Averting excessive oopses
Averting excessive oopses
Posted Nov 18, 2022 19:38 UTC (Fri) by xi0n (guest, #138144)Parent article: Averting excessive oopses
If the concern is about an attacker who can rapidly trigger a large number of oopses to exploit some counter vulnerability, then wouldn’t it be better to track the oopses over a time window instead?
Granted, I don’t have a good mental model as to how severe an oops is. But if something like a faulty driver for an obscure device can trigger it consistently without much harm for the rest of the kernel, then I can imagine a long running system may eventually hit the limit and panic seemingly out of the blue.