Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Mar 2015 14:30:37 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Konstantin Belousov <kostikbel@gmail.com>, freebsd-security@freebsd.org
Subject:   Re: DRAM Rowhammer exploits
Message-ID:  <550089CD.8040903@sentex.net>
In-Reply-To: <20150311181346.GH2379@kib.kiev.ua>
References:  <alpine.BSF.2.00.1503092248580.38285@woozle.rinet.ru> <54FFF8AD.90507@freebsd.org> <20150311181346.GH2379@kib.kiev.ua>

next in thread | previous in thread | raw e-mail | index | archive | help
On 3/11/2015 2:13 PM, Konstantin Belousov wrote:

> I just made somewhat dirty port of the double_sided program, available at
> https://github.com/kostikbel/rowhammer-test/tree/freebsd

How many iterations does it usually take to trip up the bug if its there ?

	---Mike


-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?550089CD.8040903>