LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 12-18-2020, 03:06 PM   #1
jheengut
Member
 
Registered: Sep 2006
Location: Providence, Moka Mauritius
Distribution: Slackware, Lubuntu
Posts: 352
Blog Entries: 16

Rep: Reputation: 51
UEFI Class 3 :: To use UEFI, or not to use UEFI?


In the file README_UEFI.TXT in the slackware64 iso's and tree

Quote:
To use UEFI, or not to use UEFI? Unless your computer came with a preinstalled version of Windows that requires UEFI, switching to Legacy Boot (aka, traditional BIOS) is an option.
But with upcoming UEFI Class 3, Compatibility Support Module will be dead as the Dodo and no BIOS interface will be present.

I don't think that the moto "" To use UEFI, or not to use UEFI? "" will be here to stay in the foreseen future.



https://www.uefi.org/sites/default/f...ntel_Final.pdf
 
Old 12-18-2020, 04:04 PM   #2
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
That presentation is all about promoting what the author calls "UEFI Mode 3+", meaning UEFI Mode 3 w/Secure Boot.

That will indeed be the end of all Slackware installation issues, since we won't be able to boot from unsigned media at all.
 
Old 12-18-2020, 04:15 PM   #3
jefro
Moderator
 
Registered: Mar 2008
Posts: 22,008

Rep: Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629Reputation: 3629
The writers of bios/uefi have never seemed to read or follow the standards. UEFI has many features that one may wish to use and in some cases have to use.

You will be able to find current models for some time I suspect.
When uefi/efi first came out there was a death cry from linux users. Still running.

"
UEFI machines can have one of the following "classes", which were used to help ease the transition to UEFI.

Class 0:Legacy BIOS
Class 1:Legacy BIOS with UEFI code, although it does not support UEFI booting.
Class 2:UEFI with CSM
Class 3:UEFI without CSM"

https://www.quora.com/What-is-class-...option-in-BIOS

Last edited by jefro; 12-18-2020 at 04:16 PM.
 
Old 12-18-2020, 07:00 PM   #4
Timothy Miller
Moderator
 
Registered: Feb 2003
Location: Arizona, USA
Distribution: Debian, EndeavourOS, OpenSUSE, KDE Neon
Posts: 4,007
Blog Entries: 26

Rep: Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522Reputation: 1522
Class 3 has been used in some laptops for a while now. I know several HP's that I've read about do not have the ability to turn on CSM. I don't BELIEVE I've seen a Dell or Lenovo yet that can't, but I'm not sure, since I think getting rid of CSM will be one of the best things ever, since it'll eliminate the single major reason people have failed UEFI installs nowadays.

Last edited by Timothy Miller; 12-18-2020 at 07:01 PM.
 
Old 12-18-2020, 07:29 PM   #5
truepatriot76
Member
 
Registered: Apr 2014
Location: California, USA
Distribution: slackware64-current
Posts: 232

Rep: Reputation: 195Reputation: 195
I bit the bullet and have ditched csm and legacy boot about a year ago on all my machines (except for an ancient laptop). I saw the writing on the wall. As far as Class 3+, I'm confident linux in general will adapt and work out a way to co-exist with or mitigate secure boot.
 
Old 12-19-2020, 01:19 AM   #6
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by truepatriot76 View Post
As far as Class 3+, I'm confident linux in general will adapt and work out a way to co-exist with or mitigate secure boot.
That is literally impossible.

Which is why it wasn't (and still isn't) possible to install Linux on the old ARM-based Surface laptops. You would need Microsoft-signed boot files, and Microsoft is the only party who has the keys.
 
Old 12-19-2020, 02:59 AM   #7
enorbet
Senior Member
 
Registered: Jun 2003
Location: Virginia
Distribution: Slackware = Main OpSys
Posts: 4,797

Rep: Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436Reputation: 4436
Hmmmm.... is there a UEFI equivalent to good ol' "modbin"?
 
Old 12-19-2020, 03:24 AM   #8
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by enorbet View Post
Hmmmm.... is there a UEFI equivalent to good ol' "modbin"?
No. The UEFI firmware images are all signed.
 
Old 12-19-2020, 04:56 AM   #9
ZhaoLin1457
Senior Member
 
Registered: Jan 2018
Posts: 1,032

Rep: Reputation: 1238Reputation: 1238Reputation: 1238Reputation: 1238Reputation: 1238Reputation: 1238Reputation: 1238Reputation: 1238Reputation: 1238
Quote:
Originally Posted by Ser Olmy View Post
That is literally impossible.

Which is why it wasn't (and still isn't) possible to install Linux on the old ARM-based Surface laptops. You would need Microsoft-signed boot files, and Microsoft is the only party who has the keys.
You are quite wrong.

A computer shop can make an agreement with Slackware, Inc. to install in the shipped computers an particular master key provided by.

Then, any signed kernels shipped by Slackware could be upgraded seamlessly on those computers.

Also, Slackware, Inc. may make public a master key to certify its signed kernels, which eventually can be added manually even by the end-users to UEFI's Secure Boot, then any signed kernels shipped by Slackware could be upgraded seamlessly on their computers.

Is not the fault of the hardware companies that a particular Linux distribution choose to ignore the requirements of Secure Boot on UEFI.

Last edited by ZhaoLin1457; 12-19-2020 at 05:16 AM.
 
Old 12-19-2020, 05:39 AM   #10
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by ZhaoLin1457 View Post
You are quite wrong.
No, I'm not.
Quote:
Originally Posted by ZhaoLin1457 View Post
A computer shop can make an agreement with Slackware, Inc. to install in the shipped computers an particular master key provided by.
No, a computer manufacturer (OEM) could theoretically do that, but we all know that isn't going to happen.
Quote:
Originally Posted by ZhaoLin1457 View Post
Then, any signed kernels shipped by Slackware could be upgraded seamlessly on those computers.
No, any Slackware kernel and boot loader signed by that OEM would run on those computers. They would never hand their keys over to a third party like PV/Slackware.
Quote:
Originally Posted by ZhaoLin1457 View Post
Also, Slackware, Inc. may make public a master key to certify its signed kernels, which eventually can be added manually even by the end-users to UEFI's Secure Boot, then any signed kernels shipped by Slackware could be upgraded seamlessly on their computers.
Assuming the user is allowed to manage the keys, yes. Which you can currently do on x86, but not on Microsoft's ARM systems.
Quote:
Originally Posted by ZhaoLin1457 View Post
Is not the fault of the hardware companies that a particular Linux distribution choose to ignore the requirements of Secure Boot on UEFI.
Nobody's ignoring anything. PV could make keys all day, Intel (and certainly Microsoft!) will just refuse to put them on their systems.
 
Old 12-19-2020, 05:47 AM   #11
LuckyCyborg
Senior Member
 
Registered: Mar 2010
Posts: 3,550

Rep: Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404
Aparently, some people here believes that Secure Boot signing is some kind of Nazis Secret Weapon...

There: https://wiki.archlinux.org/index.php...ce/Secure_Boot

Yeah, it is just a SSL signing.

Until our BDFL is kind to consider the UEFI's Secure Boot, at least we can sign OUR OWN kernels and other things alike.

So, no Devil Company handshake is required.

Last edited by LuckyCyborg; 12-19-2020 at 05:54 AM.
 
Old 12-19-2020, 05:55 AM   #12
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by LuckyCyborg View Post
Aparently, some people here believes that Secure Boot signing is some kind of Nazi Secret Weapon...
That's just a nonsensical statement.
Quote:
Originally Posted by LuckyCyborg View Post
There: https://wiki.archlinux.org/index.php...ce/Secure_Boot

Until our BDFL is kind to consider the Secure Boot, at least we can sign OUR OWN kernels.

No Devil Company handshake is required.
OK, then install the ARM version of Slackware on a Surface device. That's right, you can't.

The title of this thread is "UEFI Class 3", and the Intel paper in the first post talks about UEFI Class 3 with Secure Boot enabled ("Class 3+"). Sure, that's not where we are today, but we know exactly how it would work, because we already have ARM devices where Secure Boot can't be turned off and the keys are not user-manageable.

The whole point of Secure Boot is to establish a chain of trust that looks like this:
Chipset -> UEFI Firmware -> Boot Loader -> OS
Note how you, the user, is not a part of that chain. And that is the whole idea.
 
4 members found this post helpful.
Old 12-19-2020, 06:19 AM   #13
LuckyCyborg
Senior Member
 
Registered: Mar 2010
Posts: 3,550

Rep: Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404
Quote:
Originally Posted by Ser Olmy View Post
That's just a nonsensical statement.
I did this Secure Boot of Slackware (and Android) in the near past. Your statements instead feels as some kind of radicalism...

Quote:
Originally Posted by Ser Olmy View Post
OK, then install the ARM version of Slackware on a Surface device. That's right, you can't.
I do not cares about ARM Microsoft Surface's issues. In fact, I do not use other ARM devices than those shipped by default with Android. I accept that my family owns some Android smartphones, after all...

But, it wasn't supposed that the ARM devices have uBOOT as low level bootloader and no BIOS or UEFI at all?

Quote:
Originally Posted by Ser Olmy View Post
The title of this thread is "UEFI Class 3", and the Intel paper in the first post talks about UEFI Class 3 with Secure Boot enabled ("Class 3+"). Sure, that's not where we are today, but we know exactly how it would work, because we already have ARM devices where Secure Boot can't be turned off and the keys are not user-manageable.

The whole point of Secure Boot is to establish a chain of trust that looks like this:
Chipset -> UEFI Firmware -> Boot Loader -> OS
Note how you, the user, is not a part of that chain. And that is the whole idea.
With all respect, I do not care at all about he ARM computers, unless they are in the form of Android smartphones, with a good Google made OS shipped by the factory.

Last edited by LuckyCyborg; 12-19-2020 at 10:21 AM.
 
Old 12-19-2020, 06:29 AM   #14
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
Quote:
Originally Posted by LuckyCyborg View Post
I did this Secure Boot of Slackware (and Android) in the near past. Your statements instead feels as radicalism...
Advocating for UEFI Class 3 without a compatibility module to become mandatory on x86 hardware is quite radical, and opens up the possibility for vendor-locked x86 hardware.
Quote:
Originally Posted by LuckyCyborg View Post
With all respect, I do not care at all about ARM computers, unless they are in the form of an Android smartphones, with a good OS shipped by the factory.
You're missing the point. The Intel document is about x86, and what they're advocating for will make locked devices a possibility (which means it will be a reality).

Consider this: Intel has spent millions of dollars on UEFI. Can you name a single advantage of UEFI Class 3 (without Secure Boot) over BIOS?
 
Old 12-19-2020, 06:34 AM   #15
LuckyCyborg
Senior Member
 
Registered: Mar 2010
Posts: 3,550

Rep: Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404Reputation: 3404
Quote:
Originally Posted by Ser Olmy View Post
Can you name a single advantage of UEFI Class 3 (without Secure Boot) over BIOS?
They are at least capable to boot from an USB 3.x card, which BIOS cannot.

That single and very reason made me to even add the UEFI DUET (an EFI layer over BIOS) even to my BIOS-only computers.

Last edited by LuckyCyborg; 12-19-2020 at 06:38 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
C++ - Using class pointers to use class functions? golmschenk Programming 2 04-24-2011 12:41 AM
[SOLVED] Compilation error trying to sub-class a Qt QAction class, not sure why rstewart Programming 2 02-08-2011 11:45 AM
PHP: how to use a method from a class in the same class ldp Programming 5 09-17-2004 09:52 AM
Communicating Class A and Class C Networks chadtce Linux - Networking 10 07-23-2003 01:36 PM
c++ : regarding (inheritence)base class and derived class edreddy Programming 6 07-31-2002 06:33 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 12:06 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration