i got it all worked out
i had to emulate TPM 2.0, boot win10 and convert my mbr hard drive to
GPT, shutdown and switch to uefi and boot win10, and manually run the
win11 setup from a thumbdrive
i had previously told qemu i had an amd EPYC cpu due to issues with
threadrippers at the time.
win11 wont accept EPYC so i had to uninstall the epyc processors one at
a time, tell qemu to pass through the host cpu instead (-cpu host).
i was allowed to keep my win10 license and did not have to make a
microsoft account
overall, not pleasant but doable
On 8/20/22 9:20 PM, Brett Peckinpaugh wrote:
You also need secure boot enabled bios even if you do not fully use
it. Have it working on a VM as well
On Aug 20, 2022, at 4:55 PM, Roger Lawhorn <r...@twc.com> wrote:
i added tmp 2.0 support to my virt machine.
windows pc health check says i dont qualify for windows 11.
my amd epyc cpu is not supported and i dont use secure boot
says tpm not detected and yet the device manager shows tpm 2.0 installed
i can add secure boot if needed
On 8/4/21 10:24 AM, Roger Lawhorn wrote:
i found this:
https://titanwolf.org/Network/Articles/Article?AID=61faf297-0fb8-4dac-babc-877e889b896e#gsc.tab=0
On 8/3/21 8:36 PM, Ivan Volosyuk wrote:
It's a package, just run in your gentoo box: emerge swtpm
And setup using:
https://qemu-project.gitlab.io/qemu/specs/tpm.html On Wed,
Aug 4, 2021 at 2:49 AM Roger Lawhorn <r...@twc.com> wrote:
how do i install swtpm? is it a package in my repo or
do i need to compile the source code? i dont use
libvert, i run a qemu script to launch windows 10 how
do i tell qemu that it needs to use it? is it an
additional switch on the command line? thanks On
8/3/21 2:20 AM, Brett Peckinpaugh wrote: I found my
issue, it was mainly I was still using the i440fx and
needed to switch to q35. Which required a bit more
work, and as I had to rebuild and reinstall windows I
used the secure boot OVMF and with that I should be if
I decide to 100% windows 11 compliant. You will need
to install swtpm and might have to correct some
permissions based on your install, and what user and
it's permissions that are running your qemu and
libvirt. On Mon, Aug 2, 2021 at 9:39 PM Roger Lawhorn
<r...@twc.com> wrote:
We are all facing a forced upgrade to windows 11
so we must answer this question. Thanks for asking
it. I am not familiar with TPM in virt machines so
I decline to comment. On 7/2/21 2:03 AM, Brett
Peckinpaugh wrote: With Win 11 coming I figured I
would spend a bit of time tinkering and see I
could be ready if I decided it isn't the junk OS
that every other windows OS is. I run a guest
with OVMF for UEFI and pass through a PCIE video
card. Everything works fine. Challenge I am
running into is I installed swtpm, then added a
software TPM to my guest. System boots and runs
fine but the TPM fails to start in the Windows
guest with a code of 10. From Linux it all looks
good. Windows events just say generic failure
messages. To confuse me more, I have a server with
a guest running windows that is just virtual.
Added the TPM and it shows up and is working on
that guest. Host is Manjaro flavor of Arch. Linux
logs for the TPM seems good. Any ideas? I tried
to boot using a secure boot enabled version of
OVMF and guest would not even start. Starting vTPM
manufacturing as root:root @ Thu 01 Jul 2021
10:48:40 PM PDT Successfully created RSA 2048 EK
with handle 0x81010001. Invoking
/usr/share/swtpm/swtpm-localca --type ek --ek
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
--dir
/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2
--logfile
/var/log/swtpm/libvirt/qemu/Megaera-swtpm.log
--vmid
Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a
--tpm-spec-family 2.0 --tpm-spec-level 0
--tpm-spec-revision 162 --tpm-manufacturer
id:00001014 --tpm-model swtpm --tpm-version
id:20191023 --tpm2 --configfile
/etc/swtpm-localca.conf --optsfile
/etc/swtpm-localca.options Successfully created EK
certificate locally. Invoking
/usr/share/swtpm/swtpm-localca --type platform
--ek
ac3b97418acfd724aed5d9dcc0f0e10a1a90b04ab21525115e7bb00009b9ea63525acc5ac367deef59d99620f129417f21e1419edaebd8b1f385a5b874b463d744c609b2f4c6fc00bfe5712bea7d7506e29ba8b4cb34e1b3c90d3f5a1805ba52628751aef659959d12a33d5238ec82bfa0b04ebab52bde403c9291f80a949de6303af04aa1a706ca4b054f45e94d4749b729ddf2b50849abaae1f681c3bb48ddfce1166fd804b9197d14af5fff9a52e48b0707916091516ed67c4c1e519b51478ecc25c89d9ad7a6f1e29e263b35cb54ca75ebe8bc2d7a82a3f262108abc75592467ccf5defe9e46f3706cc90ae67a4b38910e61a05ff62a9d3ec383bd352143
--dir
/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2
--logfile
/var/log/swtpm/libvirt/qemu/Megaera-swtpm.log
--vmid
Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a
--tpm-spec-family 2.0 --tpm-spec-level 0
--tpm-spec-revision 162 --tpm-manufacturer
id:00001014 --tpm-model swtpm --tpm-version
id:20191023 --tpm2 --configfile
/etc/swtpm-localca.conf --optsfile
/etc/swtpm-localca.options Successfully created
platform certificate locally. Successfully created
NVRAM area 0x1c00002 for RSA 2048 EK certificate.
Successfully created NVRAM area 0x1c08000 for
platform certificate. Successfully created ECC EK
with handle 0x81010016. Invoking
/usr/share/swtpm/swtpm-localca --type ek --ek
x=0ecc2c9a02316295724304fcdeb9802c6d2f2d5fa40c34717ea9ff64f4d5e969c79f6eaba9bf4f8e6c67416057542a7e,y=6d54604b00bbbc83f8e9d02983c3486514218c9eabf29dbfc692058506828b299cec8605be490173ebe1727719ff5c90,id=secp384r1
--dir
/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2
--logfile
/var/log/swtpm/libvirt/qemu/Megaera-swtpm.log
--vmid
Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a
--tpm-spec-family 2.0 --tpm-spec-level 0
--tpm-spec-revision 162 --tpm-manufacturer
id:00001014 --tpm-model swtpm --tpm-version
id:20191023 --tpm2 --configfile
/etc/swtpm-localca.conf --optsfile
/etc/swtpm-localca.options Successfully created EK
certificate locally. Successfully created NVRAM
area 0x1c00016 for ECC EK certificate.
Successfully activated PCR banks sha1,sha256 among
sha1,sha256,sha384,sha512. Successfully authored
TPM state. Ending vTPM manufacturing @ Thu 01 Jul
2021 10:48:40 PM PDT
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list
vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
_______________________________________________
vfio-users mailing list
vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users