Fedora considers deprecating legacy BIOS
A proposal to "deprecate" support for BIOS-only systems for Fedora, by no longer supporting new installations on those systems, led to a predictably long discussion on the Fedora devel mailing list. There are, it seems, quite a few users who still have BIOS-based systems; many do not want to have to switch away from Fedora simply to keep their systems up to date. But, sometime in the future, getting rid of BIOS support seems inevitable since the burden on those maintaining the tools for installing and booting those systems is non-trivial and likely to grow over time. To head that off, a special interest group (SIG) may form to help keep BIOS support alive until it really is no longer needed.
Proposal
The proposal to "Deprecate Legacy BIOS" was, as usual, posted on behalf of its owners, Robbie Harwood, Jiří Konečný, and Brian C. Lane, by Fedora program manager Ben Cotton. It currently targets Fedora 37, which is due in October, though there is reason to believe the change will not happen quite that soon. The reasons for removing the support are described in the proposal:
UEFI is defined by a versioned standard that can be tested and certified against. By contrast, every legacy BIOS is unique. Legacy BIOS is widely considered deprecated (Intel, AMD, Microsoft, Apple) and on its way out. As it ages, maintainability has decreased, and the status quo of maintaining both stacks in perpetuity is not viable for those currently doing that work.[...] While this will eventually reduce workload for boot/installation components (grub2 reduces surface area, syslinux goes away entirely, anaconda reduces surface area), the reduction in support burden extends much further into the stack - for instance, VESA support can be removed from the distro.
The proposal says that, eventually, BIOS support will have to be removed, but that maintaining the ability to boot existing Fedora systems with BIOS is meant to help smooth the process. Fedora already has requirements that effectively restrict it to systems made after 2006, so this change would extend those restrictions somewhat further.
Intel stopped shipping the last vestiges of BIOS support in 2020 (as have other vendors, and Apple and Microsoft), so this is clearly the way things are heading - and therefore aligns with Fedora's "First" objective.
The subject was raised
back in 2020, which also led to a (predictably) long thread, though it was
not a change proposal at that time. Some of the "relevant
points from that thread
" are listed in the Feedback
section of the proposal. There are, of course, machines that are
BIOS-only and any kind of hardware deprecation for the distribution is
impossible "without causing some amount of friction
". In
addition, there is no way to migrate from a BIOS installation to a UEFI-based
system, since "repartitioning effectively mandates a
reinstall
". In particular, a UEFI partition would need to be added
to the system.
The Contingency Plan section of the proposal describes an ugly future for the status quo, but also a possible way forward:
Leave things as they are. Code continues to rot. Community assistance is required to continue the status quo. Current owners plan to orphan some packages regardless of whether the proposal is accepted.Another fallback option could be, if a Legacy BIOS SIG organizes, to donate the relevant packages there and provide some initial mentoring. Longer term, packages that cannot be wholly donated could be split, though it is unclear whether the synchronization thereby required would reduce the work for anyone.
Affected systems
As might be guessed, multiple replies from users of affected systems were
seen in the thread, starting
with Neal Gompa. He said that he is sympathetic to the change, but
thinks that it is "way too early to
do across the board
". He has a system that struggles to boot Linux
with UEFI and his workarounds are beyond the abilities of most users.
David Airlie said
that he recently worked on a project to rewrite the Mesa driver for a wide range of Intel
GPUs. Many of the systems he used to develop and validate those drivers
are pre-UEFI systems, but it was "of great benefit to me and the
community
" that he could use Fedora for that work. For future
projects, he would have to consider moving away from Fedora, which would be
a sad state of affairs.
Hans de Goede said
that he had several systems at home that were BIOS-only and happily running
Fedora now. Obsoleting them just contributes to the e-waste problem;
"Looking specifically at fixed PCs and not laptops this
proposal would (eventually) turn 2/5 PCs in my home
unusable, which really is unacceptable IMHO.
" He also pointed to
Airlie's work on Intel GPUs, saying that "it seems
rather silly to drop support for this hw after just investing
a significant chunk of time to breathe new [life] into their
GPU support
"
But it is not just desktops and laptops that are affected by a change of this sort. Fedora is also installed on cloud servers and virtual machines of various sorts, some of which do not support anything other than booting via BIOS. The proposal noted that the time of the 2020 discussion, Amazon's AWS did not support UEFI, but that has changed. Marc Pervaz Boocha pointed out that many virtual private server (VPS) providers do not support UEFI, giving Linode and Vultr as examples. Dominik "Rathann" Mierzejewski reported that OVH is also affected:
OVH is another big provider and they don't offer UEFI boot with their VPS range. I've just confirmed it with their support.Since one of my servers is hosted by OVH, I'd have to either migrate to another hosting provider or migrate off Fedora. Which is ironic, considering my involvement in Fedora.
Stewart Smith added
some "thoughts both from an EC2 [Elastic Compute Cloud] perspective, and an Amazon
Linux as a downstream of Fedora perspective
". Most EC2 instance types
boot using BIOS by default, though many can use UEFI and new types are likely
to get UEFI support, but there are "a *lot* of instance types, a whole bunch of which are
less likely to support UEFI
". There is no installer for cloud
images, instead they use the Amazon Machine Image (AMI) format, but
"AMIs that don't run on all instance types tend to cause confusion,
no
matter how [clearly] you document the limitations
". So Amazon Linux
has an interest in ensuring that BIOS booting still works well,
"likely for a decent number of years to come (however much I
wish this wasn't the case)
".
Gompa complained
that the change is not really a deprecation, but is instead a removal,
because the lack of packages and tooling that support BIOS "makes
several scenarios (including recovery) harder
". It also puts the
burden on users to determine if their hardware can boot and install Fedora,
but UEFI has not yet reached a critical mass where it can be assumed
to work. Alberto Abrao agreed,
noting that this change would "leave behind a LOT of serviceable
hardware
", especially in the server space:
Ironically, Fedora is one of the distributions out there that allows me to extract the most out of older hardware. It would be a terrible loss to have to move to a different one, but it's hard to reason purchasing new hardware - especially right now, with pandemic-related supply issues still ongoing - to keep up with this change.
In that message, Gompa also said that he is a "a fan of using UEFI
instead of BIOS
" and that he has done work to add UEFI support to
Fedora cloud images. He just does not believe that it is time, yet, to
make that switch. Part of the reason is that he believes the UEFI
experience on Fedora is not all that good.
A wander into secure boot
In his original reply to the proposal, Gompa also asked about Fedora support for NVIDIA drivers under UEFI secure boot. Peter Robinson said that was out of the scope of the proposal, since users can disable secure boot if they need support for drivers, like NVIDIA's, that are not signed by the Fedora kernel-module keys. But Gompa replied that it is sometimes easier to have users fall back to booting from BIOS; furthermore:
You're right that these are different problems, but I've also seen very little appetite for reducing the suffering of Fedora Linux users on UEFI Secure Boot with the *most common issue* we have: an NVIDIA driver that doesn't do anything because of the lockdown feature. If you're planning to say that UEFI is the only way to boot, then that means you need to be prepared to accept that our UEFI experience is *worse* than our BIOS one right now, and someone needs to take ownership to improve it.
Harwood, who is one of the feature owners, said that NVIDIA users can
either use the open-source nouveau driver (which is signed), sign their own
copy of the driver "(involves messing with
certificates, so not appropriate for all users)
", or disable
secure boot. But several people pointed out that nouveau does not really
solve the problem, especially for more recent NVIDIA hardware; it does
not provide access to accelerated graphics operations for recent GPUs and tends to have
quite a few bugs even for the older models. Michael
Catanzaro pointed out
that the options Harwood described are problematic from a user-experience
perspective:
The user experience requirement is: user searches for NVIDIA in GNOME Software and clicks Install. No further action should be necessary. We didn't make the NVIDIA driver available from the graphical installer with the intention that arcane workarounds would be required to use it.
But Adam Jackson thought
that the NVIDIA problem was not Fedora's to solve. There are technical
means to make it work and "NVIDIA are the ones with the
private source code
". But Chris Murphy sees things differently, noting
that Fedora is sending mixed messages:
When users have a suboptimal experience by default, it makes Fedora look bad. We can't have security concerns overriding all other concerns. But it's really pernicious to simultaneously say security is important, but we're also not going to sign proprietary drivers. This highly incentivizes the user to disable Secure Boot because that's so much easier than users signing kernel modules and enrolling keys with the firmware, and therefore makes the user *less safe*.
On the other hand, Fedora does not actually have a full secure boot
implementation, Lennart Poettering said, so by
disabling it "you effectively lose exactly nothing in terms
of security right now
". The reason is that the initrd is not
signed, so it can be subverted:
What good is a trusted boot loader or kernel if it then goes on loading an initrd that is not authenticated, super easy to modify (I mean, seriously, any idiot script kiddie can unpack a cpio, add some shell script and pack it up again, replacing the original one) – and it's the component that actually reads your FDE LUKS password.
SIG
In his message linked above, De Goede volunteered to form a SIG along the lines suggested in the proposal. He noted that previous attempts to keep 32-bit x86 alive when Fedora removed support for i686 had run aground, but felt that BIOS is different:
Legacy BIOS boot support is basically only about the image-creation tools + the bootloader. As various people have mentioned in the thread BIOS support is still very much a thing in data-centers, so I expect the upstream kernel community to keep the kernel working with this for at least a couple of years. Where as both the kernel + many userspace apps were breaking on i686.
After Fedora project leader Matthew Miller started a new thread about the possibility of having a video call to discuss the BIOS issue, which was generally seen as not being something that would do much more than rehash what had already been aired, De Goede renewed his call for a Legacy BIOS SIG. He envisioned it as a lightweight organization that focused on testing Fedora on BIOS systems, particularly the next version of Fedora early in its development, in order to file and fix bugs.
The new thread largely went over the same ground as the first, at some
length, naturally, though there
was also some concrete planning of what a new SIG would do—and how. Harwood said that what is
needed is a place to assign bugs and a way to get those problems
addressed. "The overall goal of the SIG needs to be to reduce load on existing
bootloader contributors.
" But Harwood also wondered whether Fedora
should redefine its support for BIOS:
Given there is consensus that legacy BIOS is on its way out, we think Fedora release criteria in this area should be re-evaluated. Not only does support change from "fully supported" to "best effort", but we should re-evaluate what is/isn't release blocking, and probably clarify who owns what parts.
Several people disagreed with that characterization of the status of BIOS.
Chris Adams said:
"I don't think this statement is true, unless Fedora doesn't want to
be
considered for a bunch of popular VM hosts (e.g. Linode and such) that
have no stated plans to support UEFI.
" Perhaps BIOS support for
physical hardware could be phased out, though. De Goede agreed
that BIOS support is still needed in some contexts:
Given what the server product folks have indicated that BIOS boot support is quite important for them I'm not sure if changing the release criteria is in order. I do agree that any blocker bugs related to legacy BIOS booting should be assigned to; and taken care of by the legacy BIOS boot SIG.
The change proposal will be discussed and decided by the Fedora engineering steering committee (FESCo), but its prospects do not look good. The FESCo ticket for the proposal has already gotten five "-1" votes from members and there are nine on the committee. Those votes are not binding, but it still looks pretty unlikely this change will go through—at least for Fedora 37.
But the change will, seemingly, happen eventually. One of the complaints
seen in the ticket (and threads) is that the proposal calls it a
deprecation, but that is not really what it entails; new versions of Fedora
will not be able to be installed on the older hardware, which could be
problematic if an in-place upgrade goes awry. In addition, Fedora versions
are only supported for about a year, so at some point upgrading may not
really be an option if BIOS support is removed. That means users of those
systems would have to migrate to a different distribution or keep running an
unsupported version as it slowly bitrots. In a blog
post about the change, Cotton pointed out that while he did not think
the distribution "should abandon old hardware willy-nilly
",
there is a balance to be struck:
I think some distros should strive to provide indefinite support for older hardware. I don't think all distros need to. In particular, Fedora does not need to. That's not what Fedora is. "First" is one of our Four Foundations for a reason. Other distros focus on long-term support and less on integrating the latest from upstreams. That's good. We want different distros to focus on different benefits.
With luck, the SIG will take over any packages needed to keep BIOS functioning, since their owners plan to orphan them regardless of the outcome of the proposal. Keeping BIOS alive on Fedora for another few years—how many is difficult to guess—would seem to have a fair number of benefits at this point, though there is obviously a maintenance burden associated with it as well. If the change does not get approved this time around, we will likely see the proposal recur for Fedora 38 (or later), but if the SIG takes off, that may be postponed for some time. When it does come up again, however, we can probably expect another lengthy discussion in Fedora-land.
Posted Apr 20, 2022 22:52 UTC (Wed)
by atai (subscriber, #10977)
[Link] (1 responses)
Posted Apr 20, 2022 22:52 UTC (Wed)
by atai (subscriber, #10977)
[Link]
Posted Apr 21, 2022 0:15 UTC (Thu)
by fenncruz (subscriber, #81417)
[Link] (33 responses)
Posted Apr 21, 2022 7:48 UTC (Thu)
by taladar (subscriber, #68407)
[Link] (4 responses)
Posted Apr 21, 2022 10:27 UTC (Thu)
by leoluk (guest, #97665)
[Link] (3 responses)
Posted Apr 21, 2022 23:35 UTC (Thu)
by trini (subscriber, #70570)
[Link]
Posted Apr 24, 2022 4:37 UTC (Sun)
by Conan_Kudo (subscriber, #103240)
[Link] (1 responses)
Posted Apr 24, 2022 6:48 UTC (Sun)
by johannbg (guest, #65743)
[Link]
The installer still supports installing Fedora on non uefi platforms.
What their change proposal effectively just does, is to open up the door for *other* change proposal to make further changes in Fedora which more or less will involve the elimination of the technical debt in Fedora that has been gathered since it's inception around legacy bios support.
At best it flips a switch or two for component defaulting to uefi but the fact is various upstream have already start defaulting to uefi and will eventually do code cleanups that drops any support for legacy bios regardless what downstream "feels" about it.
Those distribution that feel so strongly about it will have to carry and maintain everything themselves, they should not expect upstreams to do that *for them*.
Posted Apr 21, 2022 9:41 UTC (Thu)
by johannbg (guest, #65743)
[Link] (27 responses)
The fact is it's quite easy these days to setup "refurbish" shop that plays into peoples/companies environmental guilt, that buys used known exploitable hardware then refurbish it's and injects it with persistant bios exploitation and resell's it to that target audience ( "Green" individuals/companies ).
And for whatever reason people seem to be under the assumption that bios is not used after boot, which could not be further from the truth since the OS needs the bios for various reason and since it does, the OS always *trusts* the bios.
One ( popular ) way to exploit that fact is to use the BIOS-32 calls OS have and do an direct-to-kernel binary execution from there ( here you can see where the Linux Kernel detects and calls this service [1] ) so fourth and so on ( people can educate themselves how to best exploit legacy/cms bios, there are enough examples out there and in use in the wild ).
Anyways Fedora could not only be leading the way of moving the Linux ecosystem towards UEFI but also get rid of so much of technical debt in Fedora in the process and just leave the legacy users to some distribution better suited for that ( some LTS distro like CentOS, RHEL, etc ) but it seem that "my usecase matters the most even thou I dont contribute jack to Fedora or the ecosystem in general ) crowd wins again and this will be postponed to F40 and this whole dialog had again in the community. <sigh>
[1] https://github.com/torvalds/linux/blob/b253435746d9a4a701...
Posted Apr 21, 2022 10:22 UTC (Thu)
by pbonzini (subscriber, #60935)
[Link] (1 responses)
Posted Apr 21, 2022 10:34 UTC (Thu)
by johannbg (guest, #65743)
[Link]
I'm not sure if you are aware of it but everytime any distro mentions anything about deprecating 32-bit support, a squeel like from a pig is heard in the void and someone's pony dies so 32-bit still seems to be live and well to me :)
Posted Apr 21, 2022 10:32 UTC (Thu)
by LtWorf (subscriber, #124958)
[Link] (24 responses)
Typical security person mindset.
Posted Apr 21, 2022 12:12 UTC (Thu)
by johannbg (guest, #65743)
[Link] (23 responses)
Well funded ( law enforcement ) agencies have them in their arsenal to circumwent hard-drive encryption and in covert operation ( confuscating a computer, insert the exploit, release the subject and monitor the subject ) as well as pretending to be hardware sales company that sells drug cartels or other questionable businesses hardware ( used or new ), to infiltrate and monitor their operations while the other "darker" side is using those exploits to extort or otherwise profit from them.
These attacks are very much real and have existed in the wild for over two decades.
And I'm not sure what you mean by throwing away a perfectly good computer. What do you consider a perfectly good computer?
I'm all for recycling and reuse but the fact is computers dont last forever and computer's longevity is based on, it's usage,the environment it resides in and the quality of the component it's made out of so it can last as little as couple of days or for as long as one or two decades in otherwords people's milage might vary in that regard depending on the manufacture or even just product lines between manufactures.
The fact is distributions cannot be expect having to support old hw forever since it increases it's maintainership and will hinder the adoption of new technologies for those distribution so it's better to just use a distribution that is tailored to such usecases for that target audience.
Posted Apr 21, 2022 13:39 UTC (Thu)
by wtarreau (subscriber, #51152)
[Link] (20 responses)
Yes they've existed, no they're not hypothetical, but they're totally outdated and pointless nowadays when it's both ultra-cheap and effective to develop a browser malware and that this has become by far the most effective way to steal users' information to the point that it's an industry now (look for "malware as a service").
Sorry but I do not want to mess up with that secure boot. It's only as secure as my ability to use it properly, which is basically zero.
We should not force the user to endure pain that is designed to "protect them" against their will from attacks that are not relevant to them. We should instead educate users to where risks are and how to care about what matters. We'd already make a much bigger progress if people stopped reading HTML e-mails...
While I had been seriously considering migrating from Slackware to Fedora a few months ago when slack15 was really longing to come, at least this discusssion just convinced me that it was absolutely not a good idea!
Posted Apr 21, 2022 18:01 UTC (Thu)
by johannbg (guest, #65743)
[Link] (1 responses)
If that happens to be slack good for you, if it happens to be Fedora great, if that happens to be *BSD awesome but please dont fall into this whole "I would have moved to x distro" or worse "If x feature is implemented I stop using the x distro" crowd.
Posted Apr 21, 2022 20:29 UTC (Thu)
by jwarnica (subscriber, #27492)
[Link]
But I will say that if you do have something to hide from law enforcement, then its your problem to get a sufficiently modern system to keep them out.
Posted Apr 21, 2022 22:17 UTC (Thu)
by nix (subscriber, #2304)
[Link] (17 responses)
This is exactly why I'm not using secure boot -- but I note that secure boot works for millions of people perfectly well. I suspect the reason why is simply that they are not systems hackers regularly futzing with early boot (most people aren't). Those people (like us) who *are* systems hackers regularly futzing with early boot should either learn how secure boot works or simply not use it, but that doesn't mean it's not appropriate for the vast majority who aren't routinely doing things like that.
(As for the added security: many of the attacks secure boot protects against are physical, and I'm not worried about those: anyone who can attack systems I care about that way has broken into my house and I have much bigger problems. But I'm not sure what to do about the possibility of remote attackers implanting persistent malware in my UEFI firmware or something. Secure boot would protect against that, but I still have it turned off because it would also make it more likely to turn a moderately bad boot problem into a disastrous one, and frankly the system failing to boot because of UEFI malware *is* a disaster, arguably worse for me than it booting with the malware active would be. It's a tradeoff... how common *is* UEFI malware anyway? Is it even a threat worth worrying about for someone like me who is basically a random boring person and thus unlikely to be of interest to major governments unless they are malware-implanting literally everyone in the population?)
Posted Apr 22, 2022 0:23 UTC (Fri)
by rgmoore (✭ supporter ✭, #75)
[Link]
This makes perfect sense. You have to protect against two kinds of security failures: granting access to people who shouldn't have it and denying access to people who should. Getting locked out of your own system and losing data- or losing a lot of time going through some complicated procedure to recover your data- is a security failure just as surely as letting script kiddies in is. For your personal threat model, losing access is a much bigger danger, so it makes sense to take steps to mitigate it by turning off secure boot, even if that increases your chances of getting pwned.
Posted Apr 22, 2022 0:49 UTC (Fri)
by bartoc (guest, #124262)
[Link]
Heh, come to think of it, my desktop's firmware doesn't really do anything to indicate secure-boot is off, so if someone just went and disabled it I might not know! Same with my laptop. My Surface tablet does indicate this in firmware (the boot-splash gains a huge red warning).
I think secure-boot (implemented well, like you gotta sign the initrd, come on) is probably useful against like, customs officials quickly adding a boot-kit onto your disk though, which is worth defending against for a lot of people.
Posted Apr 22, 2022 15:47 UTC (Fri)
by abatters (✭ supporter ✭, #6932)
[Link] (14 responses)
This was just in the news: Ars Technica: Hackers can infect >100 Lenovo models with unremovable malware.
Posted Apr 22, 2022 20:31 UTC (Fri)
by johannbg (guest, #65743)
[Link] (13 responses)
https://www.dell.com/support/kbdoc/en-is/000188682/dsa-20...
Many of OEM's are using insyde
https://cybersecurityworldconference.com/2022/02/02/exper...
Insyde Software Security Advisory can be found here
Report issued by U.S. Department of Homeland Security (DHS) and Department of Commerce
"Firmware presents a large and ever-expanding attack surface, as the population of electronic
https://www.dhs.gov/sites/default/files/2022-02/ICT%20Sup...
And the list goes on...
Posted Apr 25, 2022 3:17 UTC (Mon)
by wtarreau (subscriber, #51152)
[Link] (12 responses)
These examples just show that the most effective fix against all such problems is to refuse UEFI and revert back to BIOS instead.
Posted Apr 25, 2022 3:26 UTC (Mon)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Posted Apr 25, 2022 3:40 UTC (Mon)
by mjg59 (subscriber, #23239)
[Link] (10 responses)
Posted Apr 25, 2022 14:09 UTC (Mon)
by khim (subscriber, #9252)
[Link] (6 responses)
I think you should separate the XX century from the XXI century here. I still remember MS-6309.
Year 2000 edition had a nice, simple jumper which made ROM read-only. Yes, certain change in configuration cause complaints at boot, but it was a simple matter of changing its position for one boot and return it back after that. It was as protected from malware as one can imagine. And then version 5 from 2001 (or was it 2002?) which not only lacked jumper in that place, it refused to boot if you short these two numbs which were left in it's place! So, please don't tell about the problematic situation with BIOS. It wasn't problematic when people cared. It is, of course, became problematic when people started thinking only about flexibility and forgot that it's not a good idea to have computers which are trivially bricked.
Posted Apr 25, 2022 14:26 UTC (Mon)
by pizza (subscriber, #46)
[Link] (4 responses)
Meanwhile, the other 99.999% of motherboards lacked that feature, including, as you mentioned, later versions of that same motherboard. One data point does not a generalization make.
BIOS is layered-hacks-on-top-of-layered-hacks built that goes all the way back to 1982. [1] It's long past time to shoot it in the head. And it's also why, to this day, our bleeding edge Ryzen processors still pretend to be a 44-year-old 16-bit i8086 when powering up.
[1] As in when Compaq released PC clones using a clean-room reverse-engineered BIOS.
Posted Apr 25, 2022 15:14 UTC (Mon)
by khim (subscriber, #9252)
[Link] (3 responses)
Sorry, but no. It's most definitely not 99.999%. I know for the fact that you had to replace ROM chips on Risc PC, Amiga (in fact you can still buy a replacement chips) and I have seen "Flash Protect" switch on lots and lots of motherboards made in XX centory. I remember that one specifically because it was a surprise to me that they would remove it. Yes, so what? It works. It's secure (more secure than the XXI century abomination). And easy to provide in virtual environment. EFI is huge mess with the only redeeming quality: it can support >4TB SSDs. That's great, but I'm not sure all that pointless complexity is worth it. Insecure-by-design POS which can not be protected by design — and I'm supposed to use for sake of “security”? Puhlease. Sure, I use EFI when I have no choice, but that doesn't mean it's not POS. So what? One doesn't need that many transistors to implement that more and today there are billions of them on any x86 CPU.
Posted Apr 25, 2022 15:41 UTC (Mon)
by farnz (subscriber, #17727)
[Link] (1 responses)
Note, though, that on all modern x86 hardware platforms, "traditional" BIOS is implemented as a module running atop UEFI; so you get all the vulnerabilities of UEFI, plus extra holes due to the CSM that implements the BIOS interface.
Which, in turn, makes the claims about BIOS being more secure questionable - you're talking about an additional layer atop UEFI, which can have its own vulnerabilities, plus you have the full stack of UEFI beneath it to compromise.
Posted Apr 25, 2022 15:46 UTC (Mon)
by khim (subscriber, #9252)
[Link]
That's very true, sure. I see no reason to use the BIOS interface on the system where it's emulated via CSM. But I don't think it's imlemented that way in virtual systems and other small systems where Linux can still run. Although I wonder how many of these are out there which may not just run Linux, but specifically Fedora. It's pretty heavy novadays.
Posted Apr 29, 2022 15:48 UTC (Fri)
by ms-tg (subscriber, #89231)
[Link]
Posted Apr 25, 2022 18:24 UTC (Mon)
by wtarreau (subscriber, #51152)
[Link]
Many of us have had much more robust than a jumper, an EPROM that required UV light to erase them, and a special programmer delivering 21V to the VPP pin to program them :-) There was no need for a jumper, and as an added bonus, not being upgradable in field tended to make them less bogus (at least they were more tested than my core i7's AMI BIOS).
Posted Apr 28, 2022 12:55 UTC (Thu)
by stock (guest, #5849)
[Link] (2 responses)
Posted Apr 28, 2022 13:47 UTC (Thu)
by pizza (subscriber, #46)
[Link]
The vulnerability is actually with networkd-dispatcher, which is developed (and distributed!) independently from systemd. It's not even widely packaged in distributions! It's not a "systemd vulnerability" any more than a vulnerability in NetworkManager or Apache (or any other random daemon) can be called a "systemd vulnerability."
Meanwhile I see nothing in the article about how this vulnerability can only affect UEFI systems -- it seems to involve relatively run-of-the-mill symlink traversal, and the CVE descriptions are still redacted. Can you point us towards some sort of supporting evidence for your assertion?
Posted Apr 28, 2022 21:09 UTC (Thu)
by johannbg (guest, #65743)
[Link]
Interesting even Keith Richards drugs aren't strong enough to reach that conclusion in otherwords please explain to the audience here on LWN how a security flaw in networkd-dispatcher has anything to do with systemd and it only be happening on uefi hardware.
I eagerly await your response on the matter backing that up...
Posted Apr 22, 2022 0:42 UTC (Fri)
by bartoc (guest, #124262)
[Link] (1 responses)
If you are buying hardware from the FBI (or generally if the actual, no shit, manufacturer of the hw is attacking you) you are completely screwed, even remote attestation won't save you (because it'll attest it is unmodified from what you bought!).
I don't really see what this has to do with removing BIOS, sure, you can do hardware attacks. Even secure boot can't prevent these attacks without robust attestation support, or extreme levels of tivoization. You _definately_ can't if you don't even bother to sign the initrd.
I think many modern systems will verify firmware code before allowing it to be flashed, even code that implements the legacy BIOS interfaces (ofc with physical access and enough sophistication you can just replace whatever is doing that verification or storing those keys, though sometimes this ends up being the entire processor).
In any event without an acute awareness of these kinds of attacks and a whole bunch of supporting infrastructure I don't think most systems will be able to prevent this, as it involves some significant useability (and freedom) tradeoffs to protect against an attack model that is uncommon (and if that model applies to you then you had better be well aware of that fact, otherwise you've already lost).
Posted Apr 22, 2022 1:22 UTC (Fri)
by mjg59 (subscriber, #23239)
[Link]
Not entirely. If you're on Intel and Boot Guard is enabled, the firmware will be measured before it's executed. If you're specifically targeted with modified firmware (even if it's signed appropriately), then those measurements will be different and there'll be reasons to ask questions. Of course, if the vendor just ships backdoored firmware to everyone, that doesn't help (but it does increase the probability that someone will notice the backdoor) - and if Intel is in on it, then obviously all bets are off.
Posted Apr 21, 2022 0:16 UTC (Thu)
by sub2LWN (subscriber, #134200)
[Link]
Posted Apr 21, 2022 6:57 UTC (Thu)
by LtWorf (subscriber, #124958)
[Link]
Posted Apr 21, 2022 8:11 UTC (Thu)
by rwmj (subscriber, #5474)
[Link] (39 responses)
Posted Apr 21, 2022 10:23 UTC (Thu)
by johannbg (guest, #65743)
[Link] (36 responses)
Those companies should have the required means to prevent this from happening or is the (f)oss ecosystem supposed to be handholding businesses these days?
Posted Apr 21, 2022 10:28 UTC (Thu)
by rwmj (subscriber, #5474)
[Link] (24 responses)
There is a technical issue too since UEFI is considerably slower to boot and has much greater complexity.
Posted Apr 21, 2022 11:13 UTC (Thu)
by johannbg (guest, #65743)
[Link] (18 responses)
UEFI is just one step short from becoming mandatory requirements in government contracts and usually if for example the U.S government says jumps, the vendors jump and businesses better be in shape when that call to jump comes.
Anyways still not seeing why *we* ( and by we I mean the entire (f)oss ecosystem ) should care I mean it's companies own responsibility to keep themselves relevant and competitive on the market, we do not exist to do that for them.
> There is a technical issue too since UEFI is considerably slower to boot and has much greater complexity.
This is the direction the industry is taking ( and has been for quite a while, as you yourself are very much aware of ), so it's not like there are any other choice other than to put in work to mitigate any downsides it brings.
People might not like it and businesses might choose to stick their head in the sand and ignore it but it is what it is.
Posted Apr 22, 2022 3:13 UTC (Fri)
by dvdeug (guest, #10998)
[Link] (17 responses)
Or the FOSS community can put its weight where it is most useful. There's no value to forcing cloud computing to move from BIOS to UEFI, and as long as Linux supports it, these cloud providers can continue using it. Not permitting AWS to run away with everything is of value for the FOSS community; it reduces the leverage Amazon has over the community, and more generally the FOSS community is opposed to monopolies.
Posted Apr 22, 2022 7:21 UTC (Fri)
by johannbg (guest, #65743)
[Link] (16 responses)
And now the industry is faced with deep, firmware- and hardware-level attacks and the reason for that being is there is a major firmware security gap with zero visibility in it.
In this interconnected world we (now?) live in, organazations and businesses need to be able verify that the internal components of their purchased computing devices are genuine and have not been altered with during the manufacturing and distribution processes ( for example manufactures swapped out components during the chip shortage for different ones, from different suppliers ) or otherwise modified throughout the device´s life cycles in their infrastructure or during the warranty of the device as a part of their business solution(s).
That the firmware that the every day device relies on, be it the "smart" coffee machine, corporate laptops, the network equipment, the servers or the even the personal/corporate EV's ( you dont want your Tesla's to run rampage, plowing down pedestrians like an elephant tramping over ants do you, or turn left when it should be turning right after the vehicle recieved altered firmware update over the air right? ) has not been tampered with.
All these devices have firmware on them so it's vital that organazations and businesses have their cybersecurity supply chain in check.
The unified extensible firmware interfaces is an critical components in the cybersecurity supply chain since it's an integrated part of infrastructures that runs this fairly newly founded interconnected world and I most certainly would think that the FOSS community would want to be integrated part in helping pushing, validate and securing and otherwise help strengthen the cybersecurity supply chain as well as phase out solutions like legacy bios's that are no longer being maintained and are considered obsolete in the industry since more often than not Linux is the underlying technology running this new world.
I'm not too overly concerned with cloud vendors or other buisnesses that do not have their cybersecurity supply chain in check since the free market will take care of those that wont ( they break the root of trust and will just be stuck with financially starved clients ).
For example if I was a government entity or a car manufacturer like Toyota,Volvo or Tesla I would not be doing any business with companies that dont have their cybersecurity supply chain in check and one of the things I would be checking for would be if the relevant vendor supported uefi and which hw manufacture it ran, in it's infrastructure on ( all the way down to component level ) etc. so I could validate and ensure that *my* cybersecurity supply chain was in check and *my* root of trust was secure.
I would exclude IBM/RH/Amazone from every government/business contracts since it's quite apparent based on the feedback here and on fedora-devel that they are not ready for this.
Their cybersecurity supply chain is not in order thus cannot be trusted and wont be for years ( from the looks of it ) thus I would choose a different vendor that provided me with a secure root of trust. ( There are business opportunity for those that can, to get ahead of large vendors like Amazon for example )
Fedora will not be allowed to make the required change to prepare RHEL due to the legacy trolls that come crawling out of last century, screaming ME ME ME, MY USECASE, FOREVER!!!! while riding on their roating,rusting, steam powered technology devices demanding that the technology universe remains frozen in time and be supported forever, as is ( another example is Adam trying to deprecate the legacy xorg driver ) as opposed to be thinking a bit further away from their own noses, ahead into the future, to the state that the industry is in now and evolving into.
The Fedora solutions MOAR Community Burecracy ( because that as worked so well! ) by forming a "Legacy SIG" to deal with the problem. So RHEL 10, nope propably more like RHEL 11...
Posted Apr 22, 2022 8:22 UTC (Fri)
by LtWorf (subscriber, #124958)
[Link]
Have you seen the world? The free market doesn't take care of putting bad products out of business.
Posted Apr 22, 2022 8:23 UTC (Fri)
by LtWorf (subscriber, #124958)
[Link]
Posted Apr 25, 2022 3:41 UTC (Mon)
by wtarreau (subscriber, #51152)
[Link] (13 responses)
This paragraph is very interesting because I've long been interpreting the situation exactly the other way. What if those unnecessary changes were only pushed hard by a few vendors who need to force their customers to regularly buy new hardware, and by software developers who see it as a guarantee to get a lifetime job ? I mean, I'm fine with changes that bring improvements, but there are many changes we're forced to swallow that significantly degrade our user experience. Sometimes you're even forced to abandon hardware by lack of support from new software, and for what justification, beyond "look how great the new version is" ?
I used to have machines that took 3 seconds to start to boot from power-on in the past. At work in the lab we have a UEFI machine that takes more than one minute doing whatever in your back before trying to boot, and you have just 2 seconds to decide what device to boot from so you're forced to stay in front counting in your head. That's one of the machines I run test kernels on... It's a good example of crap I don't need and that significantly degrades my experience by preventing me from remotely booting test kernels.
It's not about wanting to stay in the previous century, it's a concrete example of "improvements" that I didn't need and that makes users suffer for no reason except some vendors forcefully pushing that down their customers' throat.
It would be nice if software developers could sometimes try to argument their improvements as benefits perceived by their *users* and not only by themselves as software maintainers. Just claiming that "new feature X is much better and if you don't want to adopt it we'll remove the previous one and you'll have no other choice" isn't exactly how the free software movement started, quite the opposite in fact. I remember the time when we were proud to recycle old machines to make powerful Linux servers. Nowadays some linux distros force you to trash powerful machines. There must be something really wrong with that policy. The only reason I'm thinking about is the distro's policy possibly being dictated by too powerful companies whose business does not benefit from small systems.
But surely I'm wrong on all that line and it's normal to trash perfectly working hardware, I'm the only one concerned about e-waste and with purposely spending my money to buy less pleasant replacement hardware...
Posted Apr 25, 2022 7:30 UTC (Mon)
by johannbg (guest, #65743)
[Link] (9 responses)
That would be insecure working hardware, connected to the network that requires more "power" than current solutions, which adds to the environmental problem.
The people/companies that live by a concept called "carbon footprint" installed by the oil companies as part of an deceptive PR campaigns [1] on their behalf, the biggest one in history and claim that they care about the environment should not be buying/using anything involving computers,solar panels, tv's etc since in the devices manufacturing process is an chemical ( that is among few that was conveniently left out of the Kyoto Protocol international climate change agreement ) called Nitrogen Trifluoride(NF3) is being used.
"The gas is 17,000 times more potent as a global warming agent than a similar mass of carbon dioxide. It survives in the atmosphere about five times longer than carbon dioxide" [2]
People wont like what I'm about to say but the fact is we are way beyond point of no return for our planet at this point so if people genuenly care about the environment then they should disconnect, find another line of work and go and live like an Amish in the literal sense and figuring out solution that a) change the worlds economy in an instant and b) reduce the human population because *none* of the solution out there fix anything ( but they do produce profit ), at best they just delay it.
This whole act of people pretenting to be "green" to ease their environmental guilt which has been installed by their government in conjunction with the oil companies and an trillion dollar environmental industry is just ridiculous.
1. https://mashable.com/feature/carbon-footprint-pr-campaign...
Posted Apr 25, 2022 8:49 UTC (Mon)
by kleptog (subscriber, #1183)
[Link] (6 responses)
Sources:
Perfect is the enemy of good. If we only accept perfect solutions we'll never get anywhere.
I don't disagree with your sentiment that we're already basically screwed, but I don't think that's an excuse to just give up completely.
Posted Apr 25, 2022 17:36 UTC (Mon)
by johannbg (guest, #65743)
[Link] (5 responses)
It's not like we are getting anywhere without the solutions being perfect now is it.
And it's not like the real/perfect solutions aren't known as in changing the world's economy and reduce the human population, they just cant be realistically implemented, well technically they can the former will never be allowed to happen and the latter never be socially accepted.
> I don't disagree with your sentiment that we're already basically screwed,
Biodiversity, polution in earth, water and air yup we are pretty fucked.
> but I don't think that's an excuse to just give up completely.
True we can always hope that good size meteor hits the planet.
Posted Apr 25, 2022 18:22 UTC (Mon)
by Wol (subscriber, #4433)
[Link] (4 responses)
To the best of my knowledge, we've undershot pretty much every prediction since, and the forecast for 2100 or 2150 is only 3Bn ...
Populations naturally boom and bust, and it looks like we might be hitting bust, luckily for Earth ...
Cheers,
Posted Apr 25, 2022 19:08 UTC (Mon)
by johannbg (guest, #65743)
[Link] (1 responses)
And who does not want to go out in a blaze of glory of kinetic energy = mass/2 * velocity^2
It sure beats dying of old age doesn't it...
Posted Apr 25, 2022 22:13 UTC (Mon)
by Wol (subscriber, #4433)
[Link]
Cheers,
Posted Apr 26, 2022 12:50 UTC (Tue)
by nix (subscriber, #2304)
[Link] (1 responses)
(There is probably also something related to falling death rates: if you know that most of your children will survive, you'll have fewer. But the economic incentive is substantial even in the absence of that.)
Posted Apr 27, 2022 1:33 UTC (Wed)
by JanC_ (guest, #34940)
[Link]
Posted Apr 25, 2022 14:20 UTC (Mon)
by wtarreau (subscriber, #51152)
[Link] (1 responses)
This actually is the part I agree with :-)
Note that I wasn't doing some greenwashing, just explaining that I'm not seeing any reason to trash perfectly working hardware (which comes with costs and waste) just for the sake of making some developers' life easier when they claim that may hardware is dead.
Posted Apr 25, 2022 15:31 UTC (Mon)
by Wol (subscriber, #4433)
[Link]
Running costs are only part of the equation. How much environmental damage is done and making new and disposing of obsolete hardware? Surely the extra costs of running old hardware may well be cheaper ...
Much as I dislike the waste-to-power plant just down the road (and even more so because we're a poor East London borough having all of posh West London's waste dumped on us), the fact is that is very environmentally friendly - it means a load of waste is converted efficiently to energy and CO2 rather than inefficiently converted to methane ... and it leaves a load of oil/coal unmined and in the ground.
If you're being green, you need to look at the big picture, not just minimise your costs at the expense of creating even bigger costs elsewhere (cough cough the government pricing our steel industry out of existence cough cough).
Cheers,
Posted Apr 25, 2022 12:15 UTC (Mon)
by james (subscriber, #1325)
[Link] (2 responses)
Works for me on Fedora.
Posted Apr 25, 2022 14:23 UTC (Mon)
by wtarreau (subscriber, #51152)
[Link]
However it only works when the machine reaches grub, and that one is particularly stubborn and decides to boot again from the first disk because boot priorities are reset every second boot or so... I simply gave up doing kernel testing on that one.
Posted Apr 25, 2022 15:45 UTC (Mon)
by Wol (subscriber, #4433)
[Link]
Last time I read the grub documentation, it told you how to changed the default boot entry from entry one, and then had the caveat "this only works if ...". Of course, my system breaks that "if"...
Cheers,
Posted Apr 22, 2022 1:06 UTC (Fri)
by bartoc (guest, #124262)
[Link] (4 responses)
This applies to laptops, desktops, and server hardware.
I haven't used a system that doesn't support EFI only mode (i.e. no oproms or anything required) for at least 10 years.
In any event I would like fedora to stop silently installing in BIOS mode, I've made that mistake several times and you need to reinstall the whole OS to fix it.
Posted Apr 22, 2022 9:35 UTC (Fri)
by rwmj (subscriber, #5474)
[Link] (3 responses)
Posted Apr 22, 2022 10:52 UTC (Fri)
by amacater (subscriber, #790)
[Link]
BIOS is _dead_ in the sense that new hardware doesn't support it, it's not being developed - and when Linux eventually is forced to move to attestation by market pressure it'll be dead anyway.
Although I've a 25 year old laptop somewhere in my junkpile - I'm hardly expecting to resurrect it - and it's been some years since I've _needed_ BIOS (except for a couple of HP Microservers which are annoying in that firmware is a paid for support contract upgrade).
Posted Apr 22, 2022 11:30 UTC (Fri)
by mjg59 (subscriber, #23239)
[Link] (1 responses)
Posted Apr 24, 2022 11:55 UTC (Sun)
by johannbg (guest, #65743)
[Link]
Posted Apr 21, 2022 10:30 UTC (Thu)
by leoluk (guest, #97665)
[Link] (10 responses)
Posted Apr 21, 2022 10:41 UTC (Thu)
by johannbg (guest, #65743)
[Link] (6 responses)
Posted Apr 21, 2022 12:23 UTC (Thu)
by dullfire (guest, #111432)
[Link] (5 responses)
I would suggest looking at some maps with rivers on them.
Posted Apr 21, 2022 13:41 UTC (Thu)
by smoogen (subscriber, #97)
[Link] (4 responses)
Posted Apr 21, 2022 14:34 UTC (Thu)
by Wol (subscriber, #4433)
[Link]
Cheers,
Posted Apr 21, 2022 16:08 UTC (Thu)
by rgmoore (✭ supporter ✭, #75)
[Link] (2 responses)
The criticism isn't of the wording, it's of the content. Water frequently does not take the shortest route, as you can determine by looking at a map. Instead, rivers meander all over the place. A river can even erode through the soil into the underlying rock, causing its old meandering path to be literally set in stone.
There may be some truth to the idea of people behaving like water, but it has more to do with their path being heavily determined by history. Both will usually take an established route even when it is long and convoluted. It's only the occasional dramatic event that causes rivers- or people- to change their course.
Posted Apr 21, 2022 16:16 UTC (Thu)
by sfeam (subscriber, #2841)
[Link]
Posted Apr 21, 2022 17:38 UTC (Thu)
by johannbg (guest, #65743)
[Link]
Those that are bothered by the inaccuracy of that can replaces "least resistant" with the "distribution of flow that will lead to the least "total" resistance" but most people should have gotten the gist of what I meant.
Posted Apr 21, 2022 13:42 UTC (Thu)
by rwmj (subscriber, #5474)
[Link] (2 responses)
Posted Apr 21, 2022 18:18 UTC (Thu)
by johannbg (guest, #65743)
[Link] (1 responses)
That said why should UEFI miracles start happening when RHEL 10 get's released?
Posted Apr 22, 2022 0:52 UTC (Fri)
by bartoc (guest, #124262)
[Link]
Posted Apr 21, 2022 14:37 UTC (Thu)
by cortana (subscriber, #24596)
[Link]
Posted Apr 21, 2022 21:10 UTC (Thu)
by dmoulding (subscriber, #95171)
[Link]
Posted Apr 21, 2022 8:27 UTC (Thu)
by Lionel_Debroux (subscriber, #30014)
[Link] (1 responses)
Posted Apr 22, 2022 16:24 UTC (Fri)
by mattdm (subscriber, #18)
[Link]
Posted Apr 24, 2022 20:15 UTC (Sun)
by ballombe (subscriber, #9523)
[Link] (5 responses)
Posted Apr 25, 2022 0:46 UTC (Mon)
by pabs (subscriber, #43278)
[Link] (3 responses)
Posted Apr 25, 2022 11:44 UTC (Mon)
by lsl (subscriber, #86508)
[Link]
Posted Apr 27, 2022 11:57 UTC (Wed)
by plugwash (subscriber, #29694)
[Link] (1 responses)
Legacy HD-media
In principle it would be possible for an installed system to support both UEFI and Legacy. I do see a few issues though.
1. Operating systems using UEFI installed on fixed drives are supposed to register themselves with the firmware(which requires the installer to berunning in UEFImode) rather than relying on a fixed entry point on the drive. In practice it's possible to boot using the "removable media path" even on a fixed drive but it's not the official way to do things.
Posted Apr 27, 2022 14:55 UTC (Wed)
by jem (subscriber, #24231)
[Link]
GRUB supports booting from a GPT disk in BIOS mode, but you will need an extra BIOS boot partition. A disk with an MBR partition table usually contains a gap between the boot record and the first partition, which GRUB takes advantage of. GPT-partitioned disks do not (typically) have this "no man's land", so a separate partition is used instead. Using a partition is cleaner anyway, and GPT also does not have a practical limit on the number of partitions a disk can contain, so one extra partition doesn't make a big difference.
Posted Apr 26, 2022 12:43 UTC (Tue)
by nix (subscriber, #2304)
[Link]
This fubar is becoming rarer now because few machines with existing DOS partition tables are getting GPT-reformatted, and the installers that do that are using wipefs or equivalent and thus are *actually* wiping out the old one properly. But oh good grief was it confusing for a few years.
Posted Apr 29, 2022 8:24 UTC (Fri)
by yuhong (guest, #57183)
[Link]
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
EDK2 is only one part of UEFI. In the entire thread, there was no commitment by the proposers to improve the experience with UEFI on Fedora Linux. There are several dimensions there to improve, but the fundamental assumption was that the current experience is fine, when it is clearly not.
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora will still work on non uefi platforms, it's just considered unsupported
Improving UEFI experience can and should be handled by a different change proposal in Fedora ( not that I'm seeing how since the experience from the installer is not "bad", the rest is relevant to upstream as in no downstream contributor is going to change that, let alone some individuals that are doing change proposal in Fedora, which is just a marketing gimmick for the distribution ).
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
There is nothing hypothetical about them at all.
( like LTS distribution or something like I guess slackware which presumably looks and operate just like it did when it was initally created at least it's website is most certainly from that era )
Fedora considers deprecating legacy BIOS
> There is nothing hypothetical about them at all.
However it surely guarantees that I will eventually lose my data when not being able to recover my system after some bugs, crashes or other issues with my machine.
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
I won't be that guy to say that if you don't have anything to hide then law enforcement will leave you alone.
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Secure boot would protect against that, but I still have it turned off because it would also make it more likely to turn a moderately bad boot problem into a disastrous one, and frankly the system failing to boot because of UEFI malware *is* a disaster, arguably worse for me than it booting with the malware active would be.
Fedora considers deprecating legacy BIOS
> how common *is* UEFI malware anyway?
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
https://www.insyde.com/security-pledge
devices grows. Securing the firmware layer is often overlooked, but it is a single point of failure
in devices and is one of the stealthiest methods in which an attacker can compromise devices at
scale. Over the past few years, hackers have increasingly targeted firmware to launch
devastating attacks."
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
>Year 2000 edition had a nice, simple jumper which made ROM read-only. Yes, certain change in configuration cause complaints at boot, but it was a simple matter of changing its position for one boot and return it back after that.
> Meanwhile, the other 99.999% of motherboards lacked that feature, including, as you mentioned, later versions of that same motherboard. One data point does not a generalization make.
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
contrary :
https://www.theregister.com/2022/04/27/microsoft-linux-vu...
which is vulnerability within systemd and only happens on UEFI hardware.
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
which is vulnerability within systemd and only happens on UEFI hardware.
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Fedora considers deprecating legacy BIOS
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
It's use increases as the world is being deliberately pushed into adopting more technology as can be clearly seen in the market projections for the chemical [3].
2. https://scripps.ucsd.edu/news/potent-greenhouse-gas-more-...
3. https://www.marketquest.biz/report/108079/global-nitrogen...
Clouds and VPSes
https://en.wikipedia.org/wiki/Nitrogen_trifluoride#Greenh...
https://unfccc.int/process-and-meetings/transparency-and-...
Clouds and VPSes
Clouds and VPSes
Wol
Clouds and VPSes
Clouds and VPSes
Wol
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Wol
Clouds and VPSes
... a UEFI machine that takes more than one minute doing whatever in your back before trying to boot, and you have just 2 seconds to decide what device to boot from so you're forced to stay in front counting in your head.
Just in case you haven't heard of it, does sudo grub2-reboot work for you? You run it from the Linux command line, specifying a grub menu entry, then reboot: Grub2 uses that menu entry just that once.Clouds and VPSes
Clouds and VPSes
Wol
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Wol
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
Clouds and VPSes
In the Phoronix forum thread about the same topic, "skeevy420" mentions the Clover bootloader, which has an ability to emulate a UEFI.Fedora considers deprecating legacy BIOS
I'm sharing the link to 1) spread the knowledge (it was the first time I read about that project) and 2) possibly get some interesting takes from users of that project :)
Fedora considers deprecating legacy BIOS
sneaky dual-boot
It is also possible to have two different partitions tables (GPT and legacy) on the same disk.
sneaky dual-boot
sneaky dual-boot
sneaky dual-boot
Legacy optical media
UEFI HD-media
UEFI CD
2. While the combination of BIOS boot and GPT is technically feasible it's notexactly standard, I'm not sure if grub supports it or if a hybrid partion table (which is it's own can of worms) is needed.
3. There is no gaurantee that what works in one mode will work in the other.
4. Multiboot becomes even more of a can of worms than usual.
sneaky dual-boot
While the combination of BIOS boot and GPT is technically feasible it's notexactly standard, I'm not sure if grub supports it or if a hybrid partion table (which is it's own can of worms) is needed.
sneaky dual-boot
Fedora considers deprecating legacy BIOS