Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042911-18688-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0220c000 PsLoadedModuleList = 0xfffff800`02449e50
Debug session time: Fri Apr 29 19:11:58.102 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:34.602
Loading Kernel Symbols
...............................................................
.......................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8000228d4ec, fffff8800b834660, 0}
Probably caused by : ntkrnlmp.exe ( nt!KiSystemServiceHandler+7c )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8000228d4ec, Address of the instruction which caused the bugcheck
Arg3: fffff8800b834660, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!IoGetRelatedDeviceObject+c
fffff800`0228d4ec 488b4008 mov rax,qword ptr [rax+8]
CONTEXT: fffff8800b834660 -- (.cxr 0xfffff8800b834660)
rax=ffffffffffffffff rbx=0000000000000000 rcx=fffffa80063e0520
rdx=fffffa80063e0520 rsi=fffffa8007463c01 rdi=0000000008000000
rip=fffff8000228d4ec rsp=fffff8800b835048 rbp=fffff8800b835088
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000001
r14=fffffa80063e0520 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!IoGetRelatedDeviceObject+0xc:
fffff800`0228d4ec 488b4008 mov rax,qword ptr [rax+8] ds:002b:00000000`00000007=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8000228d4ec
STACK_TEXT:
fffff880`0b833d98 fffff800`0227d469 : 00000000`0000003b 00000000`c0000005 fffff800`0228d4ec fffff880`0b834660 : nt!KeBugCheckEx
fffff880`0b833da0 fffff800`0227cdbc : fffff880`0b834e08 fffff880`0b834660 00000000`00000000 fffff800`022ac450 : nt!KiBugCheckDispatch+0x69
fffff880`0b833ee0 fffff800`022a3bed : fffff800`0249ecb8 00000000`00000000 fffff800`0220c000 fffff880`0b834e08 : nt!KiSystemServiceHandler+0x7c
fffff880`0b833f20 fffff800`022ab250 : fffff800`023cc1e8 fffff880`0b833f98 fffff880`0b834e08 fffff800`0220c000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0b833f50 fffff800`022b81b5 : fffff880`0b834e08 fffff880`0b834660 fffff880`00000000 00000000`08000000 : nt!RtlDispatchException+0x410
fffff880`0b834630 fffff800`0227d542 : fffff880`0b834e08 00000000`00000000 fffff880`0b834eb0 fffffa80`07463c01 : nt!KiDispatchException+0x135
fffff880`0b834cd0 fffff800`0227c0ba : 00000000`00000000 00000000`00000000 fffffa80`0730b200 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0b834eb0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiSystemServiceHandler+7c
fffff800`0227cdbc b801000000 mov eax,1
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiSystemServiceHandler+7c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
BUCKET_ID: X64_0x3B_nt!KiSystemServiceHandler+7c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\043011-23228-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`03062000 PsLoadedModuleList = 0xfffff800`0329fe50
Debug session time: Sat Apr 30 12:19:25.698 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:47.010
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa8007bed450, fffff8a007dc0c90, fffffa8007bed450}
Probably caused by : Pool_Corruption ( nt!ExFreePool+780 )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa8007bed450, the pool entry being checked.
Arg3: fffff8a007dc0c90, the read back flink freelist value (should be the same as 2).
Arg4: fffffa8007bed450, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80003205130 to fffff800030d3f00
STACK_TEXT:
fffff880`0314c938 fffff800`03205130 : 00000000`00000019 00000000`00000003 fffffa80`07bed450 fffff8a0`07dc0c90 : nt!KeBugCheckEx
fffff880`0314c940 fffff800`032074c1 : fffffa80`05201600 fffffa80`07e78000 00000000`00000000 fffff800`033e74b7 : nt!ExFreePool+0x780
fffff880`0314c9d0 fffff800`030d90bc : fffffa80`061359b0 00000000`00000000 fffffa80`656c6946 fffffa80`05201600 : nt!ExFreePoolWithTag+0x411
fffff880`0314ca80 fffff800`030c3c91 : fffffa80`07e78070 00000000`00000002 00000000`00000000 00000000`00000000 : nt!ObfDereferenceObject+0xdc
fffff880`0314cae0 fffff800`030c755c : 00000000`00000000 00000000`00000000 fffffa80`07e781c0 fffff800`00000000 : nt!CcDeleteSharedCacheMap+0x2fd
fffff880`0314cb50 fffff800`030c7d60 : fffff880`02f64700 fffff880`0314cc58 00000000`00000000 fffff800`00000000 : nt!CcWriteBehind+0x5bc
fffff880`0314cc00 fffff800`030e1161 : fffffa80`0520a550 fffff800`030c7b98 fffff800`032d9140 00000000`00000002 : nt!CcWorkerThread+0x1c8
fffff880`0314ccb0 fffff800`03377166 : 00000000`00000000 fffffa80`0521c680 00000000`00000080 fffffa80`051ee040 : nt!ExpWorkerThread+0x111
fffff880`0314cd40 fffff800`030b2486 : fffff880`03088180 fffffa80`0521c680 fffff880`03093040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0314cd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExFreePool+780
fffff800`03205130 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExFreePool+780
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExFreePool+780
BUCKET_ID: X64_0x19_3_nt!ExFreePool+780
Followup: Pool_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042911-25006-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`03050000 PsLoadedModuleList = 0xfffff800`0328de50
Debug session time: Fri Apr 29 19:10:28.466 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:22.762
Loading Kernel Symbols
...............................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {0, 2, 1, fffff800031094a2}
Probably caused by : ntkrnlmp.exe ( nt!KeWaitForGate+de )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800031094a2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800032f80e0
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeWaitForGate+de
fffff800`031094a2 4c8928 mov qword ptr [rax],r13
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff8800317d210 -- (.trap 0xfffff8800317d210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8005a0bcb0
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800031094a2 rsp=fffff8800317d3a0 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=fffffa8005e0bb80
r11=00000000137a1deb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForGate+0xde:
fffff800`031094a2 4c8928 mov qword ptr [rax],r13 ds:0002:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030c1469 to fffff800030c1f00
STACK_TEXT:
fffff880`0317d0c8 fffff800`030c1469 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0317d0d0 fffff800`030c00e0 : fffff8a0`0108b590 fffffa80`05227040 fffff8a0`0108b590 fffffa80`07bc9b10 : nt!KiBugCheckDispatch+0x69
fffff880`0317d210 fffff800`031094a2 : 00000000`00000001 fffff880`0317d408 00000000`0317d400 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0317d3a0 fffff800`030972dd : fffffa80`05a0bc90 fffff880`00000023 fffff800`032655a0 00000000`0305a401 : nt!KeWaitForGate+0xde
fffff880`0317d3f0 fffff800`030d75c0 : fffff800`0324f880 fffff800`031f46eb fffff880`0317d750 fffff880`01237a27 : nt!KiAcquireGuardedMutex+0x45
fffff880`0317d420 fffff800`030b6dbb : fffffa80`05e0bdc0 fffff800`032655a0 fffff800`00001000 00000000`00000000 : nt!CcUnpinFileDataEx+0x520
fffff880`0317d4a0 fffff880`012c500e : fffff8a0`00220a20 fffff880`012379a4 fffff880`0317dab0 fffff880`0317d658 : nt!CcGetDirtyPages+0x337
fffff880`0317d590 fffff880`012c76fb : fffff880`0317dab0 fffffa80`06001180 fffff880`0317da00 fffff880`01249100 : Ntfs!NtfsCheckpointVolume+0x35e
fffff880`0317d990 fffff880`012c78c7 : fffff880`0317dab0 fffffa80`06001180 fffffa80`06001188 fffff880`01239c42 : Ntfs!NtfsCheckpointAllVolumesWorker+0x4b
fffff880`0317d9e0 fffff880`012c6948 : fffff880`0317dab0 00000000`00000000 fffff880`012c76b0 fffff880`0317dcb8 : Ntfs!NtfsForEachVcb+0x167
fffff880`0317da80 fffff800`030cf161 : fffff800`0337c300 fffff800`0337c300 fffffa80`05227040 fffff800`00000005 : Ntfs!NtfsCheckpointAllVolumes+0xb8
fffff880`0317dcb0 fffff800`03365166 : 00000000`00000000 fffffa80`05227040 00000000`00000080 fffffa80`05211040 : nt!ExpWorkerThread+0x111
fffff880`0317dd40 fffff800`030a0486 : fffff880`030a4180 fffffa80`05227040 fffff880`030af040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`0317dd80 00000000`00000000 : fffff880`0317e000 fffff880`03178000 fffff880`0317d9f0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KeWaitForGate+de
fffff800`031094a2 4c8928 mov qword ptr [rax],r13
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KeWaitForGate+de
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0xA_nt!KeWaitForGate+de
BUCKET_ID: X64_0xA_nt!KeWaitForGate+de
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042911-27034-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0301a000 PsLoadedModuleList = 0xfffff800`03257e50
Debug session time: Fri Apr 29 19:16:43.571 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:15.882
Loading Kernel Symbols
...............................................................
................................................................
......
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {cd5c4, 2, 0, fffff800032cd6f5}
Probably caused by : cng.sys ( cng!HashFirstUserModeCallerBlobs+a5 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 00000000000cd5c4, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032cd6f5, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032c20e0
00000000000cd5c4
CURRENT_IRQL: 2
FAULTING_IP:
nt!ExQuerySystemLockInformation+175
fffff800`032cd6f5 488b80b8030000 mov rax,qword ptr [rax+3B8h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff8800a263ae0 -- (.trap 0xfffff8800a263ae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000cd20c rbx=0000000000000000 rcx=fffffa8007060c00
rdx=fffff8800c440000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032cd6f5 rsp=fffff8800a263c70 rbp=0000000000000000
r8=0000000000020000 r9=fffff8000322f770 r10=0000000000000002
r11=0000fffffffff000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExQuerySystemLockInformation+0x175:
fffff800`032cd6f5 488b80b8030000 mov rax,qword ptr [rax+3B8h] ds:0be0:00000000`000cd5c4=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000308b469 to fffff8000308bf00
STACK_TEXT:
fffff880`0a263998 fffff800`0308b469 : 00000000`0000000a 00000000`000cd5c4 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`0a2639a0 fffff800`0308a0e0 : 00000000`00007658 00000000`00009728 fffff880`0c447628 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0a263ae0 fffff800`032cd6f5 : 00000000`00000008 fffff880`0a264180 00000000`00000000 fffff800`032fe4c9 : nt!KiPageFault+0x260
fffff880`0a263c70 fffff800`034eb445 : fffff880`0c440000 fffff800`00020000 00000000`00000000 fffff880`0a263d60 : nt!ExQuerySystemLockInformation+0x175
fffff880`0a263ce0 fffff800`033ee58f : 00000000`00000000 00000000`00000000 fffff880`0c440000 fffffa80`075b3d90 : nt!ExpGetLockInformation+0x55
fffff880`0a263d20 fffff800`03387e49 : fffff8a0`00f4e000 fffffa80`6365734b fffff880`011bf2a8 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x5821f
fffff880`0a2640c0 fffff800`0308b153 : 00000000`00013268 fffff880`02fe2000 00000000`00000001 00000000`00000000 : nt!NtQuerySystemInformation+0x4d
fffff880`0a264100 fffff800`030876f0 : fffff880`011b3525 00000000`00000000 00000000`00000000 00000000`00020000 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0a264298 fffff880`011b3525 : 00000000`00000000 00000000`00000000 00000000`00020000 00000000`00000001 : nt!KiServiceLinkage
fffff880`0a2642a0 fffff880`011b23cb : fffff8a0`00f2e048 00000000`00000001 fffff880`0a2643e0 fffff880`00000001 : cng!HashFirstUserModeCallerBlobs+0xa5
fffff880`0a264360 fffff880`01190d59 : fffff880`0a264a18 fffff800`0338bed0 00000000`00000000 fffffa80`061f1a50 : cng!dblint_sqrt+0x1eb
fffff880`0a264720 fffff880`0117cde0 : fffff880`0a264a18 00000000`00000400 fffff800`03218a80 00000000`00000000 : cng!UninitializeLoader+0xa9
fffff880`0a2647b0 fffff880`0116fe45 : 00000000`00000040 fffff880`0a264a18 00000000`00000000 fffff800`03381469 : cng! ?? ::FNODOBFM::`string'+0x20d9
fffff880`0a264880 fffff880`013d030b : 00000000`20206f49 fffff880`0a264a18 fffff880`0a264ca0 00000000`00000000 : cng!CngDeviceControl+0x65
fffff880`0a264980 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ksecdd!KsecDeviceControl+0x5b
STACK_COMMAND: kb
FOLLOWUP_IP:
cng!HashFirstUserModeCallerBlobs+a5
fffff880`011b3525 85c0 test eax,eax
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: cng!HashFirstUserModeCallerBlobs+a5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: cng
IMAGE_NAME: cng.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc814
FAILURE_BUCKET_ID: X64_0xA_cng!HashFirstUserModeCallerBlobs+a5
BUCKET_ID: X64_0xA_cng!HashFirstUserModeCallerBlobs+a5
Followup: MachineOwner
---------