Forum Discussion
Nelson_007
Nov 05, 2020Copper Contributor
BSOD USER_MODE_HEALTH_MONITOR (9e) on Windows Server 2016 Exchange DAG
Hello,
I am trying to figure out what caused the BSOD on one of our Exchange servers. We are running Exchange 2016 in a DAG environment on Windows Server 2016 VMs. I did not notice any threads being stuck while analyzing the first argument process but my knowledge with BSOD analysis is limited.
Any insight would be appreciated!
Here is the BSOD dump:
7: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
USER_MODE_HEALTH_MONITOR (9e)
One or more critical user mode components failed to satisfy a health check.
Hardware mechanisms such as watchdog timers can detect that basic kernel
services are not executing. However, resource starvation issues, including
memory leaks, lock contention, and scheduling priority misconfiguration,
may block critical user mode components without blocking DPCs or
draining the nonpaged pool.
Kernel components can extend watchdog timer functionality to user mode
by periodically monitoring critical applications. This bugcheck indicates
that a user mode health check failed in a manner such that graceful
shutdown is unlikely to succeed. It restores critical services by
rebooting and/or allowing application failover to other servers.
Arguments:
Arg1: ffff8a01aee09080, Process that failed to satisfy a health check within the
configured timeout
Arg2: 0000000000000690, Health monitoring timeout (seconds)
Arg3: 0000000000000005, WatchdogSourceRhsResourceDeadlock
Monitors that RHS process goes away when
terminating on resource deadlock
Arg4: 0000000000000000
ffffa101`0eb46c78 fffff803`4ec742c5 : 00000000`0000009e ffff8a01`aee09080 00000000`00000690 00000000`00000005 : nt!KeBugCheckEx
ffffa101`0eb46c80 fffff803`4ec73b6f : 00000000`00000001 ffff8a01`8da0adb0 00000000`00000000 00000000`00000000 : netft!NetftProcessWatchdogEvent+0x2f1
ffffa101`0eb46cf0 fffff803`8baf4581 : ffffa101`0eb46e50 00000000`001f3816 ffffa101`0eb46e30 ffffa101`00000002 : netft!NetftWatchdogTimerDpc+0x3f
ffffa101`0eb46d30 fffff803`8bbee185 : 00000000`00000000 ffffa101`0eb0b180 00000000`00000000 00000000`00000001 : nt!KiRetireDpcList+0x731
ffffa101`0eb46fb0 fffff803`8bbedf90 : ffffa101`279ad040 fffff803`4d0650e3 00000000`00000000 ffffa101`279ad0f8 : nt!KxRetireDpcList+0x5
ffffa101`245b4690 fffff803`8bbed719 : ffff8a01`f23a5550 ffff8a01`8ac90dd0 00000000`00000000 fffff803`4d065352 : nt!KiDispatchInterruptContinue
ffffa101`245b46c0 fffff803`8bae7557 : fffff803`4d06433e 00000000`00000001 ffffb800`40200342 ffffa101`245b48b8 : nt!KiDpcInterrupt+0x2a9
ffffa101`245b4858 fffff803`4d06433e : 00000000`00000001 ffffb800`40200342 ffffa101`245b48b8 00000000`00000001 : nt!KzLowerIrql+0x7
ffffa101`245b4860 fffff803`4d063c02 : 00000000`00000000 fffff803`8bab2600 ffffa101`00000000 ffff8a02`15c18400 : storport!RaidStartIoPacket+0x45e
ffffa101`245b4940 fffff803`4d063a6a : ffff280b`99dab233 00000000`00000001 ffffa101`13a57000 ffff8a01`8bd4a010 : storport!RaUnitScsiIrp+0x152
ffffa101`245b49e0 fffff803`4daa5931 : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : storport!RaDriverScsiIrp+0x5a
ffffa101`245b4a20 fffff803`4daa525d : 00000000`00000008 00000000`00000000 00000392`00001000 0000001f`4516a000 : CLASSPNP!SubmitTransferPacket+0x201
ffffa101`245b4aa0 fffff803`4daa4edd : ffff8a02`15f2f010 ffffa101`245b4b00 ffff8a01`8bc5e600 00000000`00101000 : CLASSPNP!ServiceTransferRequest+0x29d
ffffa101`245b4b50 fffff803`4cd21937 : 00000000`00000000 ffff8a01`8bc2bae0 00001178`249d470b 00000000`00000001 : CLASSPNP!ClassReadWrite+0x5fd
ffffa101`245b4cb0 fffff803`4d97b903 : 00000001`00000001 00000000`00000000 00000392`fd2b87e7 ffffb0fc`af11a044 : partmgr!PmGlobalDispatch+0xf7
ffffa101`245b4d40 fffff803`4cd21db7 : 00000000`00000000 00000000`00000000 ffff8a01`8ba47bb0 ffff8a01`ef3d6810 : mfedisk+0xb903
ffffa101`245b4dc0 fffff803`4cd218a3 : ffffa101`0ec76280 ffff8a01`ef3d6810 ffff8a01`8ba47a60 ffff8a01`8ba47bb0 : partmgr!PartitionIo+0x177
ffffa101`245b4e50 fffff803`4cea1109 : ffff8a01`8b9f97c0 00000000`00000001 00000392`fd2b87e3 00000000`00000000 : partmgr!PmGlobalDispatch+0x63
ffffa101`245b4ee0 fffff803`4d9a5ccf : ffffa101`245b5000 ffff8a01`8bd88190 ffff8a01`8ad66040 ffffa101`245b5000 : volmgr!VmReadWrite+0x109
ffffa101`245b4f20 fffff803`4d38e8f6 : ffffa101`0ec76280 ffffa101`0ec68510 fffff803`4d38e8e0 00000000`00000000 : volsnap!VolSnapReadFilter+0x480f
ffffa101`245b4f50 fffff803`8bbea707 : ffffa101`28f5e530 ffffa101`245b4fd0 ffff8a02`0cfa8800 fffff803`8dcab130 : NTFS!NtfsStorageDriverCallout+0x16
ffffa101`245b4f80 fffff803`8bbea6cd : 00000000`00006000 ffff8a01`8b5604e0 00000000`00000012 fffff803`8bb32da1 : nt!KxSwitchKernelStackCallout+0x27
ffffa101`0ec760f0 fffff803`8bb32da1 : 00000000`00000012 00000000`00006000 fffff803`8bdae730 fffff803`00000006 : nt!KiSwitchKernelStackContinue
ffffa101`0ec76110 fffff803`8bb32a06 : ffffa101`0ec761a0 00000000`00006000 fffff803`00000008 00000000`00000009 : nt!KiExpandKernelStackAndCalloutOnStackSegment+0x241
ffffa101`0ec761a0 fffff803`8bb328cf : ffffa101`0ec76340 ffffa101`0ec76280 00000000`00000001 00000000`0046349d : nt!KiExpandKernelStackAndCalloutSwitchStack+0xa6
ffffa101`0ec76200 fffff803`4d38f14c : 00000000`00001000 00000000`00000000 ffff8a01`ef3d6b20 ffff8a01`8cfd7180 : nt!KeExpandKernelStackAndCalloutInternal+0x2f
ffffa101`0ec76250 fffff803`4d396218 : ffffa101`0eb10d60 ffffa101`0ec763f0 ffffa101`0ec763a8 ffffa101`0ec76380 : NTFS!NtfsCallStorageDriver+0x44
ffffa101`0ec762c0 fffff803`4d39b721 : ffffa101`0ec76478 ffff8a01`ef3d6801 ffff8a01`ef3d6b00 ffff8a01`8de2db90 : NTFS!NtfsPagingFileIo+0x2c8
ffffa101`0ec76430 fffff803`4c465206 : ffff8a01`ffeb2b80 ffff8a01`ef3d6810 ffff8a01`ef3d6810 ffff8a01`ef3d6b68 : NTFS!NtfsFsdRead+0x25351
ffffa101`0ec764e0 fffff803`4c463146 : 00000000`0046349d 0046349d`000003e4 ffff8a01`8ad66701 ffff8a01`ef3d6830 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x1a6
ffffa101`0ec76570 fffff803`8baff590 : ffff8a01`ef3d6810 ffff8a01`f23a54a0 00000000`00000001 ffff8a01`ef3d6810 : FLTMGR!FltpDispatch+0xb6
ffffa101`0ec765d0 fffff803`8baad12f : ffff8a01`f23a5450 fffff803`8bc7972c ffff8a01`f23a54b0 ffff8a01`f23a5470 : nt!IoPageReadEx+0x2b0
ffffa101`0ec76640 fffff803`8baab7eb : 00000000`00000002 00000000`00000001 ffff8a01`f23a5450 00000000`00000000 : nt!MiIssueHardFaultIo+0xcb
ffffa101`0ec766d0 fffff803`8badaf3f : 00000000`c0033333 ffff8a01`f23a5450 fffff803`8bdae910 ffffa101`13a57000 : nt!MiIssueHardFault+0x1fb
ffffa101`0ec76770 fffff803`8bb6e252 : 00000000`00000001 80000000`1da29963 ffffa101`164de000 00000000`00000001 : nt!MmAccessFault+0x128f
ffffa101`0ec76970 fffff803`8bbc54f3 : ffff8a01`b99b28d8 ffff8a01`b99b28d8 ffff8a01`bc6a18d8 00000000`00000000 : nt!MiInPageSingleKernelStack+0x23e
ffffa101`0ec76bb0 fffff803`8bb93f6d : ffff8a01`8ad66040 fffff803`8bbc5440 00000000`00000000 00000000`00000000 : nt!KeSwapProcessOrStack+0xb3
ffffa101`0ec76c10 fffff803`8bbee5d6 : fffff803`8bdcb180 ffff8a01`8ad66040 fffff803`8bb93f2c 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffffa101`0ec76c60 00000000`00000000 : ffffa101`0ec77000 ffffa101`0ec71000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
No RepliesBe the first to reply