Quantcast
Viewing all articles
Browse latest Browse all 8719

Exchange Server 2012: Health Manager Worker causes BSOD when iSCSI target is unavailable

Windows Server 2012 (all updates are installed), Exchange Server 2012 CU1. Mail database server role. Volume with mail database is attached to the mail server using iSCSI protocol. This database volume is stored on other Windows 2012 file server with iSCSI Target component activated.

Last night that file server crashed because of hardware issues. Its reboot took more that half an hour. During that time the mail serer crashed twice (iSCSI target inaccessible - BSOD - half an hour later iSCSI target is still inaccessible - BSOD - iSCSI Target is accessible - mail server works as usual).

After investigating crash dump file I've found that the culprit is MSExchangeHMWorker process (Exchange Health Manager Worker). Additional info is shown below.

The main question: is it possible to turn that process off without seriously crippling Exchange services? I suspect this is not the last time iSCSI servers crash, and I don't want our mail database servers to follow in their wake. I can live without monitoring, but I cannot allow the servers to die unexpectedly.

------------------

Bugcheck Analysis

CRITICAL_PROCESS_DIED (ef)
        A critical system process died
Arguments:
Arg1: fffffa800e334700, Process object or thread object
Arg2: 0000000000000000, If this is 0, a process died. If this is 1, a thread died.
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for System.ni.dll

PROCESS_OBJECT: fffffa800e334700

IMAGE_NAME:  wininit.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: wininit

FAULTING_MODULE: 0000000000000000

PROCESS_NAME:  MSExchangeHMWo

BUGCHECK_STR:  0xEF_MSExchangeHMWo

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

CURRENT_IRQL:  0

MANAGED_STACK: !dumpstack -EE
!dumpstack -EE
OS Thread Id: 0x0 (3)
TEB information is not available so a stack size of 0xFFFF is assumed
Current frame:
Child-SP         RetAddr          Caller, Callee

LAST_CONTROL_TRANSFER:  from fffff8003a5fa6d9 to fffff8003a0d2240

STACK_TEXT: 
fffff880`051419a8 fffff800`3a5fa6d9 : 00000000`000000ef fffffa80`0e334700 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`051419b0 fffff800`3a591df2 : fffffa80`0e334700 00000000`144d2c41 00000000`00000000 fffff800`3a24e304 : nt!PspCatchCriticalBreak+0xad
fffff880`051419f0 fffff800`3a508a81 : fffffa80`0e334700 00000000`144d2c41 fffffa80`0e334700 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x4adfe
fffff880`05141a50 fffff800`3a50e846 : ffffffff`ffffffff fffffa80`0fb74980 fffffa80`0e334700 00000000`00000001 : nt!PspTerminateProcess+0x6d
fffff880`05141a90 fffff800`3a0d1253 : fffffa80`0e334700 fffffa80`108ceb00 fffff880`05141b80 00000000`ffffffff : nt!NtTerminateProcess+0x9e
fffff880`05141b00 000007ff`5b542eaa : 000007ff`58861731 00000000`229be048 00000000`051456a8 00000000`00000984 : nt!KiSystemServiceCopyEnd+0x13
00000000`229bdfa8 000007ff`58861731 : 00000000`229be048 00000000`051456a8 00000000`00000984 00000000`21776c40 : ntdll!NtTerminateProcess+0xa
00000000`229bdfb0 000007ff`50e55c3b : 000007ff`50e55c3b 00000000`ffffffff 00000000`21776c40 00000000`0517c588 : KERNELBASE!TerminateProcess+0x25
00000000`229bdfe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : System_ni+0x795c3b


STACK_COMMAND:  kb

FOLLOWUP_NAME:  MachineOwner

FAILURE_BUCKET_ID:  0xEF_MSExchangeHMWo_IMAGE_wininit.exe

BUCKET_ID:  0xEF_MSExchangeHMWo_IMAGE_wininit.exe

Followup: MachineOwner
---------

rax=fffff88005141903 rbx=fffffa800e334700 rcx=00000000000000ef
rdx=fffffa800e334700 rsi=0000000000000000 rdi=fffffa800e334700
rip=fffff8003a0d2240 rsp=fffff880051419a8 rbp=0000000000000001
 r8=0000000000000000  r9=0000000000000000 r10=00000000144d2c49
r11=fffff88005141af8 r12=00000000ffffffff r13=0000000000000000
r14=fffffa80108ceb00 r15=fffffa80108ceb00
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00000246
nt!KeBugCheckEx:
fffff800`3a0d2240 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff880`051419b0=ef00000000000000
Child-SP          RetAddr           : Args to Child                                                           : Call Site
fffff880`051419a8 fffff800`3a5fa6d9 : 00000000`000000ef fffffa80`0e334700 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`051419b0 fffff800`3a591df2 : fffffa80`0e334700 00000000`144d2c41 00000000`00000000 fffff800`3a24e304 : nt!PspCatchCriticalBreak+0xad
fffff880`051419f0 fffff800`3a508a81 : fffffa80`0e334700 00000000`144d2c41 fffffa80`0e334700 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x4adfe
fffff880`05141a50 fffff800`3a50e846 : ffffffff`ffffffff fffffa80`0fb74980 fffffa80`0e334700 00000000`00000001 : nt!PspTerminateProcess+0x6d
fffff880`05141a90 fffff800`3a0d1253 : fffffa80`0e334700 fffffa80`108ceb00 fffff880`05141b80 00000000`ffffffff : nt!NtTerminateProcess+0x9e
fffff880`05141b00 000007ff`5b542eaa : 000007ff`58861731 00000000`229be048 00000000`051456a8 00000000`00000984 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`05141b00)
00000000`229bdfa8 000007ff`58861731 : 00000000`229be048 00000000`051456a8 00000000`00000984 00000000`21776c40 : ntdll!NtTerminateProcess+0xa
*** WARNING: Unable to verify checksum for System.ni.dll
00000000`229bdfb0 000007ff`50e55c3b : 000007ff`50e55c3b 00000000`ffffffff 00000000`21776c40 00000000`0517c588 : KERNELBASE!TerminateProcess+0x25
00000000`229bdfe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : System_ni+0x795c3b
start             end                 module name
00000000`00590000 00000000`0059c000   MSExchangeHMWorker MSExchangeHMWorker.exe Mon Feb 18 08:37:06 2013 (512193D2)

<skip>


Viewing all articles
Browse latest Browse all 8719

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>