From nobody Thu Jan 29 02:01:23 2026 X-Original-To: virtualization@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4f1j6q1rbmz6Qcry for ; Thu, 29 Jan 2026 02:01:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R13" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4f1j6q1NC2z3Wkg for ; Thu, 29 Jan 2026 02:01:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1769652083; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=L1tND8TAVrACJ/IRrsTRoDcRLxoDoRA/gV6UjvPx2w4=; b=Otla9THlVKhEWhJ/ju1WQBvkKIfr3rvxhF3lGHuCxuKZFWUfHpePw6SAve2Bs2g2XSQmqg 7+/4SDhZHkFg3nb0GrolFgYvpo67UXJyxdRhVIXaAMRkqJnTdbLvUpwRSZALU+N6vx5So0 fw0YjHBiptVPN/9t+t/c4EDWdp04rWECfG9Ri18Rfiafs23Myj3x8u/L1o9F9Mz3+eqIjz aX/MaBnSj6Kl1tpXACNGe+o+HRsudYLsan+JFCyHixWp2jJ+5uPE0FzQHybCaP9dOdjWMA kyL1p6bKFMbBU8zuCo9QApLZlgXRpVk84KGR6QJcqlfpjKJOrr8DKCShAs5dQw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1769652083; a=rsa-sha256; cv=none; b=We77rPQbewM+OMfGxDgB5dGUC3fQtEnIbbLL6a9SMjxPxu3ycwW4qohSBnpGb8Qz8xFGpA +x22lmbdSH98Cy6QhaOtILs57ZT1ck/yHT5670wXYwhr2ayfo9O+u494qDNVHgGpKA/wVD Gp6CjvrAV4y67R67Fp4cPCBgx+Z0Q/Tls/+f7wb3F677VLq8Tk8x/0oSQzhHd6ysip3af7 Y8kACIQJ4rHVmYLXFtX9M4Ou4GLt3pUO/AmDEGODUuqIlMOZW1tKGUdCzaSOcf9qCd9qSr sXc1KvxvQALENpCeuwUNbjQrG1UNLsoyNGRikjvNloYcHMJlvHFynuVlqAHuJg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1769652083; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=L1tND8TAVrACJ/IRrsTRoDcRLxoDoRA/gV6UjvPx2w4=; b=s3XTKKKnU0rKLIaFB3cvmnGuuqm07PvQ/Gjga0LeFP+lebgEgWeFUM/Q40GYA1kQvSrbGa q8zglnhcXjPWQ78dEN4bFse22YqTNQhEXtDhXXRu0SsyX5Mqt+TrhlbB2nUNxFqmOXGXJG SM2b6qryUkPcrczBhni9l5akUfcPyUvg/co6FLamtRZipr0+6v9tiAyesr6A5UzgpvT3mk LPYXg1+7G8EgHDqKRmgN+feV1gRrdld+V5tZmXH8jGvAOvhwRNRTfCvDqkcbXilprZjwLS mgQdckVVmrR0bg4xk1OtawSQ+WZvfuyibj4tu+RYRv3xWPYhennZmadm+QPU4w== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4f1j6q0rP1z3CM for ; Thu, 29 Jan 2026 02:01:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 60T21MFo087944 for ; Thu, 29 Jan 2026 02:01:22 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 60T21MlZ087943 for virtualization@FreeBSD.org; Thu, 29 Jan 2026 02:01:22 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: virtualization@FreeBSD.org Subject: [Bug 292798] bhyve: VMX triple fault in efi windows bootloader Date: Thu, 29 Jan 2026 02:01:23 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bhyve X-Bugzilla-Version: 15.0-STABLE X-Bugzilla-Keywords: bhyve X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: nikolaytihonov2022@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: virtualization@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status keywords bug_severity priority component assigned_to reporter Message-ID: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Discussion List-Archive: https://lists.freebsd.org/archives/freebsd-virtualization List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-virtualization@freebsd.org Sender: owner-freebsd-virtualization@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D292798 Bug ID: 292798 Summary: bhyve: VMX triple fault in efi windows bootloader Product: Base System Version: 15.0-STABLE Hardware: amd64 OS: Any Status: New Keywords: bhyve Severity: Affects Some People Priority: --- Component: bhyve Assignee: virtualization@FreeBSD.org Reporter: nikolaytihonov2022@gmail.com Hi.=20 I'm having not so great time with Windows Server under Bhyve. In fact it doesn't boot past windows bootmgr.efi or bootmgfw.efi - VMX Triple Fault root@z440:/usr/local/vm/vm-720 # bhyve \ -c 1,sockets=3D1,cores=3D1,threads=3D1 \ -m 4096M -w \ -l bootrom,/usr/local/share/uefi-firmware/BHYVE_UEFI.fd \ -U 56da390d-fc0d-11f0-81a2-5cb901933e24 \ -s 0,hostbridge \ -s 31,lpc \ -s 3:0,nvme,/dev/zvol/zroot/vm/vm-710-disk0 \ vm-720 vm exit[0] reason VMX rip 0x00000000015d1f37 inst_length 2 status 0 exit_reason 2 (Triple fault) qualification 0x0000000000000000 inst_type 0 inst_error=20=20=20 What have been tried: 1. Adding/removing virtio devices (NICs, disks) 2. Adding/removing nvme disk 3. Changing guest CPU (sockets/cores/threads) 4. Changing guest RAM size 5. Changing hostbridge to hostbridge_amd 6. Forcing virtio devices to use MSI instead of MSI-X (-W) 7. Igoring MSRs (-w) 8. x2APIC (-x) 9. Disabling MPtable geenration (-Y) As well as I tried different Windows versions. Booting from ISO directly, or booting from old backup - triple fault, but at different places. This server currently runs 6 bhyve VMs thorough vm-bhyve. Also runs VNET ja= ils and performs IPFW firewalling. FreeBSD and Linux UEFI guests run without issues flawlessly under Bhyve. Software FreeBSD 15-STABLE FreeBSD z440.mykola.lain 15.0-STABLE FreeBSD 15.0-STABLE stable/15-n281998-d76fb46307da GENERIC amd64 Hardware by Hewlett-Packard HP Z440 Jan 28 14:32:54 z440 kernel: CPU: Intel(R) Xeon(R) CPU E5-2683 v3 @ 2.00GHz (1995.47-MHz K8-class CPU) Jan 28 14:32:54 z440 kernel: Origin=3D"GenuineIntel" Id=3D0x306f2 Famil= y=3D0x6=20 Model=3D0x3f Stepping=3D2 Jan 28 14:32:54 z440 kernel:=20=20 Features=3D0xbfebfbff Jan 28 14:32:54 z440 kernel:=20=20 Features2=3D0x7ffefbff Jan 28 14:32:54 z440 kernel: AMD Features=3D0x2c000800 Jan 28 14:32:54 z440 kernel: AMD Features2=3D0x21 Jan 28 14:32:54 z440 kernel: Structured Extended Features=3D0x37ab Jan 28 14:32:54 z440 kernel: Structured Extended Features3=3D0x9c000400 Jan 28 14:32:54 z440 kernel: XSAVE Features=3D0x1 Jan 28 14:32:54 z440 kernel: VT-x: PAT,HLT,MTF,PAUSE,EPT,UG,VPID,VID,Post= Intr Jan 28 14:32:54 z440 kernel: TSC: P-state invariant, performance statisti= cs Jan 28 14:32:54 z440 kernel: real memory =3D 137438953472 (131072 MB) Jan 28 14:32:54 z440 kernel: avail memory =3D 134222069760 (128004 MB) BIOS is up to date Handle 0x0000, DMI type 0, 24 bytes Platform Firmware Information Vendor: Hewlett-Packard Version: M60 v02.61 Release Date: 03/23/2023 Address: 0xF0000 Runtime Size: 64 KiB ROM Size: 16 MiB Characteristics: PCI is supported PNP is supported Firmware is upgradeable Firmware shadowing is allowed Boot from CD is supported Selectable boot is supported EDD is supported Print screen service is supported (int 5h) 8042 keyboard services are supported (int 9h) Serial services are supported (int 14h) Printer services are supported (int 17h) ACPI is supported USB legacy is supported BIOS boot specification is supported Function key-initiated network boot is supported Targeted content distribution is supported UEFI is supported Platform Firmware Revision: 2.61 sysctl hw.vmm hw.vmm.amdvi.domain_id: 0 hw.vmm.amdvi.disable_io_fault: 0 hw.vmm.amdvi.ptp_level: 4 hw.vmm.amdvi.host_ptp: 1 hw.vmm.amdvi.enable: 0 hw.vmm.amdvi.count: 0 hw.vmm.npt.pmap_flags: 0 hw.vmm.svm.num_asids: 0 hw.vmm.svm.disable_npf_assist: 0 hw.vmm.svm.features: 4294967295 hw.vmm.svm.vmcb_clean: 1023 hw.vmm.vmx.l1d_flush_sw: 0 hw.vmm.vmx.l1d_flush: 1 hw.vmm.vmx.vpid_alloc_failed: 0 hw.vmm.vmx.posted_interrupt_vector: 253 hw.vmm.vmx.cap.posted_interrupts: 1 hw.vmm.vmx.cap.virtual_interrupt_delivery: 1 hw.vmm.vmx.cap.tpr_shadowing: 1 hw.vmm.vmx.cap.invpcid: 1 hw.vmm.vmx.cap.monitor_trap: 1 hw.vmm.vmx.cap.unrestricted_guest: 1 hw.vmm.vmx.cap.rdtscp: 1 hw.vmm.vmx.cap.rdpid: 0 hw.vmm.vmx.cap.wbinvd_exit: 1 hw.vmm.vmx.cap.pause_exit: 1 hw.vmm.vmx.cap.halt_exit: 1 hw.vmm.vmx.initialized: 1 hw.vmm.vmx.cr4_zeros_mask: 18446744073708017664 hw.vmm.vmx.cr4_ones_mask: 8192 hw.vmm.vmx.cr0_zeros_mask: 18446744071025197056 hw.vmm.vmx.cr0_ones_mask: 32 hw.vmm.vmx.no_flush_rsb: 0 hw.vmm.ept.pmap_flags: 1532 hw.vmm.vrtc.flag_broken_time: 1 hw.vmm.ppt.devices: 0 hw.vmm.iommu.enable: 1 hw.vmm.iommu.initialized: 0 hw.vmm.bhyve_xcpuids: 0 hw.vmm.topology.cpuid_leaf_b: 1 hw.vmm.create:=20 hw.vmm.destroy:=20 hw.vmm.maxcpu: 28 hw.vmm.trap_wbinvd: 0 hw.vmm.trace_guest_exceptions: 0 hw.vmm.ipinum: 252 hw.vmm.halt_detection: 1 --=20 You are receiving this mail because: You are the assignee for the bug.=