7840U, Windows 11 23H2, BSOD in msgpioclx.sys

[forum admins: this would not let me add “!WinHvpProcessSignalBitsetMessage” to the topic, which seems very silly for a technical forum]

I am running the forbidden 96GB of RAM which I am now keenly aware is unsupported.

If you get BSODs like this, please grab WinDBG (https://windbg.download.prss.microsoft.com/dbazure/prod/1-0-0/windbg.appinstaller) or WhoCrashed (Resplendence Software - WhoCrashed, automatic crash dump analyzer) to do analysis on the crash dump.

[Have shifted this post around because I think WhoCrashedMe is more accurate here]

Crash dump file:  C:\windows\MEMORY.DMP (Kernel memory dump)  
Bugcheck code:  0x133(0x0, 0x501, 0x500, 0xFFFFF80128B1D340) 
Bugcheck name: DPC_WATCHDOG_VIOLATION 
Driver or module in which error occurred:  msgpioclx.sys (msgpioclx+0x1438e) 

WinDBG
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
	component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff80128b1d340, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
	additional information regarding this single DPC timeout

PROCESS_NAME:  svchost.exe

STACK_TEXT:  
ffffe700`9d1f9c88 fffff801`280289f5     : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffffe700`9d1f9c90 fffff801`280280c1     : 0000430f`548ac2c0 00000000`033a55e8 00000000`033a55e7 00000000`00000000 : nt!KeAccumulateTicks+0x3d5
ffffe700`9d1f9cf0 fffff801`28026151     : 00000000`00000000 00000000`00000000 ffffe700`9d1df180 00000000`00000000 : nt!KiUpdateRunTime+0xd1
ffffe700`9d1f9ea0 fffff801`28025b7a     : fffff801`28a5ff90 00000000`00000001 00000000`00000001 00000000`00000002 : nt!KeClockInterruptNotify+0xc1
ffffe700`9d1f9f40 fffff801`280ae6dc     : 000007b2`278f93e5 ffff9201`80b6fe80 ffff9201`80b6ff30 fffff801`2821a35b : nt!HalpTimerClockInterrupt+0x10a
ffffe700`9d1f9f70 fffff801`2821489a     : fffffd88`7c2fed30 ffff9201`80b6fe80 fffffd88`7c2fee80 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0x9c
ffffe700`9d1f9fb0 fffff801`28215107     : ffffe700`00000000 00001f80`00210214 00000000`537e2e10 fffffd88`7c2fee88 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd88`7c2fecb0 fffff801`28030642     : ffffe700`9cda1180 fffff801`2803060f 00000000`00000000 00000000`00989680 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd88`7c2fee40 fffff801`2803060f     : 00000000`00000000 00000000`00989680 ffffe700`9cda1180 00000000`00000000 : nt!KeYieldProcessorEx+0x2
fffffd88`7c2fee50 fffff801`28256528     : ffffe700`9cda1180 fffffd88`53805268 00000000`0000d9fc fffffd88`7c2feff8 : nt!KiAcquirePrcbLocksForIsolationUnit+0x6f
fffffd88`7c2fee80 fffff801`2811fa42     : fffffd88`7c2fef50 ffffe700`9cda1180 00000000`0000ffff ffff9201`a28f4080 : nt!KiHeteroChooseTargetProcessor+0x18a
fffffd88`7c2fef30 fffff801`28121f3d     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeferredReadySingleThread+0x742
fffffd88`7c2ff300 fffff801`281216fb     : ffff9201`a952a0f8 ffff9201`00000000 00000000`00000000 ffffe700`9d1e7500 : nt!KiExitDispatcher+0x19d
fffffd88`7c2ff6b0 fffff801`529faf09     : ffff9201`00000000 00000000`00000000 ffff9201`80efb4c8 ffff9201`a28f41c0 : nt!KeSetEvent+0xeb
fffffd88`7c2ff740 fffff801`529fae3e     : 00000000`00000000 fffffd88`00000000 fffffd88`7c2ffe00 00000000`00000001 : winhvr!WinHvpProcessSignalBitsetMessage+0x99
fffffd88`7c2ff790 fffff801`2802a72c     : 00000000`00000000 00000000`00000001 fffffd88`00000000 00000000`00000002 : winhvr!WinHvpXSchedulerDpcRoutine+0x5e
fffffd88`7c2ff7c0 fffff801`28029731     : 00000000`00000020 fffffd88`7c2ffe00 fffff780`00000014 fffff801`24c34d08 : nt!KiExecuteAllDpcs+0x42c
fffffd88`7c2ffd00 fffff801`2821bbb5     : ffff8003`03db6090 00000000`00000000 ffffe700`9d1df180 00000000`00000000 : nt!KiRetireDpcList+0x1b1
fffffd88`7c2fffb0 fffff801`2821bb5f     : fffffd88`8499e479 fffff801`28128925 00000000`00000000 fffffd88`8499e880 : nt!KxSwapStacksAndRetireDpcList+0x5
fffffd88`8499e3e0 fffff801`28128925     : 00000000`00000000 fffffd88`8499e880 fffff801`28b496c0 fffff801`28125ddb : nt!KiPlatformSwapStacksAndCallReturn
fffffd88`8499e3f0 fffff801`2821afd0     : ffff9201`a5ee54f0 ffff9201`8d476f10 00000000`00000006 00000008`00000011 : nt!KiDispatchInterrupt+0xd5
fffffd88`8499e4e0 fffff801`281234db     : ffff9201`a5ee54f0 00000000`00000000 00000000`00000000 ffff9201`ad848a80 : nt!KiDpcInterrupt+0x350
fffffd88`8499e670 fffff801`2d19a54c     : 00000000`00000000 00000000`00000000 ffff9201`ac743960 fffff801`00000000 : nt!KzLowerIrql+0x1b
fffffd88`8499e6a0 fffff801`2d19a245     : fffffd88`8499eb70 ffff9201`a86ea550 fffffd88`8499eb70 fffffd88`8499f401 : tcpip!UdpSendMessages+0x2ec
fffffd88`8499ea60 fffff801`28148c2a     : 00000000`00000000 ffff9201`a86ea500 00000000`00000000 ffff9201`80cf8e10 : tcpip!UdpTlProviderSendMessagesCalloutRoutine+0x15
fffffd88`8499ea90 fffff801`28148b9d     : fffff801`2d19a230 fffffd88`8499eb70 00000000`00000000 ffff9201`00000001 : nt!KeExpandKernelStackAndCalloutInternal+0x7a
fffffd88`8499eb00 fffff801`2d1b8aca     : ffff9201`a5e9b010 ffff9201`ac743960 fffff801`5264b310 ffff9201`8d0aabf0 : nt!KeExpandKernelStackAndCalloutEx+0x1d
fffffd88`8499eb40 fffff801`526479b8     : 00000000`00000000 fffffd88`8499f4e0 ffff9201`8d0a9b70 fffffd88`8499f4e0 : tcpip!UdpTlProviderSendMessages+0x7a
fffffd88`8499ebb0 fffff801`52647237     : ffff9201`8d0a9b70 fffffd88`8499f238 ffff9201`8d0a9b70 fffff801`288af59e : afd!AfdFastDatagramSend+0x708
fffffd88`8499edf0 fffff801`285cbf2e     : ffff9201`ad8471f0 ffff9201`ad8471f0 ffff9201`ad8471f0 00000000`00000000 : afd!AfdFastIoDeviceControl+0x1857
fffffd88`8499f190 fffff801`285cb2a6     : 00000000`00000001 00007ff9`6def0740 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x45e
fffffd88`8499f380 fffff801`282274e8     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`2856d3b0 : nt!NtDeviceIoControlFile+0x56
fffffd88`8499f3f0 00007ff9`783cf4d4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000006f`d49fe188 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`783cf4d4

There have been issues like this before caused by hacking/spam protection incorrectly flagging messages like this. Hopefully someone can look into it now that you’ve reported it.

Hi. I was getting BSOD (unfortunately no dump file generated), with an Event Viewer Kernel error of “Windows boot environment failed load the HSP firmware. StatusCode: {File Not Found}”.

I found that I could eliminate the BSOD if I changed the PCI Express State Link Management setting in the power plan to “Moderate power savings” instead of the “Maximum power savings”.

Seems like there is a problem somewhere in the management of the power state on PCIE.