• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

jasonish / suricata / 23266215808

18 Mar 2026 08:46PM UTC coverage: 79.307% (-0.01%) from 79.32%
23266215808

push

github

jasonish
fixup

266032 of 335445 relevant lines covered (79.31%)

4496749.68 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

87.57
/src/detect-engine-loader.c
1
/* Copyright (C) 2021-2023 Open Information Security Foundation
2
 *
3
 * You can copy, redistribute or modify this Program under the terms of
4
 * the GNU General Public License version 2 as published by the Free
5
 * Software Foundation.
6
 *
7
 * This program is distributed in the hope that it will be useful,
8
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
10
 * GNU General Public License for more details.
11
 *
12
 * You should have received a copy of the GNU General Public License
13
 * version 2 along with this program; if not, write to the Free Software
14
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
15
 * 02110-1301, USA.
16
 */
17

18
/**
19
 * \file
20
 *
21
 * \author Victor Julien <victor@inliniac.net>
22
 */
23

24
#include "suricata-common.h"
25
#include "suricata.h"
26
#include "conf.h"
27
#include "detect.h"
28
#include "detect-parse.h"
29

30
#include "runmodes.h"
31
#include "threads.h"
32
#include "threadvars.h"
33
#include "tm-threads.h"
34
#include "queue.h"
35

36
#include "detect-engine.h"
37
#include "detect-engine-loader.h"
38
#include "detect-engine-build.h"
39
#include "detect-engine-analyzer.h"
40
#include "detect-engine-mpm.h"
41
#include "detect-engine-sigorder.h"
42

43
#include "util-detect.h"
44
#include "util-threshold-config.h"
45
#include "util-path.h"
46

47
#include "rust.h"
48

49
#ifdef HAVE_GLOB_H
50
#include <glob.h>
51
#endif
52

53
extern int rule_reload;
54
extern int engine_analysis;
55
static bool fp_engine_analysis_set = false;
56
bool rule_engine_analysis_set = false;
57

58
static char *DetectLoadCompleteSigPathWithKey(
59
        const DetectEngineCtx *de_ctx, const char *default_key, const char *sig_file)
60
{
45,082✔
61
    const char *defaultpath = NULL;
45,082✔
62
    char *path = NULL;
45,082✔
63
    char varname[128];
45,082✔
64

65
    if (sig_file == NULL) {
45,082✔
66
        SCLogError("invalid sig_file argument - NULL");
×
67
        return NULL;
×
68
    }
×
69

70
    /* If we have a configuration prefix, only use it if the primary configuration node
71
     * is not marked as final, as that means it was provided on the command line with
72
     * a --set. */
73
    SCConfNode *default_rule_path = SCConfGetNode(default_key);
45,082✔
74
    if ((!default_rule_path || !default_rule_path->final) && strlen(de_ctx->config_prefix) > 0) {
45,082✔
75
        snprintf(varname, sizeof(varname), "%s.%s", de_ctx->config_prefix, default_key);
12✔
76
        default_rule_path = SCConfGetNode(varname);
12✔
77
    }
12✔
78
    if (default_rule_path) {
45,082✔
79
        defaultpath = default_rule_path->val;
85✔
80
    }
85✔
81

82
    /* Path not specified */
83
    if (PathIsRelative(sig_file)) {
45,082✔
84
        if (defaultpath) {
45,074✔
85
            path = PathMergeAlloc(defaultpath, sig_file);
85✔
86
            if (unlikely(path == NULL))
85✔
87
                return NULL;
×
88
        } else {
45,046✔
89
            path = SCStrdup(sig_file);
44,989✔
90
            if (unlikely(path == NULL))
44,989✔
91
                return NULL;
×
92
        }
44,989✔
93
    } else {
45,074✔
94
        path = SCStrdup(sig_file);
8✔
95
        if (unlikely(path == NULL))
8✔
96
            return NULL;
×
97
    }
8✔
98
    return path;
45,082✔
99
}
45,082✔
100

101
/**
102
 *  \brief Create the path if default-rule-path was specified
103
 *  \param sig_file The name of the file
104
 *  \retval str Pointer to the string path + sig_file
105
 */
106
char *DetectLoadCompleteSigPath(const DetectEngineCtx *de_ctx, const char *sig_file)
107
{
45,081✔
108
    return DetectLoadCompleteSigPathWithKey(de_ctx, "default-rule-path", sig_file);
45,081✔
109
}
45,081✔
110

111
/**
112
 *  \brief Load a file with signatures
113
 *  \param de_ctx Pointer to the detection engine context
114
 *  \param sig_file Filename to load signatures from
115
 *  \param goodsigs_tot Will store number of valid signatures in the file
116
 *  \param badsigs_tot Will store number of invalid signatures in the file
117
 *  \retval 0 on success, -1 on error
118
 */
119
static int DetectLoadSigFile(DetectEngineCtx *de_ctx, const char *sig_file, int *goodsigs,
120
        int *badsigs, int *skippedsigs, const bool firewall_rule)
121
{
37,282✔
122
    int good = 0, bad = 0, skipped = 0;
37,282✔
123
    char line[DETECT_MAX_RULE_SIZE] = "";
37,282✔
124
    size_t offset = 0;
37,282✔
125
    int lineno = 0, multiline = 0;
37,282✔
126

127
    (*goodsigs) = 0;
37,282✔
128
    (*badsigs) = 0;
37,282✔
129
    (*skippedsigs) = 0;
37,282✔
130

131
    FILE *fp = fopen(sig_file, "r");
37,282✔
132
    if (fp == NULL) {
37,282✔
133
        SCLogError("opening rule file %s:"
×
134
                   " %s.",
×
135
                sig_file, strerror(errno));
×
136
        return -1;
×
137
    }
×
138

139
    while (1) {
6,775,916✔
140
        /* help clang to understand offset can't get > sizeof(line), so the argument to
141
         * fgets can't get negative. */
142
        BUG_ON(offset >= sizeof(line));
6,775,908✔
143
        char *res = fgets(line + offset, (int)(sizeof(line) - offset), fp);
6,775,908✔
144
        if (res == NULL)
6,775,908✔
145
            break;
37,274✔
146

147
        lineno++;
6,738,634✔
148
        size_t len = strlen(line);
6,738,634✔
149

150
        /* ignore comments and empty lines */
151
        if (line[0] == '\n' || line [0] == '\r' || line[0] == ' ' || line[0] == '#' || line[0] == '\t')
6,738,634✔
152
            continue;
793,217✔
153

154
        /* Check for multiline rules. */
155
        while (len > 0 && isspace((unsigned char)line[--len]));
12,225,276✔
156
        if (line[len] == '\\') {
5,945,417✔
157
            multiline++;
818,801✔
158
            offset = len;
818,801✔
159
            if (offset < sizeof(line) - 1) {
818,801✔
160
                /* We have room for more. */
161
                continue;
818,801✔
162
            }
818,801✔
163
            /* No more room in line buffer, continue, rule will fail
164
             * to parse. */
165
        }
818,801✔
166

167
        /* Check if we have a trailing newline, and remove it */
168
        len = strlen(line);
5,126,616✔
169
        if (len > 0 && (line[len - 1] == '\n' || line[len - 1] == '\r')) {
5,126,616✔
170
            line[len - 1] = '\0';
5,097,942✔
171
        }
5,097,942✔
172

173
        /* Reset offset. */
174
        offset = 0;
5,126,616✔
175

176
        de_ctx->rule_file = sig_file;
5,126,616✔
177
        de_ctx->rule_line = lineno - multiline;
5,126,616✔
178

179
        Signature *sig = NULL;
5,126,616✔
180
        if (firewall_rule)
5,126,616✔
181
            sig = DetectFirewallRuleAppendNew(de_ctx, line);
259✔
182
        else
5,126,357✔
183
            sig = DetectEngineAppendSig(de_ctx, line);
5,126,357✔
184
        if (sig != NULL) {
5,126,616✔
185
            if (rule_engine_analysis_set || fp_engine_analysis_set) {
253,432✔
186
                if (fp_engine_analysis_set) {
418✔
187
                    EngineAnalysisFP(de_ctx, sig, line);
398✔
188
                }
398✔
189
                if (rule_engine_analysis_set) {
418✔
190
                    EngineAnalysisRules(de_ctx, sig, line);
418✔
191
                }
418✔
192
            }
418✔
193
            SCLogDebug("signature %"PRIu32" loaded", sig->id);
253,432✔
194
            good++;
253,432✔
195
        } else {
5,018,250✔
196
            if (!de_ctx->sigerror_silent) {
4,873,184✔
197
                SCLogError("error parsing signature \"%s\" from "
4,845,407✔
198
                           "file %s at line %" PRId32 "",
4,845,407✔
199
                        line, sig_file, lineno - multiline);
4,845,407✔
200

201
                if (!SigStringAppend(&de_ctx->sig_stat, sig_file, line, de_ctx->sigerror, (lineno - multiline))) {
4,845,407✔
202
                    SCLogError("Error adding sig \"%s\" from "
×
203
                               "file %s at line %" PRId32 "",
×
204
                            line, sig_file, lineno - multiline);
×
205
                }
×
206
                if (de_ctx->sigerror) {
4,845,407✔
207
                    de_ctx->sigerror = NULL;
12,250✔
208
                }
12,250✔
209
            }
4,845,407✔
210
            if (rule_engine_analysis_set) {
4,873,184✔
211
                EngineAnalysisRulesFailure(de_ctx, line, sig_file, lineno - multiline);
40✔
212
            }
40✔
213
            if (!de_ctx->sigerror_ok) {
4,873,184✔
214
                bad++;
4,845,408✔
215
            }
4,845,408✔
216
            if (de_ctx->sigerror_requires) {
4,873,184✔
217
                SCLogInfo("Skipping signature due to missing requirements: %s from file %s at line "
10,021✔
218
                          "%" PRId32,
10,021✔
219
                        line, sig_file, lineno - multiline);
10,021✔
220
                skipped++;
10,021✔
221
            }
10,021✔
222
        }
4,873,184✔
223
        multiline = 0;
5,126,616✔
224
    }
5,126,616✔
225
    fclose(fp);
37,282✔
226

227
    *goodsigs = good;
37,282✔
228
    *badsigs = bad;
37,282✔
229
    *skippedsigs = skipped;
37,282✔
230
    return 0;
37,282✔
231
}
37,282✔
232

233
/**
234
 *  \brief Expands wildcards and reads signatures from each matching file
235
 *  \param de_ctx Pointer to the detection engine context
236
 *  \param sig_file Filename (or pattern) holding signatures
237
 *  \retval -1 on error
238
 */
239
static int ProcessSigFiles(DetectEngineCtx *de_ctx, char *pattern, SigFileLoaderStat *st,
240
        int *good_sigs, int *bad_sigs, int *skipped_sigs)
241
{
37,255✔
242
    int r = 0;
37,255✔
243

244
    if (pattern == NULL) {
37,255✔
245
        SCLogError("opening rule file null");
×
246
        return -1;
×
247
    }
×
248

249
#ifdef HAVE_GLOB_H
37,255✔
250
    glob_t files;
37,255✔
251
    r = glob(pattern, 0, NULL, &files);
37,255✔
252

253
    if (r == GLOB_NOMATCH) {
37,255✔
254
        SCLogWarning("No rule files match the pattern %s", pattern);
2✔
255
        ++(st->bad_files);
2✔
256
        ++(st->total_files);
2✔
257
        return -1;
2✔
258
    } else if (r != 0) {
37,254✔
259
        SCLogError("error expanding template %s: %s", pattern, strerror(errno));
×
260
        return -1;
×
261
    }
×
262

263
    for (size_t i = 0; i < (size_t)files.gl_pathc; i++) {
74,506✔
264
        char *fname = files.gl_pathv[i];
37,253✔
265
        if (strcmp("/dev/null", fname) == 0)
37,253✔
266
            continue;
18✔
267
#else
268
        char *fname = pattern;
269
        if (strcmp("/dev/null", fname) == 0)
270
            return 0;
271
#endif
272
        if (strlen(de_ctx->config_prefix) > 0) {
37,235✔
273
            SCLogConfig("tenant id %d: Loading rule file: %s", de_ctx->tenant_id, fname);
27✔
274
        } else {
37,217✔
275
            SCLogConfig("Loading rule file: %s", fname);
37,208✔
276
        }
37,208✔
277
        r = DetectLoadSigFile(de_ctx, fname, good_sigs, bad_sigs, skipped_sigs, false);
37,235✔
278
        if (r < 0) {
37,235✔
279
            ++(st->bad_files);
×
280
        }
×
281

282
        ++(st->total_files);
37,235✔
283

284
        st->good_sigs_total += *good_sigs;
37,235✔
285
        st->bad_sigs_total += *bad_sigs;
37,235✔
286
        st->skipped_sigs_total += *skipped_sigs;
37,235✔
287

288
#ifdef HAVE_GLOB_H
37,235✔
289
    }
37,235✔
290
    globfree(&files);
37,253✔
291
#endif
37,253✔
292
    return r;
37,253✔
293
}
37,255✔
294

295
static int LoadFirewallRuleFiles(DetectEngineCtx *de_ctx)
296
{
47✔
297
    if (de_ctx->firewall_rule_file_exclusive) {
47✔
298
        int32_t good_sigs = 0;
46✔
299
        int32_t bad_sigs = 0;
46✔
300
        int32_t skipped_sigs = 0;
46✔
301

302
        SCLogDebug("fw: rule file full path \"%s\"", de_ctx->firewall_rule_file_exclusive);
46✔
303

304
        int ret = DetectLoadSigFile(de_ctx, de_ctx->firewall_rule_file_exclusive, &good_sigs,
46✔
305
                &bad_sigs, &skipped_sigs, true);
46✔
306

307
        /* for now be as strict as possible */
308
        if (ret != 0 || bad_sigs != 0 || skipped_sigs != 0) {
46✔
309
            /* Some rules failed to load, just exit as
310
             * errors would have already been logged. */
311
            exit(EXIT_FAILURE);
×
312
        }
×
313

314
        if (good_sigs == 0) {
46✔
315
            SCLogNotice("fw: No rules loaded from %s.", de_ctx->firewall_rule_file_exclusive);
×
316
        } else {
46✔
317
            SCLogNotice("fw: %d rules loaded from %s.", good_sigs,
46✔
318
                    de_ctx->firewall_rule_file_exclusive);
46✔
319
            de_ctx->sig_stat.good_sigs_total += good_sigs;
46✔
320
        }
46✔
321

322
        return 0;
46✔
323
    }
46✔
324

325
    SCConfNode *default_fw_rule_path = SCConfGetNode("firewall.rule-path");
1✔
326
    if (default_fw_rule_path == NULL) {
1✔
327
        SCLogNotice("fw: firewall.rule-path not defined, skip loading firewall rules");
×
328
        return 0;
×
329
    }
×
330
    SCConfNode *rule_files = SCConfGetNode("firewall.rule-files");
1✔
331
    if (rule_files == NULL) {
1✔
332
        SCLogNotice("fw: firewall.rule-files not defined, skip loading firewall rules");
×
333
        return 0;
×
334
    }
×
335

336
    SCConfNode *file = NULL;
1✔
337
    TAILQ_FOREACH (file, &rule_files->head, next) {
1✔
338
        int32_t good_sigs = 0;
1✔
339
        int32_t bad_sigs = 0;
1✔
340
        int32_t skipped_sigs = 0;
1✔
341

342
        char *sfile = DetectLoadCompleteSigPathWithKey(de_ctx, "firewall.rule-path", file->val);
1✔
343
        SCLogNotice("fw: rule file full path \"%s\"", sfile);
1✔
344

345
        int ret = DetectLoadSigFile(de_ctx, sfile, &good_sigs, &bad_sigs, &skipped_sigs, true);
1✔
346
        SCFree(sfile);
1✔
347

348
        /* for now be as strict as possible */
349
        if (ret != 0 || bad_sigs != 0 || skipped_sigs != 0) {
1✔
350
            /* Some rules failed to load, just exit as
351
             * errors would have already been logged. */
352
            exit(EXIT_FAILURE);
×
353
        }
×
354

355
        if (good_sigs == 0) {
1✔
356
            SCLogNotice("fw: No rules loaded from %s.", file->val);
×
357
        } else {
1✔
358
            SCLogNotice("fw: %d rules loaded from %s.", good_sigs, file->val);
1✔
359
            de_ctx->sig_stat.good_sigs_total += good_sigs;
1✔
360
        }
1✔
361
    }
1✔
362
    return 0;
1✔
363
}
1✔
364

365
/**
366
 *  \brief Load signatures
367
 *  \param de_ctx Pointer to the detection engine context
368
 *  \param sig_file Filename (or pattern) holding signatures
369
 *  \param sig_file_exclusive File passed in 'sig_file' should be loaded exclusively.
370
 *  \retval -1 on error
371
 */
372
int SigLoadSignatures(DetectEngineCtx *de_ctx, char *sig_file, bool sig_file_exclusive)
373
{
37,300✔
374
    SCEnter();
37,300✔
375

376
    SCConfNode *rule_files;
37,300✔
377
    SCConfNode *file = NULL;
37,300✔
378
    SigFileLoaderStat *sig_stat = &de_ctx->sig_stat;
37,300✔
379
    int ret = 0;
37,300✔
380
    char *sfile = NULL;
37,300✔
381
    char varname[128] = "rule-files";
37,300✔
382
    int good_sigs = 0;
37,300✔
383
    int bad_sigs = 0;
37,300✔
384
    int skipped_sigs = 0;
37,300✔
385

386
    if (strlen(de_ctx->config_prefix) > 0) {
37,300✔
387
        snprintf(varname, sizeof(varname), "%s.rule-files", de_ctx->config_prefix);
29✔
388
    }
29✔
389

390
    if (SCRunmodeGet() == RUNMODE_ENGINE_ANALYSIS) {
37,300✔
391
        SetupEngineAnalysis(de_ctx, &fp_engine_analysis_set, &rule_engine_analysis_set);
111✔
392
    }
111✔
393

394
    if (EngineModeIsFirewall() || de_ctx->firewall_rule_file_exclusive) {
37,300✔
395
        if (LoadFirewallRuleFiles(de_ctx) < 0) {
47✔
396
            if (de_ctx->failure_fatal) {
×
397
                exit(EXIT_FAILURE);
×
398
            }
×
399
            ret = -1;
×
400
            goto end;
×
401
        }
×
402

403
        /* skip regular rules if we used a exclusive firewall rule file */
404
        if (!sig_file_exclusive && de_ctx->firewall_rule_file_exclusive) {
47✔
405
            ret = 0;
41✔
406
            goto skip_regular_rules;
41✔
407
        }
41✔
408
    }
47✔
409

410
    /* ok, let's load signature files from the general config */
411
    if (!(sig_file != NULL && sig_file_exclusive)) {
37,259✔
412
        rule_files = SCConfGetNode(varname);
39✔
413
        if (rule_files != NULL) {
39✔
414
            if (!SCConfNodeIsSequence(rule_files)) {
35✔
415
                SCLogWarning("Invalid rule-files configuration section: "
×
416
                             "expected a list of filenames.");
×
417
            } else {
35✔
418
                TAILQ_FOREACH(file, &rule_files->head, next) {
35✔
419
                    sfile = DetectLoadCompleteSigPath(de_ctx, file->val);
35✔
420
                    good_sigs = bad_sigs = skipped_sigs = 0;
35✔
421
                    ret = ProcessSigFiles(
35✔
422
                            de_ctx, sfile, sig_stat, &good_sigs, &bad_sigs, &skipped_sigs);
35✔
423
                    SCFree(sfile);
35✔
424

425
                    if (de_ctx->failure_fatal && ret != 0) {
35✔
426
                        /* Some rules failed to load, just exit as
427
                         * errors would have already been logged. */
428
                        exit(EXIT_FAILURE);
×
429
                    }
×
430

431
                    if (good_sigs == 0) {
35✔
432
                        SCLogConfig("No rules loaded from %s.", file->val);
2✔
433
                    }
2✔
434
                }
35✔
435
            }
35✔
436
        }
35✔
437
    }
39✔
438

439
    /* If a Signature file is specified from command-line, parse it too */
440
    if (sig_file != NULL) {
37,259✔
441
        ret = ProcessSigFiles(de_ctx, sig_file, sig_stat, &good_sigs, &bad_sigs, &skipped_sigs);
37,220✔
442

443
        if (ret != 0) {
37,220✔
444
            if (de_ctx->failure_fatal) {
1✔
445
                exit(EXIT_FAILURE);
×
446
            }
×
447
        }
1✔
448

449
        if (good_sigs == 0) {
37,220✔
450
            SCLogConfig("No rules loaded from %s", sig_file);
15,008✔
451
        }
15,008✔
452
    }
37,220✔
453

454
skip_regular_rules:
37,292✔
455
    /* now we should have signatures to work with */
456
    if (sig_stat->good_sigs_total <= 0) {
37,292✔
457
        if (sig_stat->total_files > 0) {
15,013✔
458
            SCLogWarning(
14,991✔
459
                    "%d rule files specified, but no rules were loaded!", sig_stat->total_files);
14,991✔
460
        } else {
15,013✔
461
            SCLogInfo("No signatures supplied.");
22✔
462
            goto end;
22✔
463
        }
22✔
464
    } else {
22,281✔
465
        /* we report the total of files and rules successfully loaded and failed */
466
        if (strlen(de_ctx->config_prefix) > 0) {
22,279✔
467
            SCLogInfo("tenant id %d:  %" PRId32 " rule files processed. %" PRId32
27✔
468
                      " rules successfully loaded, %" PRId32 " rules failed, %" PRId32
27✔
469
                      " rules skipped",
27✔
470
                    de_ctx->tenant_id, sig_stat->total_files, sig_stat->good_sigs_total,
27✔
471
                    sig_stat->bad_sigs_total, sig_stat->skipped_sigs_total);
27✔
472
        } else {
22,261✔
473
            SCLogInfo("%" PRId32 " rule files processed. %" PRId32
22,252✔
474
                      " rules successfully loaded, %" PRId32 " rules failed, %" PRId32
22,252✔
475
                      " rules skipped",
22,252✔
476
                    sig_stat->total_files, sig_stat->good_sigs_total, sig_stat->bad_sigs_total,
22,252✔
477
                    sig_stat->skipped_sigs_total);
22,252✔
478
        }
22,252✔
479
        if (de_ctx->requirements != NULL && sig_stat->skipped_sigs_total > 0) {
22,279✔
480
            SCDetectRequiresStatusLog(de_ctx->requirements, PROG_VER,
310✔
481
                    strlen(de_ctx->config_prefix) > 0 ? de_ctx->tenant_id : 0);
310✔
482
        }
310✔
483
    }
22,279✔
484

485
    if ((sig_stat->bad_sigs_total || sig_stat->bad_files) && de_ctx->failure_fatal) {
37,270✔
486
        ret = -1;
45✔
487
        goto end;
45✔
488
    }
45✔
489

490
    SCSigRegisterSignatureOrderingFuncs(de_ctx);
37,225✔
491
    SCSigOrderSignatures(de_ctx);
37,225✔
492
    SCSigSignatureOrderingModuleCleanup(de_ctx);
37,225✔
493

494
    if (SCThresholdConfInitContext(de_ctx) < 0) {
37,225✔
495
        ret = -1;
1✔
496
        goto end;
1✔
497
    }
1✔
498

499
    /* Setup the signature group lookup structure and pattern matchers */
500
    if (SigGroupBuild(de_ctx) < 0)
37,224✔
501
        goto end;
×
502

503
    ret = 0;
37,224✔
504

505
 end:
37,292✔
506
    gettimeofday(&de_ctx->last_reload, NULL);
37,292✔
507
    if (SCRunmodeGet() == RUNMODE_ENGINE_ANALYSIS) {
37,292✔
508
        CleanupEngineAnalysis(de_ctx);
110✔
509
    }
110✔
510

511
    DetectParseDupSigHashFree(de_ctx);
37,292✔
512
    SCReturnInt(ret);
37,292✔
513
}
37,224✔
514

515
#define NLOADERS 4
4✔
516
static DetectLoaderControl *loaders = NULL;
517
static int cur_loader = 0;
518
static void TmThreadWakeupDetectLoaderThreads(void);
519
static int num_loaders = NLOADERS;
520

521
/** \param loader -1 for auto select
522
 *  \retval loader_id or negative in case of error */
523
int DetectLoaderQueueTask(int loader_id, LoaderFunc Func, void *func_ctx, LoaderFreeFunc FreeFunc)
524
{
21✔
525
    if (loader_id == -1) {
21✔
526
        loader_id = cur_loader;
15✔
527
        cur_loader++;
15✔
528
        if (cur_loader >= num_loaders)
15✔
529
            cur_loader = 0;
4✔
530
    }
15✔
531
    if (loader_id >= num_loaders || loader_id < 0) {
21✔
532
        return -ERANGE;
×
533
    }
×
534

535
    DetectLoaderControl *loader = &loaders[loader_id];
21✔
536

537
    DetectLoaderTask *t = SCCalloc(1, sizeof(*t));
21✔
538
    if (t == NULL)
21✔
539
        return -ENOMEM;
×
540

541
    t->Func = Func;
21✔
542
    t->ctx = func_ctx;
21✔
543
    t->FreeFunc = FreeFunc;
21✔
544

545
    SCMutexLock(&loader->m);
21✔
546
    TAILQ_INSERT_TAIL(&loader->task_list, t, next);
21✔
547
    SCMutexUnlock(&loader->m);
21✔
548

549
    TmThreadWakeupDetectLoaderThreads();
21✔
550

551
    SCLogDebug("%d %p %p", loader_id, Func, func_ctx);
21✔
552
    return loader_id;
21✔
553
}
21✔
554

555
/** \brief wait for loader tasks to complete
556
 *  \retval result 0 for ok, -1 for errors */
557
int DetectLoadersSync(void)
558
{
9✔
559
    SCLogDebug("waiting");
9✔
560
    int errors = 0;
9✔
561
    for (int i = 0; i < num_loaders; i++) {
39✔
562
        bool done = false;
30✔
563

564
        DetectLoaderControl *loader = &loaders[i];
30✔
565
        while (!done) {
132,457✔
566
            SCMutexLock(&loader->m);
132,427✔
567
            if (TAILQ_EMPTY(&loader->task_list)) {
132,427✔
568
                done = true;
30✔
569
            }
30✔
570
            SCMutexUnlock(&loader->m);
132,427✔
571
            if (!done) {
132,427✔
572
                /* nudge thread in case it's sleeping */
573
                SCCtrlMutexLock(loader->tv->ctrl_mutex);
132,397✔
574
                pthread_cond_broadcast(loader->tv->ctrl_cond);
132,397✔
575
                SCCtrlMutexUnlock(loader->tv->ctrl_mutex);
132,397✔
576
            }
132,397✔
577
        }
132,427✔
578
        SCMutexLock(&loader->m);
30✔
579
        if (loader->result != 0) {
30✔
580
            errors++;
×
581
            loader->result = 0;
×
582
        }
×
583
        SCMutexUnlock(&loader->m);
30✔
584
    }
30✔
585
    if (errors) {
9✔
586
        SCLogError("%d loaders reported errors", errors);
×
587
        return -1;
×
588
    }
×
589
    SCLogDebug("done");
9✔
590
    return 0;
9✔
591
}
9✔
592

593
static void DetectLoaderInit(DetectLoaderControl *loader)
594
{
15✔
595
    memset(loader, 0x00, sizeof(*loader));
15✔
596
    SCMutexInit(&loader->m, NULL);
15✔
597
    TAILQ_INIT(&loader->task_list);
15✔
598
}
15✔
599

600
void DetectLoadersInit(void)
601
{
4✔
602
    intmax_t setting = NLOADERS;
4✔
603
    (void)SCConfGetInt("multi-detect.loaders", &setting);
4✔
604

605
    if (setting < 1 || setting > 1024) {
4✔
606
        FatalError("invalid multi-detect.loaders setting %" PRIdMAX, setting);
×
607
    }
×
608

609
    num_loaders = (int32_t)setting;
4✔
610
    SCLogInfo("using %d detect loader threads", num_loaders);
4✔
611

612
    BUG_ON(loaders != NULL);
4✔
613
    loaders = SCCalloc(num_loaders, sizeof(DetectLoaderControl));
4✔
614
    BUG_ON(loaders == NULL);
4✔
615

616
    for (int i = 0; i < num_loaders; i++) {
19✔
617
        DetectLoaderInit(&loaders[i]);
15✔
618
    }
15✔
619
}
4✔
620

621
/**
622
 * \brief Unpauses all threads present in tv_root
623
 */
624
static void TmThreadWakeupDetectLoaderThreads(void)
625
{
21✔
626
    SCMutexLock(&tv_root_lock);
21✔
627
    for (int i = 0; i < TVT_MAX; i++) {
84✔
628
        ThreadVars *tv = tv_root[i];
63✔
629
        while (tv != NULL) {
218✔
630
            if (strncmp(tv->name,"DL#",3) == 0) {
155✔
631
                BUG_ON(tv->ctrl_cond == NULL);
75✔
632
                SCCtrlMutexLock(tv->ctrl_mutex);
75✔
633
                pthread_cond_broadcast(tv->ctrl_cond);
75✔
634
                SCCtrlMutexUnlock(tv->ctrl_mutex);
75✔
635
            }
75✔
636
            tv = tv->next;
155✔
637
        }
155✔
638
    }
63✔
639
    SCMutexUnlock(&tv_root_lock);
21✔
640
}
21✔
641

642
/**
643
 * \brief Unpauses all threads present in tv_root
644
 */
645
void TmThreadContinueDetectLoaderThreads(void)
646
{
4✔
647
    SCMutexLock(&tv_root_lock);
4✔
648
    for (int i = 0; i < TVT_MAX; i++) {
16✔
649
        ThreadVars *tv = tv_root[i];
12✔
650
        while (tv != NULL) {
27✔
651
            if (strncmp(tv->name,"DL#",3) == 0)
15✔
652
                TmThreadContinue(tv);
15✔
653

654
            tv = tv->next;
15✔
655
        }
15✔
656
    }
12✔
657
    SCMutexUnlock(&tv_root_lock);
4✔
658
}
4✔
659

660
SC_ATOMIC_DECLARE(int, detect_loader_cnt);
661

662
typedef struct DetectLoaderThreadData_ {
663
    uint32_t instance;
664
} DetectLoaderThreadData;
665

666
static TmEcode DetectLoaderThreadInit(ThreadVars *t, const void *initdata, void **data)
667
{
15✔
668
    DetectLoaderThreadData *ftd = SCCalloc(1, sizeof(DetectLoaderThreadData));
15✔
669
    if (ftd == NULL)
15✔
670
        return TM_ECODE_FAILED;
×
671

672
    ftd->instance = SC_ATOMIC_ADD(detect_loader_cnt, 1); /* id's start at 0 */
15✔
673
    SCLogDebug("detect loader instance %u", ftd->instance);
15✔
674

675
    /* pass thread data back to caller */
676
    *data = ftd;
15✔
677

678
    DetectLoaderControl *loader = &loaders[ftd->instance];
15✔
679
    loader->tv = t;
15✔
680

681
    return TM_ECODE_OK;
15✔
682
}
15✔
683

684
static TmEcode DetectLoaderThreadDeinit(ThreadVars *t, void *data)
685
{
7✔
686
    SCFree(data);
7✔
687
    return TM_ECODE_OK;
7✔
688
}
7✔
689

690

691
static TmEcode DetectLoader(ThreadVars *th_v, void *thread_data)
692
{
15✔
693
    DetectLoaderThreadData *ftd = (DetectLoaderThreadData *)thread_data;
15✔
694
    BUG_ON(ftd == NULL);
15✔
695

696
    TmThreadsSetFlag(th_v, THV_INIT_DONE | THV_RUNNING);
15✔
697
    SCLogDebug("loader thread started");
15✔
698
    bool run = TmThreadsWaitForUnpause(th_v);
15✔
699
    while (run) {
44✔
700
        /* see if we have tasks */
701

702
        DetectLoaderControl *loader = &loaders[ftd->instance];
29✔
703
        SCMutexLock(&loader->m);
29✔
704

705
        DetectLoaderTask *task = NULL, *tmptask = NULL;
29✔
706
        TAILQ_FOREACH_SAFE(task, &loader->task_list, next, tmptask) {
29✔
707
            int r = task->Func(task->ctx, ftd->instance);
21✔
708
            loader->result |= r;
21✔
709
            TAILQ_REMOVE(&loader->task_list, task, next);
21✔
710
            task->FreeFunc(task->ctx);
21✔
711
            SCFree(task);
21✔
712
        }
21✔
713

714
        SCMutexUnlock(&loader->m);
29✔
715

716
        /* just wait until someone wakes us up */
717
        SCCtrlMutexLock(th_v->ctrl_mutex);
29✔
718
        int rc = 0;
29✔
719
        while (rc == 0) {
74✔
720
            if (TmThreadsCheckFlag(th_v, THV_KILL)) {
66✔
721
                run = false;
7✔
722
                break;
7✔
723
            }
7✔
724
            SCMutexLock(&loader->m);
59✔
725
            bool has_work = loader->task_list.tqh_first != NULL;
59✔
726
            SCMutexUnlock(&loader->m);
59✔
727
            if (has_work)
59✔
728
                break;
14✔
729

730
            rc = SCCtrlCondWait(th_v->ctrl_cond, th_v->ctrl_mutex);
45✔
731
        }
45✔
732
        SCCtrlMutexUnlock(th_v->ctrl_mutex);
29✔
733

734
        SCLogDebug("woke up...");
29✔
735
    }
29✔
736

737
    TmThreadsSetFlag(th_v, THV_RUNNING_DONE);
15✔
738
    TmThreadWaitForFlag(th_v, THV_DEINIT);
15✔
739
    TmThreadsSetFlag(th_v, THV_CLOSED);
15✔
740

741
    return TM_ECODE_OK;
15✔
742
}
15✔
743

744
/** \brief spawn the detect loader manager thread */
745
void DetectLoaderThreadSpawn(void)
746
{
4✔
747
    for (int i = 0; i < num_loaders; i++) {
19✔
748
        char name[TM_THREAD_NAME_MAX];
15✔
749
        snprintf(name, sizeof(name), "%s#%02d", thread_name_detect_loader, i+1);
15✔
750

751
        ThreadVars *tv_loader = TmThreadCreateCmdThreadByName(name, "DetectLoader", 1);
15✔
752
        if (tv_loader == NULL) {
15✔
753
            FatalError("failed to create thread %s", name);
×
754
        }
×
755
        if (TmThreadSpawn(tv_loader) != TM_ECODE_OK) {
15✔
756
            FatalError("failed to create spawn %s", name);
×
757
        }
×
758
    }
15✔
759
}
4✔
760

761
void TmModuleDetectLoaderRegister (void)
762
{
4✔
763
    tmm_modules[TMM_DETECTLOADER].name = "DetectLoader";
4✔
764
    tmm_modules[TMM_DETECTLOADER].ThreadInit = DetectLoaderThreadInit;
4✔
765
    tmm_modules[TMM_DETECTLOADER].ThreadDeinit = DetectLoaderThreadDeinit;
4✔
766
    tmm_modules[TMM_DETECTLOADER].Management = DetectLoader;
4✔
767
    tmm_modules[TMM_DETECTLOADER].cap_flags = 0;
4✔
768
    tmm_modules[TMM_DETECTLOADER].flags = TM_FLAG_MANAGEMENT_TM;
4✔
769
    SCLogDebug("%s registered", tmm_modules[TMM_DETECTLOADER].name);
4✔
770

771
    SC_ATOMIC_INIT(detect_loader_cnt);
4✔
772
}
4✔
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc