Go to the documentation of this file.
34 #ifdef HAVE_SYS_RESOURCE_H
36 #include <sys/resource.h>
145 #ifdef SYSTEMD_NOTIFY
170 #define DEFAULT_MAX_PENDING_PACKETS 1024
173 #define VERBOSE_MAX (SC_LOG_DEBUG - SC_LOG_NOTICE)
198 #ifndef AFLFUZZ_NO_RANDOM
311 #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
312 static void SignalHandlerSigint(
int sig)
316 static void SignalHandlerSigterm(
int sig)
322 #define UNW_LOCAL_ONLY
323 #include <libunwind.h>
324 static void SignalHandlerUnexpected(
int sig_num, siginfo_t *info,
void *context)
329 signal(SIGABRT, SIG_DFL);
330 signal(SIGSEGV, SIG_DFL);
332 if ((r = unw_init_local(&cursor, (unw_context_t *)(context)) != 0)) {
333 SCLogError(
"unable to obtain stack trace: unw_init_local: %s", unw_strerror(r));
342 if (unw_is_signal_frame(&cursor) == 0) {
345 if (unw_get_proc_name(&cursor,
name,
sizeof(
name), &off) == UNW_ENOMEM) {
354 r = unw_step(&cursor);
364 kill(getpid(), sig_num);
366 #undef UNW_LOCAL_ONLY
376 static void SignalHandlerSigusr2(
int sig)
386 static void SignalHandlerSigHup(
int sig)
439 #ifdef HAVE_AF_PACKET
447 #ifdef BUILD_HYPERSCAN
468 static void OnNotifyRunning(
void)
470 #ifdef SYSTEMD_NOTIFY
496 static int SetBpfString(
int argc,
char *argv[])
498 char *bpf_filter = NULL;
499 uint32_t bpf_len = 0;
504 while(argv[tmpindex] != NULL) {
505 bpf_len+=strlen(argv[tmpindex]) + 1;
517 while(argv[tmpindex] != NULL) {
518 strlcat(bpf_filter, argv[tmpindex],bpf_len);
519 if(argv[tmpindex + 1] != NULL) {
520 strlcat(bpf_filter,
" ", bpf_len);
525 if(strlen(bpf_filter) > 0) {
537 static void SetBpfStringFromFile(
char *filename)
539 char *bpf_filter = NULL;
540 char *bpf_comment_tmp = NULL;
541 char *bpf_comment_start = NULL;
547 fp = fopen(filename,
"r");
549 SCLogError(
"Failed to open file %s", filename);
554 SCLogError(
"Failed to stat file %s", filename);
558 bpf_len = ((size_t)(st.st_size)) + 1;
562 SCLogError(
"Failed to allocate buffer for bpf filter in file %s", filename);
566 nm = fread(bpf_filter, 1, bpf_len - 1, fp);
567 if ((ferror(fp) != 0) || (nm != (bpf_len - 1))) {
568 SCLogError(
"Failed to read complete BPF file %s", filename);
574 bpf_filter[nm] =
'\0';
576 if(strlen(bpf_filter) > 0) {
578 bpf_comment_start = bpf_filter;
579 while((bpf_comment_tmp = strchr(bpf_comment_start,
'#')) != NULL) {
580 while((*bpf_comment_tmp !=
'\0') &&
581 (*bpf_comment_tmp !=
'\r') && (*bpf_comment_tmp !=
'\n'))
583 *bpf_comment_tmp++ =
' ';
585 bpf_comment_start = bpf_comment_tmp;
588 while((bpf_comment_tmp = strchr(bpf_filter,
'\r')) != NULL) {
589 *bpf_comment_tmp =
' ';
591 while((bpf_comment_tmp = strchr(bpf_filter,
'\n')) != NULL) {
592 *bpf_comment_tmp =
' ';
595 while (strlen(bpf_filter) > 0 &&
596 bpf_filter[strlen(bpf_filter)-1] ==
' ')
598 bpf_filter[strlen(bpf_filter)-1] =
'\0';
600 if (strlen(bpf_filter) > 0) {
610 static void PrintUsage(
const char *progname)
617 printf(
"USAGE: %s [OPTIONS] [BPF FILTER]\n\n", progname);
619 printf(
"\n General:\n");
620 printf(
"\t-v : be more verbose (use multiple times to "
621 "increase verbosity)\n");
622 printf(
"\t-c <path> : path to configuration file\n");
623 printf(
"\t-l <dir> : default log directory\n");
624 printf(
"\t--include <path> : additional configuration file\n");
625 printf(
"\t--set name=value : set a configuration value\n");
626 printf(
"\t--pidfile <file> : write pid to this file\n");
627 printf(
"\t-T : test configuration file (use with -c)\n");
628 printf(
"\t--init-errors-fatal : enable fatal failure on signature init "
631 printf(
"\t-D : run as daemon\n");
633 printf(
"\t--service-install : install as service\n");
634 printf(
"\t--service-remove : remove service\n");
635 printf(
"\t--service-change-params : change service startup parameters\n");
637 #ifdef HAVE_LIBCAP_NG
638 printf(
"\t--user <user> : run suricata as this user after init\n");
639 printf(
"\t--group <group> : run suricata as this group after init\n");
641 #ifdef BUILD_UNIX_SOCKET
642 printf(
"\t--unix-socket[=<file>] : use unix socket to control suricata work\n");
644 printf(
"\t--runmode <runmode_id> : specific runmode modification the engine should run. The argument\n"
645 "\t supplied should be the id for the runmode obtained by running\n"
646 "\t --list-runmodes\n");
647 printf(
"\t--plugin <path> : load plugin in addition to config\n");
649 printf(
"\n Capture and IPS:\n");
651 printf(
"\t-F <bpf filter file> : bpf filter file\n");
652 printf(
"\t-k [all|none] : force checksum check (all) or disabled it "
654 printf(
"\t-i <dev or ip> : run in pcap live mode\n");
655 printf(
"\t--pcap[=<dev>] : run in pcap mode, no value select interfaces "
656 "from suricata.yaml\n");
657 #ifdef HAVE_PCAP_SET_BUFF
658 printf(
"\t--pcap-buffer-size : size of the pcap buffer value from 0 - %i\n",INT_MAX);
661 printf(
"\t-q <qid[:qid]> : run in inline nfqueue mode (use colon to "
662 "specify a range of queues)\n");
665 printf(
"\t-d <divert port> : run in inline ipfw divert mode\n");
667 #ifdef HAVE_AF_PACKET
668 printf(
"\t--af-packet[=<dev>] : run in af-packet mode, no value select interfaces from suricata.yaml\n");
671 printf(
"\t--af-xdp[=<dev>] : run in af-xdp mode, no value select "
672 "interfaces from suricata.yaml\n");
675 printf(
"\t--netmap[=<dev>] : run in netmap mode, no value select interfaces from suricata.yaml\n");
678 printf(
"\t--pfring[=<dev>] : run in pfring mode, use interfaces from suricata.yaml\n");
679 printf(
"\t--pfring-int <dev> : run in pfring mode, use interface <dev>\n");
680 printf(
"\t--pfring-cluster-id <id> : pfring cluster id \n");
681 printf(
"\t--pfring-cluster-type <type> : pfring cluster type for PF_RING 4.1.2 and later cluster_round_robin|cluster_flow\n");
684 printf(
"\t--dpdk : run in dpdk mode, uses interfaces from "
688 printf(
"\t--dag <dagX:Y> : process ERF records from DAG interface X, stream Y\n");
691 printf(
"\t--windivert <filter> : run in inline WinDivert mode\n");
692 printf(
"\t--windivert-forward <filter> : run in inline WinDivert mode, as a gateway\n");
695 printf(
"\t--reject-dev <dev> : send reject packets from this interface\n");
698 printf(
"\n Capture Files:\n");
699 printf(
"\t-r <path> : run in pcap file/offline mode\n");
700 printf(
"\t--pcap-file-continuous : when running in pcap mode with a directory, "
701 "continue checking directory for pcaps until interrupted\n");
702 printf(
"\t--pcap-file-delete : when running in replay mode (-r with "
703 "directory or file), will delete pcap files that have been processed when done\n");
704 printf(
"\t--pcap-file-recursive : will descend into subdirectories when running "
705 "in replay mode (-r)\n");
706 printf(
"\t--pcap-file-buffer-size : set read buffer size (setvbuf)\n");
707 printf(
"\t--erf-in <path> : process an ERF file\n");
709 printf(
"\n Detection:\n");
710 printf(
"\t-s <path> : path to signature file loaded in addition to "
711 "suricata.yaml settings (optional)\n");
712 printf(
"\t-S <path> : path to signature file loaded exclusively "
714 printf(
"\t--disable-detection : disable detection engine\n");
715 printf(
"\t--engine-analysis : print reports on analysis of different "
716 "sections in the engine and exit.\n"
717 "\t Please have a look at the conf parameter "
718 "engine-analysis on what reports\n"
719 "\t can be printed\n");
721 printf(
"\n Firewall:\n");
722 printf(
"\t--firewall : enable firewall mode\n");
723 printf(
"\t--firewall-rules-exclusive=<path> : path to firewall rule file loaded "
726 printf(
"\n Info:\n");
727 printf(
"\t-V : display Suricata version\n");
728 printf(
"\t--list-keywords[=all|csv|<kword>] : list keywords implemented by the engine\n");
729 printf(
"\t--list-runmodes : list supported runmodes\n");
730 printf(
"\t--list-app-layer-protos : list supported app layer protocols\n");
731 printf(
"\t--list-rule-protos : list supported rule protocols\n");
732 printf(
"\t--list-app-layer-hooks : list supported app layer hooks for use in "
734 printf(
"\t--list-app-layer-frames : list supported app layer frames for use with "
735 "'frame' keyword\n");
736 printf(
"\t--dump-config : show the running configuration\n");
737 printf(
"\t--dump-features : display provided features\n");
738 printf(
"\t--build-info : display build information\n");
740 printf(
"\n Testing:\n");
741 printf(
"\t--simulate-ips : force engine into IPS mode. Useful for QA\n");
743 printf(
"\t-u : run the unittests and exit\n");
744 printf(
"\t-U=REGEX, --unittest-filter=REGEX : filter unittests with a pcre compatible "
746 printf(
"\t--list-unittests : list unit tests\n");
747 printf(
"\t--fatal-unittests : enable fatal failure on unittest error\n");
748 printf(
"\t--unittests-coverage : display unittest coverage report\n");
751 printf(
"\nTo run " PROG_NAME " with default configuration on "
752 "interface eth0 with signature file \"signatures.rules\", run the "
753 "command as:\n\n%s -c suricata.yaml -s signatures.rules -i eth0 \n\n",
757 static void PrintBuildInfo(
void)
762 char features[2048] =
"";
767 strlcat(features,
"DEBUG ",
sizeof(features));
769 #ifdef DEBUG_VALIDATION
770 strlcat(features,
"DEBUG_VALIDATION ",
sizeof(features));
773 strlcat(features,
"QA_SIMULATION ",
sizeof(features));
776 strlcat(features,
"UNITTESTS ",
sizeof(features));
779 strlcat(features,
"NFQ ",
sizeof(features));
782 strlcat(features,
"IPFW ",
sizeof(features));
784 #ifdef HAVE_PCAP_SET_BUFF
785 strlcat(features,
"PCAP_SET_BUFF ",
sizeof(features));
788 strlcat(features,
"PF_RING ",
sizeof(features));
791 strlcat(features,
"NAPATECH ",
sizeof(features));
793 #ifdef HAVE_AF_PACKET
794 strlcat(features,
"AF_PACKET ",
sizeof(features));
797 strlcat(features,
"NETMAP ",
sizeof(features));
799 #ifdef HAVE_PACKET_FANOUT
800 strlcat(features,
"HAVE_PACKET_FANOUT ",
sizeof(features));
803 strlcat(features,
"DAG ",
sizeof(features));
805 #ifdef HAVE_LIBCAP_NG
806 strlcat(features,
"LIBCAP_NG ",
sizeof(features));
809 strlcat(features,
"LIBNET1.1 ",
sizeof(features));
811 strlcat(features,
"HAVE_HTP_URI_NORMALIZE_HOOK ",
sizeof(features));
812 #ifdef PCRE2_HAVE_JIT
813 strlcat(features,
"PCRE_JIT ",
sizeof(features));
816 strlcat(features,
"HAVE_NSS ",
sizeof(features));
818 strlcat(features,
"HTTP2_DECOMPRESSION ",
sizeof(features));
820 strlcat(features,
"HAVE_LUA ",
sizeof(features));
822 strlcat(features,
"HAVE_JA3 ",
sizeof(features));
825 strlcat(features,
"HAVE_JA4 ",
sizeof(features));
827 strlcat(features,
"HAVE_LIBJANSSON ",
sizeof(features));
829 strlcat(features,
"PROFILING ",
sizeof(features));
831 #ifdef PROFILE_LOCKING
832 strlcat(features,
"PROFILE_LOCKING ",
sizeof(features));
834 #ifdef BUILD_UNIX_SOCKET
835 strlcat(features,
"UNIX_SOCKET ",
sizeof(features));
837 #if defined(TLS_C11) || defined(TLS_GNU)
838 strlcat(features,
"TLS ",
sizeof(features));
841 strlcat(features,
"TLS_C11 ",
sizeof(features));
842 #elif defined(TLS_GNU)
843 strlcat(features,
"TLS_GNU ",
sizeof(features));
846 strlcat(features,
"MAGIC ",
sizeof(features));
848 strlcat(features,
"RUST ",
sizeof(features));
849 #if defined(SC_ADDRESS_SANITIZER)
850 strlcat(features,
"ASAN ",
sizeof(features));
852 #if defined(HAVE_POPCNT64)
853 strlcat(features,
"POPCNT64 ",
sizeof(features));
855 if (strlen(features) == 0) {
856 strlcat(features,
"none",
sizeof(features));
859 printf(
"Features: %s\n", features);
862 memset(features, 0x00,
sizeof(features));
863 #if defined(__SSE4_2__)
864 strlcat(features,
"SSE_4_2 ",
sizeof(features));
866 #if defined(__SSE4_1__)
867 strlcat(features,
"SSE_4_1 ",
sizeof(features));
869 #if defined(__SSE3__)
870 strlcat(features,
"SSE_3 ",
sizeof(features));
872 #if defined(__SSE2__)
873 strlcat(features,
"SSE_2 ",
sizeof(features));
875 if (strlen(features) == 0) {
876 strlcat(features,
"none",
sizeof(features));
878 printf(
"SIMD support: %s\n", features);
881 memset(features, 0x00,
sizeof(features));
882 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_1)
883 strlcat(features,
"1 ",
sizeof(features));
885 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_2)
886 strlcat(features,
"2 ",
sizeof(features));
888 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_4)
889 strlcat(features,
"4 ",
sizeof(features));
891 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_8)
892 strlcat(features,
"8 ",
sizeof(features));
894 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_16)
895 strlcat(features,
"16 ",
sizeof(features));
897 if (strlen(features) == 0) {
898 strlcat(features,
"none",
sizeof(features));
900 strlcat(features,
"byte(s)",
sizeof(features));
902 printf(
"Atomic intrinsics: %s\n", features);
906 #elif __WORDSIZE == 32
909 bits =
"<unknown>-bits";
912 #if __BYTE_ORDER == __BIG_ENDIAN
913 endian =
"Big-endian";
914 #elif __BYTE_ORDER == __LITTLE_ENDIAN
915 endian =
"Little-endian";
917 endian =
"<unknown>-endian";
920 printf(
"%s, %s architecture\n", bits, endian);
922 printf(
"GCC version %s, C version %"PRIiMAX
"\n", __VERSION__, (intmax_t)__STDC_VERSION__);
924 printf(
"C version %"PRIiMAX
"\n", (intmax_t)__STDC_VERSION__);
928 printf(
"compiled with -fstack-protector\n");
931 printf(
"compiled with -fstack-protector-all\n");
940 #if _FORTIFY_SOURCE == 2
941 printf(
"compiled with _FORTIFY_SOURCE=2\n");
942 #elif _FORTIFY_SOURCE == 1
943 printf(
"compiled with _FORTIFY_SOURCE=1\n");
944 #elif _FORTIFY_SOURCE == 0
945 printf(
"compiled with _FORTIFY_SOURCE=0\n");
948 printf(
"L1 cache line size (CLS)=%d\n",
CLS);
951 tls =
"_Thread_local";
952 #elif defined(TLS_GNU)
955 #error "Unsupported thread local"
957 printf(
"thread local storage method: %s\n", tls);
959 printf(
"compiled with %s\n", htp_get_version());
961 #include "build-info.h"
1057 static TmEcode ParseInterfacesList(
const int runmode,
char *pcap_dev)
1063 if (strlen(pcap_dev) == 0) {
1066 SCLogError(
"No interface found in config for pcap");
1073 if (strlen(pcap_dev)) {
1075 SCLogError(
"Failed to set pfring.live-interface");
1082 char iface_selector[] =
"dpdk.interfaces";
1085 SCLogError(
"No interface found in config for %s", iface_selector);
1089 #ifdef HAVE_AF_PACKET
1092 if (strlen(pcap_dev)) {
1094 SCLogError(
"Failed to set af-packet.live-interface");
1100 SCLogError(
"No interface found in config for af-packet");
1108 if (strlen(pcap_dev)) {
1110 SCLogError(
"Failed to set af-xdp.live-interface");
1116 SCLogError(
"No interface found in config for af-xdp");
1124 if (strlen(pcap_dev)) {
1126 SCLogError(
"Failed to set netmap.live-interface");
1132 SCLogError(
"No interface found in config for netmap");
1141 SCLogError(
"No group found in config for nflog");
1150 static void SCInstanceInit(
SCInstance *suri,
const char *progname)
1152 memset(suri, 0x00,
sizeof(*suri));
1179 #if HAVE_DETECT_DISABLED==1
1189 if (strstr(prog_ver,
"RELEASE") != NULL) {
1209 if (strstr(
PROG_VER,
"-dev") == NULL) {
1220 static TmEcode PrintVersion(
void)
1228 const char *mode = suri->
system ?
"SYSTEM" :
"USER";
1229 SCLogNotice(
"This is %s version %s running in %s mode",
1240 static void SCPrintElapsedTime(
struct timeval *start_time)
1242 if (start_time == NULL)
1244 struct timeval end_time;
1245 memset(&end_time, 0,
sizeof(end_time));
1246 gettimeofday(&end_time, NULL);
1247 uint64_t milliseconds = ((end_time.tv_sec - start_time->tv_sec) * 1000) +
1248 (((1000000 + end_time.tv_usec - start_time->tv_usec) / 1000) - 1000);
1249 SCLogInfo(
"time elapsed %.3fs", (
float)milliseconds/(
float)1000);
1252 static int ParseCommandLineAfpacket(
SCInstance *suri,
const char *in_arg)
1254 #ifdef HAVE_AF_PACKET
1266 SCLogInfo(
"Multiple af-packet option without interface on each is useless");
1270 "has been specified");
1276 SCLogError(
"AF_PACKET not enabled. On Linux "
1277 "host, make sure to pass --enable-af-packet to "
1278 "configure when building.");
1283 static int ParseCommandLineAfxdp(
SCInstance *suri,
const char *in_arg)
1297 SCLogInfo(
"Multiple af-xdp options without interface on each is useless");
1301 "has been specified");
1308 "host, make sure correct libraries are installed,"
1309 " see documentation for information.");
1314 static int ParseCommandLineDpdk(
SCInstance *suri,
const char *in_arg)
1320 SCLogInfo(
"Multiple dpdk options have no effect on Suricata");
1323 "has been specified");
1330 "host, make sure to pass --enable-dpdk to "
1331 "configure when building.");
1336 static int ParseCommandLinePcapLive(
SCInstance *suri,
const char *in_arg)
1338 #if defined(OS_WIN32) && !defined(HAVE_LIBWPCAP)
1340 FatalError(
"Live capture not available. To support live capture compile against Npcap.");
1344 if (in_arg != NULL) {
1347 if (strlen(in_arg) > 9 && strncmp(in_arg,
"DeviceNPF", 9) == 0) {
1348 snprintf(suri->
pcap_dev,
sizeof(suri->
pcap_dev),
"\\Device\\NPF%s", in_arg+9);
1354 if (strcmp(suri->
pcap_dev, in_arg) != 0) {
1356 }
else if (strlen(suri->
pcap_dev) > 0 && isdigit((
unsigned char)suri->
pcap_dev[0])) {
1357 SCLogError(
"failed to find a pcap device for IP %s", in_arg);
1371 "has been specified");
1381 static bool IsLogDirectoryWritable(
const char*
str)
1383 return access(
str, W_OK) == 0;
1392 static void AddCommandLineOptionValue(
1393 const char ***values,
const char *value,
const char *description)
1395 if (*values == NULL) {
1396 *values =
SCCalloc(2,
sizeof(
char *));
1397 if (*values == NULL) {
1398 FatalError(
"Failed to allocate memory for %s: %s", description, strerror(errno));
1400 (*values)[0] = value;
1402 for (
int i = 0;; i++) {
1403 if ((*values)[i] == NULL) {
1404 const char **new_values =
SCRealloc(*values, (i + 2) *
sizeof(
char *));
1405 if (new_values == NULL) {
1407 "Failed to allocate memory for %s: %s", description, strerror(errno));
1409 *values = new_values;
1410 (*values)[i] = value;
1411 (*values)[i + 1] = NULL;
1425 int dump_config = 0;
1426 int dump_features = 0;
1427 int list_app_layer_protocols = 0;
1428 int list_rule_protocols = 0;
1429 int list_app_layer_hooks = 0;
1430 int list_app_layer_frames = 0;
1431 int list_unittests = 0;
1432 int list_runmodes = 0;
1433 int list_keywords = 0;
1438 int is_firewall = 0;
1447 struct option long_opts[] = {
1449 {
"dump-config", 0, &dump_config, 1},
1450 {
"dump-features", 0, &dump_features, 1},
1451 {
"pfring", optional_argument, 0, 0},
1452 {
"pfring-int", required_argument, 0, 0},
1453 {
"pfring-cluster-id", required_argument, 0, 0},
1454 {
"pfring-cluster-type", required_argument, 0, 0},
1458 {
"af-packet", optional_argument, 0, 0},
1459 {
"af-xdp", optional_argument, 0, 0},
1460 {
"netmap", optional_argument, 0, 0},
1461 {
"pcap", optional_argument, 0, 0},
1462 {
"pcap-file-continuous", 0, 0, 0},
1463 {
"pcap-file-delete", 0, 0, 0},
1464 {
"pcap-file-recursive", 0, 0, 0},
1465 {
"pcap-file-buffer-size", required_argument, 0, 0},
1466 {
"simulate-ips", 0, 0 , 0},
1468 {
"strict-rule-keywords", optional_argument, 0, 0},
1470 {
"plugin", required_argument, 0, 0},
1471 {
"capture-plugin", required_argument, 0, 0},
1472 {
"capture-plugin-args", required_argument, 0, 0},
1474 #ifdef BUILD_UNIX_SOCKET
1475 {
"unix-socket", optional_argument, 0, 0},
1477 {
"pcap-buffer-size", required_argument, 0, 0},
1478 {
"unittest-filter", required_argument, 0,
'U'},
1479 {
"list-app-layer-protos", 0, &list_app_layer_protocols, 1},
1480 {
"list-rule-protos", 0, &list_rule_protocols, 1},
1481 {
"list-app-layer-hooks", 0, &list_app_layer_hooks, 1},
1482 {
"list-app-layer-frames", 0, &list_app_layer_frames, 1},
1483 {
"list-unittests", 0, &list_unittests, 1},
1484 {
"list-runmodes", 0, &list_runmodes, 1},
1485 {
"list-keywords", optional_argument, &list_keywords, 1},
1486 {
"runmode", required_argument, NULL, 0},
1489 {
"service-install", 0, 0, 0},
1490 {
"service-remove", 0, 0, 0},
1491 {
"service-change-params", 0, 0, 0},
1493 {
"pidfile", required_argument, 0, 0},
1494 {
"init-errors-fatal", 0, 0, 0},
1495 {
"disable-detection", 0, 0, 0},
1496 {
"disable-hashing", 0, 0, 0},
1497 {
"fatal-unittests", 0, 0, 0},
1499 {
"user", required_argument, 0, 0},
1500 {
"group", required_argument, 0, 0},
1501 {
"erf-in", required_argument, 0, 0},
1502 {
"dag", required_argument, 0, 0},
1503 {
"build-info", 0, &build_info, 1},
1504 {
"data-dir", required_argument, 0, 0},
1506 {
"windivert", required_argument, 0, 0},
1507 {
"windivert-forward", required_argument, 0, 0},
1509 #ifdef HAVE_LIBNET11
1510 {
"reject-dev", required_argument, 0, 0},
1512 {
"set", required_argument, 0, 0},
1514 {
"nflog", optional_argument, 0, 0},
1516 {
"simulate-packet-flow-memcap", required_argument, 0, 0},
1517 {
"simulate-applayer-error-at-offset-ts", required_argument, 0, 0},
1518 {
"simulate-applayer-error-at-offset-tc", required_argument, 0, 0},
1519 {
"simulate-packet-loss", required_argument, 0, 0},
1520 {
"simulate-packet-tcp-reassembly-memcap", required_argument, 0, 0},
1521 {
"simulate-packet-tcp-ssn-memcap", required_argument, 0, 0},
1522 {
"simulate-packet-defrag-memcap", required_argument, 0, 0},
1523 {
"simulate-alert-queue-realloc-failure", 0, 0, 0},
1527 {
"firewall", 0, &is_firewall, 1 },
1528 {
"firewall-rules-exclusive", required_argument, 0, 0},
1530 {
"include", required_argument, 0, 0},
1537 int option_index = 0;
1539 char short_opts[] =
"c:TDhi:l:q:d:r:us:S:U:VF:vk:";
1541 while ((opt = getopt_long(argc, argv, short_opts, long_opts, &option_index)) != -1) {
1544 if (strcmp((long_opts[option_index]).
name,
"help") == 0) {
1547 }
else if (strcmp((long_opts[option_index]).
name,
"pfring") == 0 ||
1548 strcmp((long_opts[option_index]).
name,
"pfring-int") == 0) {
1553 if (optarg != NULL) {
1556 ((strlen(optarg) <
sizeof(suri->
pcap_dev)) ?
1557 (strlen(optarg) + 1) :
sizeof(suri->
pcap_dev)));
1562 "to pass --enable-pfring to configure when building.");
1565 }
else if (strcmp((long_opts[option_index]).
name,
"pfring-cluster-id") == 0) {
1568 SCLogError(
"failed to set pfring.cluster-id");
1573 "to pass --enable-pfring to configure when building.");
1576 }
else if (strcmp((long_opts[option_index]).
name,
"pfring-cluster-type") == 0) {
1579 SCLogError(
"failed to set pfring.cluster-type");
1584 "to pass --enable-pfring to configure when building.");
1587 }
else if (strcmp((long_opts[option_index]).
name,
"plugin") == 0) {
1589 }
else if (strcmp((long_opts[option_index]).
name,
"capture-plugin") == 0) {
1592 }
else if (strcmp((long_opts[option_index]).
name,
"capture-plugin-args") == 0) {
1594 }
else if (strcmp((long_opts[option_index]).
name,
"dpdk") == 0) {
1595 if (ParseCommandLineDpdk(suri, optarg) !=
TM_ECODE_OK) {
1598 }
else if (strcmp((long_opts[option_index]).
name,
"af-packet") == 0) {
1599 if (ParseCommandLineAfpacket(suri, optarg) !=
TM_ECODE_OK) {
1602 }
else if (strcmp((long_opts[option_index]).
name,
"af-xdp") == 0) {
1603 if (ParseCommandLineAfxdp(suri, optarg) !=
TM_ECODE_OK) {
1606 }
else if (strcmp((long_opts[option_index]).
name,
"netmap") == 0) {
1614 ((strlen(optarg) <
sizeof(suri->
pcap_dev)) ?
1615 (strlen(optarg) + 1) :
sizeof(suri->
pcap_dev)));
1621 SCLogInfo(
"Multiple netmap option without interface on each is useless");
1626 "has been specified");
1627 PrintUsage(argv[0]);
1634 }
else if (strcmp((long_opts[option_index]).
name,
"nflog") == 0) {
1644 }
else if (strcmp((long_opts[option_index]).
name,
"pcap") == 0) {
1645 if (ParseCommandLinePcapLive(suri, optarg) !=
TM_ECODE_OK) {
1648 }
else if (strcmp((long_opts[option_index]).
name,
"simulate-ips") == 0) {
1651 }
else if (strcmp((long_opts[option_index]).
name,
"init-errors-fatal") == 0) {
1653 SCLogError(
"failed to set engine init-failure-fatal");
1656 #ifdef BUILD_UNIX_SOCKET
1657 }
else if (strcmp((long_opts[option_index]).
name ,
"unix-socket") == 0) {
1662 SCLogError(
"failed to set unix-command.filename");
1668 "has been specified");
1669 PrintUsage(argv[0]);
1674 else if(strcmp((long_opts[option_index]).
name,
"list-app-layer-protocols") == 0) {
1676 }
else if (strcmp((long_opts[option_index]).
name,
"list-app-layer-hooks") == 0) {
1678 }
else if (strcmp((long_opts[option_index]).
name,
"list-unittests") == 0) {
1682 SCLogError(
"unit tests not enabled. Make sure to pass --enable-unittests to "
1683 "configure when building");
1686 }
else if (strcmp((long_opts[option_index]).
name,
"list-runmodes") == 0) {
1689 }
else if (strcmp((long_opts[option_index]).
name,
"list-keywords") == 0) {
1691 if (strcmp(
"short", optarg) != 0) {
1695 }
else if (strcmp((long_opts[option_index]).
name,
"runmode") == 0) {
1697 }
else if (strcmp((long_opts[option_index]).
name,
"engine-analysis") == 0) {
1701 else if (strcmp((long_opts[option_index]).
name,
"service-install") == 0) {
1702 suri->
run_mode = RUNMODE_INSTALL_SERVICE;
1704 }
else if (strcmp((long_opts[option_index]).
name,
"service-remove") == 0) {
1705 suri->
run_mode = RUNMODE_REMOVE_SERVICE;
1707 }
else if (strcmp((long_opts[option_index]).
name,
"service-change-params") == 0) {
1708 suri->
run_mode = RUNMODE_CHANGE_SERVICE_PARAMS;
1712 else if (strcmp((long_opts[option_index]).
name,
"pidfile") == 0) {
1715 SCLogError(
"strdup failed: %s", strerror(errno));
1718 }
else if (strcmp((long_opts[option_index]).
name,
"disable-detection") == 0) {
1720 }
else if (strcmp((long_opts[option_index]).
name,
"disable-hashing") == 0) {
1724 }
else if (strcmp((long_opts[option_index]).
name,
"fatal-unittests") == 0) {
1728 SCLogError(
"unit tests not enabled. Make sure to pass --enable-unittests to "
1729 "configure when building");
1732 }
else if (strcmp((long_opts[option_index]).
name,
"user") == 0) {
1733 #ifndef HAVE_LIBCAP_NG
1735 " drop privileges, but it was not compiled into Suricata.");
1741 }
else if (strcmp((long_opts[option_index]).
name,
"group") == 0) {
1742 #ifndef HAVE_LIBCAP_NG
1744 " drop privileges, but it was not compiled into Suricata.");
1750 }
else if (strcmp((long_opts[option_index]).
name,
"erf-in") == 0) {
1756 }
else if (strcmp((long_opts[option_index]).
name,
"dag") == 0) {
1762 SCLogError(
"more than one run mode has been specified");
1763 PrintUsage(argv[0]);
1768 SCLogError(
"libdag and a DAG card are required"
1769 " to receive packets using --dag.");
1772 }
else if (strcmp((long_opts[option_index]).
name,
"napatech") == 0) {
1773 #ifdef HAVE_NAPATECH
1776 SCLogError(
"libntapi and a Napatech adapter are required"
1777 " to capture packets using --napatech.");
1780 }
else if (strcmp((long_opts[option_index]).
name,
"pcap-buffer-size") == 0) {
1781 #ifdef HAVE_PCAP_SET_BUFF
1783 SCLogError(
"failed to set pcap-buffer-size");
1788 " doesn't support setting buffer size.");
1790 }
else if (strcmp((long_opts[option_index]).
name,
"build-info") == 0) {
1793 }
else if (strcmp((long_opts[option_index]).
name,
"windivert-forward") == 0) {
1797 if (WinDivertRegisterQueue(
true, optarg) == -1) {
1801 if (WinDivertRegisterQueue(
true, optarg) == -1) {
1806 "has been specified");
1807 PrintUsage(argv[0]);
1811 else if(strcmp((long_opts[option_index]).
name,
"windivert") == 0) {
1814 if (WinDivertRegisterQueue(
false, optarg) == -1) {
1818 if (WinDivertRegisterQueue(
false, optarg) == -1) {
1823 "has been specified");
1824 PrintUsage(argv[0]);
1828 SCLogError(
"WinDivert not enabled. Make sure to pass --enable-windivert to "
1829 "configure when building.");
1832 }
else if(strcmp((long_opts[option_index]).
name,
"reject-dev") == 0) {
1833 #ifdef HAVE_LIBNET11
1835 extern char *g_reject_dev;
1836 extern uint16_t g_reject_dev_mtu;
1837 g_reject_dev = optarg;
1840 g_reject_dev_mtu = (uint16_t)mtu;
1843 SCLogError(
"Libnet 1.1 support not enabled. Compile Suricata with libnet support.");
1847 else if (strcmp((long_opts[option_index]).
name,
"set") == 0) {
1848 if (optarg != NULL) {
1850 char *val = strchr(optarg,
'=');
1852 FatalError(
"Invalid argument for --set, must be key=val.");
1855 FatalError(
"failed to set configuration value %s", optarg);
1859 else if (strcmp((long_opts[option_index]).
name,
"pcap-file-continuous") == 0) {
1861 SCLogError(
"Failed to set pcap-file.continuous");
1865 else if (strcmp((long_opts[option_index]).
name,
"pcap-file-delete") == 0) {
1867 SCLogError(
"Failed to set pcap-file.delete-when-done");
1871 else if (strcmp((long_opts[option_index]).
name,
"pcap-file-recursive") == 0) {
1873 SCLogError(
"failed to set pcap-file.recursive");
1876 }
else if (strcmp((long_opts[option_index]).
name,
"pcap-file-buffer-size") == 0) {
1878 SCLogError(
"failed to set pcap-file.buffer-size");
1881 }
else if (strcmp((long_opts[option_index]).
name,
"data-dir") == 0) {
1882 if (optarg == NULL) {
1883 SCLogError(
"no option argument (optarg) for -d");
1893 " supplied at the command-line (-d %s) doesn't "
1894 "exist. Shutting down the engine.",
1899 }
else if (strcmp((long_opts[option_index]).
name,
"strict-rule-keywords") == 0) {
1900 if (optarg == NULL) {
1906 FatalError(
"failed to duplicate 'strict' string");
1908 }
else if (strcmp((long_opts[option_index]).
name,
"include") == 0) {
1909 AddCommandLineOptionValue(
1911 }
else if (strcmp((long_opts[option_index]).
name,
"firewall-rules-exclusive") == 0) {
1913 SCLogError(
"can't have multiple --firewall-rules-exclusive options");
1921 (long_opts[option_index]).
name, optarg);
1932 SCLogError(
"failed to set engine init-failure-fatal");
1945 if (optarg == NULL) {
1946 SCLogError(
"no option argument (optarg) for -i");
1949 #ifdef HAVE_AF_PACKET
1950 if (ParseCommandLineAfpacket(suri, optarg) !=
TM_ECODE_OK) {
1955 #if defined HAVE_NETMAP
1961 "option%s %s available:"
1963 " NETMAP (--netmap=%s)"
1965 ". Use --pcap=%s to suppress this warning",
1966 i == 1 ?
"" :
"s", i == 1 ?
"is" :
"are"
1974 if (ParseCommandLinePcapLive(suri, optarg) !=
TM_ECODE_OK) {
1980 if (optarg == NULL) {
1981 SCLogError(
"no option argument (optarg) for -l");
1991 " supplied at the command-line (-l %s) doesn't "
1992 "exist. Shutting down the engine.",
1996 if (!IsLogDirectoryWritable(optarg)) {
1998 " supplied at the command-line (-l %s) is not "
1999 "writable. Shutting down the engine.",
2018 "has been specified");
2019 PrintUsage(argv[0]);
2023 SCLogError(
"NFQUEUE not enabled. Make sure to pass --enable-nfqueue to configure when "
2040 "has been specified");
2041 PrintUsage(argv[0]);
2045 SCLogError(
"IPFW not enabled. Make sure to pass --enable-ipfw to configure when "
2056 "has been specified");
2057 PrintUsage(argv[0]);
2062 SCLogError(
"pcap file '%s': %s", optarg, strerror(errno));
2066 SCLogError(
"ERROR: Failed to set pcap-file.file\n");
2073 SCLogError(
"can't have multiple -s options or mix -s and -S.");
2080 SCLogError(
"can't have multiple -S options or mix -s and -S.");
2093 PrintUsage(argv[0]);
2097 SCLogError(
"unit tests not enabled. Make sure to pass --enable-unittests to configure "
2114 if (optarg == NULL) {
2115 SCLogError(
"no option argument (optarg) for -F");
2119 SetBpfStringFromFile(optarg);
2122 static bool ignore_extra =
false;
2125 else if (!ignore_extra) {
2126 SCLogNotice(
"extraneous verbose option(s) ignored");
2127 ignore_extra =
true;
2131 if (optarg == NULL) {
2132 SCLogError(
"no option argument (optarg) for -k");
2135 if (!strcmp(
"all", optarg))
2137 else if (!strcmp(
"none", optarg))
2140 SCLogError(
"option '%s' invalid for -k", optarg);
2145 PrintUsage(argv[0]);
2155 SCLogError(
"can't use -s/-S or --firewall-rules-exclusive when detection is disabled");
2162 if (list_app_layer_protocols)
2164 if (list_rule_protocols)
2166 if (list_app_layer_hooks)
2168 if (list_app_layer_frames)
2186 ret = SetBpfString(optind, argv);
2194 int WindowsInitService(
int argc,
char **argv)
2196 if (SCRunningAsService()) {
2197 char path[MAX_PATH];
2199 strlcpy(path, argv[0], MAX_PATH);
2200 if ((p = strrchr(path,
'\\'))) {
2203 if (!SetCurrentDirectory(path)) {
2204 SCLogError(
"Can't set current directory to: %s", path);
2207 SCLogInfo(
"Current directory is set to: %s", path);
2208 SCServiceInit(argc, argv);
2213 if (0 != WSAStartup(MAKEWORD(2, 2), &wsaData)) {
2214 SCLogError(
"Can't initialize Windows sockets: %d", WSAGetLastError());
2225 const char *pid_filename;
2227 if (
SCConfGet(
"pid-file", &pid_filename) == 1) {
2228 SCLogInfo(
"Use pid file %s from config file.", pid_filename);
2235 SCLogError(
"strdup failed: %s", strerror(errno));
2254 SCLogError(
"Unable to create PID file, concurrent run of"
2255 " Suricata can occur.");
2256 SCLogError(
"PID file creation WILL be mandatory for daemon mode"
2257 " in future version");
2272 if (
SCConfGet(
"run-as.user", &
id) == 1) {
2276 if (
SCConfGet(
"run-as.group", &
id) == 1) {
2294 static int InitSignalHandler(
SCInstance *suri)
2297 #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
2302 if (
SCConfGetBool(
"logging.stacktrace-on-signal", &enabled) == 0) {
2307 SCLogInfo(
"Preparing unexpected signal handling");
2308 struct sigaction stacktrace_action;
2309 memset(&stacktrace_action, 0,
sizeof(stacktrace_action));
2310 stacktrace_action.sa_sigaction = SignalHandlerUnexpected;
2311 stacktrace_action.sa_flags = SA_SIGINFO;
2312 sigaction(SIGSEGV, &stacktrace_action, NULL);
2313 sigaction(SIGABRT, &stacktrace_action, NULL);
2336 #ifdef PROFILE_RULES
2337 SCProfilingRulesGlobalInit();
2344 #ifdef PROFILE_RULES
2398 SCPrintElapsedTime(start_time);
2472 PrintUsage(argv[0]);
2482 case RUNMODE_INSTALL_SERVICE:
2483 if (SCServiceInstall(argc, argv)) {
2486 SCLogInfo(
"Suricata service has been successfully installed.");
2488 case RUNMODE_REMOVE_SERVICE:
2489 if (SCServiceRemove()) {
2492 SCLogInfo(
"Suricata service has been successfully removed.");
2494 case RUNMODE_CHANGE_SERVICE_PARAMS:
2495 if (SCServiceChangeParams(argc, argv)) {
2498 SCLogInfo(
"Suricata service startup parameters has been successfully changed.");
2526 static void SetupDelayedDetect(
SCInstance *suri)
2535 if (decnf != NULL) {
2537 if (strcmp(denode->
val,
"delayed-detect") == 0) {
2548 SCLogInfo(
"Packets will start being processed before signatures are active.");
2566 static int ConfigGetCaptureValue(
SCInstance *suri)
2570 intmax_t tmp_max_pending_packets;
2571 if (
SCConfGetInt(
"max-pending-packets", &tmp_max_pending_packets) != 1)
2573 if (tmp_max_pending_packets < 1 || tmp_max_pending_packets > 2147483648) {
2574 SCLogError(
"Maximum max-pending-packets setting is 2147483648 and must be greater than 0. "
2575 "Please check %s for errors",
2586 const char *temp_default_packet_size;
2587 if ((
SCConfGet(
"default-packet-size", &temp_default_packet_size)) != 1) {
2590 int strip_trailing_plus = 0;
2600 const int mtu = GetGlobalMTUWin32();
2614 strip_trailing_plus = 1;
2620 for (lthread = 0; lthread < nlive; lthread++) {
2623 (void)
strlcpy(dev, live_dev,
sizeof(dev));
2625 if (strip_trailing_plus) {
2626 size_t len = strlen(dev);
2628 (dev[
len-1] ==
'+' ||
2629 dev[
len-1] ==
'^' ||
2648 SCLogError(
"Error parsing max-pending-packets "
2649 "from conf file - %s. Killing engine",
2650 temp_default_packet_size);
2660 static void PostRunStartedDetectSetup(
const SCInstance *suri)
2674 SCLogNotice(
"Signature(s) loaded, Detect thread(s) activated.");
2686 SetupDelayedDetect(suri);
2689 int default_tenant = 0;
2691 (void)
SCConfGetBool(
"multi-detect.default", &default_tenant);
2694 "detection engine contexts failed.");
2704 FatalError(
"initializing detection engine failed.");
2720 static void PostConfLoadedSetupHostMode(
void)
2722 const char *hostmode = NULL;
2724 if (
SCConfGet(
"host-mode", &hostmode) == 1) {
2725 if (!strcmp(hostmode,
"router")) {
2727 }
else if (!strcmp(hostmode,
"sniffer-only")) {
2730 if (strcmp(hostmode,
"auto") != 0) {
2742 SCLogInfo(
"No 'host-mode': suricata is in IPS mode, using "
2743 "default setting 'router'");
2746 SCLogInfo(
"No 'host-mode': suricata is in IDS mode, using "
2747 "default setting 'sniffer-only'");
2759 FatalError(
"could not set USER mode logdir");
2765 FatalError(
"could not set USER mode datadir");
2777 int cnf_firewall_enabled = 0;
2778 if (
SCConfGetBool(
"firewall.enabled", &cnf_firewall_enabled) == 1) {
2779 if (cnf_firewall_enabled == 1) {
2783 FatalError(
"firewall mode enabled through commandline, but disabled in config");
2788 SCLogWarning(
"firewall mode is EXPERIMENTAL and subject to change");
2796 int disable_offloading;
2797 if (
SCConfGetBool(
"capture.disable-offloading", &disable_offloading) == 0)
2798 disable_offloading = 1;
2799 if (disable_offloading) {
2806 const char *cv = NULL;
2807 if (
SCConfGet(
"capture.checksum-validation", &cv) == 1) {
2808 if (strcmp(cv,
"none") == 0) {
2810 }
else if (strcmp(cv,
"all") == 0) {
2817 SCConfSet(
"stream.checksum-validation",
"0");
2820 SCConfSet(
"stream.checksum-validation",
"1");
2829 #ifdef HAVE_PACKET_EBPF
2831 EBPFRegisterExtension();
2854 SCLogInfo(
"Setting engine mode to IDS mode by default");
2875 const char *custom_umask;
2876 if (
SCConfGet(
"umask", &custom_umask) == 1) {
2878 if (
StringParseUint16(&mask, 8, (uint16_t)strlen(custom_umask), custom_umask) > 0) {
2879 umask((mode_t)mask);
2896 SCLogInfo(
"== Carrying out Engine Analysis ==");
2897 const char *temp = NULL;
2898 if (
SCConfGet(
"engine-analysis", &temp) == 0) {
2899 SCLogInfo(
"no engine-analysis parameter(s) defined in conf file. "
2900 "Please define/enable them in the conf to use this "
2919 "basic address vars test failed. Please check %s for errors", suri->
conf_filename);
2948 "supplied by %s (default-log-dir) doesn't exist. "
2949 "Shutting down the engine",
2953 if (!IsLogDirectoryWritable(suri->
log_dir)) {
2955 "supplied by %s (default-log-dir) is not writable. "
2956 "Shutting down the engine",
2974 PostConfLoadedSetupHostMode();
3041 return EXIT_FAILURE;
3062 SCInstanceInit(&
suricata, progname);
3080 if (
SCConfGetBool(
"vlan.use-for-tracking", &tracking) == 1 && !tracking) {
3084 SCLogDebug(
"vlan tracking is %s", tracking == 1 ?
"enabled" :
"disabled");
3085 if (
SCConfGetBool(
"livedev.use-for-tracking", &tracking) == 1 && !tracking) {
3089 if (
SCConfGetBool(
"decoder.recursion-level.use-for-tracking", &tracking) == 1 && !tracking) {
3105 SCLogInfo(
"Running suricata under test mode");
3139 SCLogNotice(
"Configuration provided was successfully loaded. Exiting.");
3182 int limit_nproc = 0;
3183 if (
SCConfGetBool(
"security.limit-noproc", &limit_nproc) == 0) {
3187 #if defined(SC_ADDRESS_SANITIZER)
3190 "\"security.limit-noproc\" (setrlimit()) not set when using address sanitizer");
3196 #if defined(HAVE_SYS_RESOURCE_H)
3199 SCLogWarning(
"setrlimit has no effect when running as root.");
3202 struct rlimit r = { 0, 0 };
3203 if (setrlimit(RLIMIT_NPROC, &r) != 0) {
3204 SCLogWarning(
"setrlimit failed to prevent process creation.");
3230 PostRunStartedDetectSetup(&
suricata);
@ RUNMODE_LIST_APP_LAYERS
enum SCRunModes SCRunMode
@ RUNMODE_ENGINE_ANALYSIS
void TmModuleUnixManagerRegister(void)
void StatsReleaseResources(void)
Releases the resources allotted by the Stats API.
#define DETECT_ENGINE_MPM_CACHE_OP_PRUNE
void TmModuleReceiveIPFWRegister(void)
Registration Function for RecieveIPFW.
void SuricataMainLoop(void)
int ExceptionSimulationCommandLineParser(const char *name, const char *arg)
char * firewall_rule_file
void AppLayerHtpNeedFileInspection(void)
Sets a flag that informs the HTP app layer that some module in the engine needs the http request file...
void TmThreadDisablePacketThreads(const uint16_t set, const uint16_t check, const uint8_t module_flags)
Disable all packet threads.
enum SCRunModes aux_run_mode
void IPPairInitConfig(bool quiet)
initialize the configuration
void SCLogInitLogModule(SCLogInitData *sc_lid)
Initializes the logging module.
void SCEnableDefaultSignalHandlers(void)
Enable default signal handlers.
int LiveDeviceListClean(void)
void DetectEngineDeReference(DetectEngineCtx **de_ctx)
struct timeval start_time
bool IsRunModeOffline(enum SCRunModes run_mode_to_check)
#define SC_ATOMIC_INIT(name)
wrapper for initializing an atomic variable.
SystemHugepageSnapshot * prerun_snap
void TmThreadContinueThreads(void)
Unpauses all threads present in tv_root.
@ SURI_HOST_IS_SNIFFER_ONLY
enum DetectEngineType type
int SigLoadSignatures(DetectEngineCtx *de_ctx, char *sig_file, bool sig_file_exclusive)
Load signatures.
const char * firewall_rule_file_exclusive
#define SC_ATOMIC_SET(name, val)
Set the value for the atomic variable.
@ RUNMODE_LIST_APP_LAYER_FRAMES
SCConfNode * SCConfGetRootNode(void)
Get the root configuration node.
DetectEngineCtx * DetectEngineCtxInitStubForDD(void)
void LiveDevRegisterExtension(void)
void OutputTxShutdown(void)
void AppLayerHtpPrintStats(void)
void StatsSetupPostConfigPreOutput(void)
char * runmode_custom_mode
struct HtpBodyChunk_ * next
void TmModuleReceiveNFQRegister(void)
void DetectEngineMpmCacheService(uint32_t op_flags)
int LiveBuildDeviceList(const char *runmode)
void RunModeShutDown(void)
void SCProtoNameInit(void)
void SuricataPostInit(void)
void RunModeDispatch(int runmode, const char *custom_mode, const char *capture_plugin_name, const char *capture_plugin_args)
volatile sig_atomic_t sigint_count
SC_ATOMIC_DECLARE(unsigned int, engine_stage)
void TmModuleRunDeInit(void)
void TmThreadsUnsealThreads(void)
void RegisterFlowBypassInfo(void)
#define SCSetThreadName(n)
int SCConfYamlHandleInclude(SCConfNode *parent, const char *filename)
Include a file in the configuration.
void SCLogDeInitLogModule(void)
De-Initializes the logging module.
void TmModuleDecodeErfFileRegister(void)
Register the ERF file decoder module.
main detection engine ctx
int StringParseUint16(uint16_t *res, int base, size_t len, const char *str)
void DetectEngineReloadSetIdle(void)
void DatalinkTableDeinit(void)
int SCConfGet(const char *name, const char **vptr)
Retrieve the value of a configuration node.
DetectEngineCtx * DetectEngineGetCurrent(void)
int EngineModeIsUnknown(void)
void VarNameStoreInit(void)
void TmModuleFlowRecyclerRegister(void)
int SCConfNodeChildValueIsTrue(const SCConfNode *node, const char *key)
Test if a configuration node has a true value.
void DatalinkTableInit(void)
void Daemonize(void)
Daemonize the process.
void UtilSignalHandlerSetup(int sig, void(*handler)(int))
#define TAILQ_FOREACH(var, head, field)
void TmModuleDecodeAFPRegister(void)
Registration Function for DecodeAFP.
void TmModuleDecodeWinDivertRegister(void)
int DetectEngineAddToMaster(DetectEngineCtx *de_ctx)
int SCConfGetChildValueBool(const SCConfNode *base, const char *name, int *val)
void TmModuleStatsLoggerRegister(void)
void RegisterAllModules(void)
int DetectEngineMultiTenantSetup(const bool unix_socket)
setup multi-detect / multi-tenancy
void SupportFastPatternForSigMatchTypes(void)
Registers the keywords(SMs) that should be given fp support.
TmEcode SCParseCommandLine(int argc, char **argv)
int CheckValidDaemonModes(int daemon, int mode)
Check for a valid combination daemon/mode.
void SCGetGroupID(const char *group_name, uint32_t *gid)
Function to get the group ID from the specified group name.
int SCConfGetBool(const char *name, int *val)
Retrieve a configuration value as a boolean.
void TmThreadDisableReceiveThreads(void)
Disable all threads having the specified TMs.
void StatsInit(void)
Initializes the perf counter api. Things are hard coded currently. More work to be done when we imple...
void PreRunInit(const int runmode)
void MacSetRegisterFlowStorage(void)
void EngineModeSetFirewall(void)
void SuricataShutdown(void)
const char * conf_filename
int GetIfaceMTU(const char *dev)
output the link MTU
void GlobalsInitPreConfig(void)
void TmModuleReceiveNetmapRegister(void)
void PacketPoolPostRunmodes(void)
Set the max_pending_return_packets value.
void NFQInitConfig(bool quiet)
To initialize the NFQ global configuration data.
void TmModuleReceiveWinDivertRegister(void)
bool EngineModeIsFirewall(void)
void SCProfilingDestroy(void)
Free resources used by profiling.
void AFPPeersListClean(void)
Clean the global peers list.
void RunModeInitializeOutputs(void)
int DetectPortTestConfVars(void)
void SCThresholdConfGlobalInit(void)
void DecodeUnregisterCounters(void)
const char * capture_plugin_name
int SCConfYamlLoadFile(const char *filename)
Load configuration from a YAML file.
void HostBitInitCtx(void)
bool IsRunModeSystem(enum SCRunModes run_mode_to_check)
const char * capture_plugin_args
void ThresholdRegisterGlobalCounters(void)
void TmModuleLoggerRegister(void)
void PacketPoolInit(void)
int AppLayerDeSetup(void)
De initializes the app layer.
@ RUNMODE_LIST_APP_LAYER_HOOKS
size_t strlcpy(char *dst, const char *src, size_t siz)
void PcapTranslateIPToDevice(char *pcap_dev, size_t len)
void FlowDisableFlowRecyclerThread(void)
Used to disable flow recycler thread(s).
void SCRunmodeSet(SCRunMode run_mode)
Set the current run mode.
void TmModuleDecodePcapFileRegister(void)
void TmModuleBypassedFlowManagerRegister(void)
void IPPairShutdown(void)
shutdown the flow engine
void SCConfInit(void)
Initialize the configuration system.
void DetectParseFreeRegexes(void)
void SCConfDump(void)
Dump configuration to stdout.
void TmModuleDecodeNFLOGRegister(void)
int NFQParseAndRegisterQueues(const char *queues)
Parses and adds Netfilter queue(s).
void FlowInitConfig(bool quiet)
initialize the configuration
int AppLayerSetup(void)
Setup the app layer.
void FeatureTrackingRegister(void)
void TmModuleReceiveDPDKRegister(void)
void UnixManagerThreadSpawnNonRunmode(const bool unix_socket_enabled)
void RunModeInitializeThreadSettings(void)
void StreamTcpInitConfig(bool)
To initialize the stream global configuration data.
int GetIfaceMaxPacketSize(LiveDevice *ld)
output max packet size for a link
SCRunMode SCRunmodeGet(void)
Get the current run mode.
void TmModuleDecodeNetmapRegister(void)
Registration Function for DecodeNetmap.
void PreRunPostPrivsDropInit(const int runmode)
void SigTableCleanup(void)
int DetectEngineMoveToFreeList(DetectEngineCtx *de_ctx)
volatile sig_atomic_t sigterm_count
TmEcode TmThreadWaitOnThreadInit(void)
Used to check if all threads have finished their initialization. On finding an un-initialized thread,...
const char * SCLogLevel2Name(const SCLogLevel lvl)
void TmModuleVerdictNFQRegister(void)
void AppLayerRegisterGlobalCounters(void)
HACK to work around our broken unix manager (re)init loop.
void RunModeListRunmodes(void)
Lists all registered runmodes.
size_t strlcat(char *, const char *src, size_t siz)
void LiveSetOffloadDisable(void)
void StatsSetupPostConfigPostOutput(void)
void EngineModeSetIDS(void)
void TmModuleReceiveAFPRegister(void)
Registration Function for RecieveAFP.
int LiveBuildDeviceListCustom(const char *runmode, const char *itemname)
LiveDevice * LiveGetDevice(const char *name)
Get a pointer to the device at idx.
void UnixSocketKillSocketThread(void)
void TmModuleVerdictIPFWRegister(void)
Registration Function for VerdictIPFW.
int SCConfGetInt(const char *name, intmax_t *val)
Retrieve a configuration value as an integer.
bool g_stats_eps_per_app_proto_errors
void HttpRangeContainersInit(void)
struct timeval last_reload
void TmModuleVerdictWinDivertRegister(void)
void HostCleanup(void)
Cleanup the host engine.
void FlowDisableFlowManagerThread(void)
Used to disable flow manager thread(s).
int UtilSignalUnblock(int signum)
int DetectEngineEnabled(void)
Check if detection is enabled.
void TmThreadClearThreadsFamily(int family)
#define THV_REQ_FLOW_LOOP
void FlowRateRegisterFlowStorage(void)
void TmModuleRunInit(void)
void EngineModeSetIPS(void)
void HTPAtExitPrintStats(void)
Print the stats of the HTTP requests.
int UtilSignalBlock(int signum)
void SCProfilingPrefilterGlobalInit(void)
void ThresholdDestroy(void)
#define SCLogWarning(...)
Macro used to log WARNING messages.
int PostConfLoadedSetup(SCInstance *suri)
const char * GetProgramVersion(void)
get string with program version
void TmModuleReceivePcapFileRegister(void)
int32_t CoredumpLoadConfig(void)
Configures the core dump size.
int IPFWRegisterQueue(char *queue)
Add an IPFW divert.
int ListAppLayerHooks(const char *conf_filename)
int ListAppLayerProtocols(const char *conf_filename)
void DatasetsDestroy(void)
void UtilCpuPrintSummary(void)
Print a summary of CPUs detected (configured and online)
int profiling_packets_enabled
int SystemDNotifyReady(void)
void TmThreadKillThreads(void)
void OutputDeregisterAll(void)
Deregister all modules. Useful for a memory clean exit.
void PostConfLoadedDetectSetup(SCInstance *suri)
int EngineModeIsIDS(void)
TmModule tmm_modules[TMM_SIZE]
const char * SCConfigGetLogDirectory(void)
void OutputNotifyFileRotation(void)
Notifies all registered file rotation notification flags.
void VarNameStoreDestroy(void)
void TmModuleFlowWorkerRegister(void)
uint32_t max_pending_packets
const char ** additional_configs
#define DEFAULT_PID_FILENAME
volatile sig_atomic_t sighup_count
TmEcode ConfigSetDataDirectory(char *name)
void TmModuleDecodeErfDagRegister(void)
Register the ERF file decoder module.
#define SCDropMainThreadCaps(...)
void TmModuleDebugList(void)
void TmModuleDecodeNFQRegister(void)
void SCProtoNameRelease(void)
int RunmodeIsUnittests(void)
#define SCLogInfo(...)
Macro used to log INFORMATIONAL messages.
void TmModuleReceiveNFLOGRegister(void)
#define DEFAULT_PACKET_SIZE
#define WarnInvalidConfEntry(param_name, format, value)
Generic API that can be used by all to log an invalid conf entry.
#define TM_FLAG_RECEIVE_TM
void TmModuleReceiveErfFileRegister(void)
Register the ERF file receiver (reader) module.
int SCConfSetFromString(const char *input, int final)
Set a configuration parameter from a string.
int SCConfSetFinal(const char *name, const char *val)
Set a final configuration value.
#define SCRealloc(ptr, sz)
void TmModuleDecodeAFXDPRegister(void)
Registration Function for DecodeAFXDP.
uint32_t default_packet_size
void SigTableApplyStrictCommandLineOption(const char *str)
@ DETECT_ENGINE_TYPE_NORMAL
void TmThreadKillThreadsFamily(int family)
void FeatureTrackingRelease(void)
void TmqhCleanup(void)
Clean up registration time allocs.
void StreamTcpFreeConfig(bool quiet)
void DecodeGlobalConfig(void)
char * strict_rule_parsing_string
DetectEngineCtx * DetectEngineCtxInitStubForMT(void)
const char * LiveGetDeviceName(int number)
Get a pointer to the device name at idx.
void FlowShutdown(void)
shutdown the flow engine
void SCHInfoLoadFromConfig(void)
Load the host os policy information from the configuration.
void DetectEngineBumpVersion(void)
void TmModuleFlowManagerRegister(void)
int SCStartInternalRunMode(int argc, char **argv)
int SCPidfileTestRunning(const char *pid_filename)
Check the Suricata pid file (used at the startup)
void HostShutdown(void)
shutdown the flow engine
#define SCFstatFn(fd, statbuf)
void LiveSetOffloadWarn(void)
void ParseSizeDeinit(void)
void SCConfDeInit(void)
De-initializes the configuration system.
void RunModeRegisterRunModes(void)
Register all runmodes in the engine.
int ListRuleProtocols(const char *conf_filename)
void SCProfilingDump(void)
void TmModuleReceiveAFXDPRegister(void)
void EngineStop(void)
make sure threads can stop the engine by calling this function. Purpose: pcap file mode needs to be a...
int ParseSizeStringU32(const char *size, uint32_t *res)
void TmModuleReceiveErfDagRegister(void)
Register the ERF file receiver (reader) module.
void IPPairBitInitCtx(void)
TmEcode ConfigSetLogDirectory(const char *name)
void TmModuleDecodeIPFWRegister(void)
Registration Function for DecodeIPFW.
int ConfUnixSocketIsEnable(void)
#define TM_FLAG_PACKET_ALL
struct SCLogConfig_ SCLogConfig
Holds the config state used by the logging api.
#define DETECT_ENGINE_MPM_CACHE_OP_SAVE
volatile sig_atomic_t sigusr2_count
void SystemHugepageSnapshotDestroy(SystemHugepageSnapshot *s)
void TmModuleDecodePcapRegister(void)
Registration Function for DecodePcap.
TmEcode SCLoadYamlConfig(void)
TmEcode ConfigCheckDataDirectory(const char *data_dir)
SCConfNode * SCConfGetNode(const char *name)
Get a SCConfNode by name.
#define SCLogError(...)
Macro used to log ERROR messages.
int DetectEngineReloadStart(void)
void TopologyDestroy(void)
#define DEFAULT_CONF_FILE
#define SC_LOG_MAX_LOG_MSG_LEN
void AppLayerParserPostStreamSetup(void)
void TmModuleReceivePcapRegister(void)
Registration Function for ReceivePcap.
void SCGetUserID(const char *user_name, const char *group_name, uint32_t *uid, uint32_t *gid)
Function to get the user and group ID from the specified user name.
bool install_signal_handlers
void TmModuleRespondRejectRegister(void)
void CoredumpEnable(void)
Enable coredumps on systems where coredumps can and need to be enabled.
void RunUnittests(int list_unittests, const char *regex_arg)
TmEcode ConfigCheckLogDirectoryExists(const char *log_dir)
int SCConfSet(const char *name, const char *val)
Set a configuration value.
void PacketAlertTagInit(void)
int RunModeEngineIsIPS(int capture_mode, const char *runmode, const char *capture_plugin_name)
DetectEngineCtx * DetectEngineCtxInit(void)
void SCOnLoggingReady(void)
Invokes all registered logging ready callbacks.
void TmModuleDecodeLibRegister(void)
register a "Decode" module for suricata as a library.
int EngineModeIsIPS(void)
int ListAppLayerFrames(const char *conf_filename)
void SCProfilingKeywordsGlobalInit(void)
void EngineDone(void)
Used to indicate that the current task is done.
bool firewall_rule_file_exclusive
const char * GetDocURL(void)
void PostRunDeinit(const int runmode, struct timeval *start_time)
clean up / shutdown code for packet modes
void HostInitConfig(bool quiet)
initialize the configuration
TmEcode TmThreadWaitOnThreadRunning(void)
Waits for all threads to be in a running state.
void HttpRangeContainersDestroy(void)
void SCLogLoadConfig(int daemon, int verbose, uint32_t userid, uint32_t groupid)
int DetectEngineReload(const SCInstance *suri)
Reload the detection engine.
#define DEFAULT_MAX_PENDING_PACKETS
void DetectEngineClearMaster(void)
void SetMasterExceptionPolicy(void)
void TmThreadCheckThreadState(void)
Used to check the thread for certain conditions of failure.
void OutputFilestoreRegisterGlobalCounters(void)
int InitGlobal(void)
Global initialization common to all runmodes.
int LiveGetDeviceCount(void)
Get the number of registered devices.
SystemHugepageSnapshot * SystemHugepageSnapshotCreate(void)
The function creates a snapshot of the system's hugepage usage per NUMA node and per hugepage size....
void SCProfilingSghsGlobalInit(void)
@ RUNMODE_LIST_RULE_PROTOS
int SCPidfileCreate(const char *pidfile)
Write a pid file (used at the startup) This commonly needed by the init scripts.
int LiveRegisterDeviceName(const char *dev)
Add a device for monitoring.
#define SCStatFn(pathname, statbuf)
void LiveDeviceFinalize(void)
void TmModuleDecodeDPDKRegister(void)
Registration Function for DecodeDPDK.
void PacketPoolDestroy(void)
void HTPFreeConfig(void)
Clears the HTTP server configuration memory used by HTP library.
void LandlockSandboxing(SCInstance *suri)
int ListKeywords(const char *keyword_info)
#define SCLogNotice(...)
Macro used to log NOTICE messages.
void SuricataPreInit(const char *progname)
const char ** additional_plugins
void DPDKCleanupEAL(void)
@ RUNMODE_PRINT_BUILDINFO
void SCPidfileRemove(const char *pid_filename)
Remove the pid file (used at the startup)
void NFQContextsClean(void)
Clean global contexts. Must be called on exit.
void SystemHugepageEvaluateHugepages(SystemHugepageSnapshot *pre_s, SystemHugepageSnapshot *post_s)
The function compares two hugepage snapshots and prints out recommendations for hugepage configuratio...
#define DEBUG_VALIDATE_BUG_ON(exp)
int SCFinalizeRunMode(void)
void SCProfilingInit(void)
Initialize profiling.
void GlobalsDestroy(void)
int DetectEngineReloadIsStart(void)
int SCStorageFinalize(void)
volatile uint8_t suricata_ctl_flags
#define TM_FLAG_FLOWWORKER_TM
void TagDestroyCtx(void)
Destroy tag context hash tables.
int DetectAddressTestConfVars(void)
void FlowWorkToDoCleanup(void)
Clean up all the flows that have unprocessed segments and have some work to do in the detection engin...
void MpmHSGlobalCleanup(void)
void SCPluginsLoad(const char *capture_plugin_name, const char *capture_plugin_args, const char **additional_plugins)
void TmqResetQueues(void)