• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

OISF / suricata / 22618661228

02 Mar 2026 09:33PM UTC coverage: 42.258% (-34.4%) from 76.611%
22618661228

push

github

victorjulien
github-actions: bump actions/download-artifact from 7.0.0 to 8.0.0

Bumps [actions/download-artifact](https://github.com/actions/download-artifact) from 7.0.0 to 8.0.0.
- [Release notes](https://github.com/actions/download-artifact/releases)
- [Commits](https://github.com/actions/download-artifact/compare/37930b1c2...70fc10c6e)

---
updated-dependencies:
- dependency-name: actions/download-artifact
  dependency-version: 8.0.0
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>

91511 of 216553 relevant lines covered (42.26%)

3416852.41 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

22.91
/src/detect-engine-loader.c
1
/* Copyright (C) 2021-2023 Open Information Security Foundation
2
 *
3
 * You can copy, redistribute or modify this Program under the terms of
4
 * the GNU General Public License version 2 as published by the Free
5
 * Software Foundation.
6
 *
7
 * This program is distributed in the hope that it will be useful,
8
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
10
 * GNU General Public License for more details.
11
 *
12
 * You should have received a copy of the GNU General Public License
13
 * version 2 along with this program; if not, write to the Free Software
14
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
15
 * 02110-1301, USA.
16
 */
17

18
/**
19
 * \file
20
 *
21
 * \author Victor Julien <victor@inliniac.net>
22
 */
23

24
#include "suricata-common.h"
25
#include "suricata.h"
26
#include "conf.h"
27
#include "detect.h"
28
#include "detect-parse.h"
29

30
#include "runmodes.h"
31
#include "threads.h"
32
#include "threadvars.h"
33
#include "tm-threads.h"
34
#include "queue.h"
35

36
#include "detect-engine.h"
37
#include "detect-engine-loader.h"
38
#include "detect-engine-build.h"
39
#include "detect-engine-analyzer.h"
40
#include "detect-engine-mpm.h"
41
#include "detect-engine-sigorder.h"
42

43
#include "util-detect.h"
44
#include "util-threshold-config.h"
45
#include "util-path.h"
46

47
#include "rust.h"
48

49
#ifdef HAVE_GLOB_H
50
#include <glob.h>
51
#endif
52

53
extern int rule_reload;
54
extern int engine_analysis;
55
static bool fp_engine_analysis_set = false;
56
bool rule_engine_analysis_set = false;
57

58
static char *DetectLoadCompleteSigPathWithKey(
59
        const DetectEngineCtx *de_ctx, const char *default_key, const char *sig_file)
60
{
×
61
    const char *defaultpath = NULL;
×
62
    char *path = NULL;
×
63
    char varname[128];
×
64

65
    if (sig_file == NULL) {
×
66
        SCLogError("invalid sig_file argument - NULL");
×
67
        return NULL;
×
68
    }
×
69

70
    /* If we have a configuration prefix, only use it if the primary configuration node
71
     * is not marked as final, as that means it was provided on the command line with
72
     * a --set. */
73
    SCConfNode *default_rule_path = SCConfGetNode(default_key);
×
74
    if ((!default_rule_path || !default_rule_path->final) && strlen(de_ctx->config_prefix) > 0) {
×
75
        snprintf(varname, sizeof(varname), "%s.%s", de_ctx->config_prefix, default_key);
×
76
        default_rule_path = SCConfGetNode(varname);
×
77
    }
×
78
    if (default_rule_path) {
×
79
        defaultpath = default_rule_path->val;
×
80
    }
×
81

82
    /* Path not specified */
83
    if (PathIsRelative(sig_file)) {
×
84
        if (defaultpath) {
×
85
            path = PathMergeAlloc(defaultpath, sig_file);
×
86
            if (unlikely(path == NULL))
×
87
                return NULL;
×
88
        } else {
×
89
            path = SCStrdup(sig_file);
×
90
            if (unlikely(path == NULL))
×
91
                return NULL;
×
92
        }
×
93
    } else {
×
94
        path = SCStrdup(sig_file);
×
95
        if (unlikely(path == NULL))
×
96
            return NULL;
×
97
    }
×
98
    return path;
×
99
}
×
100

101
/**
102
 *  \brief Create the path if default-rule-path was specified
103
 *  \param sig_file The name of the file
104
 *  \retval str Pointer to the string path + sig_file
105
 */
106
char *DetectLoadCompleteSigPath(const DetectEngineCtx *de_ctx, const char *sig_file)
107
{
×
108
    return DetectLoadCompleteSigPathWithKey(de_ctx, "default-rule-path", sig_file);
×
109
}
×
110

111
/**
112
 *  \brief Load a file with signatures
113
 *  \param de_ctx Pointer to the detection engine context
114
 *  \param sig_file Filename to load signatures from
115
 *  \param goodsigs_tot Will store number of valid signatures in the file
116
 *  \param badsigs_tot Will store number of invalid signatures in the file
117
 *  \retval 0 on success, -1 on error
118
 */
119
static int DetectLoadSigFile(DetectEngineCtx *de_ctx, const char *sig_file, int *goodsigs,
120
        int *badsigs, int *skippedsigs, const bool firewall_rule)
121
{
7✔
122
    int good = 0, bad = 0, skipped = 0;
7✔
123
    char line[DETECT_MAX_RULE_SIZE] = "";
7✔
124
    size_t offset = 0;
7✔
125
    int lineno = 0, multiline = 0;
7✔
126

127
    (*goodsigs) = 0;
7✔
128
    (*badsigs) = 0;
7✔
129
    (*skippedsigs) = 0;
7✔
130

131
    FILE *fp = fopen(sig_file, "r");
7✔
132
    if (fp == NULL) {
7✔
133
        SCLogError("opening rule file %s:"
×
134
                   " %s.",
×
135
                sig_file, strerror(errno));
×
136
        return -1;
×
137
    }
×
138

139
    while (1) {
101,765✔
140
        /* help clang to understand offset can't get > sizeof(line), so the argument to
141
         * fgets can't get negative. */
142
        BUG_ON(offset >= sizeof(line));
101,765✔
143
        char *res = fgets(line + offset, (int)(sizeof(line) - offset), fp);
101,765✔
144
        if (res == NULL)
101,765✔
145
            break;
7✔
146

147
        lineno++;
101,758✔
148
        size_t len = strlen(line);
101,758✔
149

150
        /* ignore comments and empty lines */
151
        if (line[0] == '\n' || line [0] == '\r' || line[0] == ' ' || line[0] == '#' || line[0] == '\t')
101,758✔
152
            continue;
66,146✔
153

154
        /* Check for multiline rules. */
155
        while (len > 0 && isspace((unsigned char)line[--len]));
71,224✔
156
        if (line[len] == '\\') {
35,612✔
157
            multiline++;
×
158
            offset = len;
×
159
            if (offset < sizeof(line) - 1) {
×
160
                /* We have room for more. */
161
                continue;
×
162
            }
×
163
            /* No more room in line buffer, continue, rule will fail
164
             * to parse. */
165
        }
×
166

167
        /* Check if we have a trailing newline, and remove it */
168
        len = strlen(line);
35,612✔
169
        if (len > 0 && (line[len - 1] == '\n' || line[len - 1] == '\r')) {
35,612✔
170
            line[len - 1] = '\0';
35,612✔
171
        }
35,612✔
172

173
        /* Reset offset. */
174
        offset = 0;
35,612✔
175

176
        de_ctx->rule_file = sig_file;
35,612✔
177
        de_ctx->rule_line = lineno - multiline;
35,612✔
178

179
        Signature *sig = NULL;
35,612✔
180
        if (firewall_rule)
35,612✔
181
            sig = DetectFirewallRuleAppendNew(de_ctx, line);
×
182
        else
35,612✔
183
            sig = DetectEngineAppendSig(de_ctx, line);
35,612✔
184
        if (sig != NULL) {
35,612✔
185
            if (rule_engine_analysis_set || fp_engine_analysis_set) {
35,612✔
186
                if (fp_engine_analysis_set) {
×
187
                    EngineAnalysisFP(de_ctx, sig, line);
×
188
                }
×
189
                if (rule_engine_analysis_set) {
×
190
                    EngineAnalysisRules(de_ctx, sig, line);
×
191
                }
×
192
            }
×
193
            SCLogDebug("signature %"PRIu32" loaded", sig->id);
35,612✔
194
            good++;
35,612✔
195
        } else {
35,612✔
196
            if (!de_ctx->sigerror_silent) {
×
197
                SCLogError("error parsing signature \"%s\" from "
×
198
                           "file %s at line %" PRId32 "",
×
199
                        line, sig_file, lineno - multiline);
×
200

201
                if (!SigStringAppend(&de_ctx->sig_stat, sig_file, line, de_ctx->sigerror, (lineno - multiline))) {
×
202
                    SCLogError("Error adding sig \"%s\" from "
×
203
                               "file %s at line %" PRId32 "",
×
204
                            line, sig_file, lineno - multiline);
×
205
                }
×
206
                if (de_ctx->sigerror) {
×
207
                    de_ctx->sigerror = NULL;
×
208
                }
×
209
            }
×
210
            if (rule_engine_analysis_set) {
×
211
                EngineAnalysisRulesFailure(de_ctx, line, sig_file, lineno - multiline);
×
212
            }
×
213
            if (!de_ctx->sigerror_ok) {
×
214
                bad++;
×
215
            }
×
216
            if (de_ctx->sigerror_requires) {
×
217
                SCLogInfo("Skipping signature due to missing requirements: %s from file %s at line "
×
218
                          "%" PRId32,
×
219
                        line, sig_file, lineno - multiline);
×
220
                skipped++;
×
221
            }
×
222
        }
×
223
        multiline = 0;
35,612✔
224
    }
35,612✔
225
    fclose(fp);
7✔
226

227
    *goodsigs = good;
7✔
228
    *badsigs = bad;
7✔
229
    *skippedsigs = skipped;
7✔
230
    return 0;
7✔
231
}
7✔
232

233
/**
234
 *  \brief Expands wildcards and reads signatures from each matching file
235
 *  \param de_ctx Pointer to the detection engine context
236
 *  \param sig_file Filename (or pattern) holding signatures
237
 *  \retval -1 on error
238
 */
239
static int ProcessSigFiles(DetectEngineCtx *de_ctx, char *pattern, SigFileLoaderStat *st,
240
        int *good_sigs, int *bad_sigs, int *skipped_sigs)
241
{
7✔
242
    int r = 0;
7✔
243

244
    if (pattern == NULL) {
7✔
245
        SCLogError("opening rule file null");
×
246
        return -1;
×
247
    }
×
248

249
#ifdef HAVE_GLOB_H
7✔
250
    glob_t files;
7✔
251
    r = glob(pattern, 0, NULL, &files);
7✔
252

253
    if (r == GLOB_NOMATCH) {
7✔
254
        SCLogWarning("No rule files match the pattern %s", pattern);
×
255
        ++(st->bad_files);
×
256
        ++(st->total_files);
×
257
        return -1;
×
258
    } else if (r != 0) {
7✔
259
        SCLogError("error expanding template %s: %s", pattern, strerror(errno));
×
260
        return -1;
×
261
    }
×
262

263
    for (size_t i = 0; i < (size_t)files.gl_pathc; i++) {
14✔
264
        char *fname = files.gl_pathv[i];
7✔
265
        if (strcmp("/dev/null", fname) == 0)
7✔
266
            continue;
×
267
#else
268
        char *fname = pattern;
269
        if (strcmp("/dev/null", fname) == 0)
270
            return 0;
271
#endif
272
        if (strlen(de_ctx->config_prefix) > 0) {
7✔
273
            SCLogConfig("tenant id %d: Loading rule file: %s", de_ctx->tenant_id, fname);
×
274
        } else {
7✔
275
            SCLogConfig("Loading rule file: %s", fname);
7✔
276
        }
7✔
277
        r = DetectLoadSigFile(de_ctx, fname, good_sigs, bad_sigs, skipped_sigs, false);
7✔
278
        if (r < 0) {
7✔
279
            ++(st->bad_files);
×
280
        }
×
281

282
        ++(st->total_files);
7✔
283

284
        st->good_sigs_total += *good_sigs;
7✔
285
        st->bad_sigs_total += *bad_sigs;
7✔
286
        st->skipped_sigs_total += *skipped_sigs;
7✔
287

288
#ifdef HAVE_GLOB_H
7✔
289
    }
7✔
290
    globfree(&files);
7✔
291
#endif
7✔
292
    return r;
7✔
293
}
7✔
294

295
static int LoadFirewallRuleFiles(DetectEngineCtx *de_ctx)
296
{
×
297
    if (de_ctx->firewall_rule_file_exclusive) {
×
298
        int32_t good_sigs = 0;
×
299
        int32_t bad_sigs = 0;
×
300
        int32_t skipped_sigs = 0;
×
301

302
        SCLogDebug("fw: rule file full path \"%s\"", de_ctx->firewall_rule_file_exclusive);
×
303

304
        int ret = DetectLoadSigFile(de_ctx, de_ctx->firewall_rule_file_exclusive, &good_sigs,
×
305
                &bad_sigs, &skipped_sigs, true);
×
306

307
        /* for now be as strict as possible */
308
        if (ret != 0 || bad_sigs != 0 || skipped_sigs != 0) {
×
309
            /* Some rules failed to load, just exit as
310
             * errors would have already been logged. */
311
            exit(EXIT_FAILURE);
×
312
        }
×
313

314
        if (good_sigs == 0) {
×
315
            SCLogNotice("fw: No rules loaded from %s.", de_ctx->firewall_rule_file_exclusive);
×
316
        } else {
×
317
            SCLogNotice("fw: %d rules loaded from %s.", good_sigs,
×
318
                    de_ctx->firewall_rule_file_exclusive);
×
319
            de_ctx->sig_stat.good_sigs_total += good_sigs;
×
320
        }
×
321

322
        return 0;
×
323
    }
×
324

325
    SCConfNode *default_fw_rule_path = SCConfGetNode("firewall.rule-path");
×
326
    if (default_fw_rule_path == NULL) {
×
327
        SCLogNotice("fw: firewall.rule-path not defined, skip loading firewall rules");
×
328
        return 0;
×
329
    }
×
330
    SCConfNode *rule_files = SCConfGetNode("firewall.rule-files");
×
331
    if (rule_files == NULL) {
×
332
        SCLogNotice("fw: firewall.rule-files not defined, skip loading firewall rules");
×
333
        return 0;
×
334
    }
×
335

336
    SCConfNode *file = NULL;
×
337
    TAILQ_FOREACH (file, &rule_files->head, next) {
×
338
        int32_t good_sigs = 0;
×
339
        int32_t bad_sigs = 0;
×
340
        int32_t skipped_sigs = 0;
×
341

342
        char *sfile = DetectLoadCompleteSigPathWithKey(de_ctx, "firewall.rule-path", file->val);
×
343
        SCLogNotice("fw: rule file full path \"%s\"", sfile);
×
344

345
        int ret = DetectLoadSigFile(de_ctx, sfile, &good_sigs, &bad_sigs, &skipped_sigs, true);
×
346
        SCFree(sfile);
×
347

348
        /* for now be as strict as possible */
349
        if (ret != 0 || bad_sigs != 0 || skipped_sigs != 0) {
×
350
            /* Some rules failed to load, just exit as
351
             * errors would have already been logged. */
352
            exit(EXIT_FAILURE);
×
353
        }
×
354

355
        if (good_sigs == 0) {
×
356
            SCLogNotice("fw: No rules loaded from %s.", file->val);
×
357
        } else {
×
358
            SCLogNotice("fw: %d rules loaded from %s.", good_sigs, file->val);
×
359
            de_ctx->sig_stat.good_sigs_total += good_sigs;
×
360
        }
×
361
    }
×
362
    return 0;
×
363
}
×
364

365
/**
366
 *  \brief Load signatures
367
 *  \param de_ctx Pointer to the detection engine context
368
 *  \param sig_file Filename (or pattern) holding signatures
369
 *  \param sig_file_exclusive File passed in 'sig_file' should be loaded exclusively.
370
 *  \retval -1 on error
371
 */
372
int SigLoadSignatures(DetectEngineCtx *de_ctx, char *sig_file, bool sig_file_exclusive)
373
{
7✔
374
    SCEnter();
7✔
375

376
    SCConfNode *rule_files;
7✔
377
    SCConfNode *file = NULL;
7✔
378
    SigFileLoaderStat *sig_stat = &de_ctx->sig_stat;
7✔
379
    int ret = 0;
7✔
380
    char *sfile = NULL;
7✔
381
    char varname[128] = "rule-files";
7✔
382
    int good_sigs = 0;
7✔
383
    int bad_sigs = 0;
7✔
384
    int skipped_sigs = 0;
7✔
385

386
    if (strlen(de_ctx->config_prefix) > 0) {
7✔
387
        snprintf(varname, sizeof(varname), "%s.rule-files", de_ctx->config_prefix);
×
388
    }
×
389

390
    if (SCRunmodeGet() == RUNMODE_ENGINE_ANALYSIS) {
7✔
391
        SetupEngineAnalysis(de_ctx, &fp_engine_analysis_set, &rule_engine_analysis_set);
×
392
    }
×
393

394
    if (EngineModeIsFirewall() || de_ctx->firewall_rule_file_exclusive) {
7✔
395
        if (LoadFirewallRuleFiles(de_ctx) < 0) {
×
396
            if (de_ctx->failure_fatal) {
×
397
                exit(EXIT_FAILURE);
×
398
            }
×
399
            ret = -1;
×
400
            goto end;
×
401
        }
×
402

403
        /* skip regular rules if we used a exclusive firewall rule file */
404
        if (!sig_file_exclusive && de_ctx->firewall_rule_file_exclusive) {
×
405
            ret = 0;
×
406
            goto skip_regular_rules;
×
407
        }
×
408
    }
×
409

410
    /* ok, let's load signature files from the general config */
411
    if (!(sig_file != NULL && sig_file_exclusive)) {
7✔
412
        rule_files = SCConfGetNode(varname);
×
413
        if (rule_files != NULL) {
×
414
            if (!SCConfNodeIsSequence(rule_files)) {
×
415
                SCLogWarning("Invalid rule-files configuration section: "
×
416
                             "expected a list of filenames.");
×
417
            } else {
×
418
                TAILQ_FOREACH(file, &rule_files->head, next) {
×
419
                    sfile = DetectLoadCompleteSigPath(de_ctx, file->val);
×
420
                    good_sigs = bad_sigs = skipped_sigs = 0;
×
421
                    ret = ProcessSigFiles(
×
422
                            de_ctx, sfile, sig_stat, &good_sigs, &bad_sigs, &skipped_sigs);
×
423
                    SCFree(sfile);
×
424

425
                    if (de_ctx->failure_fatal && ret != 0) {
×
426
                        /* Some rules failed to load, just exit as
427
                         * errors would have already been logged. */
428
                        exit(EXIT_FAILURE);
×
429
                    }
×
430

431
                    if (good_sigs == 0) {
×
432
                        SCLogConfig("No rules loaded from %s.", file->val);
×
433
                    }
×
434
                }
×
435
            }
×
436
        }
×
437
    }
×
438

439
    /* If a Signature file is specified from command-line, parse it too */
440
    if (sig_file != NULL) {
7✔
441
        ret = ProcessSigFiles(de_ctx, sig_file, sig_stat, &good_sigs, &bad_sigs, &skipped_sigs);
7✔
442

443
        if (ret != 0) {
7✔
444
            if (de_ctx->failure_fatal) {
×
445
                exit(EXIT_FAILURE);
×
446
            }
×
447
        }
×
448

449
        if (good_sigs == 0) {
7✔
450
            SCLogConfig("No rules loaded from %s", sig_file);
×
451
        }
×
452
    }
7✔
453

454
skip_regular_rules:
7✔
455
    /* now we should have signatures to work with */
456
    if (sig_stat->good_sigs_total <= 0) {
7✔
457
        if (sig_stat->total_files > 0) {
×
458
            SCLogWarning(
×
459
                    "%d rule files specified, but no rules were loaded!", sig_stat->total_files);
×
460
        } else {
×
461
            SCLogInfo("No signatures supplied.");
×
462
            goto end;
×
463
        }
×
464
    } else {
7✔
465
        /* we report the total of files and rules successfully loaded and failed */
466
        if (strlen(de_ctx->config_prefix) > 0) {
7✔
467
            SCLogInfo("tenant id %d:  %" PRId32 " rule files processed. %" PRId32
×
468
                      " rules successfully loaded, %" PRId32 " rules failed, %" PRId32
×
469
                      " rules skipped",
×
470
                    de_ctx->tenant_id, sig_stat->total_files, sig_stat->good_sigs_total,
×
471
                    sig_stat->bad_sigs_total, sig_stat->skipped_sigs_total);
×
472
        } else {
7✔
473
            SCLogInfo("%" PRId32 " rule files processed. %" PRId32
7✔
474
                      " rules successfully loaded, %" PRId32 " rules failed, %" PRId32
7✔
475
                      " rules skipped",
7✔
476
                    sig_stat->total_files, sig_stat->good_sigs_total, sig_stat->bad_sigs_total,
7✔
477
                    sig_stat->skipped_sigs_total);
7✔
478
        }
7✔
479
        if (de_ctx->requirements != NULL && sig_stat->skipped_sigs_total > 0) {
7✔
480
            SCDetectRequiresStatusLog(de_ctx->requirements, PROG_VER,
×
481
                    strlen(de_ctx->config_prefix) > 0 ? de_ctx->tenant_id : 0);
×
482
        }
×
483
    }
7✔
484

485
    if ((sig_stat->bad_sigs_total || sig_stat->bad_files) && de_ctx->failure_fatal) {
7✔
486
        ret = -1;
×
487
        goto end;
×
488
    }
×
489

490
    SCSigRegisterSignatureOrderingFuncs(de_ctx);
7✔
491
    SCSigOrderSignatures(de_ctx);
7✔
492
    SCSigSignatureOrderingModuleCleanup(de_ctx);
7✔
493

494
    if (SCThresholdConfInitContext(de_ctx) < 0) {
7✔
495
        ret = -1;
×
496
        goto end;
×
497
    }
×
498

499
    /* Setup the signature group lookup structure and pattern matchers */
500
    if (SigGroupBuild(de_ctx) < 0)
7✔
501
        goto end;
×
502

503
    ret = 0;
7✔
504

505
 end:
7✔
506
    gettimeofday(&de_ctx->last_reload, NULL);
7✔
507
    if (SCRunmodeGet() == RUNMODE_ENGINE_ANALYSIS) {
7✔
508
        CleanupEngineAnalysis(de_ctx);
×
509
    }
×
510

511
    DetectParseDupSigHashFree(de_ctx);
7✔
512
    SCReturnInt(ret);
7✔
513
}
7✔
514

515
#define NLOADERS 4
×
516
static DetectLoaderControl *loaders = NULL;
517
static int cur_loader = 0;
518
static void TmThreadWakeupDetectLoaderThreads(void);
519
static int num_loaders = NLOADERS;
520

521
/** \param loader -1 for auto select
522
 *  \retval loader_id or negative in case of error */
523
int DetectLoaderQueueTask(int loader_id, LoaderFunc Func, void *func_ctx, LoaderFreeFunc FreeFunc)
524
{
×
525
    if (loader_id == -1) {
×
526
        loader_id = cur_loader;
×
527
        cur_loader++;
×
528
        if (cur_loader >= num_loaders)
×
529
            cur_loader = 0;
×
530
    }
×
531
    if (loader_id >= num_loaders || loader_id < 0) {
×
532
        return -ERANGE;
×
533
    }
×
534

535
    DetectLoaderControl *loader = &loaders[loader_id];
×
536

537
    DetectLoaderTask *t = SCCalloc(1, sizeof(*t));
×
538
    if (t == NULL)
×
539
        return -ENOMEM;
×
540

541
    t->Func = Func;
×
542
    t->ctx = func_ctx;
×
543
    t->FreeFunc = FreeFunc;
×
544

545
    SCMutexLock(&loader->m);
×
546
    TAILQ_INSERT_TAIL(&loader->task_list, t, next);
×
547
    SCMutexUnlock(&loader->m);
×
548

549
    TmThreadWakeupDetectLoaderThreads();
×
550

551
    SCLogDebug("%d %p %p", loader_id, Func, func_ctx);
×
552
    return loader_id;
×
553
}
×
554

555
/** \brief wait for loader tasks to complete
556
 *  \retval result 0 for ok, -1 for errors */
557
int DetectLoadersSync(void)
558
{
×
559
    SCLogDebug("waiting");
×
560
    int errors = 0;
×
561
    for (int i = 0; i < num_loaders; i++) {
×
562
        bool done = false;
×
563

564
        DetectLoaderControl *loader = &loaders[i];
×
565
        while (!done) {
×
566
            SCMutexLock(&loader->m);
×
567
            if (TAILQ_EMPTY(&loader->task_list)) {
×
568
                done = true;
×
569
            }
×
570
            SCMutexUnlock(&loader->m);
×
571
            if (!done) {
×
572
                /* nudge thread in case it's sleeping */
573
                SCCtrlMutexLock(loader->tv->ctrl_mutex);
×
574
                pthread_cond_broadcast(loader->tv->ctrl_cond);
×
575
                SCCtrlMutexUnlock(loader->tv->ctrl_mutex);
×
576
            }
×
577
        }
×
578
        SCMutexLock(&loader->m);
×
579
        if (loader->result != 0) {
×
580
            errors++;
×
581
            loader->result = 0;
×
582
        }
×
583
        SCMutexUnlock(&loader->m);
×
584
    }
×
585
    if (errors) {
×
586
        SCLogError("%d loaders reported errors", errors);
×
587
        return -1;
×
588
    }
×
589
    SCLogDebug("done");
×
590
    return 0;
×
591
}
×
592

593
static void DetectLoaderInit(DetectLoaderControl *loader)
594
{
×
595
    memset(loader, 0x00, sizeof(*loader));
×
596
    SCMutexInit(&loader->m, NULL);
×
597
    TAILQ_INIT(&loader->task_list);
×
598
}
×
599

600
void DetectLoadersInit(void)
601
{
×
602
    intmax_t setting = NLOADERS;
×
603
    (void)SCConfGetInt("multi-detect.loaders", &setting);
×
604

605
    if (setting < 1 || setting > 1024) {
×
606
        FatalError("invalid multi-detect.loaders setting %" PRIdMAX, setting);
×
607
    }
×
608

609
    num_loaders = (int32_t)setting;
×
610
    SCLogInfo("using %d detect loader threads", num_loaders);
×
611

612
    BUG_ON(loaders != NULL);
×
613
    loaders = SCCalloc(num_loaders, sizeof(DetectLoaderControl));
×
614
    BUG_ON(loaders == NULL);
×
615

616
    for (int i = 0; i < num_loaders; i++) {
×
617
        DetectLoaderInit(&loaders[i]);
×
618
    }
×
619
}
×
620

621
/**
622
 * \brief Unpauses all threads present in tv_root
623
 */
624
static void TmThreadWakeupDetectLoaderThreads(void)
625
{
×
626
    SCMutexLock(&tv_root_lock);
×
627
    for (int i = 0; i < TVT_MAX; i++) {
×
628
        ThreadVars *tv = tv_root[i];
×
629
        while (tv != NULL) {
×
630
            if (strncmp(tv->name,"DL#",3) == 0) {
×
631
                BUG_ON(tv->ctrl_cond == NULL);
×
632
                SCCtrlMutexLock(tv->ctrl_mutex);
×
633
                pthread_cond_broadcast(tv->ctrl_cond);
×
634
                SCCtrlMutexUnlock(tv->ctrl_mutex);
×
635
            }
×
636
            tv = tv->next;
×
637
        }
×
638
    }
×
639
    SCMutexUnlock(&tv_root_lock);
×
640
}
×
641

642
/**
643
 * \brief Unpauses all threads present in tv_root
644
 */
645
void TmThreadContinueDetectLoaderThreads(void)
646
{
×
647
    SCMutexLock(&tv_root_lock);
×
648
    for (int i = 0; i < TVT_MAX; i++) {
×
649
        ThreadVars *tv = tv_root[i];
×
650
        while (tv != NULL) {
×
651
            if (strncmp(tv->name,"DL#",3) == 0)
×
652
                TmThreadContinue(tv);
×
653

654
            tv = tv->next;
×
655
        }
×
656
    }
×
657
    SCMutexUnlock(&tv_root_lock);
×
658
}
×
659

660
SC_ATOMIC_DECLARE(int, detect_loader_cnt);
661

662
typedef struct DetectLoaderThreadData_ {
663
    uint32_t instance;
664
} DetectLoaderThreadData;
665

666
static TmEcode DetectLoaderThreadInit(ThreadVars *t, const void *initdata, void **data)
667
{
×
668
    DetectLoaderThreadData *ftd = SCCalloc(1, sizeof(DetectLoaderThreadData));
×
669
    if (ftd == NULL)
×
670
        return TM_ECODE_FAILED;
×
671

672
    ftd->instance = SC_ATOMIC_ADD(detect_loader_cnt, 1); /* id's start at 0 */
×
673
    SCLogDebug("detect loader instance %u", ftd->instance);
×
674

675
    /* pass thread data back to caller */
676
    *data = ftd;
×
677

678
    DetectLoaderControl *loader = &loaders[ftd->instance];
×
679
    loader->tv = t;
×
680

681
    return TM_ECODE_OK;
×
682
}
×
683

684
static TmEcode DetectLoaderThreadDeinit(ThreadVars *t, void *data)
685
{
×
686
    SCFree(data);
×
687
    return TM_ECODE_OK;
×
688
}
×
689

690

691
static TmEcode DetectLoader(ThreadVars *th_v, void *thread_data)
692
{
×
693
    DetectLoaderThreadData *ftd = (DetectLoaderThreadData *)thread_data;
×
694
    BUG_ON(ftd == NULL);
×
695

696
    TmThreadsSetFlag(th_v, THV_INIT_DONE | THV_RUNNING);
×
697
    SCLogDebug("loader thread started");
×
698
    bool run = TmThreadsWaitForUnpause(th_v);
×
699
    while (run) {
×
700
        /* see if we have tasks */
701

702
        DetectLoaderControl *loader = &loaders[ftd->instance];
×
703
        SCMutexLock(&loader->m);
×
704

705
        DetectLoaderTask *task = NULL, *tmptask = NULL;
×
706
        TAILQ_FOREACH_SAFE(task, &loader->task_list, next, tmptask) {
×
707
            int r = task->Func(task->ctx, ftd->instance);
×
708
            loader->result |= r;
×
709
            TAILQ_REMOVE(&loader->task_list, task, next);
×
710
            task->FreeFunc(task->ctx);
×
711
            SCFree(task);
×
712
        }
×
713

714
        SCMutexUnlock(&loader->m);
×
715

716
        /* just wait until someone wakes us up */
717
        SCCtrlMutexLock(th_v->ctrl_mutex);
×
718
        int rc = 0;
×
719
        while (rc == 0) {
×
720
            if (TmThreadsCheckFlag(th_v, THV_KILL)) {
×
721
                run = false;
×
722
                break;
×
723
            }
×
724
            SCMutexLock(&loader->m);
×
725
            bool has_work = loader->task_list.tqh_first != NULL;
×
726
            SCMutexUnlock(&loader->m);
×
727
            if (has_work)
×
728
                break;
×
729

730
            rc = SCCtrlCondWait(th_v->ctrl_cond, th_v->ctrl_mutex);
×
731
        }
×
732
        SCCtrlMutexUnlock(th_v->ctrl_mutex);
×
733

734
        SCLogDebug("woke up...");
×
735
    }
×
736

737
    TmThreadsSetFlag(th_v, THV_RUNNING_DONE);
×
738
    TmThreadWaitForFlag(th_v, THV_DEINIT);
×
739
    TmThreadsSetFlag(th_v, THV_CLOSED);
×
740

741
    return TM_ECODE_OK;
×
742
}
×
743

744
/** \brief spawn the detect loader manager thread */
745
void DetectLoaderThreadSpawn(void)
746
{
×
747
    for (int i = 0; i < num_loaders; i++) {
×
748
        char name[TM_THREAD_NAME_MAX];
×
749
        snprintf(name, sizeof(name), "%s#%02d", thread_name_detect_loader, i+1);
×
750

751
        ThreadVars *tv_loader = TmThreadCreateCmdThreadByName(name, "DetectLoader", 1);
×
752
        if (tv_loader == NULL) {
×
753
            FatalError("failed to create thread %s", name);
×
754
        }
×
755
        if (TmThreadSpawn(tv_loader) != TM_ECODE_OK) {
×
756
            FatalError("failed to create spawn %s", name);
×
757
        }
×
758
    }
×
759
}
×
760

761
void TmModuleDetectLoaderRegister (void)
762
{
×
763
    tmm_modules[TMM_DETECTLOADER].name = "DetectLoader";
×
764
    tmm_modules[TMM_DETECTLOADER].ThreadInit = DetectLoaderThreadInit;
×
765
    tmm_modules[TMM_DETECTLOADER].ThreadDeinit = DetectLoaderThreadDeinit;
×
766
    tmm_modules[TMM_DETECTLOADER].Management = DetectLoader;
×
767
    tmm_modules[TMM_DETECTLOADER].cap_flags = 0;
×
768
    tmm_modules[TMM_DETECTLOADER].flags = TM_FLAG_MANAGEMENT_TM;
×
769
    SCLogDebug("%s registered", tmm_modules[TMM_DETECTLOADER].name);
×
770

771
    SC_ATOMIC_INIT(detect_loader_cnt);
×
772
}
×
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc