[Arm-netbook] bunnie about riscv

ronwirring at Safe-mail.net ronwirring at Safe-mail.net
Sun Jun 11 21:38:04 BST 2017


-------- Original Message --------
From: Neil Jansen <njansen1 at gmail.com>
Apparently from: arm-netbook-bounces at lists.phcomp.co.uk
To: Eco-Conscious Computing <arm-netbook at lists.phcomp.co.uk>
Subject: Re: [Arm-netbook] bunnie about riscv
Date: Sun, 11 Jun 2017 11:07:56 -0400



Thank you for the information.
I have watched a rutkowska video on how complicated
intel's management features are.
Difficult.



> On Sat, Jun 10, 2017 at 11:54 AM, <ronwirring at safe-mail.net> wrote:
> 
> > It was very informative. A lot of the technical matter I did not
> understand.
> 
> This was a GREAT talk.  Thanks for the link.
> 
> > Can you explain:
> > 23.04 The 2 lowermost boxes?
> 
> 1) PDK / Foundries.  The factories in which the chips are made in.  They're
> not open.  They're proprietary and there's a implication of trust.
> 2) Equipment / Raw Materials.  The equipment that makes the chips and the
> raw materials that go into the chips.  All a very cloudy and and murky area
> that is not open, and very proprietary.
> 
>  He's basically saying that those that want *100%* open source hardware
> would require infinite recursion down to the raw components, which is
> impossible.  That's the whole point of the talk.  The 'impedance mismatch'
> thing is a sort of metaphor to describe the unrealistic expectations of
> those idealists that want 100% open source hardware.  He's saying it cannot
> happen today.  And BTW I've met Bunnie on several occasions, he's legit,
> and you can trust what he's saying to be technically correct.  He's the
> real deal.
> 
> > What is a stepper?
> 
> A stepper motor. That is, do you trust the motors that move the machines
> that made the integrated circuits?
> 
> > What is fuse?
> 
> See this link:
> https://electronics.stackexchange.com/questions/1262/what-are-atmel-fuses
> 
> 
> > 25.15 The 4 lowermost boxes?
> 
> * BIOS
> * Firmware
> * Hidden / fused silicon blocks - Blocks of silicon on the chip that aren't
> usually turned on, but are there.  Lots of big vendors are doing this now:
> Intel, AMD, Nvidia, and it's anyone's guess as to what their real purpose
> is.  That leads to conspiracy theories, as Bunnie said.  This is a problem
> because if you put a chip like this into an open source laptop, it begs the
> question of what would happen if something turned on that section and
> started execution code from it?  Nobody will know until (A) documentation
> is leaked from the company or (B) someone reverse engineers it.  Basically
> if you use anything application processor chip made in the last 5-10 years,
> you probably have some hidden / fused silicon blocks doing god knows what.
> * Pre-boot microcode - Microcode (https://en.wikipedia.org/wiki/Microcode)
> that executes BEFORE your computer boots.   This is a big deal, because
> everything that happens after this point can be considered suspect.
> (similar to how a boot virus would spread because it executes first).
> * IP industry practices - Intellectual property used by silicon
> manufacturers that are not open.  What he's saying is, say that you're a
> silicon vendor and you just bought a intellectual property from ARM to make
> an ARM chip.  They're giving you HDL (hardware description language) and
> netlists (a large list of the connections to be made in the die), and guess
> what, they gave them to you encrypted so that their intellectual property
> is safe.  You (the guy that runs a third party chip factory) cannot review
> or inspect the intellectual property that ARM gave you.  The point here is
> that unless you're using an open source (RISC-V, etc) core, then using an
> ARM isn't really 100% open source hardware.
> * Mask trojans & glitches - These are malicious things in the CPU die
> itself, that even if you were looking at the silicon die under a microscope
> and studying it, you'd still completely miss it.  Very nasty but they


Remarkable that you cannot do a verification using a microscope.



> exist.  Hackaday.com has a lot of interesting articles that break these
> sort of things down in layman's terms.  Very interesting.  Basically
> because these exist, there's no way to know that you are really executing
> what you think you are executing unless you built the foundry and
> supervised the chips being made, and analyzed everything that went into the
> manufacture of them.  It's a trust problem.
> 
> These are all highly complex subjects that hardware engineers like Bunnie
> deal with a lot, and other (I'll say idealist) software guys probably have
> never thought of. They're important in that when you realize that they're
> there, you will then understand how silly wanting 100% open hardware really
> is.  It's a huge problem that hardly anybody is trying to fix.
> 
> 
> Recently the 6502 was completely dissected and recreated, so that's one of
> the only fully documented (and I'd say fully trusted) cores out there
> today.  And that was made probably before I was born.  Everything since
> that should be assumed to be compromised and < 100% open.  Oh, and even
> then, the 6502 would have to hook up to OTHER chips like flash, RAM, and
> whatever generates the video and handles the peripherals.  Those have not
> been completely dissected, and could be suspect.  Do you see what Bunnie
> means now?  That's the impedance mismatch.
> 
> 


We should have libre software hdds and ram.



> P.S. my apologies to LKCL and others, I don't have a plain text email
> client.
> _______________________________________________
> arm-netbook mailing list arm-netbook at lists.phcomp.co.uk
> http://lists.phcomp.co.uk/mailman/listinfo/arm-netbook
> Send large attachments to arm-netbook at files.phcomp.co.uk



More information about the arm-netbook mailing list