well, i tried that, but i ran into several issues:
it wouldnt let me do anything but win11 home edition
it demaned i create a microsoft account
it wouldnt keep my license number
so i gave up, recovered from a backup and did the upgrade process
On 8/21/22 11:16 AM, Brett Peckinpaugh wrote:
Honestly your better off doing a fresh install. From what I see and
hear performance is effected with an in place upgrade
On Aug 21, 2022, at 6:19 AM, Roger Lawhorn <r...@twc.com> wrote:
i got it all worked out
i had to emulate TPM 2.0, boot win10 and convert my mbr hard drive
to GPT, shutdown and switch to uefi and boot win10, and manually
run the win11 setup from a thumbdrive
i had previously told qemu i had an amd EPYC cpu due to issues
with threadrippers at the time.
win11 wont accept EPYC so i had to uninstall the epyc processors
one at a time, tell qemu to pass through the host cpu instead
(-cpu host).
i was allowed to keep my win10 license and did not have to make a
microsoft account
overall, not pleasant but doable
On 8/20/22 9:20 PM, Brett Peckinpaugh wrote:
You also need secure boot enabled bios even if you do not fully
use it. Have it working on a VM as well
On Aug 20, 2022, at 4:55 PM, Roger Lawhorn < r...@twc.com> wrote:
i added tmp 2.0 support to my virt machine.
windows pc health check says i dont qualify for windows 11.
my amd epyc cpu is not supported and i dont use secure boot
says tpm not detected and yet the device manager shows tpm 2.0 installed
i can add secure boot if needed
On 8/4/21 10:24 AM, Roger Lawhorn wrote:
i found this:
https://titanwolf.org/Network/Articles/Article?AID=61faf297-0fb8-4dac-babc-877e889b896e#gsc.tab=0
On 8/3/21 8:36 PM, Ivan Volosyuk wrote:
It's a package, just run in your gentoo box: emerge
swtpm And setup using:
https://qemu-project.gitlab.io/qemu/specs/tpm.html On
Wed, Aug 4, 2021 at 2:49 AM Roger Lawhorn
<r...@twc.com> wrote:
how do i install swtpm? is it a package in my
repo or do i need to compile the source code? i
dont use libvert, i run a qemu script to launch
windows 10 how do i tell qemu that it needs to
use it? is it an additional switch on the command
line? thanks On 8/3/21 2:20 AM, Brett Peckinpaugh
wrote: I found my issue, it was mainly I was
still using the i440fx and needed to switch to
q35. Which required a bit more work, and as I
had to rebuild and reinstall windows I used the
secure boot OVMF and with that I should be if I
decide to 100% windows 11 compliant. You will
need to install swtpm and might have to correct
some permissions based on your install, and what
user and it's permissions that are running your
qemu and libvirt. On Mon, Aug 2, 2021 at 9:39 PM
Roger Lawhorn <r...@twc.com> wrote:
We are all facing a forced upgrade to windows
11 so we must answer this question. Thanks
for asking it. I am not familiar with TPM in
virt machines so I decline to comment. On
7/2/21 2:03 AM, Brett Peckinpaugh wrote: With
Win 11 coming I figured I would spend a bit
of time tinkering and see I could be ready if
I decided it isn't the junk OS that every
other windows OS is. I run a guest with OVMF
for UEFI and pass through a PCIE video card.
Everything works fine. Challenge I am running
into is I installed swtpm, then added a
software TPM to my guest. System boots and
runs fine but the TPM fails to start in the
Windows guest with a code of 10. From Linux
it all looks good. Windows events just say
generic failure messages. To confuse me more,
I have a server with a guest running windows
that is just virtual. Added the TPM and it
shows up and is working on that guest. Host
is Manjaro flavor of Arch. Linux logs for the
TPM seems good. Any ideas? I tried to boot
using a secure boot enabled version of OVMF
and guest would not even start. Starting vTPM
manufacturing as root:root @ Thu 01 Jul 2021
10:48:40 PM PDT Successfully created RSA 2048
EK with handle 0x81010001. Invoking
/usr/share/swtpm/swtpm-localca --type ek --ek
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
--dir
/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2
--logfile
/var/log/swtpm/libvirt/qemu/Megaera-swtpm.log
--vmid
Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a
--tpm-spec-family 2.0 --tpm-spec-level 0
--tpm-spec-revision 162 --tpm-manufacturer
id:00001014 --tpm-model swtpm --tpm-version
id:20191023 --tpm2 --configfile
/etc/swtpm-localca.conf --optsfile
/etc/swtpm-localca.options Successfully
created EK certificate locally. Invoking
/usr/share/swtpm/swtpm-localca --type
platform --ek
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
--dir
/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2
--logfile
/var/log/swtpm/libvirt/qemu/Megaera-swtpm.log
--vmid
Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a
--tpm-spec-family 2.0 --tpm-spec-level 0
--tpm-spec-revision 162 --tpm-manufacturer
id:00001014 --tpm-model swtpm --tpm-version
id:20191023 --tpm2 --configfile
/etc/swtpm-localca.conf --optsfile
/etc/swtpm-localca.options Successfully
created platform certificate locally.
Successfully created NVRAM area 0x1c00002 for
RSA 2048 EK certificate. Successfully created
NVRAM area 0x1c08000 for platform
certificate. Successfully created ECC EK with
handle 0x81010016. Invoking
/usr/share/swtpm/swtpm-localca --type ek --ek
x=0ecc2c9a02316295724304fcdeb9802c6d2f2d5fa40c34717ea9ff64f4d5e969c79f6eaba9bf4f8e6c67416057542a7e,y=6d54604b00bbbc83f8e9d02983c3486514218c9eabf29dbfc692058506828b299cec8605be490173ebe1727719ff5c90,id=secp384r1
--dir
/var/lib/libvirt/swtpm/5e3c8d62-c0ef-41d7-9b7f-cddf618df88a/tpm2
--logfile
/var/log/swtpm/libvirt/qemu/Megaera-swtpm.log
--vmid
Megaera:5e3c8d62-c0ef-41d7-9b7f-cddf618df88a
--tpm-spec-family 2.0 --tpm-spec-level 0
--tpm-spec-revision 162 --tpm-manufacturer
id:00001014 --tpm-model swtpm --tpm-version
id:20191023 --tpm2 --configfile
/etc/swtpm-localca.conf --optsfile
/etc/swtpm-localca.options Successfully
created EK certificate locally. Successfully
created NVRAM area 0x1c00016 for ECC EK
certificate. Successfully activated PCR banks
sha1,sha256 among sha1,sha256,sha384,sha512.
Successfully authored TPM state. Ending vTPM
manufacturing @ Thu 01 Jul 2021 10:48:40 PM PDT
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
------------------------------------------------------------------------
vfio-users mailing list
vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users
_______________________________________________
vfio-users mailing list
vfio-users@redhat.com
https://listman.redhat.com/mailman/listinfo/vfio-users