qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* QEMU, UEFI and Windows with Bitlocker encryption
@ 2022-03-09 16:55 Jostein Kjønigsen
  2022-03-27 15:19 ` Jostein Kjønigsen
  0 siblings, 1 reply; 2+ messages in thread
From: Jostein Kjønigsen @ 2022-03-09 16:55 UTC (permalink / raw)
  To: QEMU Developers

[-- Attachment #1: Type: text/plain, Size: 946 bytes --]

Dear QEMU developers. 

I’m having some issues with one of my QEMU VMs. I’m not sure if the mailing list is the best place to get help, and if it’s a complete miss, feel free to direct me towards more appropriate venues. 

My case in short: I have a Windows 11 VM with BitLocker encryption which is imported from a physical volume. I run it through virt-manager, booting with UEFI through OVMF, tpm pass-through and it boots just fine. 

What is annoying is that I have to manually enter the 48-digit BitLocker recovery key on every boot. 

I would assume these keys should get stored in EFI vars or TPM somewhere? If so, shouldn’t they be persisted when the VM is rebooted or powered off?

Any advice on how I can resolve this situation would be greatly appreciated. 

--
Kind regards
Jostein Kjønigsen

jostein@kjonigsen.net 🍵 jostein@gmail.com
https://jostein.kjønigsen.no <https://jostein.xn--kjnigsen-64a.no/>

[-- Attachment #2: Type: text/html, Size: 1621 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-03-27 15:21 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-03-09 16:55 QEMU, UEFI and Windows with Bitlocker encryption Jostein Kjønigsen
2022-03-27 15:19 ` Jostein Kjønigsen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).