Hi everyone:
I've already opened a ticket on Dell's Forum, but had no luck. Perhaps, someone has an idea about how to solve this problem:
Problem description: Error when trying to launch a VM with "Virtualize Intel VT-x/EPT or AMD-V/RVI" enabled to use nested virtualization ("VMware does not support nested virtualization on this host. Module 'HV' power on failed. Failed to start the virtual machine"):
vm_settings.png
vm_info_1.png
vm_info_2.png
Environment description:
Discards and tests made:
bios_change_1.png
bios_change_2.png
Did you verify that all the steps you took to disable Hyper-V and associated technologies actually worked? Check the vmware.log file and look for a line starting "Monitor mode" which should be "CPL0" if you are running under the VMware hypervisor. If it says "ULM", you're still running some remnant of Hyper-V and you'll need to make sure you got ALL the settings right
Hi Technogeezer, thanks for your answer. As you pointed out Monitor Mode says "ULM". So I will try to figure out what else I can do to actually get rid of Hyper-V.
The "Enable OS Kernel DMA Support" in the host UEFI should be "OFF". You should see in msinfo32 "Kernel DMA Protection" as "Off". If it is not "off" despite turning off "Enable OS Kernel DMA Support", try turning "OFF" "VT for Direct I/O" as kernel DMA protection has a dependency on VT-d.
The "Virtualization-based security" value should be "not enabled" as well in msinfo32. A value of "Running" would also result in "ULM" instead of "CPL0" for VMware VMs.
Hi bluefirestorm , I disabled "Enable OS Kernel DMA Support" and "Enable Intel VT for Direct I/O" on the BIOS (see
bios_setup_virtualization_support_1.png, and bios_setup_virtualization_support_1.png).
After the machine booted up, system information showed "Kernel DMA Protection" as "OFF" but "Virtualization-based security" still showed "Running" status (see system_info.png). Unfortunately, Monitor Mode is still ULM.
The UEFI setting only affects the "Kernel DMA Protection".
The msinfo32 screenshot shows "Windows Defender Application Guard" as "Enforced"; the "Windows Defender Application Guard" from the turn on/off Windows feature also has to be removed (aside from WSL2, Virtual Machine Platform, Windows Sandbox, etc).
As for VBS, you could try one more round with this post (try Phase 2 and Phase 3).
https://communities.vmware.com/t5/VMware-Workstation-Pro/Disabling-Hyper-V-hypervisor-on-Windows-11-...
If the machine is a member of an AD domain (maybe it is??? AzureAD\ is prefixed to the User Name in msinfo32), things like VBS can be enforced through Domain Policy as well, if that is the case you will need to talk to your AD Domain Admin.
Finally worked with Phase 3 procedure of the referenced link https://communities.vmware.com/t5/VMware-Workstation-Pro/Disabling-Hyper-V-hypervisor-on-Windows-11-...
I'm attaching some screenshots so other people with the same problem can use them as complement of the referenced link.
1. in_reboot_confirmation_1.png
2. in_reboot_confirmation_2.png
3. after_reboot.png
Finally, the vmware.log for the VM shows: "vmx Monitor Mode: CPL0"
Thanks to everyone for your help!