User Tools

Site Tools


Mysterious arpalert segfaults

Yesterday, when I needed the tool for catching the unknown MAC addresses, the choice have fallen to arpalert. It provides hooks in the form of external executables for getting the job done on many event types, which I used for reporting new MAC addresses:
#!/bin/bash -e
source /etc/environment
# Excerpt from arpalert.conf:
# script launched on each detection
# parameters are:
#  - "mac adress of requestor"
#  - "ip of requestor"
#  - "supp. parm."
#  - "ethernet device listening on"
#  - "type of alert"
#  - optional : "ethernet vendor"
# type of alert:
# 0: ip change
# 1: mac address only detected but not in white list
# 2: mac address in black list
# 3: new mac address
# 4: unauthorized arp request
# 5: abusive number of arp request detected 
# 6: ethernet mac address different from arp mac address
# 7: global flood detection
# 8: new mac address without ip
# 9: mac change
logger "arpalert event: ${mac} ${ip} ${supp_parm} ${eth_dev} ${alert_type} ${eth_vendor}"

You may need some additional processing if you need more than numeric alert type codes. You can even process arpalert's log (or syslog) with excellent nxlog log processing daemon, which is a different story.

First start

After short configuration edit, the tool was started in daemon mode. What surprised me was that after detecting new MAC, the tool segfaulted:

==> /var/log/syslog <==
Jul  2 20:09:49 dhcp kernel: [ 8212.536872] arpalert[4587]: segfault at 126 ip 00007f7490db3cc0 sp 00007ffe132ba770 error 4 in[7f7490d65000+1c0000]

What puzzled me even more that Google had 3 hits, of which zero applied to the issue.

The solution

After some consideration and event correlation, it struck me:

chmod +x /etc/arpalert/
devops/mysterious_arpalert_segfaults.txt · Last modified: 2017/07/03 12:19 by lubos