CONFIG_RESET_ATTACK_MITIGATION should not be enabled by default without additional scripts
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
Description of problem:
Ubuntu 19.10 kernel 5.3.0-46-generic has Reset Attack Mitigation enabled (CONFIG_
Instead of rebooting normally, the laptop would hard power off (without properly stopping peripherals and internal devices, which may be spotted by HDD losing power with a specific unusual sound) and then powers on again after 1 second.
This kernel configuration option should not be enabled unless additional scripts, which disable RAM clean step upon normal poweroff/reboot. I made the systemd service to workaround the problem, which writes "0" to MemoryOverwrite
https:/
The author of this kernel option, Matthew Garett, wrote the following:
>if userspace can ensure that all secrets are
>removed as part of a controlled shutdown, it can reset this variable to
>0 before triggering a hardware reboot.
https:/
Version-Release number of selected component (if applicable):
linux-image 5.3.0-46-generic
How reproducible:
Always
Steps to Reproduce:
1. Boot Ubuntu 19.10, either live or installed
2. Reboot the computer (Lenovo X220 laptop in my case)
Actual results:
The computer perform hard power off and power on after 1 second
Expected results:
The computer reboots without losing power
In 2018, Fedora enabled this option and I got this bug. I talked to Matthew Garrett, he replied:
>It shouldn't be enabled unless there's code in the shutdown path to clear the flag on clean shutdowns
The option has been disabled in Fedora since then.
https:/ /bugzilla. redhat. com/show_ bug.cgi? id=1532058# c2