Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 09 Mar 2015 20:45:09 +0000
From:      "Poul-Henning Kamp" <phk@phk.freebsd.dk>
To:        Dmitry Morozovsky <marck@rinet.ru>
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: DRAM Rowhammer exploits
Message-ID:  <68420.1425933909@critter.freebsd.dk>
In-Reply-To: <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru>
References:  <alpine.BSF.2.00.1503092248580.38285@woozle.rinet.ru> <91440.1425930724@critter.freebsd.dk> <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru>

next in thread | previous in thread | raw e-mail | index | archive | help

--------
In message <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru>, Dmitry Morozo
vsky writes:
>On Mon, 9 Mar 2015, Poul-Henning Kamp wrote:
>
>> >any thoughts we're vulnerable to this?
>> 
>> It's a hardware problem, *everybody* are vulnerable.
>
>Well, it seems I used somewhat incorrect wordings.
>
>Any chance we could provide workaround like for Pentium f00f bug?

As far as I know the only workaround is increasing the DRAM refresh
rate sufficiently that the hardware behaves as it should.

It seems that such BIOS updates are being rolled out, but undoubtedly
a lot of old machines will get none and it's not even entirely obvious
that increasing the DRAM refresh rate is enough.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?68420.1425933909>