7840U, Windows 11 23H2, BSOD in msgpioclx.sys

[forum admins: this would not let me add “!WinHvpProcessSignalBitsetMessage” to the topic, which seems very silly for a technical forum]

I am running the forbidden 96GB of RAM which I am now keenly aware is unsupported.

If you get BSODs like this, please grab WinDBG (https://windbg.download.prss.microsoft.com/dbazure/prod/1-0-0/windbg.appinstaller) or WhoCrashed (Resplendence Software - WhoCrashed, automatic crash dump analyzer) to do analysis on the crash dump.

[Have shifted this post around because I think WhoCrashedMe is more accurate here]

Crash dump file:  C:\windows\MEMORY.DMP (Kernel memory dump)  
Bugcheck code:  0x133(0x0, 0x501, 0x500, 0xFFFFF80128B1D340) 
Bugcheck name: DPC_WATCHDOG_VIOLATION 
Driver or module in which error occurred:  msgpioclx.sys (msgpioclx+0x1438e) 

WinDBG
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
	component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80128b1d340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
	additional information regarding this single DPC timeout

PROCESS_NAME:  svchost.exe

STACK_TEXT:  
ffffe700`9d1f9c88 fffff801`280289f5     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffe700`9d1f9c90 fffff801`280280c1     : 0000430f`548ac2c0 00000000`033a55e8 00000000`033a55e7 00000000`00000000 : nt!KeAccumulateTicks+0x3d5
ffffe700`9d1f9cf0 fffff801`28026151     : 00000000`00000000 00000000`00000000 ffffe700`9d1df180 00000000`00000000 : nt!KiUpdateRunTime+0xd1
ffffe700`9d1f9ea0 fffff801`28025b7a     : fffff801`28a5ff90 00000000`00000001 00000000`00000001 00000000`00000002 : nt!KeClockInterruptNotify+0xc1
ffffe700`9d1f9f40 fffff801`280ae6dc     : 000007b2`278f93e5 ffff9201`80b6fe80 ffff9201`80b6ff30 fffff801`2821a35b : nt!HalpTimerClockInterrupt+0x10a
ffffe700`9d1f9f70 fffff801`2821489a     : fffffd88`7c2fed30 ffff9201`80b6fe80 fffffd88`7c2fee80 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x9c
ffffe700`9d1f9fb0 fffff801`28215107     : ffffe700`00000000 00001f80`00210214 00000000`537e2e10 fffffd88`7c2fee88 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd88`7c2fecb0 fffff801`28030642     : ffffe700`9cda1180 fffff801`2803060f 00000000`00000000 00000000`00989680 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd88`7c2fee40 fffff801`2803060f     : 00000000`00000000 00000000`00989680 ffffe700`9cda1180 00000000`00000000 : nt!KeYieldProcessorEx+0x2
fffffd88`7c2fee50 fffff801`28256528     : ffffe700`9cda1180 fffffd88`53805268 00000000`0000d9fc fffffd88`7c2feff8 : nt!KiAcquirePrcbLocksForIsolationUnit+0x6f
fffffd88`7c2fee80 fffff801`2811fa42     : fffffd88`7c2fef50 ffffe700`9cda1180 00000000`0000ffff ffff9201`a28f4080 : nt!KiHeteroChooseTargetProcessor+0x18a
fffffd88`7c2fef30 fffff801`28121f3d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeferredReadySingleThread+0x742
fffffd88`7c2ff300 fffff801`281216fb     : ffff9201`a952a0f8 ffff9201`00000000 00000000`00000000 ffffe700`9d1e7500 : nt!KiExitDispatcher+0x19d
fffffd88`7c2ff6b0 fffff801`529faf09     : ffff9201`00000000 00000000`00000000 ffff9201`80efb4c8 ffff9201`a28f41c0 : nt!KeSetEvent+0xeb
fffffd88`7c2ff740 fffff801`529fae3e     : 00000000`00000000 fffffd88`00000000 fffffd88`7c2ffe00 00000000`00000001 : winhvr!WinHvpProcessSignalBitsetMessage+0x99
fffffd88`7c2ff790 fffff801`2802a72c     : 00000000`00000000 00000000`00000001 fffffd88`00000000 00000000`00000002 : winhvr!WinHvpXSchedulerDpcRoutine+0x5e
fffffd88`7c2ff7c0 fffff801`28029731     : 00000000`00000020 fffffd88`7c2ffe00 fffff780`00000014 fffff801`24c34d08 : nt!KiExecuteAllDpcs+0x42c
fffffd88`7c2ffd00 fffff801`2821bbb5     : ffff8003`03db6090 00000000`00000000 ffffe700`9d1df180 00000000`00000000 : nt!KiRetireDpcList+0x1b1
fffffd88`7c2fffb0 fffff801`2821bb5f     : fffffd88`8499e479 fffff801`28128925 00000000`00000000 fffffd88`8499e880 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffd88`8499e3e0 fffff801`28128925     : 00000000`00000000 fffffd88`8499e880 fffff801`28b496c0 fffff801`28125ddb : nt!KiPlatformSwapStacksAndCallReturn
fffffd88`8499e3f0 fffff801`2821afd0     : ffff9201`a5ee54f0 ffff9201`8d476f10 00000000`00000006 00000008`00000011 : nt!KiDispatchInterrupt+0xd5
fffffd88`8499e4e0 fffff801`281234db     : ffff9201`a5ee54f0 00000000`00000000 00000000`00000000 ffff9201`ad848a80 : nt!KiDpcInterrupt+0x350
fffffd88`8499e670 fffff801`2d19a54c     : 00000000`00000000 00000000`00000000 ffff9201`ac743960 fffff801`00000000 : nt!KzLowerIrql+0x1b
fffffd88`8499e6a0 fffff801`2d19a245     : fffffd88`8499eb70 ffff9201`a86ea550 fffffd88`8499eb70 fffffd88`8499f401 : tcpip!UdpSendMessages+0x2ec
fffffd88`8499ea60 fffff801`28148c2a     : 00000000`00000000 ffff9201`a86ea500 00000000`00000000 ffff9201`80cf8e10 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffffd88`8499ea90 fffff801`28148b9d     : fffff801`2d19a230 fffffd88`8499eb70 00000000`00000000 ffff9201`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffffd88`8499eb00 fffff801`2d1b8aca     : ffff9201`a5e9b010 ffff9201`ac743960 fffff801`5264b310 ffff9201`8d0aabf0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffd88`8499eb40 fffff801`526479b8     : 00000000`00000000 fffffd88`8499f4e0 ffff9201`8d0a9b70 fffffd88`8499f4e0 : tcpip!UdpTlProviderSendMessages+0x7a
fffffd88`8499ebb0 fffff801`52647237     : ffff9201`8d0a9b70 fffffd88`8499f238 ffff9201`8d0a9b70 fffff801`288af59e : afd!AfdFastDatagramSend+0x708
fffffd88`8499edf0 fffff801`285cbf2e     : ffff9201`ad8471f0 ffff9201`ad8471f0 ffff9201`ad8471f0 00000000`00000000 : afd!AfdFastIoDeviceControl+0x1857
fffffd88`8499f190 fffff801`285cb2a6     : 00000000`00000001 00007ff9`6def0740 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x45e
fffffd88`8499f380 fffff801`282274e8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`2856d3b0 : nt!NtDeviceIoControlFile+0x56
fffffd88`8499f3f0 00007ff9`783cf4d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006f`d49fe188 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`783cf4d4

There have been issues like this before caused by hacking/spam protection incorrectly flagging messages like this. Hopefully someone can look into it now that you’ve reported it.

Hi. I was getting BSOD (unfortunately no dump file generated), with an Event Viewer Kernel error of “Windows boot environment failed load the HSP firmware. StatusCode: {File Not Found}”.

I found that I could eliminate the BSOD if I changed the PCI Express State Link Management setting in the power plan to “Moderate power savings” instead of the “Maximum power savings”.

Seems like there is a problem somewhere in the management of the power state on PCIE.

1 Like

I am a bit worried I am the only one mentioning amdgpio2.sys / msigpioclx.sys here

Hello,

I am also on Windows 11 7640U. I received my laptop Dec 20th and got a BSOD for msigpioclx.sys today Dec 29th. I am using the CRUCIAL 32GB 5600 D5 SODIMM KIT that everyone on Reddit seems to be using for the AMD Framework.

Does anyone have any advice? I have already experienced another BSOD on Dec 24th. Does 2 BSODs in 9 days merit opening a ticket?

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
	component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8062fb1d340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding this single DPC timeout

BUGCHECK_CODE:  133

BUGCHECK_P1: 0

BUGCHECK_P2: 501

BUGCHECK_P3: 500

BUGCHECK_P4: fffff8062fb1d340

FILE_IN_CAB:  122923-15640-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffff90c61e56d90 -- (.trap 0xfffff90c61e56d90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000007 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000007c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8062f06fbfa rsp=fffff90c61e56f20 rbp=0000000000000001
 r8=ffff9b80cb351180  r9=fffff90c61e57400 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KiCommitRescheduleContextEntry+0x20a:
fffff806`2f06fbfa 0fb65f23        movzx   ebx,byte ptr [rdi+23h] ds:00000000`00000023=??
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
fffff90c`61e56f20 fffff806`2f06779f     : 00002d76`0000007c ffff9b80`cb351180 ffff9b80`00000000 ffff9b80`cb791180 : nt!KiCommitRescheduleContextEntry+0x20a
fffff90c`61e56fc0 fffff806`2f069a3d     : fffff90c`61e57390 fffff90c`61e57390 00000000`00000022 00000000`00000000 : nt!KiDeferredReadySingleThread+0x99f
fffff90c`61e57390 fffff806`2f15d8d7     : fffff806`2fa5cf60 fffff806`00000000 ffffd289`91cfb848 ffffd289`91ce8040 : nt!KiExitDispatcher+0x19d
fffff90c`61e57740 fffff806`2f1b24c4     : 00000000`00000000 fffff90c`61e57e00 ffff9b80`e9c0c1f0 fffff90c`61e57e70 : nt!KeInsertQueue+0xc7
fffff90c`61e57790 fffff806`2f07148c     : 00000000`00000000 ffff9b80`e9c0c1f0 00000000`00000000 ffff9b80`00000002 : nt!IopPassiveInterruptDpc+0x14
fffff90c`61e577c0 fffff806`2f072741     : 00000000`00000020 fffff90c`61e57e00 fffff780`00000014 fffff806`2a1fb448 : nt!KiExecuteAllDpcs+0x42c
fffff90c`61e57d00 fffff806`2f220135     : 00000000`00000000 00000000`00000000 ffff9b80`cb351180 00000000`00000000 : nt!KiRetireDpcList+0x1b1
fffff90c`61e57fb0 fffff806`2f2200df     : fffff90c`620e6fb9 fffff806`2f0609d5 00000000`00000002 00000000`00000000 : nt!KxSwapStacksAndRetireDpcList+0x5
fffff90c`620e6f20 fffff806`2f0609d5     : 00000000`00000002 00000000`00000000 00000000`00000000 fffff806`2f14c11b : nt!KiPlatformSwapStacksAndCallReturn
fffff90c`620e6f30 fffff806`2f21f89b     : 00000000`00000000 ffffd289`acade701 00000000`00000008 00000000`00000000 : nt!KiDispatchInterrupt+0xd5
fffff90c`620e7020 fffff806`2f2183c1     : fffff90c`620e70d0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
fffff90c`620e7050 fffff806`2f143dab     : 00000000`00000003 fffff806`2f11ae80 00000000`08157b00 ffffd289`a02c47c0 : nt!KiChainedDispatch+0xb1
fffff90c`620e71e0 fffff806`304059bc     : fffff806`8522c170 ffffd289`99a088a0 ffff9b81`03ef0037 fffff806`85203f1c : nt!KeReleaseInterruptSpinLock+0x3b
fffff90c`620e7220 fffff806`30405978     : 00000000`00000020 00000000`08157b00 00000000`00000000 00000000`00000000 : Wdf01000!FxInterrupt::ReleaseLock+0x38 [minkernel\wdf\framework\shared\irphandlers\pnp\interruptobject.cpp @ 1877] 
fffff90c`620e7260 fffff806`85218db7     : ffffd289`99a1dab0 00000000`00000100 ffffd289`a02c43c0 00000000`00000000 : Wdf01000!imp_WdfInterruptReleaseLock+0x38 [minkernel\wdf\framework\shared\irphandlers\pnp\fxinterruptapi.cpp @ 675] 
fffff90c`620e7290 fffff806`8521c913     : ffffd289`99a1da00 fffff806`8522c101 ffffd289`a02c43c0 00000000`00000000 : msgpioclx!GpiopDeferredUnmaskRequestHandler+0x413
fffff90c`620e7360 fffff806`8521fea4     : 00000000`00000002 00000000`00000004 00000000`0000040b fffff90c`620e7450 : msgpioclx!GpiopUnmaskInterrupt+0x3af
fffff90c`620e7410 fffff806`2f316f0c     : ffffd289`a02c2000 00000000`00000016 00000000`000000d2 00000000`00000000 : msgpioclx!GpioHubUnmaskInterrupt+0x44
fffff90c`620e7440 fffff806`2f2d9d74     : 00000000`0000040b 00000000`00000002 ffffd289`b359a488 00000000`00000000 : nt!HalpHandleMaskUnmaskSecondaryInterrupt+0xa8
fffff90c`620e7470 fffff806`2f250fcd     : ffffd289`b359a450 fffff90c`620e7520 00000000`00000000 fffff806`2f1af4d0 : nt!HalpUnmaskInterrupt+0x15d0d4
fffff90c`620e74c0 fffff806`2f1af4fe     : ffffd289`00000002 fffff806`2fa5cf60 fffff806`2f1af4d0 ffffd289`b359a498 : nt!IopPassiveInterruptWorker+0xb171d
fffff90c`620e7540 fffff806`2f107167     : ffffd289`92dee040 fffff806`2f1af4d0 fffff806`2fa5cf60 005fe07f`b8bbbdff : nt!IopPassiveInterruptRealtimeWorker+0x2e
fffff90c`620e7570 fffff806`2f21bb94     : ffff9b80`cb511180 ffffd289`92dee040 fffff806`2f107110 00000000`00000000 : nt!PspSystemThreadStartup+0x57
fffff90c`620e75c0 00000000`00000000     : fffff90c`620e8000 fffff90c`620e1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x34


STACK_COMMAND:  .trap 0xfffff90c61e56d90 ; kb

SYMBOL_NAME:  msgpioclx!GpiopDeferredUnmaskRequestHandler+413

MODULE_NAME: msgpioclx

IMAGE_NAME:  msgpioclx.sys

IMAGE_VERSION:  10.0.22621.2915

BUCKET_ID_FUNC_OFFSET:  413

FAILURE_BUCKET_ID:  0x133_DPC_msgpioclx!GpiopDeferredUnmaskRequestHandler

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {e6cadd0a-9976-1aef-f7a3-393ce0c421f1}

You may also want to run Resplendence Software’s WhoCrashedMe as it seems to do a better job of pinpointing the driver responsible.

Yes, open a ticket for this.

I was asked to run Memtest86 - everything passed.