Date: Mon, 09 Mar 2015 20:45:09 +0000 From: "Poul-Henning Kamp" <phk@phk.freebsd.dk> To: Dmitry Morozovsky <marck@rinet.ru> Cc: freebsd-security@FreeBSD.org Subject: Re: DRAM Rowhammer exploits Message-ID: <68420.1425933909@critter.freebsd.dk> In-Reply-To: <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru> References: <alpine.BSF.2.00.1503092248580.38285@woozle.rinet.ru> <91440.1425930724@critter.freebsd.dk> <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
-------- In message <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru>, Dmitry Morozo vsky writes: >On Mon, 9 Mar 2015, Poul-Henning Kamp wrote: > >> >any thoughts we're vulnerable to this? >> >> It's a hardware problem, *everybody* are vulnerable. > >Well, it seems I used somewhat incorrect wordings. > >Any chance we could provide workaround like for Pentium f00f bug? As far as I know the only workaround is increasing the DRAM refresh rate sufficiently that the hardware behaves as it should. It seems that such BIOS updates are being rolled out, but undoubtedly a lot of old machines will get none and it's not even entirely obvious that increasing the DRAM refresh rate is enough. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?68420.1425933909>
