Skip to content

Commit a5c03c3

Browse files
mjg59Ingo Molnar
authored andcommitted
x86/efi: Clarify that reset attack mitigation needs appropriate userspace
Some distributions have turned on the reset attack mitigation feature, which is designed to force the platform to clear the contents of RAM if the machine is shut down uncleanly. However, in order for the platform to be able to determine whether the shutdown was clean or not, userspace has to be configured to clear the MemoryOverwriteRequest flag on shutdown - otherwise the firmware will end up clearing RAM on every reboot, which is unnecessarily time consuming. Add some additional clarity to the kconfig text to reduce the risk of systems being configured this way. Signed-off-by: Matthew Garrett <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Cc: Linus Torvalds <[email protected]> Cc: Peter Zijlstra <[email protected]> Cc: Thomas Gleixner <[email protected]> Cc: [email protected] Cc: [email protected] Cc: [email protected] Signed-off-by: Ingo Molnar <[email protected]>
1 parent 301f55b commit a5c03c3

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

drivers/firmware/efi/Kconfig

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,10 @@ config RESET_ATTACK_MITIGATION
159159
using the TCG Platform Reset Attack Mitigation specification. This
160160
protects against an attacker forcibly rebooting the system while it
161161
still contains secrets in RAM, booting another OS and extracting the
162-
secrets.
162+
secrets. This should only be enabled when userland is configured to
163+
clear the MemoryOverwriteRequest flag on clean shutdown after secrets
164+
have been evicted, since otherwise it will trigger even on clean
165+
reboots.
163166

164167
endmenu
165168

0 commit comments

Comments
 (0)