Disable KDump Kernel Crash Analyzer (kdump)
An XCCDF Rule
Description
The kdump
service provides a kernel crash dump analyzer. It uses the kexec
system call to boot a secondary kernel ("capture" kernel) following a system
crash, which can load information from the crashed kernel for analysis.
The kdump
service can be disabled with the following command:
$ sudo systemctl mask --now kdump.service
Rationale
Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps consume a considerable amount of disk space and may result in denial of service by exhausting the available space on the target file system partition. Unless the system is used for kernel development or testing, there is little need to run the kdump service.
- ID
- xccdf_org.ssgproject.content_rule_service_kdump_disabled
- Severity
- Medium
- References
- Updated
Remediation - Kubernetes Patch
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
ignition:
version: 3.1.0
Remediation - Anaconda Pre-Install Instructions
kdump --disable
Remediation - OS Build Blueprint
[customizations.services]
disabled = ["kdump"]
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" stop 'kdump.service'
"$SYSTEMCTL_EXEC" disable 'kdump.service'
Remediation - Ansible
- name: Block Disable service kdump
block:
- name: Disable service kdump
block:
Remediation - Puppet
include disable_kdump
class disable_kdump {
service {'kdump':
enable => false,
ensure => 'stopped',