English Portuguese (Brazil)
Optionally Configure libvirtd to advertise UEFI support
Libvirt needs to know about UEFI->NVRAM config file mapping, so it can advertise it to tools like virt-manager/virt-install. On Fedora 22 and later, libvirt packages are configured to look for the nightly build paths, so this will work out of the box.
However, if you want to use custom binaries, you will need to edit the nvram variable in /etc/libvirt/qemu.conf and restart libvirtd.
Creating a VM
Create a new VM in virt-manager. When you get to the final page of the 'New VM' wizard, do the following:
Click 'Customize before install', then select 'Finish'
On the 'Overview' screen, Change the 'Firmware' field to select the 'UEFI x86_64' option.
Click 'Begin Installation'
The boot screen you'll see should use `linuxefi` commands to boot the installer, and you should be able to run `efibootmgr` inside that system, to verify that you're running an UEFI OS.
Add `--boot uefi` to your `virt-install` command. Example:
` sudo virt-install --name f20-uefi \` + `   --ram 2048 --disk size=20 \` + `   --boot uefi \` + `   --location `https://dl.fedoraproject.org/pub/fedora/linux/releases/22/Workstation/x86_64/os/[`https://dl.fedoraproject.org/pub/fedora/linux/releases/22/Workstation/x86_64/os/`]
Testing Secureboot in a VM
These steps describe how to test Fedora Secureboot support inside a KVM VM. The audience here is QA folks that want to test secureboot, and any other curious parties. This requires configuring the VM to use UEFI, so it builds upon the previous UEFI steps.
Run EnrollDefaultKeys.efi
(Formerly this article recommended the independent utility "LockDown_ms.efi".)
Since OVMF doesn't ship with any SecureBoot keys installed, we need to install some to mimic what an MS certified UEFI machine will ship with. OVMF now ships with the binaries required to set up a default set of keys. The easiest way is to use UefiShell.iso which is available at `/usr/share/edk2/ovmf/UefiShell.iso`. Boot your VM with this as the CD-ROM image and it should boot into the UEFI shell. At the prompt
Shell> fs0:
FS0:\> EnrollDefaultKeys.efi
FS0:\> reset