]> Git Repo - linux.git/commitdiff
x86/efi: Clarify that reset attack mitigation needs appropriate userspace
authorMatthew Garrett <[email protected]>
Tue, 16 Jan 2018 09:10:02 +0000 (09:10 +0000)
committerIngo Molnar <[email protected]>
Fri, 19 Jan 2018 08:17:41 +0000 (09:17 +0100)
Some distributions have turned on the reset attack mitigation feature,
which is designed to force the platform to clear the contents of RAM if
the machine is shut down uncleanly. However, in order for the platform
to be able to determine whether the shutdown was clean or not, userspace
has to be configured to clear the MemoryOverwriteRequest flag on
shutdown - otherwise the firmware will end up clearing RAM on every
reboot, which is unnecessarily time consuming. Add some additional
clarity to the kconfig text to reduce the risk of systems being
configured this way.

Signed-off-by: Matthew Garrett <[email protected]>
Acked-by: Ard Biesheuvel <[email protected]>
Cc: Linus Torvalds <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: [email protected]
Cc: [email protected]
Cc: [email protected]
Signed-off-by: Ingo Molnar <[email protected]>
drivers/firmware/efi/Kconfig

index aab108e82f788b218291b8fba781e2c6994a4058..6047ed4e8a3d613be04b9487b29749f96e82cc18 100644 (file)
@@ -159,7 +159,10 @@ config RESET_ATTACK_MITIGATION
          using the TCG Platform Reset Attack Mitigation specification. This
          protects against an attacker forcibly rebooting the system while it
          still contains secrets in RAM, booting another OS and extracting the
-         secrets.
+         secrets. This should only be enabled when userland is configured to
+         clear the MemoryOverwriteRequest flag on clean shutdown after secrets
+         have been evicted, since otherwise it will trigger even on clean
+         reboots.
 
 endmenu
 
This page took 0.058871 seconds and 4 git commands to generate.