Honestly your better off doing a fresh install. From what I see and hear performance is effected with an in place upgrade
On Aug 21, 2022, 6:19 AM, at 6:19 AM, Roger Lawhorn <r...@twc.com> wrote: >i got it all worked out >i had to emulate TPM 2.0, boot win10 and convert my mbr hard drive to >GPT, shutdown and switch to uefi and boot win10, and manually run the >win11 setup from a thumbdrive >i had previously told qemu i had an amd EPYC cpu due to issues with >threadrippers at the time. >win11 wont accept EPYC so i had to uninstall the epyc processors one at > >a time, tell qemu to pass through the host cpu instead (-cpu host). > >i was allowed to keep my win10 license and did not have to make a >microsoft account >overall, not pleasant but doable > > >On 8/20/22 9:20 PM, Brett Peckinpaugh wrote: >> You also need secure boot enabled bios even if you do not fully use >> it. Have it working on a VM as well >> On Aug 20, 2022, at 4:55 PM, Roger Lawhorn <r...@twc.com> wrote: >> >> i added tmp 2.0 support to my virt machine. >> windows pc health check says i dont qualify for windows 11. >> my amd epyc cpu is not supported and i dont use secure boot >> says tpm not detected and yet the device manager shows tpm 2.0 >installed >> i can add secure boot if needed >> >> On 8/4/21 10:24 AM, Roger Lawhorn wrote: >> >> i found this: >> >https://titanwolf.org/Network/Articles/Article?AID=61faf297-0fb8-4dac-babc-877e889b896e#gsc.tab=0 >> On 8/3/21 8:36 PM, Ivan Volosyuk wrote: >> >> It's a package, just run in your gentoo box: emerge swtpm >> And setup using: >> https://qemu-project.gitlab.io/qemu/specs/tpm.html On >Wed, >> Aug 4, 2021 at 2:49 AM Roger Lawhorn <r...@twc.com> wrote: >> >> how do i install swtpm? is it a package in my repo or >> do i need to compile the source code? i dont use >> libvert, i run a qemu script to launch windows 10 how >> do i tell qemu that it needs to use it? is it an >> additional switch on the command line? thanks On >> 8/3/21 2:20 AM, Brett Peckinpaugh wrote: I found my >> issue, it was mainly I was still using the i440fx and >> needed to switch to q35. Which required a bit more >> work, and as I had to rebuild and reinstall windows I >> used the secure boot OVMF and with that I should be >if >> I decide to 100% windows 11 compliant. You will need >> to install swtpm and might have to correct some >> permissions based on your install, and what user and >> it's permissions that are running your qemu and >> libvirt. On Mon, Aug 2, 2021 at 9:39 PM Roger Lawhorn >> <r...@twc.com> wrote: >> >> We are all facing a forced upgrade to windows 11 >> so we must answer this question. Thanks for >asking >> it. I am not familiar with TPM in virt machines >so >> I decline to comment. On 7/2/21 2:03 AM, Brett >> Peckinpaugh wrote: With Win 11 coming I figured I >> would spend a bit of time tinkering and see I >> could be ready if I decided it isn't the junk OS >> that every other windows OS is. I run a guest >> with OVMF for UEFI and pass through a PCIE video >> card. Everything works fine. Challenge I am >> running into is I installed swtpm, then added a >> software TPM to my guest. System boots and runs >> fine but the TPM fails to start in the Windows >> guest with a code of 10. From Linux it all looks >> good. Windows events just say generic failure >> messages. To confuse me more, I have a server >with >> a guest running windows that is just virtual. >> Added the TPM and it shows up and is working on >> that guest. Host is Manjaro flavor of Arch. >Linux >> logs for the TPM seems good. Any ideas? I tried >> to boot using a secure boot enabled version of >> OVMF and guest would not even start. Starting >vTPM >> manufacturing as root:root @ Thu 01 Jul 2021 >> 10:48:40 PM PDT Successfully created RSA 2048 EK >> with handle 0x81010001. Invoking >> /usr/share/swtpm/swtpm-localca --type ek --ek >> >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 >> --dir >> >/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2 >> --logfile >> /var/log/swtpm/libvirt/qemu/Megaera-swtpm.log >> --vmid >> Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a >> --tpm-spec-family 2.0 --tpm-spec-level 0 >> --tpm-spec-revision 162 --tpm-manufacturer >> id:00001014 --tpm-model swtpm --tpm-version >> id:20191023 --tpm2 --configfile >> /etc/swtpm-localca.conf --optsfile >> /etc/swtpm-localca.options Successfully created >EK >> certificate locally. Invoking >> /usr/share/swtpm/swtpm-localca --type platform >> --ek >> >ac3b97418acfd724aed5d9dcc0f0e10a1a90b04ab21525115e7bb00009b9ea63525acc5ac367deef59d99620f129417f21e1419edaebd8b1f385a5b874b463d744c609b2f4c6fc00bfe5712bea7d7506e29ba8b4cb34e1b3c90d3f5a1805ba52628751aef659959d12a33d5238ec82bfa0b04ebab52bde403c9291f80a949de6303af04aa1a706ca4b054f45e94d4749b729ddf2b50849abaae1f681c3bb48ddfce1166fd804b9197d14af5fff9a52e48b0707916091516ed67c4c1e519b51478ecc25c89d9ad7a6f1e29e263b35cb54ca75ebe8bc2d7a82a3f262108abc75592467ccf5defe9e46f3706cc90ae67a4b38910e61a05ff62a9d3ec383bd352143 >> --dir >> >/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2 >> --logfile >> /var/log/swtpm/libvirt/qemu/Megaera-swtpm.log >> --vmid >> Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a >> --tpm-spec-family 2.0 --tpm-spec-level 0 >> --tpm-spec-revision 162 --tpm-manufacturer >> id:00001014 --tpm-model swtpm --tpm-version >> id:20191023 --tpm2 --configfile >> /etc/swtpm-localca.conf --optsfile >> /etc/swtpm-localca.options Successfully created >> platform certificate locally. Successfully >created >> NVRAM area 0x1c00002 for RSA 2048 EK certificate. >> Successfully created NVRAM area 0x1c08000 for >> platform certificate. Successfully created ECC EK >> with handle 0x81010016. Invoking >> /usr/share/swtpm/swtpm-localca --type ek --ek >> >x=0ecc2c9a02316295724304fcdeb9802c6d2f2d5fa40c34717ea9ff64f4d5e969c79f6eaba9bf4f8e6c67416057542a7e,y=6d54604b00bbbc83f8e9d02983c3486514218c9eabf29dbfc692058506828b299cec8605be490173ebe1727719ff5c90,id=secp384r1 >> --dir >> >/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2 >> --logfile >> /var/log/swtpm/libvirt/qemu/Megaera-swtpm.log >> --vmid >> Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a >> --tpm-spec-family 2.0 --tpm-spec-level 0 >> --tpm-spec-revision 162 --tpm-manufacturer >> id:00001014 --tpm-model swtpm --tpm-version >> id:20191023 --tpm2 --configfile >> /etc/swtpm-localca.conf --optsfile >> /etc/swtpm-localca.options Successfully created >EK >> certificate locally. Successfully created NVRAM >> area 0x1c00016 for ECC EK certificate. >> Successfully activated PCR banks sha1,sha256 >among >> sha1,sha256,sha384,sha512. Successfully authored >> TPM state. Ending vTPM manufacturing @ Thu 01 Jul >> 2021 10:48:40 PM PDT >> >------------------------------------------------------------------------ >> vfio-users mailing list vfio-users@redhat.com >> >https://listman.redhat.com/mailman/listinfo/vfio-users >> >> >------------------------------------------------------------------------ >> vfio-users mailing list vfio-users@redhat.com >> >https://listman.redhat.com/mailman/listinfo/vfio-users >> >> >> >------------------------------------------------------------------------ >> vfio-users mailing list vfio-users@redhat.com >> >https://listman.redhat.com/mailman/listinfo/vfio-users >> >> >------------------------------------------------------------------------ >> vfio-users mailing list vfio-users@redhat.com >> https://listman.redhat.com/mailman/listinfo/vfio-users >> >> >> >> >------------------------------------------------------------------------ >> >> vfio-users mailing list >> vfio-users@redhat.com >> https://listman.redhat.com/mailman/listinfo/vfio-users >>
_______________________________________________ vfio-users mailing list vfio-users@redhat.com https://listman.redhat.com/mailman/listinfo/vfio-users