From: Kurt on
Today one of the two servers went down again. Error looks the same. /PAE is
off, but system still loads ntkrpamp.exe. I guess because it is a
two-processor-system. I expect the second server to go down any moment now...


Kurt


"Vera Noest [MVP]" wrote:

> Enterprise Edition should not need the /PAE switch with 4 GB, only
> when you have more then 4 GB.
> Can you test if this also occurs when you boot without the /PAE
> switch (and thus don't load the ntkrpamp.exe but the standard
> ntoskrnl.exe)?
>
> --
> Vera Noest
> MCSE, CCEA, Microsoft MVP - Terminal Server
> http://hem.fyristorg.com/vera/IT
> --- please respond in newsgroup, NOT by private email ---
>
> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote on
> 28 maj 2005 in microsoft.public.windows.terminal_services:
>
> > Yes, with PAE
> > 4 GB RAM
> >
> > Kurt
> >
> >
> > "Vera Noest [MVP]" wrote:
> >
> >> So you are booting with the /PAE switch?
> >> How much RAM does this server have?
> >>
> >> --
> >> Vera Noest
> >> MCSE, CCEA, Microsoft MVP - Terminal Server
> >> http://hem.fyristorg.com/vera/IT
> >> --- please respond in newsgroup, NOT by private email ---
> >>
> >> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote
> >> on 27 maj 2005 in microsoft.public.windows.terminal_services:
> >>
> >> > After installing SP1 on my 2 Windows 2003 Server Enterprise
> >> > Edition, running terminal services in App Mode, they have
> >> > both stopped and rebooted several times. In 8 weeks time
> >> > there has been 4-5 such incidents per server.
> >> >
> >> > In the system event log:
> >> >
> >> > Event ID: 1001
> >> >
> >> > The computer has rebooted from a bugcheck. The bugcheck was:
> >> > 0x000000ab (0x00000007, 0x00002e40, 0x00000000, 0x00000084).
> >> > A dump was saved in: C:\WINDOWS\MEMORY.DMP.
> >> >
> >> > Event ID: 1003
> >> >
> >> > Error code 000000ab, parameter1 00000007, parameter2
> >> > 00002e40, parameter3 00000000, parameter4 00000084.
> >> >
> >> > From Windbg:
> >> >
> >> > Microsoft (R) Windows Debugger Version 6.1.0017.2
> >> > Copyright (c) Microsoft Corporation. All rights reserved.
> >> >
> >> >
> >> > Loading Dump File [C:\WINDOWS\MEMORY.DMP]
> >> > Kernel Summary Dump File: Only kernel address space is
> >> > available
> >> >
> >> > Symbol search path is:
> >> > SRV*c:\debug*http://msdl.microsoft.com/download/symbols
> >> > Executable search path is: Windows Server 2003 Kernel Version
> >> > 3790 (Service Pack 1) MP (4 procs) Free x86 compatible
> >> > Product: Server, suite: Enterprise TerminalServer
> >> > Built by: 3790.srv03_sp1_rtm.050324-1447
> >> > Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
> >> > Debug session time: Thu May 26 13:16:13 2005
> >> > System Uptime: 8 days 3:32:08.381
> >> > Loading Kernel Symbols
> >> > ..............................................................
> >> > ... .....................................................
> >> > Loading unloaded module list ....
> >> > Loading User Symbols
> >> > PEB is paged out (Peb = 7ffde00c). Type ".hh dbgerr001" for
> >> > details
> >> > **************************************************************
> >> > *** ************** *
> >> >
> >> >
> >> > *
> >> > * Bugcheck Analysis
> >> >
> >> >
> >> > *
> >> > *
> >> >
> >> >
> >> > *
> >> > **************************************************************
> >> > *** **************
> >> >
> >> > Use !analyze -v to get detailed debugging information.
> >> >
> >> > BugCheck AB, {7, 2e40, 0, 84}
> >> >
> >> > Probably caused by : ntkrpamp.exe (
> >> > nt!MiCheckSessionPoolAllocations+107 )
> >> >
> >> > Followup: MachineOwner
> >> > ---------
> >> >
> >> > 2: kd> !analyze -v;r;kv;lmtn;
> >> > **************************************************************
> >> > *** ************** *
> >> >
> >> >
> >> > *
> >> > * Bugcheck Analysis
> >> >
> >> >
> >> > *
> >> > *
> >> >
> >> >
> >> > *
> >> > **************************************************************
> >> > *** **************
> >> >
> >> > SESSION_HAS_VALID_POOL_ON_EXIT (ab)
> >> > Caused by a session driver not freeing its pool allocations
> >> > prior to a session unload. This indicates a bug in
> >> > win32k.sys, atmfd.dll, rdpdd.dll or a video driver.
> >> > Arguments:
> >> > Arg1: 00000007, session ID
> >> > Arg2: 00002e40, number of paged pool bytes that are leaking
> >> > Arg3: 00000000, number of nonpaged pool bytes that are
> >> > leaking Arg4: 00000084, total number of paged and nonpaged
> >> > allocations that are leaking.
> >> > nonpaged allocations are in the upper half of this word,
> >> > paged allocations are in the lower half of this word.
> >> >
> >> > Debugging Details:
> >> > ------------------
> >> >
> >> >
> >> > DEFAULT_BUCKET_ID: DRIVER_FAULT
> >> >
> >> > BUGCHECK_STR: 0xAB
> >> >
> >> > CURRENT_IRQL: 0
> >> >
> >> > LAST_CONTROL_TRANSFER: from 8092ea6f to 80827451
> >> >
> >> > STACK_TEXT:
> >> > b72d4c24 8092ea6f 000000ab 00000007 00002e40
> >> > nt!KeBugCheckEx+0x1b b72d4c68 809ab017 8aa67aa8 8aa67aa8
> >> > 00000000 nt!MiCheckSessionPoolAllocations+0x107
> >> > b72d4ce8 8084c1a7 8aa67aa8 00000000 8a172398
> >> > nt!MiDereferenceSessionFinal+0x183
> >> > b72d4d04 8094b539 8aa67aa8 8a172398 8a1725d8
> >> > nt!MmCleanProcessAddressSpace+0x6b
> >> > b72d4d8c 8094b68d 00000000 00000000 8a172398
> >> > nt!PspExitThread+0x5f1 b72d4da4 80948bc0 8a172398 00000000
> >> > 00000001 nt!PspTerminateThreadByPointer+0x4b
> >> > b72d4ddc 8088d4d2 bf92b562 8a0abf30 00000000
> >> > nt!PspSystemThreadStartup+0x3c 00000000 00000000 00000000
> >> > 00000000 00000000 nt!KiThreadStartup+0x16
> >> >
> >> >
> >> > FOLLOWUP_IP:
> >> > nt!MiCheckSessionPoolAllocations+107
> >> > 8092ea6f 5f pop edi
> >> >
> >> > FOLLOWUP_NAME: MachineOwner
> >> >
> >> > SYMBOL_NAME: nt!MiCheckSessionPoolAllocations+107
> >> >
> >> > MODULE_NAME: nt
> >> >
> >> > IMAGE_NAME: ntkrpamp.exe
> >> >
> >> > DEBUG_FLR_IMAGE_TIMESTAMP: 42435b14
> >> >
> >> > STACK_COMMAND: kb
> >> >
> >> > BUCKET_ID: 0xAB_nt!MiCheckSessionPoolAllocations+107
> >> >
> >> > Followup: MachineOwner
> >> > ---------
> >> >
> >> > eax=f772f13c ebx=00002e40 ecx=00000000 edx=c0602f80
> >> > esi=f772f120 edi=c0602f78 eip=80827451 esp=b72d4c0c
> >> > ebp=b72d4c24 iopl=0
> >> > nv up ei ng nz na po nc cs=0008 ss=0010 ds=0023 es=0023
> >> > fs=0030 gs=0000 efl=00000286 nt!KeBugCheckEx+1b:
> >> > 80827451 5d pop ebp
> >> > ChildEBP RetAddr Args to Child
> >> > b72d4c24 8092ea6f 000000ab 00000007 00002e40
> >> > nt!KeBugCheckEx+0x1b b72d4c68 809ab017 8aa67aa8 8aa67aa8
> >> > 00000000 nt!MiCheckSessionPoolAllocations+0x107
> >> > b72d4ce8 8084c1a7 8aa67aa8 00000000 8a172398
> >> > nt!MiDereferenceSessionFinal+0x183
> >> > b72d4d04 8094b539 8aa67aa8 8a172398 8a1725d8
> >> > nt!MmCleanProcessAddressSpace+0x6b
> >> > b72d4d8c 8094b68d 00000000 00000000 8a172398
> >> > nt!PspExitThread+0x5f1 b72d4da4 80948bc0 8a172398 00000000
> >> > 00000001 nt!PspTerminateThreadByPointer+0x4b
> >> > b72d4ddc 8088d4d2 bf92b562 8a0abf30 00000000
> >> > nt!PspSystemThreadStartup+0x3c 00000000 00000000 00000000
> >> > 00000000 00000000 nt!KiThreadStartup+0x16 start end
> >> > module name 80800000 80a53000 nt Timestamp: Fri
> >> > Mar 25 01:28:04 2005 (42435B14) Checksum: 0023D043
> >> > 80a53000 80a7f000 hal Timestamp: Fri Mar 25
> >> > 01:28:37 2005 (42435B35) Checksum: 0001FB39
> >> > b8c87000 b8cb2000 RDPWD Timestamp: Fri Mar 25
> >> > 01:27:16 2005 (42435AE4) Checksum: 0002FD6D
> >> > b8d02000 b8d19700 nvcoaft51 Timestamp: Wed Dec 01
> >> > 11:55:40 2004 (41ADA32C) Checksum: 000257A2
> >> > b8dc2000 b8dcd000 TDTCP Timestamp: Fri Mar 25
> >> > 01:27:15 2005 (42435AE3) Checksum: 000102E8
> >> > b9102000 b912c000 Fastfat Timestamp: Fri Mar 25
> >> > 01:40:20 2005 (42435DF4) Checksum: 0002934F
> >> > b9294000 b92f3000 srv Timestamp: Fri Mar 25
> >> > 01:40:19 2005 (42435DF3) Checksum: 0005C6BC
> >> > b95cf000 b95d22c0 ndiskio Timestamp: Tue May 13
> >> > 11:38:13 2003 (3EC0BD05) Checksum: 00007C02
> >> > b96b3000 b96c8000 Cdfs Timestamp: Fri Mar 25
> >> > 01:40:55 2005 (42435E17) Checksum: 0001AFD3
> >> > b96c8000 b96d9000 Fips Timestamp: Fri Mar 25
> >> > 01:40:33 2005 (42435E01) Checksum: 00015AC8
> >> > b96d9000 b974f000 mrxsmb Timestamp: Fri Mar 25
> >> > 01:41:13 2005 (42435E29) Checksum: 00074260
> >> > b9777000 b97a7000 rdbss Timestamp: Fri Mar 25
> >> > 01:40:49 2005 (42435E11) Checksum: 0002ED8F
> >> > b9847000 b9871000 afd Timestamp: Fri Mar 25
> >> > 01:40:43 2005 (42435E0B) Checksum: 00025408
> >> > b9871000 b98a2000 netbt Timestamp: Fri Mar 25
> >> > 01:40:31 2005 (42435DFF) Checksum: 0002C5B2
> >> > b98a2000 b9903000 tcpip Timestamp: Fri Mar 25
> >> > 01:40:31 2005 (42435DFF) Checksum: 0005606F
> >> > b9903000 b991c000 ipsec Timestamp: Fri Mar 25
> >> > 01:40:49 2005 (42435E11) Checksum: 00016439
> >> > b998c000 b99a0000 usbhub Timestamp: Fri Mar 25
> >> > 01:30:46 2005 (42435BB6) Checksum: 00013E34
> >> > b9b08000 b9b48000 update Timestamp: Fri Mar 25
> >> > 01:40:27 2005 (42435DFB) Checksum: 00042AB3
> >> > b9b70000 b9ba7000 rdpdr Timestamp: Fri Mar 25
> >> > 01:30:20 2005 (42435B9C) Checksum: 00037A18
> >> > b9bd2000 b9c28000 wlbs Timestamp: Fri Mar 25
> >> > 01:40:15 2005 (42435DEF) Checksum: 000317A6
> >> > b9c28000 b9c3b000 raspptp Timestamp: Fri Mar 25
> >> > 01:40:43 2005 (42435E0B) Checksum: 00012D1F
> >> > b9c3b000 b9c55000 ndiswan Timestamp: Fri Mar 25
> >> > 01:40:46 2005 (42435E0E) Checksum: 00024A0E
> >> > b9c55000 b9c6a000 rasl2tp Timestamp: Fri Mar 25
> >> > 01:40:29 2005 (42435DFD) Checksum: 00015B39
> >> > b9c6a000 b9c97700 q57xp32 Timestamp: Thu May 20
> >> > 18:44:36 2004 (40ACE074) Checksum: 0002E3AB
> >> > b9c98000 b9cc2000 USBPORT Timestamp: Fri Mar 25
> >> > 01:30:43 2005 (42435BB3) Checksum: 00023E74
> >> > b9cc2000 b9cea000 ks Timestamp: Fri Mar 25
> >> > 01:41:03 2005 (42435E1F) Checksum: 000250E7
> >> > b9cea000 b9cfe000 redbook Timestamp: Fri Mar 25
> >> > 01:28:46 2005 (42435B3E) Checksum: 000165A1
> >> > b9cfe000 b9d13000 cdrom Timestamp: Fri Mar 25
> >> > 01:28:57 2005 (42435B49) Checksum: 0000FC12
> >> > b9d13000 b9d28000 serial Timestamp: Fri Mar 25
> >> > 01:28:29 2005 (42435B2D) Checksum: 0001EEE6
> >> > b9d28000 b9d3b000 i8042prt Timestamp: Fri Mar 25
> >> > 01:41:05 2005 (42435E21) Checksum: 0001C2D6
> >> > b9d3b000 b9d85000 cpqasm2 Timestamp: Tue Oct 14
> >> > 01:38:14 2003 (3F8B3766) Checksum: 00050676
> >> > b9d85000 b9da0000 VIDEOPRT Timestamp: Fri Mar 25
> >> > 01:29:53 2005 (42435B81) Checksum: 0001BC4D
> >> > b9da0000 b9df3d80 ati2mpad Timestamp: Fri Jul 19
> >> > 03:13:20 2002 (3D3767B0) Checksum: 0006029D
> >> > b9df7000 b9df7e00 nvcfsr Timestamp: Fri Nov 05
> >> > 09:47:02 2004 (418B3E06) Checksum: 00003087
> >> > ba10d000 ba116000 mssmbios Timestamp: Fri Mar 25
> >> > 01:34:14 2005 (42435C86) Checksum: 0000E2D1
> >> > ba11d000 ba12c000 termdd Timestamp: Fri Mar 25
> >> > 01:27:15 2005 (42435AE3) Checksum: 00014808
> >> > ba12d000 ba136000 raspti Timestamp: Fri Mar 25
> >> > 01:34:16 2005 (42435C88) Checksum: 0000D117
> >> > ba13d000 ba148000 ptilink Timestamp: Fri Mar 25
> >> > 01:28:25 2005 (42435B29) Checksum: 0000DEA4
> >> > ba14d000 ba158000 TDI Timestamp: Fri Mar 25
> >> > 01:35:34 2005 (42435CD6) Checksum: 00014D93
> >> > ba15d000 ba16c000 raspppoe Timestamp: Fri Mar 25
> >> > 01:34:16 2005 (42435C88) Checksum: 00015D34
> >> > ba16d000 ba176000 ndistapi Timestamp: Fri Mar 25
> >> > 01:34:11 2005 (42435C83) Checksum: 0000C04E
> >> > ba17d000 ba18bf80 CPQCISSE Timestamp: Mon Aug 04
> >> > 21:57:42 2003 (3F2EBAB6) Checksum: 0000FBA6
> >> > ba18d000 ba198000 fdc Timestamp: Fri Mar 25
> >> > 01:28:43 2005 (42435B3B) Checksum: 00009E2F
> >> > bf800000 bf9cf000 win32k Timestamp: Fri Mar 25
> >> > 01:40:09 2005 (42435DE9) Checksum: 001C9EE0
> >> > bf9cf000 bf9e5000 dxg Timestamp: Fri Mar 25
> >> > 01:27:25 2005 (42435AED) Checksum: 00017464
> >> > bf9e5000 bfa3b680 ati2drad Timestamp: Fri Mar 25
> >> > 03:30:34 2005 (424377CA) Checksum: 000572D8
> >> > bff60000 bff7e000 RDPDD Timestamp: Fri Mar 25
> >> > 03:30:48 2005 (424377D8) Checksum: 0001FF64
> >> > bffa0000 bffea000 ATMFD Timestamp: Fri Mar 25
> >> > 03:30:36 2005 (424377CC) Checksum: 00047B1F
From: Vera Noest [MVP] on
I would phone Microsoft Support. If this is a known problem, they
will be able to help you.
_________________________________________________________
Vera Noest
MCSE, CCEA, Microsoft MVP - Terminal Server
http://hem.fyristorg.com/vera/IT
___ please respond in newsgroup, NOT by private email ___

"=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote on
08 jun 2005 in microsoft.public.windows.terminal_services:

> Today one of the two servers went down again. Error looks the
> same. /PAE is off, but system still loads ntkrpamp.exe. I guess
> because it is a two-processor-system. I expect the second server
> to go down any moment now...
>
>
> Kurt
>
>
> "Vera Noest [MVP]" wrote:
>
>> Enterprise Edition should not need the /PAE switch with 4 GB,
>> only when you have more then 4 GB.
>> Can you test if this also occurs when you boot without the /PAE
>> switch (and thus don't load the ntkrpamp.exe but the standard
>> ntoskrnl.exe)?
>>
>> --
>> Vera Noest
>> MCSE, CCEA, Microsoft MVP - Terminal Server
>> http://hem.fyristorg.com/vera/IT
>> --- please respond in newsgroup, NOT by private email ---
>>
>> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com> wrote
>> on 28 maj 2005 in microsoft.public.windows.terminal_services:
>>
>> > Yes, with PAE
>> > 4 GB RAM
>> >
>> > Kurt
>> >
>> >
>> > "Vera Noest [MVP]" wrote:
>> >
>> >> So you are booting with the /PAE switch?
>> >> How much RAM does this server have?
>> >>
>> >> --
>> >> Vera Noest
>> >> MCSE, CCEA, Microsoft MVP - Terminal Server
>> >> http://hem.fyristorg.com/vera/IT
>> >> --- please respond in newsgroup, NOT by private email ---
>> >>
>> >> "=?Utf-8?B?S3VydA==?=" <Kurt(a)discussions.microsoft.com>
>> >> wrote on 27 maj 2005 in
>> >> microsoft.public.windows.terminal_services:
>> >>
>> >> > After installing SP1 on my 2 Windows 2003 Server
>> >> > Enterprise Edition, running terminal services in App Mode,
>> >> > they have both stopped and rebooted several times. In 8
>> >> > weeks time there has been 4-5 such incidents per server.
>> >> >
>> >> > In the system event log:
>> >> >
>> >> > Event ID: 1001
>> >> >
>> >> > The computer has rebooted from a bugcheck. The bugcheck
>> >> > was: 0x000000ab (0x00000007, 0x00002e40, 0x00000000,
>> >> > 0x00000084). A dump was saved in: C:\WINDOWS\MEMORY.DMP.
>> >> >
>> >> > Event ID: 1003
>> >> >
>> >> > Error code 000000ab, parameter1 00000007, parameter2
>> >> > 00002e40, parameter3 00000000, parameter4 00000084.
>> >> >
>> >> > From Windbg:
>> >> >
>> >> > Microsoft (R) Windows Debugger Version 6.1.0017.2
>> >> > Copyright (c) Microsoft Corporation. All rights reserved.
>> >> >
>> >> >
>> >> > Loading Dump File [C:\WINDOWS\MEMORY.DMP]
>> >> > Kernel Summary Dump File: Only kernel address space is
>> >> > available
>> >> >
>> >> > Symbol search path is:
>> >> > SRV*c:\debug*http://msdl.microsoft.com/download/symbols
>> >> > Executable search path is: Windows Server 2003 Kernel
>> >> > Version 3790 (Service Pack 1) MP (4 procs) Free x86
>> >> > compatible Product: Server, suite: Enterprise
>> >> > TerminalServer Built by: 3790.srv03_sp1_rtm.050324-1447
>> >> > Kernel base = 0x80800000 PsLoadedModuleList = 0x808a6ea8
>> >> > Debug session time: Thu May 26 13:16:13 2005
>> >> > System Uptime: 8 days 3:32:08.381
>> >> > Loading Kernel Symbols
>> >> > ...........................................................
>> >> > ... ...
>> >> > .....................................................
>> >> > Loading unloaded module list ....
>> >> > Loading User Symbols
>> >> > PEB is paged out (Peb = 7ffde00c). Type ".hh dbgerr001"
>> >> > for details
>> >> > ***********************************************************
>> >> > *** *** ************** *
>> >> >
>> >> >
>> >> >
>> >> > *
>> >> > * Bugcheck Analysis
>> >> >
>> >> >
>> >> >
>> >> > *
>> >> > *
>> >> >
>> >> >
>> >> >
>> >> > *
>> >> > ***********************************************************
>> >> > *** *** **************
>> >> >
>> >> > Use !analyze -v to get detailed debugging information.
>> >> >
>> >> > BugCheck AB, {7, 2e40, 0, 84}
>> >> >
>> >> > Probably caused by : ntkrpamp.exe (
>> >> > nt!MiCheckSessionPoolAllocations+107 )
>> >> >
>> >> > Followup: MachineOwner
>> >> > ---------
>> >> >
>> >> > 2: kd> !analyze -v;r;kv;lmtn;
>> >> > ***********************************************************
>> >> > *** *** ************** *
>> >> >
>> >> >
>> >> >
>> >> > *
>> >> > * Bugcheck Analysis
>> >> >
>> >> >
>> >> >
>> >> > *
>> >> > *
>> >> >
>> >> >
>> >> >
>> >> > *
>> >> > ***********************************************************
>> >> > *** *** **************
>> >> >
>> >> > SESSION_HAS_VALID_POOL_ON_EXIT (ab)
>> >> > Caused by a session driver not freeing its pool
>> >> > allocations prior to a session unload. This indicates a
>> >> > bug in win32k.sys, atmfd.dll, rdpdd.dll or a video driver.
>> >> > Arguments:
>> >> > Arg1: 00000007, session ID
>> >> > Arg2: 00002e40, number of paged pool bytes that are
>> >> > leaking Arg3: 00000000, number of nonpaged pool bytes that
>> >> > are leaking Arg4: 00000084, total number of paged and
>> >> > nonpaged allocations that are leaking.
>> >> > nonpaged allocations are in the upper half of this
>> >> > word, paged allocations are in the lower half of this
>> >> > word.
>> >> >
>> >> > Debugging Details:
>> >> > ------------------
>> >> >
>> >> >
>> >> > DEFAULT_BUCKET_ID: DRIVER_FAULT
>> >> >
>> >> > BUGCHECK_STR: 0xAB
>> >> >
>> >> > CURRENT_IRQL: 0
>> >> >
>> >> > LAST_CONTROL_TRANSFER: from 8092ea6f to 80827451
>> >> >
>> >> > STACK_TEXT:
>> >> > b72d4c24 8092ea6f 000000ab 00000007 00002e40
>> >> > nt!KeBugCheckEx+0x1b b72d4c68 809ab017 8aa67aa8 8aa67aa8
>> >> > 00000000 nt!MiCheckSessionPoolAllocations+0x107
>> >> > b72d4ce8 8084c1a7 8aa67aa8 00000000 8a172398
>> >> > nt!MiDereferenceSessionFinal+0x183
>> >> > b72d4d04 8094b539 8aa67aa8 8a172398 8a1725d8
>> >> > nt!MmCleanProcessAddressSpace+0x6b
>> >> > b72d4d8c 8094b68d 00000000 00000000 8a172398
>> >> > nt!PspExitThread+0x5f1 b72d4da4 80948bc0 8a172398 00000000
>> >> > 00000001 nt!PspTerminateThreadByPointer+0x4b
>> >> > b72d4ddc 8088d4d2 bf92b562 8a0abf30 00000000
>> >> > nt!PspSystemThreadStartup+0x3c 00000000 00000000 00000000
>> >> > 00000000 00000000 nt!KiThreadStartup+0x16
>> >> >
>> >> >
>> >> > FOLLOWUP_IP:
>> >> > nt!MiCheckSessionPoolAllocations+107
>> >> > 8092ea6f 5f pop edi
>> >> >
>> >> > FOLLOWUP_NAME: MachineOwner
>> >> >
>> >> > SYMBOL_NAME: nt!MiCheckSessionPoolAllocations+107
>> >> >
>> >> > MODULE_NAME: nt
>> >> >
>> >> > IMAGE_NAME: ntkrpamp.exe
>> >> >
>> >> > DEBUG_FLR_IMAGE_TIMESTAMP: 42435b14
>> >> >
>> >> > STACK_COMMAND: kb
>> >> >
>> >> > BUCKET_ID: 0xAB_nt!MiCheckSessionPoolAllocations+107
>> >> >
>> >> > Followup: MachineOwner