Go to main content

Oracle® SuperCluster M8 and SuperCluster M7 Security Guide

Exit Print View

Updated: June 2020
 
 

Protect Core Dumps

Core dumps can contain sensitive data. Protections can include file permissions and logging core dump events. For more information, refer to the Oracle Solaris coreadm(1M) man page and the chmod(1) man page.

Use the coreadm command to view and set the current configuration.

  1. Log in to one of the compute servers and access the host console as superuser.

    See Log into a Compute Server.

  2. View the current configuration.
    # coreadm
    global core file pattern: /var/share/cores/core.%f.%p
    global core file content: default
    init core file pattern: core
    init core file content: default
    global core dumps: enabled
    per-process core dumps: enabled
    global setid core dumps: disabled
    per-process setid core dumps: disabled
    global core dump logging: enabled
    
  3. Configure the core files and protect the core dump directory.
    # coreadm -g /var/cores/core_%n_%f_%u_%g_%t_%p \
               -e log -e global -e global-setid \
               -d process -d proc-setid
    
  4. Check the permissions.
    # ls -ld /var/share/cores
    drwx------ 2 root root 2 Aug 2 2015 cores/
    
  5. Set the permissions correctly on the directory.
    # chmod 700 /var/share/cores