Date: Wed, 11 Mar 2015 20:37:57 +0200 From: Konstantin Belousov <kostikbel@gmail.com> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@freebsd.org Subject: Re: DRAM Rowhammer exploits Message-ID: <20150311183757.GI2379@kib.kiev.ua> In-Reply-To: <550089CD.8040903@sentex.net> References: <alpine.BSF.2.00.1503092248580.38285@woozle.rinet.ru> <54FFF8AD.90507@freebsd.org> <20150311181346.GH2379@kib.kiev.ua> <550089CD.8040903@sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Mar 11, 2015 at 02:30:37PM -0400, Mike Tancsa wrote: > On 3/11/2015 2:13 PM, Konstantin Belousov wrote: > > > I just made somewhat dirty port of the double_sided program, available at > > https://github.com/kostikbel/rowhammer-test/tree/freebsd > > How many iterations does it usually take to trip up the bug if its there ? Look at the original report, AFAIR it has the numbers. My machine does not exhibit the issue, at least not with the tests I tried.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150311183757.GI2379>
