum: 0001EEE6 > >> > b9d28000 b9d3b000 i8042prt Timestamp: Fri Mar 25 > >> > 01:41:05 2005 (42435E21) Checksum: 0001C2D6 > >> > b9d3b000 b9d85000 cpqasm2 Timestamp: Tue Oct 14 > >> > 01:38:14 2003 (3F8B3766) Checksum: 00050676 > >> > b9d85000 b9da0000 VIDEOPRT Timestamp: Fri Mar 25 > >> > 01:29:53 2005 (42435B81) Checksum: 0001BC4D > >> > b9da0000 b9df3d80 ati2mpad Timestamp: Fri Jul 19 > >> > 03:13:20 2002 (3D3767B0) Checksum: 0006029D > >> > b9df7000 b9df7e00 nvcfsr Timestamp: Fri Nov 05 > >> > 09:47:02 2004 (418B3E06) Checksum: 00003087 > >> > ba10d000 ba116000 mssmbios Timestamp: Fri Mar 25 > >> > 01:34:14 2005 (42435C86) Checksum: 0000E2D1 > >> > ba11d000 ba12c000 termdd Timestamp: Fri Mar 25 > >> > 01:27:15 2005 (42435AE3) Checksum: 00014808 > >> > ba12d000 ba136000 raspti Timestamp: Fri Mar 25 > >> > 01:34:16 2005 (42435C88) Checksum: 0000D117 > >> > ba13d000 ba148000 ptilink Timestamp: Fri Mar 25 > >> > 01:28:25 2005 (42435B29) Checksum: 0000DEA4 > >> > ba14d000 ba158000 TDI Timestamp: Fri Mar 25 > >> > 01:35:34 2005 (42435CD6) Checksum: 00014D93 > >> > ba15d000 ba16c000 raspppoe Timestamp: Fri Mar 25 > >> > 01:34:16 2005 (42435C88) Checksum: 00015D34 > >> > ba16d000 ba176000 ndistapi Timestamp: Fri Mar 25 > >> > 01:34:11 2005 (42435C83) Checksum: 0000C04E > >> > ba17d000 ba18bf80 CPQCISSE Timestamp: Mon Aug 04 > >> > 21:57:42 2003 (3F2EBAB6) Checksum: 0000FBA6 > >> > ba18d000 ba198000 fdc Timestamp: Fri Mar 25 > >> > 01:28:43 2005 (42435B3B) Checksum: 00009E2F > >> > bf800000 bf9cf000 win32k Timestamp: Fri Mar 25 > >> > 01:40:09 2005 (42435DE9) Checksum: 001C9EE0 > >> > bf9cf000 bf9e5000 dxg Timestamp: Fri Mar 25 > >> > 01:27:25 2005 (42435AED) Checksum: 00017464 > >> > bf9e5000 bfa3b680 ati2drad Timestamp: Fri Mar 25 > >> > 03:30:34 2005 (424377CA) Checksum: 000572D8 > >> > bff60000 bff7e000 RDPDD Timestamp: Fri Mar 25 > >> > 03:30:48 2005 (424377D8) Checksum: 0001FF64 > >> > bffa0000 bffea000 ATMFD Timestamp: Fri Mar 25 > >> > 03:30:36 2005 (424377CC) Checksum: 00047B1F
From: Vera Noest [MVP] on 8 Jun 2005 19:12
I would phone Microsoft Support. If this is a known problem, they will be able to help you. _________________________________________________________ Vera Noest MCSE, CCEA, Microsoft MVP - Terminal Server http://hem.fyristorg.com/vera/IT ___ please respond in newsgroup, NOT by private email ___ "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote on 08 jun 2005 in microsoft.public.windows.terminal_services: > Today one of the two servers went down again. Error looks the > same. /PAE is off, but system still loads ntkrpamp.exe. I guess > because it is a two-processor-system. I expect the second server > to go down any moment now... > > > Kurt > > > "Vera Noest [MVP]" wrote: > >> Enterprise Edition should not need the /PAE switch with 4 GB, >> only when you have more then 4 GB. >> Can you test if this also occurs when you boot without the /PAE >> switch (and thus don't load the ntkrpamp.exe but the standard >> ntoskrnl.exe)? >> >> -- >> Vera Noest >> MCSE, CCEA, Microsoft MVP - Terminal Server >> http://hem.fyristorg.com/vera/IT >> --- please respond in newsgroup, NOT by private email --- >> >> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote >> on 28 maj 2005 in microsoft.public.windows.terminal_services: >> >> > Yes, with PAE >> > 4 GB RAM >> > >> > Kurt >> > >> > >> > "Vera Noest [MVP]" wrote: >> > >> >> So you are booting with the /PAE switch? >> >> How much RAM does this server have? >> >> >> >> -- >> >> Vera Noest >> >> MCSE, CCEA, Microsoft MVP - Terminal Server >> >> http://hem.fyristorg.com/vera/IT >> >> --- please respond in newsgroup, NOT by private email --- >> >> >> >> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> >> >> wrote on 27 maj 2005 in >> >> microsoft.public.windows.terminal_services: >> >> >> >> > After installing SP1 on my 2 Windows 2003 Server >> >> > Enterprise Edition, running terminal services in App Mode, >> >> > they have both stopped and rebooted several times. In 8 >> >> > weeks time there has been 4-5 such incidents per server. >> >> > >> >> > In the system event log: >> >> > >> >> > Event ID: 1001 >> >> > >> >> > The computer has rebooted from a bugcheck. The bugcheck >> >> > was: 0x000000ab (0x00000007, 0x00002e40, 0x00000000, >> >> > 0x00000084). A dump was saved in: C:\WINDOWS\MEMORY.DMP. >> >> > >> >> > Event ID: 1003 >> >> > >> >> > Error code 000000ab, parameter1 00000007, parameter2 >> >> > 00002e40, parameter3 00000000, parameter4 00000084. >> >> > >> >> > From Windbg: >> >> > >> >> > Microsoft (R) Windows Debugger Version 6.1.0017.2 >> >> > Copyright (c) Microsoft Corporation. All rights reserved. >> >> > >> >> > >> >> > Loading Dump File [C:\WINDOWS\MEMORY.DMP] >> >> > Kernel Summary Dump File: Only kernel address space is >> >> > available >> >> > >> >> > Symbol search path is: >> >> > SRV*c:\debug*http://msdl.microsoft.com/download/symbols >> >> > Executable search path is: Windows Server 2003 Kernel >> >> > Version 3790 (Service Pack 1) MP (4 procs) Free x86 >> >> > compatible Product: Server, suite: Enterprise >> >> > TerminalServer Built by: 3790.srv03_sp1_rtm.050324-1447 >> >> > Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8 >> >> > Debug session time: Thu May 26 13:16:13 2005 >> >> > System Uptime: 8 days 3:32:08.381 >> >> > Loading Kernel Symbols >> >> > ........................................................... >> >> > ... ... >> >> > ..................................................... >> >> > Loading unloaded module list .... >> >> > Loading User Symbols >> >> > PEB is paged out (Peb = 7ffde00c). Type ".hh dbgerr001" >> >> > for details >> >> > *********************************************************** >> >> > *** *** ************** * >> >> > >> >> > >> >> > >> >> > * >> >> > * Bugcheck Analysis >> >> > >> >> > >> >> > >> >> > * >> >> > * >> >> > >> >> > >> >> > >> >> > * >> >> > *********************************************************** >> >> > *** *** ************** >> >> > >> >> > Use !analyze -v to get detailed debugging information. >> >> > >> >> > BugCheck AB, {7, 2e40, 0, 84} >> >> > >> >> > Probably caused by : ntkrpamp.exe ( >> >> > nt!MiCheckSessionPoolAllocations+107 ) >> >> > >> >> > Followup: MachineOwner >> >> > --------- >> >> > >> >> > 2: kd> !analyze -v;r;kv;lmtn; >> >> > *********************************************************** >> >> > *** *** ************** * >> >> > >> >> > >> >> > >> >> > * >> >> > * Bugcheck Analysis >> >> > >> >> > >> >> > >> >> > * >> >> > * >> >> > >> >> > >> >> > >> >> > * >> >> > *********************************************************** >> >> > *** *** ************** >> >> > >> >> > SESSION_HAS_VALID_POOL_ON_EXIT (ab) >> >> > Caused by a session driver not freeing its pool >> >> > allocations prior to a session unload. This indicates a >> >> > bug in win32k.sys, atmfd.dll, rdpdd.dll or a video driver. >> >> > Arguments: >> >> > Arg1: 00000007, session ID >> >> > Arg2: 00002e40, number of paged pool bytes that are >> >> > leaking Arg3: 00000000, number of nonpaged pool bytes that >> >> > are leaking Arg4: 00000084, total number of paged and >> >> > nonpaged allocations that are leaking. >> >> > nonpaged allocations are in the upper half of this >> >> > word, paged allocations are in the lower half of this >> >> > word. >> >> > >> >> > Debugging Details: >> >> > ------------------ >> >> > >> >> > >> >> > DEFAULT_BUCKET_ID: DRIVER_FAULT >> >> > >> >> > BUGCHECK_STR: 0xAB >> >> > >> >> > CURRENT_IRQL: 0 >> >> > >> >> > LAST_CONTROL_TRANSFER: from 8092ea6f to 80827451 >> >> > >> >> > STACK_TEXT: >> >> > b72d4c24 8092ea6f 000000ab 00000007 00002e40 >> >> > nt!KeBugCheckEx+0x1b b72d4c68 809ab017 8aa67aa8 8aa67aa8 >> >> > 00000000 nt!MiCheckSessionPoolAllocations+0x107 >> >> > b72d4ce8 8084c1a7 8aa67aa8 00000000 8a172398 >> >> > nt!MiDereferenceSessionFinal+0x183 >> >> > b72d4d04 8094b539 8aa67aa8 8a172398 8a1725d8 >> >> > nt!MmCleanProcessAddressSpace+0x6b >> >> > b72d4d8c 8094b68d 00000000 00000000 8a172398 >> >> > nt!PspExitThread+0x5f1 b72d4da4 80948bc0 8a172398 00000000 >> >> > 00000001 nt!PspTerminateThreadByPointer+0x4b >> >> > b72d4ddc 8088d4d2 bf92b562 8a0abf30 00000000 >> >> > nt!PspSystemThreadStartup+0x3c 00000000 00000000 00000000 >> >> > 00000000 00000000 nt!KiThreadStartup+0x16 >> >> > >> >> > >> >> > FOLLOWUP_IP: >> >> > nt!MiCheckSessionPoolAllocations+107 >> >> > 8092ea6f 5f pop edi >> >> > >> >> > FOLLOWUP_NAME: MachineOwner >> >> > >> >> > SYMBOL_NAME: nt!MiCheckSessionPoolAllocations+107 >> >> > >> >> > MODULE_NAME: nt >> >> > >> >> > IMAGE_NAME: ntkrpamp.exe >> >> > >> >> > DEBUG_FLR_IMAGE_TIMESTAMP: 42435b14 >> >> > >> >> > STACK_COMMAND: kb >> >> > >> >> > BUCKET_ID: 0xAB_nt!MiCheckSessionPoolAllocations+107 >> >> > >> >> > Followup: MachineOwner |