Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965663AbcKAHyA (ORCPT ); Tue, 1 Nov 2016 03:54:00 -0400 Received: from gruss.cc ([80.82.209.135]:34280 "EHLO mail.gruss.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965305AbcKAHx7 (ORCPT ); Tue, 1 Nov 2016 03:53:59 -0400 Subject: Re: [kernel-hardening] rowhammer protection [was Re: Getting interrupt every million cache misses] To: kernel-hardening@lists.openwall.com, Pavel Machek References: <20161026204748.GA11177@amd> <20161027082801.GE3568@worktop.programming.kicks-ass.net> <20161027091104.GB19469@amd> <20161027093334.GK3102@twins.programming.kicks-ass.net> <20161027212747.GA18147@amd> <20161028095141.GA5806@leverpostej> <20161028112136.GA5635@amd> <20161028140522.GH5806@leverpostej> <20161031082705.GA2863@amd> <20161101063359.GA27822@gmail.com> Cc: Mark Rutland , Kees Cook , Peter Zijlstra , Arnaldo Carvalho de Melo , kernel list , Ingo Molnar , Alexander Shishkin From: Daniel Gruss Message-ID: Date: Tue, 1 Nov 2016 08:53:55 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0 MIME-Version: 1.0 In-Reply-To: <20161101063359.GA27822@gmail.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 492 Lines: 9 On 01.11.2016 07:33, Ingo Molnar wrote: > Can you suggest a method to find heavily rowhammer affected hardware? Only by > testing it, or are there some chipset IDs ranges or dmidecode info that will > pinpoint potentially affected machines? I have worked with many different systems both on running rowhammer attacks and testing defense mechanisms. So far, every Ivy Bridge i5 (DDR3) that I had access to was susceptible to bit flips - you will have highest chances with Ivy Bridge i5...