zlacker

[return to "Pluton is not currently a threat to software freedom"]
1. messe+sa[view] [source] 2022-01-09 03:37:29
>>foodst+(OP)
The fearmongering about Pluton feels very similar to the criticism that was levied against UEFI Secure Boot when it was being debuted. In the end, x86 systems didn't become any more locked down.

I predict that this will blow over, and won't be a big deal in a few years time once FOSS drivers for what is effectively just a new breed of TPM are released.

If in five years, it turns out I was wrong, I'll eat my hat. Although defining "my hat" by then might be difficult, as it'll probably be subscription based.

◧◩
2. jevote+zb[view] [source] 2022-01-09 03:46:42
>>messe+sa
> In the end, x86 systems didn't become any more locked down.

And non-x86 systems? Wasn't there a line of MS Surface devices where secure boot could not be disabled, and users were stuck with Windows? It feels careless to only care about x86, especially as other platforms proliferate.

In any case, lockdown is not the only threat that Trusted Computing presents. Remote attestation itself is dangerous. If we remove our x86 blinkers and look at the mobile world, we see it's already happening, with countless apps, including ones important to modern day life such as banking, refusing to run on rooted phones.

You may say, "Oh, I will use my x86 desktop system at home for Free Computing, and allow phones, consoles, tablets, surface devices, etc etc, to become locked down." Like the old free speech zones, this is a toothless freedom, tamed and neutered. The user-empowering Free Software you will write will have no users - they will be on locked devices.

◧◩◪
3. messe+ic[view] [source] 2022-01-09 03:53:31
>>jevote+zb
While that's true, with regard to some Surface devices, as I understand it, ARM systems have only become more open and interoperable over the past few years; although this holds true a lot more for the server side than desktop side.

The main issue these days is driver support. The PC platform was an anomaly in backwards compatibility, at least historically. I'm not arguing that it's going to be easy for FOSS. It's going to be an uphill battle, regardless of how locked down they are (and I'm just arguing that they won't be that locked down—see the recent M1 Macs for an example; Apple could easily have locked down those systems in exactly the same manner as iOS/iPadOS devices, but chose not to).

◧◩◪◨
4. my123+gd[view] [source] 2022-01-09 04:01:48
>>messe+ic
For arm: anything that runs Windows on Arm64 uses UEFI + ACPI, making stuff easier on that front.

Linux drivers for Qualcomm SoCs don't have extensive ACPI bindings at this point in time though, making the use of a separate devicetree necessary for full functionality. This will be mostly ironed out with time I suppose.

◧◩◪◨⬒
5. floatb+z21[view] [source] 2022-01-09 13:43:29
>>my123+gd
Didn't Linux developers say that Qualcomm's ACPI tables are a horrific Windows-specific mess that has close to zero standard PNP* things?
◧◩◪◨⬒⬓
6. my123+UI1[view] [source] 2022-01-09 18:02:35
>>floatb+z21
> Windows-specific mess that has close to zero standard PNP* things

Those are hardware dependent platform devices. Qualcomm didn’t have another option. (Nor do other manufacturers really)

On x86, a virtual PCIe bus abstraction is heavily used, which is not the case for those SoCs.

(And well, if Linux wants to boycott full support of their SoCs, their choice. They just can’t blame Qualcomm anymore at that point.)

Another thing of note is the use of a PEP (power management plug-in) in the OS instead of having power management done in AML. The ACPI spec allows a manufacturer to do this. It isn’t used only by Qualcomm, but is totally unsupported on Linux today.

◧◩◪◨⬒⬓⬔
7. floatb+BN1[view] [source] 2022-01-09 18:35:23
>>my123+UI1
Manufacturers have the option of producing standards-compliant goddamn hardware! Say for PCIe, even if it's a buggy and quirky implementation but it does support ECAM, you can still expose a PNP0A08 and deal with quirks in firmware (hello Socionext/Marvell/NXP).

> PEP (power management plug-in) in the OS […] ACPI spec allows a manufacturer to do this

Doing management in AML is almost the whole point of ACPI. Microsoft pushing this PEP thing into the ACPI spec is bad. This is the "letter" of ACPI now, unfortunately, but it's very much against the original "spirit" of ACPI :/

◧◩◪◨⬒⬓⬔⧯
8. my123+5U1[view] [source] 2022-01-09 19:18:54
>>floatb+BN1
> Manufacturers have the option of producing standards-compliant goddamn hardware

For PCIe indeed, but that’s not when the issues are present the most. There’s no standard register interface for integrated GPUs, modems…

> but it's very much against the original "spirit" of ACPI

Yup, it’s what Device Tree does too however, shifting this to the OS.

Another downside is trying to have a good driver-less boot scenario when PEPs are used, for the system to be able to go far enough until drivers can be installed. (N/A to Linux which is hostile to not in-tree drivers, but very much a concern on Windows)

[go to top]