DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80232971358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 30
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80232971358
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
fffff802`36475b08 fffff802`325ef05d : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`32971358 : 0xfffff802`325c2ce0
fffff802`36475b10 00000000`00000133 : 00000000`00000001 00000000`00001e00 fffff802`32971358 00000000`00000000 : 0xfffff802`325ef05d
fffff802`36475b18 00000000`00000001 : 00000000`00001e00 fffff802`32971358 00000000`00000000 00000000`00000000 : 0x133
fffff802`36475b20 00000000`00001e00 : fffff802`32971358 00000000`00000000 00000000`00000000 00000000`00008886 : 0x1
fffff802`36475b28 fffff802`32971358 : 00000000`00000000 00000000`00000000 00000000`00008886 ffff9180`b7c77830 : 0x1e00
fffff802`36475b30 00000000`00000000 : 00000000`00000000 00000000`00008886 ffff9180`b7c77830 fffff780`00000320 : 0xfffff802`32971358
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_0x133
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {13e3c9ef-8526-da41-b41d-06d8277b0319}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000008, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8002b48ce63, address which referenced memory
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 30
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 26
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8002b48ce63
READ_ADDRESS: Unable to get size of nt!_MMPTE - probably bad symbols
0000000000000008
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffb305`fbe29758 fffff800`2b5d4b29 : 00000000`0000000a 00000000`00000008 00000000`00000002 00000000`00000000 : 0xfffff800`2b5c2ce0
ffffb305`fbe29760 00000000`0000000a : 00000000`00000008 00000000`00000002 00000000`00000000 fffff800`2b48ce63 : 0xfffff800`2b5d4b29
ffffb305`fbe29768 00000000`00000008 : 00000000`00000002 00000000`00000000 fffff800`2b48ce63 00000000`00000000 : 0xa
ffffb305`fbe29770 00000000`00000002 : 00000000`00000000 fffff800`2b48ce63 00000000`00000000 00000000`00000000 : 0x8
ffffb305`fbe29778 00000000`00000000 : fffff800`2b48ce63 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80621691102, The address that the exception occurred at
Arg3: ffff818e00f71dd8, Exception Record Address
Arg4: ffff818e00f71620, Context Record Address
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 46
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 36
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80621691102
BUGCHECK_P3: ffff818e00f71dd8
BUGCHECK_P4: ffff818e00f71620
EXCEPTION_RECORD: ffff818e00f71dd8 -- (.exr 0xffff818e00f71dd8)
ExceptionAddress: fffff80621691102
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000010
Attempt to read from address 0000000000000010
CONTEXT: ffff818e00f71620 -- (.cxr 0xffff818e00f71620)
rax=0000000000000000 rbx=ffffc1049cdd4110 rcx=ffffc1049cdd4110
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffc1049cdd4110
rip=fffff80621691102 rsp=ffff818e00f72018 rbp=0000000020020004
r8=0000000020020004 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000001 r13=ffffc1049ea54000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
fffff806`21691102 ?? ???
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffff818e`00f70db8 fffff806`1ffdc65c : 00000000`0000007e ffffffff`c0000005 fffff806`21691102 ffff818e`00f71dd8 : 0xfffff806`1ffc2ce0
ffff818e`00f70dc0 00000000`0000007e : ffffffff`c0000005 fffff806`21691102 ffff818e`00f71dd8 ffff818e`00f71620 : 0xfffff806`1ffdc65c
ffff818e`00f70dc8 ffffffff`c0000005 : fffff806`21691102 ffff818e`00f71dd8 ffff818e`00f71620 fffff806`2176d6ab : 0x7e
ffff818e`00f70dd0 fffff806`21691102 : ffff818e`00f71dd8 ffff818e`00f71620 fffff806`2176d6ab 00000000`00131a85 : 0xffffffff`c0000005
ffff818e`00f70dd8 ffff818e`00f71dd8 : ffff818e`00f71620 fffff806`2176d6ab 00000000`00131a85 fffff806`1ff9da7c : 0xfffff806`21691102
ffff818e`00f70de0 ffff818e`00f71620 : fffff806`2176d6ab 00000000`00131a85 fffff806`1ff9da7c ffff818e`00000003 : 0xffff818e`00f71dd8
ffff818e`00f70de8 fffff806`2176d6ab : 00000000`00131a85 fffff806`1ff9da7c ffff818e`00000003 ffff818e`00f72c10 : 0xffff818e`00f71620
ffff818e`00f70df0 00000000`00131a85 : fffff806`1ff9da7c ffff818e`00000003 ffff818e`00f72c10 ffff818e`00f6d000 : 0xfffff806`2176d6ab
ffff818e`00f70df8 fffff806`1ff9da7c : ffff818e`00000003 ffff818e`00f72c10 ffff818e`00f6d000 ffff818e`00f73000 : 0x131a85
ffff818e`00f70e00 ffff818e`00000003 : ffff818e`00f72c10 ffff818e`00f6d000 ffff818e`00f73000 ffff818e`00f70ee0 : 0xfffff806`1ff9da7c
ffff818e`00f70e08 ffff818e`00f72c10 : ffff818e`00f6d000 ffff818e`00f73000 ffff818e`00f70ee0 fffff806`27e9beed : 0xffff818e`00000003
ffff818e`00f70e10 ffff818e`00f6d000 : ffff818e`00f73000 ffff818e`00f70ee0 fffff806`27e9beed ffff818e`00f71dd8 : 0xffff818e`00f72c10
ffff818e`00f70e18 ffff818e`00f73000 : ffff818e`00f70ee0 fffff806`27e9beed ffff818e`00f71dd8 ffff818e`00f71620 : 0xffff818e`00f6d000
ffff818e`00f70e20 ffff818e`00f70ee0 : fffff806`27e9beed ffff818e`00f71dd8 ffff818e`00f71620 fffff806`2031d2bc : 0xffff818e`00f73000
ffff818e`00f70e28 fffff806`27e9beed : ffff818e`00f71dd8 ffff818e`00f71620 fffff806`2031d2bc ffff818e`00f72c00 : 0xffff818e`00f70ee0
ffff818e`00f70e30 ffff818e`00f71dd8 : ffff818e`00f71620 fffff806`2031d2bc ffff818e`00f72c00 ffff818e`00f70ee0 : 0xfffff806`27e9beed
ffff818e`00f70e38 ffff818e`00f71620 : fffff806`2031d2bc ffff818e`00f72c00 ffff818e`00f70ee0 fffff806`1ff31a85 : 0xffff818e`00f71dd8
ffff818e`00f70e40 fffff806`2031d2bc : ffff818e`00f72c00 ffff818e`00f70ee0 fffff806`1ff31a85 00000000`00000000 : 0xffff818e`00f71620
ffff818e`00f70e48 ffff818e`00f72c00 : ffff818e`00f70ee0 fffff806`1ff31a85 00000000`00000000 fffff806`1ffcbad2 : 0xfffff806`2031d2bc
ffff818e`00f70e50 ffff818e`00f70ee0 : fffff806`1ff31a85 00000000`00000000 fffff806`1ffcbad2 ffff818e`00f72c10 : 0xffff818e`00f72c00
ffff818e`00f70e58 fffff806`1ff31a85 : 00000000`00000000 fffff806`1ffcbad2 ffff818e`00f72c10 ffff818e`00f713e0 : 0xffff818e`00f70ee0
ffff818e`00f70e60 00000000`00000000 : fffff806`1ffcbad2 ffff818e`00f72c10 ffff818e`00f713e0 00000000`00000000 : 0xfffff806`1ff31a85
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: CORRUPT_MODULELIST_AV
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {fc259191-ef0c-6215-476f-d32e5dcaf1b7}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffff968d70642010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8060dc9c4f4, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 30
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 32
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffff968d70642010
BUGCHECK_P2: fffff8060dc9c4f4
BUGCHECK_P3: ffffffffc000009a
BUGCHECK_P4: 4
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffff8200`0d7698a8 00007ff9`1b6a18c0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff806`0efc2ce0
ffff8200`0d7698b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`1b6a18c0
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: BAD_STACK_0x116
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {08ad1cd5-cfef-0d1a-76f3-ef654e4f75c2}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffde05ffbd9050, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80176f7c4f4, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 31
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 31
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffde05ffbd9050
BUGCHECK_P2: fffff80176f7c4f4
BUGCHECK_P3: ffffffffc000009a
BUGCHECK_P4: 4
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffc702`cef2d8a8 fffff801`7d66ec3a : 00000000`00000116 ffffde05`ffbd9050 fffff801`76f7c4f4 ffffffff`c000009a : 0xfffff801`78fc2ce0
ffffc702`cef2d8b0 00000000`00000116 : ffffde05`ffbd9050 fffff801`76f7c4f4 ffffffff`c000009a 00000000`00000004 : 0xfffff801`7d66ec3a
ffffc702`cef2d8b8 ffffde05`ffbd9050 : fffff801`76f7c4f4 ffffffff`c000009a 00000000`00000004 00000000`00000004 : 0x116
ffffc702`cef2d8c0 fffff801`76f7c4f4 : ffffffff`c000009a 00000000`00000004 00000000`00000004 ffffde05`ffbd9050 : 0xffffde05`ffbd9050
ffffc702`cef2d8c8 ffffffff`c000009a : 00000000`00000004 00000000`00000004 ffffde05`ffbd9050 fffff801`7d625ff4 : 0xfffff801`76f7c4f4
ffffc702`cef2d8d0 00000000`00000004 : 00000000`00000004 ffffde05`ffbd9050 fffff801`7d625ff4 fffff801`76f7c4f4 : 0xffffffff`c000009a
ffffc702`cef2d8d8 00000000`00000004 : ffffde05`ffbd9050 fffff801`7d625ff4 fffff801`76f7c4f4 ffffde06`01af07c0 : 0x4
ffffc702`cef2d8e0 ffffde05`ffbd9050 : fffff801`7d625ff4 fffff801`76f7c4f4 ffffde06`01af07c0 00000000`01000000 : 0x4
ffffc702`cef2d8e8 fffff801`7d625ff4 : fffff801`76f7c4f4 ffffde06`01af07c0 00000000`01000000 ffffde06`01af0858 : 0xffffde05`ffbd9050
ffffc702`cef2d8f0 fffff801`76f7c4f4 : ffffde06`01af07c0 00000000`01000000 ffffde06`01af0858 00000000`00002000 : 0xfffff801`7d625ff4
ffffc702`cef2d8f8 ffffde06`01af07c0 : 00000000`01000000 ffffde06`01af0858 00000000`00002000 fffff801`7d61ee4d : 0xfffff801`76f7c4f4
ffffc702`cef2d900 00000000`01000000 : ffffde06`01af0858 00000000`00002000 fffff801`7d61ee4d ffffde06`00ee8000 : 0xffffde06`01af07c0
ffffc702`cef2d908 ffffde06`01af0858 : 00000000`00002000 fffff801`7d61ee4d ffffde06`00ee8000 ffffde06`00ee89e0 : 0x1000000
ffffc702`cef2d910 00000000`00002000 : fffff801`7d61ee4d ffffde06`00ee8000 ffffde06`00ee89e0 00000000`00000001 : 0xffffde06`01af0858
ffffc702`cef2d918 fffff801`7d61ee4d : ffffde06`00ee8000 ffffde06`00ee89e0 00000000`00000001 00000000`00000001 : 0x2000
ffffc702`cef2d920 ffffde06`00ee8000 : ffffde06`00ee89e0 00000000`00000001 00000000`00000001 fffff801`778e0000 : 0xfffff801`7d61ee4d
ffffc702`cef2d928 ffffde06`00ee89e0 : 00000000`00000001 00000000`00000001 fffff801`778e0000 00000000`00000000 : 0xffffde06`00ee8000
ffffc702`cef2d930 00000000`00000001 : 00000000`00000001 fffff801`778e0000 00000000`00000000 00004000`00000010 : 0xffffde06`00ee89e0
ffffc702`cef2d938 00000000`00000001 : fffff801`778e0000 00000000`00000000 00004000`00000010 00000000`00000000 : 0x1
ffffc702`cef2d940 fffff801`778e0000 : 00000000`00000000 00004000`00000010 00000000`00000000 00000000`00000000 : 0x1
ffffc702`cef2d948 00000000`00000000 : 00004000`00000010 00000000`00000000 00000000`00000000 ffffde06`00eea000 : 0xfffff801`778e0000
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_ANALYSIS_INCONCLUSIVE!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d0ecd047-d84e-1626-7611-d54cbc1cd165}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffc186cc023050, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff800657741ac, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 31
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 25
Key : Analysis.Memory.CommitPeak.Mb
Value: 44
Key : Analysis.System
Value: CreateObject
Key : WER.CorruptModuleList
Value: 1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: ffffc186cc023050
BUGCHECK_P2: fffff800657741ac
BUGCHECK_P3: ffffffffc000009a
BUGCHECK_P4: 4
CUSTOMER_CRASH_COUNT: 1
STACK_TEXT:
ffffe986`7a8008a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff800`599c2990
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: ZEROED_STACK_0x116
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3154f8e6-c4fa-03b5-6330-e2df673f8bf4}
Followup: MachineOwner
---------