suricata
suricata.c
Go to the documentation of this file.
1 /* Copyright (C) 2007-2025 Open Information Security Foundation
2  *
3  * You can copy, redistribute or modify this Program under the terms of
4  * the GNU General Public License version 2 as published by the Free
5  * Software Foundation.
6  *
7  * This program is distributed in the hope that it will be useful,
8  * but WITHOUT ANY WARRANTY; without even the implied warranty of
9  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10  * GNU General Public License for more details.
11  *
12  * You should have received a copy of the GNU General Public License
13  * version 2 along with this program; if not, write to the Free Software
14  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
15  * 02110-1301, USA.
16  */
17 
18 /**
19  * \file
20  *
21  * \author Victor Julien <victor@inliniac.net>
22  */
23 
24 #include "suricata-common.h"
25 
26 #if HAVE_GETOPT_H
27 #include <getopt.h>
28 #endif
29 
30 #if HAVE_SIGNAL_H
31 #include <signal.h>
32 #endif
33 #ifndef OS_WIN32
34 #ifdef HAVE_SYS_RESOURCE_H
35 // setrlimit
36 #include <sys/resource.h>
37 #endif
38 #endif
39 
40 #include "suricata.h"
41 
42 #include "conf.h"
43 #include "conf-yaml-loader.h"
44 
45 #include "decode.h"
46 #include "defrag.h"
47 #include "flow.h"
48 #include "stream-tcp.h"
49 #include "ippair.h"
50 
51 #include "detect.h"
52 #include "detect-parse.h"
53 #include "detect-engine.h"
54 #include "detect-engine-address.h"
55 #include "detect-engine-alert.h"
56 #include "detect-engine-port.h"
57 #include "detect-engine-tag.h"
59 #include "detect-fast-pattern.h"
60 
61 #include "datasets.h"
62 
63 #include "feature.h"
64 
65 #include "flow-bypass.h"
66 #include "flow-manager.h"
67 #include "flow-timeout.h"
68 #include "flow-worker.h"
69 
70 #include "flow-bit.h"
71 #include "host-bit.h"
72 #include "ippair-bit.h"
73 
74 #include "app-layer.h"
75 #include "app-layer-parser.h"
76 #include "app-layer-htp.h"
77 #include "app-layer-htp-range.h"
78 
79 #include "output.h"
80 #include "output-filestore.h"
81 
82 #include "respond-reject.h"
83 
84 #include "runmode-af-packet.h"
85 #include "runmode-af-xdp.h"
86 #include "runmode-netmap.h"
87 #include "runmode-unittests.h"
88 
89 #include "source-nfq.h"
90 #include "source-nfq-prototypes.h"
91 #include "source-nflog.h"
92 #include "source-ipfw.h"
93 #include "source-lib.h"
94 #include "source-pcap.h"
95 #include "source-pcap-file.h"
97 #include "source-erf-file.h"
98 #include "source-erf-dag.h"
99 #include "source-af-packet.h"
100 #include "source-af-xdp.h"
101 #include "source-netmap.h"
102 #include "source-dpdk.h"
103 #include "source-windivert.h"
105 
106 #include "unix-manager.h"
107 
109 #include "util-threshold-config.h"
110 #include "util-reference-config.h"
111 
112 #include "tmqh-packetpool.h"
113 #include "tm-queuehandlers.h"
114 
115 #include "util-affinity.h"
116 #include "util-byte.h"
117 #include "util-conf.h"
118 #include "util-coredump-config.h"
119 #include "util-cpu.h"
120 #include "util-daemon.h"
121 #include "util-device-private.h"
122 #include "util-dpdk.h"
123 #include "util-ebpf.h"
124 #include "util-enum.h"
125 #include "util-exception-policy.h"
126 #include "util-host-os-info.h"
127 #include "util-hugepages.h"
128 #include "util-ioctl.h"
129 #include "util-landlock.h"
130 #include "util-macset.h"
131 #include "util-flow-rate.h"
132 #include "util-misc.h"
133 #include "util-mpm-hs.h"
134 #include "util-path.h"
135 #include "util-pidfile.h"
136 #include "util-plugin.h"
137 #include "util-privs.h"
138 #include "util-profiling.h"
139 #include "util-proto-name.h"
140 #include "util-running-modes.h"
141 #include "util-signal.h"
142 #include "util-time.h"
143 #include "util-validate.h"
144 #include "util-var-name.h"
145 #ifdef SYSTEMD_NOTIFY
146 #include "util-systemd.h"
147 #endif
148 
149 #ifdef WINDIVERT
150 #include "decode-sll.h"
151 #include "win32-syscall.h"
152 #endif
153 
154 /*
155  * we put this here, because we only use it here in main.
156  */
157 volatile sig_atomic_t sigint_count = 0;
158 volatile sig_atomic_t sighup_count = 0;
159 volatile sig_atomic_t sigterm_count = 0;
160 volatile sig_atomic_t sigusr2_count = 0;
161 
162 /*
163  * Flag to indicate if the engine is at the initialization
164  * or already processing packets. 3 stages: SURICATA_INIT,
165  * SURICATA_RUNTIME and SURICATA_FINALIZE
166  */
167 SC_ATOMIC_DECLARE(unsigned int, engine_stage);
168 
169 /* Max packets processed simultaneously per thread. */
170 #define DEFAULT_MAX_PENDING_PACKETS 1024
171 
172 /* Maximum number of v's supported */
173 #define VERBOSE_MAX (SC_LOG_DEBUG - SC_LOG_NOTICE)
174 
175 /** suricata engine control flags */
176 volatile uint8_t suricata_ctl_flags = 0;
177 
178 /** Engine mode: inline (ENGINE_MODE_IPS) or just
179  * detection mode (ENGINE_MODE_IDS by default) */
180 static enum EngineMode g_engine_mode = ENGINE_MODE_UNKNOWN;
181 
182 /** Host mode: set if box is sniffing only
183  * or is a router */
185 
186 /** Maximum packets to simultaneously process. */
188 
189 /** global indicating if detection is enabled */
191 
192 /** set caps or not */
193 bool sc_set_caps = false;
194 
195 bool g_system = false;
196 
197 /** disable randomness to get reproducible results across runs */
198 #ifndef AFLFUZZ_NO_RANDOM
200 #else
201 int g_disable_randomness = 1;
202 #endif
203 
204 /** determine (without branching) if we include the vlan_ids when hashing or
205  * comparing flows */
206 uint16_t g_vlan_mask = 0xffff;
207 
208 /** determine (without branching) if we include the livedev ids when hashing or
209  * comparing flows */
210 uint16_t g_livedev_mask = 0xffff;
211 
212 /** determine (without branching) if we include the recursion levels when hashing or
213  * comparing flows */
214 uint8_t g_recurlvl_mask = 0xff;
215 
216 /* flag to disable hashing almost globally, to be similar to disabling nss
217  * support */
218 bool g_disable_hashing = false;
219 
220 /* snapshot of the system's hugepages before system initialization. */
222 
223 /** add per-proto app-layer error counters for exception policies stats? disabled by default */
225 
226 /** Suricata instance */
228 
229 int SuriHasSigFile(void)
230 {
231  return (suricata.sig_file != NULL);
232 }
233 
235 {
236  return (g_engine_mode == ENGINE_MODE_UNKNOWN);
237 }
238 
240 {
241  DEBUG_VALIDATE_BUG_ON(g_engine_mode == ENGINE_MODE_UNKNOWN);
242  return (g_engine_mode == ENGINE_MODE_FIREWALL);
243 }
244 
245 /* this returns true for firewall mode as well */
247 {
248  DEBUG_VALIDATE_BUG_ON(g_engine_mode == ENGINE_MODE_UNKNOWN);
249  return (g_engine_mode >= ENGINE_MODE_IPS);
250 }
251 
253 {
254  DEBUG_VALIDATE_BUG_ON(g_engine_mode == ENGINE_MODE_UNKNOWN);
255  return (g_engine_mode == ENGINE_MODE_IDS);
256 }
257 
259 {
260  g_engine_mode = ENGINE_MODE_FIREWALL;
261 }
262 
264 {
265 #ifndef UNITTESTS
266  if (g_engine_mode == ENGINE_MODE_UNKNOWN)
267  g_engine_mode = ENGINE_MODE_IPS;
268 #else
269  if (RunmodeIsUnittests() || g_engine_mode == ENGINE_MODE_UNKNOWN)
270  g_engine_mode = ENGINE_MODE_IPS;
271 #endif
272 }
273 
275 {
276  g_engine_mode = ENGINE_MODE_IDS;
277 }
278 
279 #ifdef UNITTESTS
281 {
283  return 1;
284 
285  return 0;
286 }
287 #endif
288 
290 {
291  return suricata.run_mode;
292 }
293 
294 void SCRunmodeSet(SCRunMode run_mode)
295 {
296  suricata.run_mode = run_mode;
297 }
298 
300 {
302 }
303 
304 /** signal handlers
305  *
306  * WARNING: don't use the SCLog* API in the handlers. The API is complex
307  * with memory allocation possibly happening, calls to syslog, json message
308  * construction, etc.
309  */
310 
311 #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
312 static void SignalHandlerSigint(/*@unused@*/ int sig)
313 {
314  sigint_count = 1;
315 }
316 static void SignalHandlerSigterm(/*@unused@*/ int sig)
317 {
318  sigterm_count = 1;
319 }
320 #ifndef OS_WIN32
321 #if HAVE_LIBUNWIND
322 #define UNW_LOCAL_ONLY
323 #include <libunwind.h>
324 static void SignalHandlerUnexpected(int sig_num, siginfo_t *info, void *context)
325 {
326  char msg[SC_LOG_MAX_LOG_MSG_LEN];
327  unw_cursor_t cursor;
328  /* Restore defaults for signals to avoid loops */
329  signal(SIGABRT, SIG_DFL);
330  signal(SIGSEGV, SIG_DFL);
331  int r;
332  if ((r = unw_init_local(&cursor, (unw_context_t *)(context)) != 0)) {
333  SCLogError("unable to obtain stack trace: unw_init_local: %s", unw_strerror(r));
334  goto terminate;
335  }
336 
337  char *temp = msg;
338  int cw = snprintf(temp, SC_LOG_MAX_LOG_MSG_LEN - (temp - msg), "stacktrace:sig %d:", sig_num);
339  temp += cw;
340  r = 1;
341  while (r > 0) {
342  if (unw_is_signal_frame(&cursor) == 0) {
343  unw_word_t off;
344  char name[256];
345  if (unw_get_proc_name(&cursor, name, sizeof(name), &off) == UNW_ENOMEM) {
346  cw = snprintf(temp, SC_LOG_MAX_LOG_MSG_LEN - (temp - msg), "[unknown]:");
347  } else {
348  cw = snprintf(
349  temp, SC_LOG_MAX_LOG_MSG_LEN - (temp - msg), "%s+0x%08" PRIx64, name, off);
350  }
351  temp += cw;
352  }
353 
354  r = unw_step(&cursor);
355  if (r > 0) {
356  cw = snprintf(temp, SC_LOG_MAX_LOG_MSG_LEN - (temp - msg), ";");
357  temp += cw;
358  }
359  }
360  SCLogError("%s", msg);
361 
362 terminate:
363  // Propagate signal to watchers, if any
364  kill(getpid(), sig_num);
365 }
366 #undef UNW_LOCAL_ONLY
367 #endif /* HAVE_LIBUNWIND */
368 #endif /* !OS_WIN32 */
369 #endif
370 
371 #ifndef OS_WIN32
372 /**
373  * SIGUSR2 handler. Just set sigusr2_count. The main loop will act on
374  * it.
375  */
376 static void SignalHandlerSigusr2(int sig)
377 {
378  if (sigusr2_count < 2)
379  sigusr2_count++;
380 }
381 
382 /**
383  * SIGHUP handler. Just set sighup_count. The main loop will act on
384  * it.
385  */
386 static void SignalHandlerSigHup(/*@unused@*/ int sig)
387 {
388  sighup_count = 1;
389 }
390 #endif
391 
393 {
394  TimeInit();
397  SCProtoNameInit();
398 }
399 
400 void GlobalsDestroy(void)
401 {
402  SCInstance *suri = &suricata;
404  HostShutdown();
405  HTPFreeConfig();
407 
409 
410  /* TODO this can do into it's own func */
412  if (de_ctx) {
415  }
417 
418  AppLayerDeSetup();
419  DatasetsSave();
420  DatasetsDestroy();
422  TagDestroyCtx();
423 
428  TimeDeinit();
429  SigTableCleanup();
430  TmqhCleanup();
432  ParseSizeDeinit();
434 
435 #ifdef HAVE_DPDK
436  DPDKCleanupEAL();
437 #endif
438 
439 #ifdef HAVE_AF_PACKET
441 #endif
442 
443 #ifdef NFQ
445 #endif
446 
447 #ifdef BUILD_HYPERSCAN
449 #endif
450 
451  SCConfDeInit();
452 
454 
456  SCFree(suri->pid_filename);
457  suri->pid_filename = NULL;
458 
461 }
462 
463 /**
464  * \brief Used to send OS specific notification of running threads
465  *
466  * \retval TmEcode TM_ECODE_OK on success; TM_ECODE_FAILED on failure.
467  */
468 static void OnNotifyRunning(void)
469 {
470 #ifdef SYSTEMD_NOTIFY
471  if (SystemDNotifyReady() < 0) {
472  SCLogWarning("failed to notify systemd");
473  }
474 #endif
475 }
476 
477 /** \brief make sure threads can stop the engine by calling this
478  * function. Purpose: pcap file mode needs to be able to tell the
479  * engine the file eof is reached. */
480 void EngineStop(void)
481 {
483 }
484 
485 /**
486  * \brief Used to indicate that the current task is done.
487  *
488  * This is mainly used by pcap-file to tell it has finished
489  * to treat a pcap files when running in unix-socket mode.
490  */
491 void EngineDone(void)
492 {
494 }
495 
496 static int SetBpfString(int argc, char *argv[])
497 {
498  char *bpf_filter = NULL;
499  uint32_t bpf_len = 0;
500  int tmpindex = 0;
501 
502  /* attempt to parse remaining args as bpf filter */
503  tmpindex = argc;
504  while(argv[tmpindex] != NULL) {
505  bpf_len+=strlen(argv[tmpindex]) + 1;
506  tmpindex++;
507  }
508 
509  if (bpf_len == 0)
510  return TM_ECODE_OK;
511 
512  bpf_filter = SCCalloc(1, bpf_len);
513  if (unlikely(bpf_filter == NULL))
514  return TM_ECODE_FAILED;
515 
516  tmpindex = optind;
517  while(argv[tmpindex] != NULL) {
518  strlcat(bpf_filter, argv[tmpindex],bpf_len);
519  if(argv[tmpindex + 1] != NULL) {
520  strlcat(bpf_filter," ", bpf_len);
521  }
522  tmpindex++;
523  }
524 
525  if(strlen(bpf_filter) > 0) {
526  if (SCConfSetFinal("bpf-filter", bpf_filter) != 1) {
527  SCLogError("Failed to set bpf filter.");
528  SCFree(bpf_filter);
529  return TM_ECODE_FAILED;
530  }
531  }
532  SCFree(bpf_filter);
533 
534  return TM_ECODE_OK;
535 }
536 
537 static void SetBpfStringFromFile(char *filename)
538 {
539  char *bpf_filter = NULL;
540  char *bpf_comment_tmp = NULL;
541  char *bpf_comment_start = NULL;
542  size_t bpf_len = 0;
543  SCStat st;
544  FILE *fp = NULL;
545  size_t nm = 0;
546 
547  fp = fopen(filename, "r");
548  if (fp == NULL) {
549  SCLogError("Failed to open file %s", filename);
550  exit(EXIT_FAILURE);
551  }
552 
553  if (SCFstatFn(fileno(fp), &st) != 0) {
554  SCLogError("Failed to stat file %s", filename);
555  exit(EXIT_FAILURE);
556  }
557  // st.st_size is signed on Windows
558  bpf_len = ((size_t)(st.st_size)) + 1;
559 
560  bpf_filter = SCCalloc(1, bpf_len);
561  if (unlikely(bpf_filter == NULL)) {
562  SCLogError("Failed to allocate buffer for bpf filter in file %s", filename);
563  exit(EXIT_FAILURE);
564  }
565 
566  nm = fread(bpf_filter, 1, bpf_len - 1, fp);
567  if ((ferror(fp) != 0) || (nm != (bpf_len - 1))) {
568  SCLogError("Failed to read complete BPF file %s", filename);
569  SCFree(bpf_filter);
570  fclose(fp);
571  exit(EXIT_FAILURE);
572  }
573  fclose(fp);
574  bpf_filter[nm] = '\0';
575 
576  if(strlen(bpf_filter) > 0) {
577  /*replace comments with space*/
578  bpf_comment_start = bpf_filter;
579  while((bpf_comment_tmp = strchr(bpf_comment_start, '#')) != NULL) {
580  while((*bpf_comment_tmp !='\0') &&
581  (*bpf_comment_tmp != '\r') && (*bpf_comment_tmp != '\n'))
582  {
583  *bpf_comment_tmp++ = ' ';
584  }
585  bpf_comment_start = bpf_comment_tmp;
586  }
587  /*remove remaining '\r' and '\n' */
588  while((bpf_comment_tmp = strchr(bpf_filter, '\r')) != NULL) {
589  *bpf_comment_tmp = ' ';
590  }
591  while((bpf_comment_tmp = strchr(bpf_filter, '\n')) != NULL) {
592  *bpf_comment_tmp = ' ';
593  }
594  /* cut trailing spaces */
595  while (strlen(bpf_filter) > 0 &&
596  bpf_filter[strlen(bpf_filter)-1] == ' ')
597  {
598  bpf_filter[strlen(bpf_filter)-1] = '\0';
599  }
600  if (strlen(bpf_filter) > 0) {
601  if (SCConfSetFinal("bpf-filter", bpf_filter) != 1) {
602  SCFree(bpf_filter);
603  FatalError("failed to set bpf filter");
604  }
605  }
606  }
607  SCFree(bpf_filter);
608 }
609 
610 static void PrintUsage(const char *progname)
611 {
612 #ifdef REVISION
613  printf("%s %s (%s)\n", PROG_NAME, PROG_VER, xstr(REVISION));
614 #else
615  printf("%s %s\n", PROG_NAME, PROG_VER);
616 #endif
617  printf("USAGE: %s [OPTIONS] [BPF FILTER]\n\n", progname);
618 
619  printf("\n General:\n");
620  printf("\t-v : be more verbose (use multiple times to "
621  "increase verbosity)\n");
622  printf("\t-c <path> : path to configuration file\n");
623  printf("\t-l <dir> : default log directory\n");
624  printf("\t--include <path> : additional configuration file\n");
625  printf("\t--set name=value : set a configuration value\n");
626  printf("\t--pidfile <file> : write pid to this file\n");
627  printf("\t-T : test configuration file (use with -c)\n");
628  printf("\t--init-errors-fatal : enable fatal failure on signature init "
629  "error\n");
630 #ifndef OS_WIN32
631  printf("\t-D : run as daemon\n");
632 #else
633  printf("\t--service-install : install as service\n");
634  printf("\t--service-remove : remove service\n");
635  printf("\t--service-change-params : change service startup parameters\n");
636 #endif /* OS_WIN32 */
637 #ifdef HAVE_LIBCAP_NG
638  printf("\t--user <user> : run suricata as this user after init\n");
639  printf("\t--group <group> : run suricata as this group after init\n");
640 #endif /* HAVE_LIBCAP_NG */
641 #ifdef BUILD_UNIX_SOCKET
642  printf("\t--unix-socket[=<file>] : use unix socket to control suricata work\n");
643 #endif
644  printf("\t--runmode <runmode_id> : specific runmode modification the engine should run. The argument\n"
645  "\t supplied should be the id for the runmode obtained by running\n"
646  "\t --list-runmodes\n");
647  printf("\t--plugin <path> : load plugin in addition to config\n");
648 
649  printf("\n Capture and IPS:\n");
650 
651  printf("\t-F <bpf filter file> : bpf filter file\n");
652  printf("\t-k [all|none] : force checksum check (all) or disabled it "
653  "(none)\n");
654  printf("\t-i <dev or ip> : run in pcap live mode\n");
655  printf("\t--pcap[=<dev>] : run in pcap mode, no value select interfaces "
656  "from suricata.yaml\n");
657 #ifdef HAVE_PCAP_SET_BUFF
658  printf("\t--pcap-buffer-size : size of the pcap buffer value from 0 - %i\n",INT_MAX);
659 #endif /* HAVE_SET_PCAP_BUFF */
660 #ifdef NFQ
661  printf("\t-q <qid[:qid]> : run in inline nfqueue mode (use colon to "
662  "specify a range of queues)\n");
663 #endif /* NFQ */
664 #ifdef IPFW
665  printf("\t-d <divert port> : run in inline ipfw divert mode\n");
666 #endif /* IPFW */
667 #ifdef HAVE_AF_PACKET
668  printf("\t--af-packet[=<dev>] : run in af-packet mode, no value select interfaces from suricata.yaml\n");
669 #endif
670 #ifdef HAVE_AF_XDP
671  printf("\t--af-xdp[=<dev>] : run in af-xdp mode, no value select "
672  "interfaces from suricata.yaml\n");
673 #endif
674 #ifdef HAVE_NETMAP
675  printf("\t--netmap[=<dev>] : run in netmap mode, no value select interfaces from suricata.yaml\n");
676 #endif
677 #ifdef HAVE_PFRING
678  printf("\t--pfring[=<dev>] : run in pfring mode, use interfaces from suricata.yaml\n");
679  printf("\t--pfring-int <dev> : run in pfring mode, use interface <dev>\n");
680  printf("\t--pfring-cluster-id <id> : pfring cluster id \n");
681  printf("\t--pfring-cluster-type <type> : pfring cluster type for PF_RING 4.1.2 and later cluster_round_robin|cluster_flow\n");
682 #endif /* HAVE_PFRING */
683 #ifdef HAVE_DPDK
684  printf("\t--dpdk : run in dpdk mode, uses interfaces from "
685  "suricata.yaml\n");
686 #endif
687 #ifdef HAVE_DAG
688  printf("\t--dag <dagX:Y> : process ERF records from DAG interface X, stream Y\n");
689 #endif
690 #ifdef WINDIVERT
691  printf("\t--windivert <filter> : run in inline WinDivert mode\n");
692  printf("\t--windivert-forward <filter> : run in inline WinDivert mode, as a gateway\n");
693 #endif
694 #ifdef HAVE_LIBNET11
695  printf("\t--reject-dev <dev> : send reject packets from this interface\n");
696 #endif
697 
698  printf("\n Capture Files:\n");
699  printf("\t-r <path> : run in pcap file/offline mode\n");
700  printf("\t--pcap-file-continuous : when running in pcap mode with a directory, "
701  "continue checking directory for pcaps until interrupted\n");
702  printf("\t--pcap-file-delete : when running in replay mode (-r with "
703  "directory or file), will delete pcap files that have been processed when done\n");
704  printf("\t--pcap-file-recursive : will descend into subdirectories when running "
705  "in replay mode (-r)\n");
706  printf("\t--pcap-file-buffer-size : set read buffer size (setvbuf)\n");
707  printf("\t--erf-in <path> : process an ERF file\n");
708 
709  printf("\n Detection:\n");
710  printf("\t-s <path> : path to signature file loaded in addition to "
711  "suricata.yaml settings (optional)\n");
712  printf("\t-S <path> : path to signature file loaded exclusively "
713  "(optional)\n");
714  printf("\t--disable-detection : disable detection engine\n");
715  printf("\t--engine-analysis : print reports on analysis of different "
716  "sections in the engine and exit.\n"
717  "\t Please have a look at the conf parameter "
718  "engine-analysis on what reports\n"
719  "\t can be printed\n");
720 
721  printf("\n Firewall:\n");
722  printf("\t--firewall : enable firewall mode\n");
723  printf("\t--firewall-rules-exclusive=<path> : path to firewall rule file loaded "
724  "exclusively\n");
725 
726  printf("\n Info:\n");
727  printf("\t-V : display Suricata version\n");
728  printf("\t--list-keywords[=all|csv|<kword>] : list keywords implemented by the engine\n");
729  printf("\t--list-runmodes : list supported runmodes\n");
730  printf("\t--list-app-layer-protos : list supported app layer protocols\n");
731  printf("\t--list-rule-protos : list supported rule protocols\n");
732  printf("\t--list-app-layer-hooks : list supported app layer hooks for use in "
733  "rules\n");
734  printf("\t--list-app-layer-frames : list supported app layer frames for use with "
735  "'frame' keyword\n");
736  printf("\t--dump-config : show the running configuration\n");
737  printf("\t--dump-features : display provided features\n");
738  printf("\t--build-info : display build information\n");
739 
740  printf("\n Testing:\n");
741  printf("\t--simulate-ips : force engine into IPS mode. Useful for QA\n");
742 #ifdef UNITTESTS
743  printf("\t-u : run the unittests and exit\n");
744  printf("\t-U=REGEX, --unittest-filter=REGEX : filter unittests with a pcre compatible "
745  "regex\n");
746  printf("\t--list-unittests : list unit tests\n");
747  printf("\t--fatal-unittests : enable fatal failure on unittest error\n");
748  printf("\t--unittests-coverage : display unittest coverage report\n");
749 #endif /* UNITTESTS */
750  printf("\n");
751  printf("\nTo run " PROG_NAME " with default configuration on "
752  "interface eth0 with signature file \"signatures.rules\", run the "
753  "command as:\n\n%s -c suricata.yaml -s signatures.rules -i eth0 \n\n",
754  progname);
755 }
756 
757 static void PrintBuildInfo(void)
758 {
759  const char *bits;
760  const char *endian;
761  /* If all current features are enabled, features string would be 341 characters long */
762  char features[2048] = "";
763  const char *tls;
764 
765  printf("This is %s version %s\n", PROG_NAME, GetProgramVersion());
766 #ifdef DEBUG
767  strlcat(features, "DEBUG ", sizeof(features));
768 #endif
769 #ifdef DEBUG_VALIDATION
770  strlcat(features, "DEBUG_VALIDATION ", sizeof(features));
771 #endif
772 #ifdef QA_SIMULATION
773  strlcat(features, "QA_SIMULATION ", sizeof(features));
774 #endif
775 #ifdef UNITTESTS
776  strlcat(features, "UNITTESTS ", sizeof(features));
777 #endif
778 #ifdef NFQ
779  strlcat(features, "NFQ ", sizeof(features));
780 #endif
781 #ifdef IPFW
782  strlcat(features, "IPFW ", sizeof(features));
783 #endif
784 #ifdef HAVE_PCAP_SET_BUFF
785  strlcat(features, "PCAP_SET_BUFF ", sizeof(features));
786 #endif
787 #ifdef HAVE_PFRING
788  strlcat(features, "PF_RING ", sizeof(features));
789 #endif
790 #ifdef HAVE_NAPATECH
791  strlcat(features, "NAPATECH ", sizeof(features));
792 #endif
793 #ifdef HAVE_AF_PACKET
794  strlcat(features, "AF_PACKET ", sizeof(features));
795 #endif
796 #ifdef HAVE_NETMAP
797  strlcat(features, "NETMAP ", sizeof(features));
798 #endif
799 #ifdef HAVE_PACKET_FANOUT
800  strlcat(features, "HAVE_PACKET_FANOUT ", sizeof(features));
801 #endif
802 #ifdef HAVE_DAG
803  strlcat(features, "DAG ", sizeof(features));
804 #endif
805 #ifdef HAVE_LIBCAP_NG
806  strlcat(features, "LIBCAP_NG ", sizeof(features));
807 #endif
808 #ifdef HAVE_LIBNET11
809  strlcat(features, "LIBNET1.1 ", sizeof(features));
810 #endif
811  strlcat(features, "HAVE_HTP_URI_NORMALIZE_HOOK ", sizeof(features));
812 #ifdef PCRE2_HAVE_JIT
813  strlcat(features, "PCRE_JIT ", sizeof(features));
814 #endif
815  /* For compatibility, just say we have HAVE_NSS. */
816  strlcat(features, "HAVE_NSS ", sizeof(features));
817  /* HTTP2_DECOMPRESSION is not an optional feature in this major version */
818  strlcat(features, "HTTP2_DECOMPRESSION ", sizeof(features));
819  /* Lua is now vendored in and always available. */
820  strlcat(features, "HAVE_LUA ", sizeof(features));
821 #ifdef HAVE_JA3
822  strlcat(features, "HAVE_JA3 ", sizeof(features));
823 #endif
824 #ifdef HAVE_JA4
825  strlcat(features, "HAVE_JA4 ", sizeof(features));
826 #endif
827  strlcat(features, "HAVE_LIBJANSSON ", sizeof(features));
828 #ifdef PROFILING
829  strlcat(features, "PROFILING ", sizeof(features));
830 #endif
831 #ifdef PROFILE_LOCKING
832  strlcat(features, "PROFILE_LOCKING ", sizeof(features));
833 #endif
834 #ifdef BUILD_UNIX_SOCKET
835  strlcat(features, "UNIX_SOCKET ", sizeof(features));
836 #endif
837 #if defined(TLS_C11) || defined(TLS_GNU)
838  strlcat(features, "TLS ", sizeof(features));
839 #endif
840 #if defined(TLS_C11)
841  strlcat(features, "TLS_C11 ", sizeof(features));
842 #elif defined(TLS_GNU)
843  strlcat(features, "TLS_GNU ", sizeof(features));
844 #endif
845 #ifdef HAVE_MAGIC
846  strlcat(features, "MAGIC ", sizeof(features));
847 #endif
848  strlcat(features, "RUST ", sizeof(features));
849 #if defined(SC_ADDRESS_SANITIZER)
850  strlcat(features, "ASAN ", sizeof(features));
851 #endif
852 #if defined(HAVE_POPCNT64)
853  strlcat(features, "POPCNT64 ", sizeof(features));
854 #endif
855  if (strlen(features) == 0) {
856  strlcat(features, "none", sizeof(features));
857  }
858 
859  printf("Features: %s\n", features);
860 
861  /* SIMD stuff */
862  memset(features, 0x00, sizeof(features));
863 #if defined(__SSE4_2__)
864  strlcat(features, "SSE_4_2 ", sizeof(features));
865 #endif
866 #if defined(__SSE4_1__)
867  strlcat(features, "SSE_4_1 ", sizeof(features));
868 #endif
869 #if defined(__SSE3__)
870  strlcat(features, "SSE_3 ", sizeof(features));
871 #endif
872 #if defined(__SSE2__)
873  strlcat(features, "SSE_2 ", sizeof(features));
874 #endif
875  if (strlen(features) == 0) {
876  strlcat(features, "none", sizeof(features));
877  }
878  printf("SIMD support: %s\n", features);
879 
880  /* atomics stuff */
881  memset(features, 0x00, sizeof(features));
882 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_1)
883  strlcat(features, "1 ", sizeof(features));
884 #endif
885 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_2)
886  strlcat(features, "2 ", sizeof(features));
887 #endif
888 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_4)
889  strlcat(features, "4 ", sizeof(features));
890 #endif
891 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_8)
892  strlcat(features, "8 ", sizeof(features));
893 #endif
894 #if defined(__GCC_HAVE_SYNC_COMPARE_AND_SWAP_16)
895  strlcat(features, "16 ", sizeof(features));
896 #endif
897  if (strlen(features) == 0) {
898  strlcat(features, "none", sizeof(features));
899  } else {
900  strlcat(features, "byte(s)", sizeof(features));
901  }
902  printf("Atomic intrinsics: %s\n", features);
903 
904 #if __WORDSIZE == 64
905  bits = "64-bits";
906 #elif __WORDSIZE == 32
907  bits = "32-bits";
908 #else
909  bits = "<unknown>-bits";
910 #endif
911 
912 #if __BYTE_ORDER == __BIG_ENDIAN
913  endian = "Big-endian";
914 #elif __BYTE_ORDER == __LITTLE_ENDIAN
915  endian = "Little-endian";
916 #else
917  endian = "<unknown>-endian";
918 #endif
919 
920  printf("%s, %s architecture\n", bits, endian);
921 #ifdef __GNUC__
922  printf("GCC version %s, C version %"PRIiMAX"\n", __VERSION__, (intmax_t)__STDC_VERSION__);
923 #else
924  printf("C version %"PRIiMAX"\n", (intmax_t)__STDC_VERSION__);
925 #endif
926 
927 #if __SSP__ == 1
928  printf("compiled with -fstack-protector\n");
929 #endif
930 #if __SSP_ALL__ == 2
931  printf("compiled with -fstack-protector-all\n");
932 #endif
933 /*
934  * Workaround for special defines of _FORTIFY_SOURCE like
935  * FORTIFY_SOURCE=((defined __OPTIMIZE && OPTIMIZE > 0) ? 2 : 0)
936  * which is used by Gentoo for example and would result in the error
937  * 'defined' undeclared when _FORTIFY_SOURCE used via %d in printf func
938  *
939  */
940 #if _FORTIFY_SOURCE == 2
941  printf("compiled with _FORTIFY_SOURCE=2\n");
942 #elif _FORTIFY_SOURCE == 1
943  printf("compiled with _FORTIFY_SOURCE=1\n");
944 #elif _FORTIFY_SOURCE == 0
945  printf("compiled with _FORTIFY_SOURCE=0\n");
946 #endif
947 #ifdef CLS
948  printf("L1 cache line size (CLS)=%d\n", CLS);
949 #endif
950 #if defined(TLS_C11)
951  tls = "_Thread_local";
952 #elif defined(TLS_GNU)
953  tls = "__thread";
954 #else
955 #error "Unsupported thread local"
956 #endif
957  printf("thread local storage method: %s\n", tls);
958 
959  printf("compiled with %s\n", htp_get_version());
960  printf("\n");
961 #include "build-info.h"
962 }
963 
967 
969 {
970  /* commanders */
972  /* managers */
976  /* nfq */
980  /* ipfw */
984  /* pcap live */
987  /* pcap file */
990  /* af-packet */
993  /* af-xdp */
996  /* netmap */
999  /* dag file */
1002  /* dag live */
1005 
1006  /* flow worker */
1008  /* respond-reject */
1010 
1011  /* log api */
1014 
1016  /* nflog */
1019 
1020  /* windivert */
1024 
1025  /* Dpdk */
1028 
1029  /* Library */
1031 }
1032 
1034 {
1035  SCEnter();
1036 
1037  SCInstance *suri = &suricata;
1038 
1039  if (suri->conf_filename == NULL)
1041 
1042  if (SCConfYamlLoadFile(suri->conf_filename) != 0) {
1043  /* Error already displayed. */
1045  }
1046 
1047  if (suri->additional_configs) {
1048  for (int i = 0; suri->additional_configs[i] != NULL; i++) {
1049  SCLogConfig("Loading additional configuration file %s", suri->additional_configs[i]);
1051  }
1052  }
1053 
1055 }
1056 
1057 static TmEcode ParseInterfacesList(const int runmode, char *pcap_dev)
1058 {
1059  SCEnter();
1060 
1061  /* run the selected runmode */
1062  if (runmode == RUNMODE_PCAP_DEV) {
1063  if (strlen(pcap_dev) == 0) {
1064  int ret = LiveBuildDeviceList("pcap");
1065  if (ret == 0) {
1066  SCLogError("No interface found in config for pcap");
1068  }
1069  }
1070  } else if (runmode == RUNMODE_PLUGIN) {
1071  if (strcmp(suricata.capture_plugin_name, "pfring") == 0) {
1072  /* Special handling for pfring. */
1073  if (strlen(pcap_dev)) {
1074  if (SCConfSetFinal("pfring.live-interface", pcap_dev) != 1) {
1075  SCLogError("Failed to set pfring.live-interface");
1077  }
1078  }
1079  }
1080 #ifdef HAVE_DPDK
1081  } else if (runmode == RUNMODE_DPDK) {
1082  char iface_selector[] = "dpdk.interfaces";
1083  int ret = LiveBuildDeviceList(iface_selector);
1084  if (ret == 0) {
1085  SCLogError("No interface found in config for %s", iface_selector);
1087  }
1088 #endif
1089 #ifdef HAVE_AF_PACKET
1090  } else if (runmode == RUNMODE_AFP_DEV) {
1091  /* iface has been set on command line */
1092  if (strlen(pcap_dev)) {
1093  if (SCConfSetFinal("af-packet.live-interface", pcap_dev) != 1) {
1094  SCLogError("Failed to set af-packet.live-interface");
1096  }
1097  } else {
1098  int ret = LiveBuildDeviceList("af-packet");
1099  if (ret == 0) {
1100  SCLogError("No interface found in config for af-packet");
1102  }
1103  }
1104 #endif
1105 #ifdef HAVE_AF_XDP
1106  } else if (runmode == RUNMODE_AFXDP_DEV) {
1107  /* iface has been set on command line */
1108  if (strlen(pcap_dev)) {
1109  if (SCConfSetFinal("af-xdp.live-interface", pcap_dev) != 1) {
1110  SCLogError("Failed to set af-xdp.live-interface");
1112  }
1113  } else {
1114  int ret = LiveBuildDeviceList("af-xdp");
1115  if (ret == 0) {
1116  SCLogError("No interface found in config for af-xdp");
1118  }
1119  }
1120 #endif
1121 #ifdef HAVE_NETMAP
1122  } else if (runmode == RUNMODE_NETMAP) {
1123  /* iface has been set on command line */
1124  if (strlen(pcap_dev)) {
1125  if (SCConfSetFinal("netmap.live-interface", pcap_dev) != 1) {
1126  SCLogError("Failed to set netmap.live-interface");
1128  }
1129  } else {
1130  int ret = LiveBuildDeviceList("netmap");
1131  if (ret == 0) {
1132  SCLogError("No interface found in config for netmap");
1134  }
1135  }
1136 #endif
1137 #ifdef HAVE_NFLOG
1138  } else if (runmode == RUNMODE_NFLOG) {
1139  int ret = LiveBuildDeviceListCustom("nflog", "group");
1140  if (ret == 0) {
1141  SCLogError("No group found in config for nflog");
1143  }
1144 #endif
1145  }
1146 
1148 }
1149 
1150 static void SCInstanceInit(SCInstance *suri, const char *progname)
1151 {
1152  memset(suri, 0x00, sizeof(*suri));
1153 
1154  suri->progname = progname;
1155  suri->run_mode = RUNMODE_UNKNOWN;
1156 
1157  memset(suri->pcap_dev, 0, sizeof(suri->pcap_dev));
1158  suri->sig_file = NULL;
1159  suri->sig_file_exclusive = false;
1160  suri->pid_filename = NULL;
1161  suri->regex_arg = NULL;
1162 
1163  suri->keyword_info = NULL;
1164  suri->runmode_custom_mode = NULL;
1165 #ifndef OS_WIN32
1166  suri->user_name = NULL;
1167  suri->group_name = NULL;
1168  suri->do_setuid = false;
1169  suri->do_setgid = false;
1170 #endif /* OS_WIN32 */
1171  suri->userid = 0;
1172  suri->groupid = 0;
1173  suri->delayed_detect = 0;
1174  suri->daemon = 0;
1175  suri->offline = 0;
1176  suri->verbose = 0;
1177  /* use -1 as unknown */
1178  suri->checksum_validation = -1;
1179 #if HAVE_DETECT_DISABLED==1
1180  g_detect_disabled = suri->disabled_detect = 1;
1181 #else
1182  g_detect_disabled = suri->disabled_detect = 0;
1183 #endif
1184 }
1185 
1186 const char *GetDocURL(void)
1187 {
1188  const char *prog_ver = GetProgramVersion();
1189  if (strstr(prog_ver, "RELEASE") != NULL) {
1190  return DOC_URL "suricata-" PROG_VER;
1191  }
1192  return DOC_URL "latest";
1193 }
1194 
1195 /** \brief get string with program version
1196  *
1197  * Get the program version as passed to us from AC_INIT
1198  *
1199  * Add 'RELEASE' is no '-dev' in the version. Add the REVISION if passed
1200  * to us.
1201  *
1202  * Possible outputs:
1203  * release: '5.0.1 RELEASE'
1204  * dev with rev: '5.0.1-dev (64a789bbf 2019-10-18)'
1205  * dev w/o rev: '5.0.1-dev'
1206  */
1207 const char *GetProgramVersion(void)
1208 {
1209  if (strstr(PROG_VER, "-dev") == NULL) {
1210  return PROG_VER " RELEASE";
1211  } else {
1212 #ifdef REVISION
1213  return PROG_VER " (" xstr(REVISION) ")";
1214 #else
1215  return PROG_VER;
1216 #endif
1217  }
1218 }
1219 
1220 static TmEcode PrintVersion(void)
1221 {
1222  printf("This is %s version %s\n", PROG_NAME, GetProgramVersion());
1223  return TM_ECODE_OK;
1224 }
1225 
1226 static TmEcode LogVersion(SCInstance *suri)
1227 {
1228  const char *mode = suri->system ? "SYSTEM" : "USER";
1229  SCLogNotice("This is %s version %s running in %s mode",
1230  PROG_NAME, GetProgramVersion(), mode);
1231  return TM_ECODE_OK;
1232 }
1233 
1234 static void SCSetStartTime(SCInstance *suri)
1235 {
1236  memset(&suri->start_time, 0, sizeof(suri->start_time));
1237  gettimeofday(&suri->start_time, NULL);
1238 }
1239 
1240 static void SCPrintElapsedTime(struct timeval *start_time)
1241 {
1242  if (start_time == NULL)
1243  return;
1244  struct timeval end_time;
1245  memset(&end_time, 0, sizeof(end_time));
1246  gettimeofday(&end_time, NULL);
1247  uint64_t milliseconds = ((end_time.tv_sec - start_time->tv_sec) * 1000) +
1248  (((1000000 + end_time.tv_usec - start_time->tv_usec) / 1000) - 1000);
1249  SCLogInfo("time elapsed %.3fs", (float)milliseconds/(float)1000);
1250 }
1251 
1252 static int ParseCommandLineAfpacket(SCInstance *suri, const char *in_arg)
1253 {
1254 #ifdef HAVE_AF_PACKET
1255  if (suri->run_mode == RUNMODE_UNKNOWN) {
1256  suri->run_mode = RUNMODE_AFP_DEV;
1257  if (in_arg) {
1258  LiveRegisterDeviceName(in_arg);
1259  memset(suri->pcap_dev, 0, sizeof(suri->pcap_dev));
1260  strlcpy(suri->pcap_dev, in_arg, sizeof(suri->pcap_dev));
1261  }
1262  } else if (suri->run_mode == RUNMODE_AFP_DEV) {
1263  if (in_arg) {
1264  LiveRegisterDeviceName(in_arg);
1265  } else {
1266  SCLogInfo("Multiple af-packet option without interface on each is useless");
1267  }
1268  } else {
1269  SCLogError("more than one run mode "
1270  "has been specified");
1271  PrintUsage(suri->progname);
1272  return TM_ECODE_FAILED;
1273  }
1274  return TM_ECODE_OK;
1275 #else
1276  SCLogError("AF_PACKET not enabled. On Linux "
1277  "host, make sure to pass --enable-af-packet to "
1278  "configure when building.");
1279  return TM_ECODE_FAILED;
1280 #endif
1281 }
1282 
1283 static int ParseCommandLineAfxdp(SCInstance *suri, const char *in_arg)
1284 {
1285 #ifdef HAVE_AF_XDP
1286  if (suri->run_mode == RUNMODE_UNKNOWN) {
1287  suri->run_mode = RUNMODE_AFXDP_DEV;
1288  if (in_arg) {
1289  LiveRegisterDeviceName(in_arg);
1290  memset(suri->pcap_dev, 0, sizeof(suri->pcap_dev));
1291  strlcpy(suri->pcap_dev, in_arg, sizeof(suri->pcap_dev));
1292  }
1293  } else if (suri->run_mode == RUNMODE_AFXDP_DEV) {
1294  if (in_arg) {
1295  LiveRegisterDeviceName(in_arg);
1296  } else {
1297  SCLogInfo("Multiple af-xdp options without interface on each is useless");
1298  }
1299  } else {
1300  SCLogError("more than one run mode "
1301  "has been specified");
1302  PrintUsage(suri->progname);
1303  return TM_ECODE_FAILED;
1304  }
1305  return TM_ECODE_OK;
1306 #else
1307  SCLogError("AF_XDP not enabled. On Linux "
1308  "host, make sure correct libraries are installed,"
1309  " see documentation for information.");
1310  return TM_ECODE_FAILED;
1311 #endif
1312 }
1313 
1314 static int ParseCommandLineDpdk(SCInstance *suri, const char *in_arg)
1315 {
1316 #ifdef HAVE_DPDK
1317  if (suri->run_mode == RUNMODE_UNKNOWN) {
1318  suri->run_mode = RUNMODE_DPDK;
1319  } else if (suri->run_mode == RUNMODE_DPDK) {
1320  SCLogInfo("Multiple dpdk options have no effect on Suricata");
1321  } else {
1322  SCLogError("more than one run mode "
1323  "has been specified");
1324  PrintUsage(suri->progname);
1325  return TM_ECODE_FAILED;
1326  }
1327  return TM_ECODE_OK;
1328 #else
1329  SCLogError("DPDK not enabled. On Linux "
1330  "host, make sure to pass --enable-dpdk to "
1331  "configure when building.");
1332  return TM_ECODE_FAILED;
1333 #endif
1334 }
1335 
1336 static int ParseCommandLinePcapLive(SCInstance *suri, const char *in_arg)
1337 {
1338 #if defined(OS_WIN32) && !defined(HAVE_LIBWPCAP)
1339  /* If running on Windows without Npcap, bail early as live capture is not supported. */
1340  FatalError("Live capture not available. To support live capture compile against Npcap.");
1341 #endif
1342  memset(suri->pcap_dev, 0, sizeof(suri->pcap_dev));
1343 
1344  if (in_arg != NULL) {
1345  /* some windows shells require escaping of the \ in \Device. Otherwise
1346  * the backslashes are stripped. We put them back here. */
1347  if (strlen(in_arg) > 9 && strncmp(in_arg, "DeviceNPF", 9) == 0) {
1348  snprintf(suri->pcap_dev, sizeof(suri->pcap_dev), "\\Device\\NPF%s", in_arg+9);
1349  } else {
1350  strlcpy(suri->pcap_dev, in_arg, sizeof(suri->pcap_dev));
1351  PcapTranslateIPToDevice(suri->pcap_dev, sizeof(suri->pcap_dev));
1352  }
1353 
1354  if (strcmp(suri->pcap_dev, in_arg) != 0) {
1355  SCLogInfo("translated %s to pcap device %s", in_arg, suri->pcap_dev);
1356  } else if (strlen(suri->pcap_dev) > 0 && isdigit((unsigned char)suri->pcap_dev[0])) {
1357  SCLogError("failed to find a pcap device for IP %s", in_arg);
1358  return TM_ECODE_FAILED;
1359  }
1360  }
1361 
1362  if (suri->run_mode == RUNMODE_UNKNOWN) {
1363  suri->run_mode = RUNMODE_PCAP_DEV;
1364  if (in_arg) {
1366  }
1367  } else if (suri->run_mode == RUNMODE_PCAP_DEV) {
1369  } else {
1370  SCLogError("more than one run mode "
1371  "has been specified");
1372  PrintUsage(suri->progname);
1373  return TM_ECODE_FAILED;
1374  }
1375  return TM_ECODE_OK;
1376 }
1377 
1378 /**
1379  * Helper function to check if log directory is writable
1380  */
1381 static bool IsLogDirectoryWritable(const char* str)
1382 {
1383  return access(str, W_OK) == 0;
1384 }
1385 
1386 /**
1387  * Helper functions to append option values to an array where the
1388  * option is allowed multiple times. For example:
1389  * - --include
1390  * - --plugin
1391  */
1392 static void AddCommandLineOptionValue(
1393  const char ***values, const char *value, const char *description)
1394 {
1395  if (*values == NULL) {
1396  *values = SCCalloc(2, sizeof(char *));
1397  if (*values == NULL) {
1398  FatalError("Failed to allocate memory for %s: %s", description, strerror(errno));
1399  }
1400  (*values)[0] = value;
1401  } else {
1402  for (int i = 0;; i++) {
1403  if ((*values)[i] == NULL) {
1404  const char **new_values = SCRealloc(*values, (i + 2) * sizeof(char *));
1405  if (new_values == NULL) {
1406  FatalError(
1407  "Failed to allocate memory for %s: %s", description, strerror(errno));
1408  }
1409  *values = new_values;
1410  (*values)[i] = value;
1411  (*values)[i + 1] = NULL;
1412  break;
1413  }
1414  }
1415  }
1416 }
1417 
1418 extern int g_skip_prefilter;
1419 
1420 TmEcode SCParseCommandLine(int argc, char **argv)
1421 {
1422  SCInstance *suri = &suricata;
1423  int opt;
1424 
1425  int dump_config = 0;
1426  int dump_features = 0;
1427  int list_app_layer_protocols = 0;
1428  int list_rule_protocols = 0;
1429  int list_app_layer_hooks = 0;
1430  int list_app_layer_frames = 0;
1431  int list_unittests = 0;
1432  int list_runmodes = 0;
1433  int list_keywords = 0;
1434  int build_info = 0;
1435  int conf_test = 0;
1436  int engine_analysis = 0;
1437  int ret = TM_ECODE_OK;
1438  int is_firewall = 0;
1439 
1440 #ifdef UNITTESTS
1441  coverage_unittests = 0;
1442  g_ut_modules = 0;
1443  g_ut_covered = 0;
1444 #endif
1445 
1446  // clang-format off
1447  struct option long_opts[] = {
1448  {"help", 0, 0, 0},
1449  {"dump-config", 0, &dump_config, 1},
1450  {"dump-features", 0, &dump_features, 1},
1451  {"pfring", optional_argument, 0, 0},
1452  {"pfring-int", required_argument, 0, 0},
1453  {"pfring-cluster-id", required_argument, 0, 0},
1454  {"pfring-cluster-type", required_argument, 0, 0},
1455 #ifdef HAVE_DPDK
1456  {"dpdk", 0, 0, 0},
1457 #endif
1458  {"af-packet", optional_argument, 0, 0},
1459  {"af-xdp", optional_argument, 0, 0},
1460  {"netmap", optional_argument, 0, 0},
1461  {"pcap", optional_argument, 0, 0},
1462  {"pcap-file-continuous", 0, 0, 0},
1463  {"pcap-file-delete", 0, 0, 0},
1464  {"pcap-file-recursive", 0, 0, 0},
1465  {"pcap-file-buffer-size", required_argument, 0, 0},
1466  {"simulate-ips", 0, 0 , 0},
1467  {"no-random", 0, &g_disable_randomness, 1},
1468  {"strict-rule-keywords", optional_argument, 0, 0},
1469 
1470  {"plugin", required_argument, 0, 0},
1471  {"capture-plugin", required_argument, 0, 0},
1472  {"capture-plugin-args", required_argument, 0, 0},
1473 
1474 #ifdef BUILD_UNIX_SOCKET
1475  {"unix-socket", optional_argument, 0, 0},
1476 #endif
1477  {"pcap-buffer-size", required_argument, 0, 0},
1478  {"unittest-filter", required_argument, 0, 'U'},
1479  {"list-app-layer-protos", 0, &list_app_layer_protocols, 1},
1480  {"list-rule-protos", 0, &list_rule_protocols, 1},
1481  {"list-app-layer-hooks", 0, &list_app_layer_hooks, 1},
1482  {"list-app-layer-frames", 0, &list_app_layer_frames, 1},
1483  {"list-unittests", 0, &list_unittests, 1},
1484  {"list-runmodes", 0, &list_runmodes, 1},
1485  {"list-keywords", optional_argument, &list_keywords, 1},
1486  {"runmode", required_argument, NULL, 0},
1487  {"engine-analysis", 0, &engine_analysis, 1},
1488 #ifdef OS_WIN32
1489  {"service-install", 0, 0, 0},
1490  {"service-remove", 0, 0, 0},
1491  {"service-change-params", 0, 0, 0},
1492 #endif /* OS_WIN32 */
1493  {"pidfile", required_argument, 0, 0},
1494  {"init-errors-fatal", 0, 0, 0},
1495  {"disable-detection", 0, 0, 0},
1496  {"disable-hashing", 0, 0, 0},
1497  {"fatal-unittests", 0, 0, 0},
1498  {"unittests-coverage", 0, &coverage_unittests, 1},
1499  {"user", required_argument, 0, 0},
1500  {"group", required_argument, 0, 0},
1501  {"erf-in", required_argument, 0, 0},
1502  {"dag", required_argument, 0, 0},
1503  {"build-info", 0, &build_info, 1},
1504  {"data-dir", required_argument, 0, 0},
1505 #ifdef WINDIVERT
1506  {"windivert", required_argument, 0, 0},
1507  {"windivert-forward", required_argument, 0, 0},
1508 #endif
1509 #ifdef HAVE_LIBNET11
1510  {"reject-dev", required_argument, 0, 0},
1511 #endif
1512  {"set", required_argument, 0, 0},
1513 #ifdef HAVE_NFLOG
1514  {"nflog", optional_argument, 0, 0},
1515 #endif
1516  {"simulate-packet-flow-memcap", required_argument, 0, 0},
1517  {"simulate-applayer-error-at-offset-ts", required_argument, 0, 0},
1518  {"simulate-applayer-error-at-offset-tc", required_argument, 0, 0},
1519  {"simulate-packet-loss", required_argument, 0, 0},
1520  {"simulate-packet-tcp-reassembly-memcap", required_argument, 0, 0},
1521  {"simulate-packet-tcp-ssn-memcap", required_argument, 0, 0},
1522  {"simulate-packet-defrag-memcap", required_argument, 0, 0},
1523  {"simulate-alert-queue-realloc-failure", 0, 0, 0},
1524 
1525  {"qa-skip-prefilter", 0, &g_skip_prefilter, 1 },
1526 
1527  {"firewall", 0, &is_firewall, 1 },
1528  {"firewall-rules-exclusive", required_argument, 0, 0},
1529 
1530  {"include", required_argument, 0, 0},
1531 
1532  {NULL, 0, NULL, 0}
1533  };
1534  // clang-format on
1535 
1536  /* getopt_long stores the option index here. */
1537  int option_index = 0;
1538 
1539  char short_opts[] = "c:TDhi:l:q:d:r:us:S:U:VF:vk:";
1540 
1541  while ((opt = getopt_long(argc, argv, short_opts, long_opts, &option_index)) != -1) {
1542  switch (opt) {
1543  case 0:
1544  if (strcmp((long_opts[option_index]).name, "help") == 0) {
1545  suri->run_mode = RUNMODE_PRINT_USAGE;
1546  return TM_ECODE_OK;
1547  } else if (strcmp((long_opts[option_index]).name, "pfring") == 0 ||
1548  strcmp((long_opts[option_index]).name, "pfring-int") == 0) {
1549 #ifdef HAVE_PFRING
1550  /* TODO: Which plugin? */
1551  suri->run_mode = RUNMODE_PLUGIN;
1552  suri->capture_plugin_name = "pfring";
1553  if (optarg != NULL) {
1554  memset(suri->pcap_dev, 0, sizeof(suri->pcap_dev));
1555  strlcpy(suri->pcap_dev, optarg,
1556  ((strlen(optarg) < sizeof(suri->pcap_dev)) ?
1557  (strlen(optarg) + 1) : sizeof(suri->pcap_dev)));
1558  LiveRegisterDeviceName(optarg);
1559  }
1560 #else
1561  SCLogError("PF_RING not enabled. Make sure "
1562  "to pass --enable-pfring to configure when building.");
1563  return TM_ECODE_FAILED;
1564 #endif /* HAVE_PFRING */
1565  } else if (strcmp((long_opts[option_index]).name, "pfring-cluster-id") == 0) {
1566 #ifdef HAVE_PFRING
1567  if (SCConfSetFinal("pfring.cluster-id", optarg) != 1) {
1568  SCLogError("failed to set pfring.cluster-id");
1569  return TM_ECODE_FAILED;
1570  }
1571 #else
1572  SCLogError("PF_RING not enabled. Make sure "
1573  "to pass --enable-pfring to configure when building.");
1574  return TM_ECODE_FAILED;
1575 #endif /* HAVE_PFRING */
1576  } else if (strcmp((long_opts[option_index]).name, "pfring-cluster-type") == 0) {
1577 #ifdef HAVE_PFRING
1578  if (SCConfSetFinal("pfring.cluster-type", optarg) != 1) {
1579  SCLogError("failed to set pfring.cluster-type");
1580  return TM_ECODE_FAILED;
1581  }
1582 #else
1583  SCLogError("PF_RING not enabled. Make sure "
1584  "to pass --enable-pfring to configure when building.");
1585  return TM_ECODE_FAILED;
1586 #endif /* HAVE_PFRING */
1587  } else if (strcmp((long_opts[option_index]).name, "plugin") == 0) {
1588  AddCommandLineOptionValue(&suri->additional_plugins, optarg, "additional plugins");
1589  } else if (strcmp((long_opts[option_index]).name, "capture-plugin") == 0) {
1590  suri->run_mode = RUNMODE_PLUGIN;
1591  suri->capture_plugin_name = optarg;
1592  } else if (strcmp((long_opts[option_index]).name, "capture-plugin-args") == 0) {
1593  suri->capture_plugin_args = optarg;
1594  } else if (strcmp((long_opts[option_index]).name, "dpdk") == 0) {
1595  if (ParseCommandLineDpdk(suri, optarg) != TM_ECODE_OK) {
1596  return TM_ECODE_FAILED;
1597  }
1598  } else if (strcmp((long_opts[option_index]).name, "af-packet") == 0) {
1599  if (ParseCommandLineAfpacket(suri, optarg) != TM_ECODE_OK) {
1600  return TM_ECODE_FAILED;
1601  }
1602  } else if (strcmp((long_opts[option_index]).name, "af-xdp") == 0) {
1603  if (ParseCommandLineAfxdp(suri, optarg) != TM_ECODE_OK) {
1604  return TM_ECODE_FAILED;
1605  }
1606  } else if (strcmp((long_opts[option_index]).name, "netmap") == 0) {
1607 #ifdef HAVE_NETMAP
1608  if (suri->run_mode == RUNMODE_UNKNOWN) {
1609  suri->run_mode = RUNMODE_NETMAP;
1610  if (optarg) {
1611  LiveRegisterDeviceName(optarg);
1612  memset(suri->pcap_dev, 0, sizeof(suri->pcap_dev));
1613  strlcpy(suri->pcap_dev, optarg,
1614  ((strlen(optarg) < sizeof(suri->pcap_dev)) ?
1615  (strlen(optarg) + 1) : sizeof(suri->pcap_dev)));
1616  }
1617  } else if (suri->run_mode == RUNMODE_NETMAP) {
1618  if (optarg) {
1619  LiveRegisterDeviceName(optarg);
1620  } else {
1621  SCLogInfo("Multiple netmap option without interface on each is useless");
1622  break;
1623  }
1624  } else {
1625  SCLogError("more than one run mode "
1626  "has been specified");
1627  PrintUsage(argv[0]);
1628  return TM_ECODE_FAILED;
1629  }
1630 #else
1631  SCLogError("NETMAP not enabled.");
1632  return TM_ECODE_FAILED;
1633 #endif
1634  } else if (strcmp((long_opts[option_index]).name, "nflog") == 0) {
1635 #ifdef HAVE_NFLOG
1636  if (suri->run_mode == RUNMODE_UNKNOWN) {
1637  suri->run_mode = RUNMODE_NFLOG;
1638  LiveBuildDeviceListCustom("nflog", "group");
1639  }
1640 #else
1641  SCLogError("NFLOG not enabled.");
1642  return TM_ECODE_FAILED;
1643 #endif /* HAVE_NFLOG */
1644  } else if (strcmp((long_opts[option_index]).name, "pcap") == 0) {
1645  if (ParseCommandLinePcapLive(suri, optarg) != TM_ECODE_OK) {
1646  return TM_ECODE_FAILED;
1647  }
1648  } else if (strcmp((long_opts[option_index]).name, "simulate-ips") == 0) {
1649  SCLogInfo("Setting IPS mode");
1650  EngineModeSetIPS();
1651  } else if (strcmp((long_opts[option_index]).name, "init-errors-fatal") == 0) {
1652  if (SCConfSetFinal("engine.init-failure-fatal", "1") != 1) {
1653  SCLogError("failed to set engine init-failure-fatal");
1654  return TM_ECODE_FAILED;
1655  }
1656 #ifdef BUILD_UNIX_SOCKET
1657  } else if (strcmp((long_opts[option_index]).name , "unix-socket") == 0) {
1658  if (suri->run_mode == RUNMODE_UNKNOWN) {
1659  suri->run_mode = RUNMODE_UNIX_SOCKET;
1660  if (optarg) {
1661  if (SCConfSetFinal("unix-command.filename", optarg) != 1) {
1662  SCLogError("failed to set unix-command.filename");
1663  return TM_ECODE_FAILED;
1664  }
1665  }
1666  } else {
1667  SCLogError("more than one run mode "
1668  "has been specified");
1669  PrintUsage(argv[0]);
1670  return TM_ECODE_FAILED;
1671  }
1672 #endif
1673  }
1674  else if(strcmp((long_opts[option_index]).name, "list-app-layer-protocols") == 0) {
1675  /* listing all supported app layer protocols */
1676  } else if (strcmp((long_opts[option_index]).name, "list-app-layer-hooks") == 0) {
1677  /* listing all supported app layer hooks */
1678  } else if (strcmp((long_opts[option_index]).name, "list-unittests") == 0) {
1679 #ifdef UNITTESTS
1681 #else
1682  SCLogError("unit tests not enabled. Make sure to pass --enable-unittests to "
1683  "configure when building");
1684  return TM_ECODE_FAILED;
1685 #endif /* UNITTESTS */
1686  } else if (strcmp((long_opts[option_index]).name, "list-runmodes") == 0) {
1688  return TM_ECODE_OK;
1689  } else if (strcmp((long_opts[option_index]).name, "list-keywords") == 0) {
1690  if (optarg) {
1691  if (strcmp("short", optarg) != 0) {
1692  suri->keyword_info = optarg;
1693  }
1694  }
1695  } else if (strcmp((long_opts[option_index]).name, "runmode") == 0) {
1696  suri->runmode_custom_mode = optarg;
1697  } else if (strcmp((long_opts[option_index]).name, "engine-analysis") == 0) {
1698  // do nothing for now
1699  }
1700 #ifdef OS_WIN32
1701  else if (strcmp((long_opts[option_index]).name, "service-install") == 0) {
1702  suri->run_mode = RUNMODE_INSTALL_SERVICE;
1703  return TM_ECODE_OK;
1704  } else if (strcmp((long_opts[option_index]).name, "service-remove") == 0) {
1705  suri->run_mode = RUNMODE_REMOVE_SERVICE;
1706  return TM_ECODE_OK;
1707  } else if (strcmp((long_opts[option_index]).name, "service-change-params") == 0) {
1708  suri->run_mode = RUNMODE_CHANGE_SERVICE_PARAMS;
1709  return TM_ECODE_OK;
1710  }
1711 #endif /* OS_WIN32 */
1712  else if (strcmp((long_opts[option_index]).name, "pidfile") == 0) {
1713  suri->pid_filename = SCStrdup(optarg);
1714  if (suri->pid_filename == NULL) {
1715  SCLogError("strdup failed: %s", strerror(errno));
1716  return TM_ECODE_FAILED;
1717  }
1718  } else if (strcmp((long_opts[option_index]).name, "disable-detection") == 0) {
1719  g_detect_disabled = suri->disabled_detect = 1;
1720  } else if (strcmp((long_opts[option_index]).name, "disable-hashing") == 0) {
1721  g_disable_hashing = true;
1722  // for rust
1723  SCDisableHashing();
1724  } else if (strcmp((long_opts[option_index]).name, "fatal-unittests") == 0) {
1725 #ifdef UNITTESTS
1726  unittests_fatal = 1;
1727 #else
1728  SCLogError("unit tests not enabled. Make sure to pass --enable-unittests to "
1729  "configure when building");
1730  return TM_ECODE_FAILED;
1731 #endif /* UNITTESTS */
1732  } else if (strcmp((long_opts[option_index]).name, "user") == 0) {
1733 #ifndef HAVE_LIBCAP_NG
1734  SCLogError("libcap-ng is required to"
1735  " drop privileges, but it was not compiled into Suricata.");
1736  return TM_ECODE_FAILED;
1737 #else
1738  suri->user_name = optarg;
1739  suri->do_setuid = true;
1740 #endif /* HAVE_LIBCAP_NG */
1741  } else if (strcmp((long_opts[option_index]).name, "group") == 0) {
1742 #ifndef HAVE_LIBCAP_NG
1743  SCLogError("libcap-ng is required to"
1744  " drop privileges, but it was not compiled into Suricata.");
1745  return TM_ECODE_FAILED;
1746 #else
1747  suri->group_name = optarg;
1748  suri->do_setgid = true;
1749 #endif /* HAVE_LIBCAP_NG */
1750  } else if (strcmp((long_opts[option_index]).name, "erf-in") == 0) {
1751  suri->run_mode = RUNMODE_ERF_FILE;
1752  if (SCConfSetFinal("erf-file.file", optarg) != 1) {
1753  SCLogError("failed to set erf-file.file");
1754  return TM_ECODE_FAILED;
1755  }
1756  } else if (strcmp((long_opts[option_index]).name, "dag") == 0) {
1757 #ifdef HAVE_DAG
1758  if (suri->run_mode == RUNMODE_UNKNOWN) {
1759  suri->run_mode = RUNMODE_DAG;
1760  }
1761  else if (suri->run_mode != RUNMODE_DAG) {
1762  SCLogError("more than one run mode has been specified");
1763  PrintUsage(argv[0]);
1764  return TM_ECODE_FAILED;
1765  }
1766  LiveRegisterDeviceName(optarg);
1767 #else
1768  SCLogError("libdag and a DAG card are required"
1769  " to receive packets using --dag.");
1770  return TM_ECODE_FAILED;
1771 #endif /* HAVE_DAG */
1772  } else if (strcmp((long_opts[option_index]).name, "napatech") == 0) {
1773 #ifdef HAVE_NAPATECH
1774  suri->run_mode = RUNMODE_PLUGIN;
1775 #else
1776  SCLogError("libntapi and a Napatech adapter are required"
1777  " to capture packets using --napatech.");
1778  return TM_ECODE_FAILED;
1779 #endif /* HAVE_NAPATECH */
1780  } else if (strcmp((long_opts[option_index]).name, "pcap-buffer-size") == 0) {
1781 #ifdef HAVE_PCAP_SET_BUFF
1782  if (SCConfSetFinal("pcap.buffer-size", optarg) != 1) {
1783  SCLogError("failed to set pcap-buffer-size");
1784  return TM_ECODE_FAILED;
1785  }
1786 #else
1787  SCLogError("The version of libpcap you have"
1788  " doesn't support setting buffer size.");
1789 #endif /* HAVE_PCAP_SET_BUFF */
1790  } else if (strcmp((long_opts[option_index]).name, "build-info") == 0) {
1792  return TM_ECODE_OK;
1793  } else if (strcmp((long_opts[option_index]).name, "windivert-forward") == 0) {
1794 #ifdef WINDIVERT
1795  if (suri->run_mode == RUNMODE_UNKNOWN) {
1796  suri->run_mode = RUNMODE_WINDIVERT;
1797  if (WinDivertRegisterQueue(true, optarg) == -1) {
1798  exit(EXIT_FAILURE);
1799  }
1800  } else if (suri->run_mode == RUNMODE_WINDIVERT) {
1801  if (WinDivertRegisterQueue(true, optarg) == -1) {
1802  exit(EXIT_FAILURE);
1803  }
1804  } else {
1805  SCLogError("more than one run mode "
1806  "has been specified");
1807  PrintUsage(argv[0]);
1808  exit(EXIT_FAILURE);
1809  }
1810  }
1811  else if(strcmp((long_opts[option_index]).name, "windivert") == 0) {
1812  if (suri->run_mode == RUNMODE_UNKNOWN) {
1813  suri->run_mode = RUNMODE_WINDIVERT;
1814  if (WinDivertRegisterQueue(false, optarg) == -1) {
1815  exit(EXIT_FAILURE);
1816  }
1817  } else if (suri->run_mode == RUNMODE_WINDIVERT) {
1818  if (WinDivertRegisterQueue(false, optarg) == -1) {
1819  exit(EXIT_FAILURE);
1820  }
1821  } else {
1822  SCLogError("more than one run mode "
1823  "has been specified");
1824  PrintUsage(argv[0]);
1825  exit(EXIT_FAILURE);
1826  }
1827 #else
1828  SCLogError("WinDivert not enabled. Make sure to pass --enable-windivert to "
1829  "configure when building.");
1830  return TM_ECODE_FAILED;
1831 #endif /* WINDIVERT */
1832  } else if(strcmp((long_opts[option_index]).name, "reject-dev") == 0) {
1833 #ifdef HAVE_LIBNET11
1834  BUG_ON(optarg == NULL); /* for static analysis */
1835  extern char *g_reject_dev;
1836  extern uint16_t g_reject_dev_mtu;
1837  g_reject_dev = optarg;
1838  int mtu = GetIfaceMTU(g_reject_dev);
1839  if (mtu > 0) {
1840  g_reject_dev_mtu = (uint16_t)mtu;
1841  }
1842 #else
1843  SCLogError("Libnet 1.1 support not enabled. Compile Suricata with libnet support.");
1844  return TM_ECODE_FAILED;
1845 #endif
1846  }
1847  else if (strcmp((long_opts[option_index]).name, "set") == 0) {
1848  if (optarg != NULL) {
1849  /* Quick validation. */
1850  char *val = strchr(optarg, '=');
1851  if (val == NULL) {
1852  FatalError("Invalid argument for --set, must be key=val.");
1853  }
1854  if (!SCConfSetFromString(optarg, 1)) {
1855  FatalError("failed to set configuration value %s", optarg);
1856  }
1857  }
1858  }
1859  else if (strcmp((long_opts[option_index]).name, "pcap-file-continuous") == 0) {
1860  if (SCConfSetFinal("pcap-file.continuous", "true") != 1) {
1861  SCLogError("Failed to set pcap-file.continuous");
1862  return TM_ECODE_FAILED;
1863  }
1864  }
1865  else if (strcmp((long_opts[option_index]).name, "pcap-file-delete") == 0) {
1866  if (SCConfSetFinal("pcap-file.delete-when-done", "true") != 1) {
1867  SCLogError("Failed to set pcap-file.delete-when-done");
1868  return TM_ECODE_FAILED;
1869  }
1870  }
1871  else if (strcmp((long_opts[option_index]).name, "pcap-file-recursive") == 0) {
1872  if (SCConfSetFinal("pcap-file.recursive", "true") != 1) {
1873  SCLogError("failed to set pcap-file.recursive");
1874  return TM_ECODE_FAILED;
1875  }
1876  } else if (strcmp((long_opts[option_index]).name, "pcap-file-buffer-size") == 0) {
1877  if (SCConfSetFinal("pcap-file.buffer-size", optarg) != 1) {
1878  SCLogError("failed to set pcap-file.buffer-size");
1879  return TM_ECODE_FAILED;
1880  }
1881  } else if (strcmp((long_opts[option_index]).name, "data-dir") == 0) {
1882  if (optarg == NULL) {
1883  SCLogError("no option argument (optarg) for -d");
1884  return TM_ECODE_FAILED;
1885  }
1886 
1887  if (ConfigSetDataDirectory(optarg) != TM_ECODE_OK) {
1888  SCLogError("Failed to set data directory.");
1889  return TM_ECODE_FAILED;
1890  }
1891  if (ConfigCheckDataDirectory(optarg) != TM_ECODE_OK) {
1892  SCLogError("The data directory \"%s\""
1893  " supplied at the command-line (-d %s) doesn't "
1894  "exist. Shutting down the engine.",
1895  optarg, optarg);
1896  return TM_ECODE_FAILED;
1897  }
1898  suri->set_datadir = true;
1899  } else if (strcmp((long_opts[option_index]).name, "strict-rule-keywords") == 0) {
1900  if (optarg == NULL) {
1901  suri->strict_rule_parsing_string = SCStrdup("all");
1902  } else {
1903  suri->strict_rule_parsing_string = SCStrdup(optarg);
1904  }
1905  if (suri->strict_rule_parsing_string == NULL) {
1906  FatalError("failed to duplicate 'strict' string");
1907  }
1908  } else if (strcmp((long_opts[option_index]).name, "include") == 0) {
1909  AddCommandLineOptionValue(
1910  &suri->additional_configs, optarg, "additional configuration files");
1911  } else if (strcmp((long_opts[option_index]).name, "firewall-rules-exclusive") == 0) {
1912  if (suri->firewall_rule_file != NULL) {
1913  SCLogError("can't have multiple --firewall-rules-exclusive options");
1914  return TM_ECODE_FAILED;
1915  }
1916  suri->firewall_rule_file = optarg;
1917  suri->firewall_rule_file_exclusive = true;
1918  suri->is_firewall = true;
1919  } else {
1921  (long_opts[option_index]).name, optarg);
1922  if (r < 0)
1923  return TM_ECODE_FAILED;
1924  }
1925  break;
1926  case 'c':
1927  suri->conf_filename = optarg;
1928  break;
1929  case 'T':
1930  conf_test = 1;
1931  if (SCConfSetFinal("engine.init-failure-fatal", "1") != 1) {
1932  SCLogError("failed to set engine init-failure-fatal");
1933  return TM_ECODE_FAILED;
1934  }
1935  break;
1936 #ifndef OS_WIN32
1937  case 'D':
1938  suri->daemon = 1;
1939  break;
1940 #endif /* OS_WIN32 */
1941  case 'h':
1942  suri->run_mode = RUNMODE_PRINT_USAGE;
1943  return TM_ECODE_OK;
1944  case 'i':
1945  if (optarg == NULL) {
1946  SCLogError("no option argument (optarg) for -i");
1947  return TM_ECODE_FAILED;
1948  }
1949 #ifdef HAVE_AF_PACKET
1950  if (ParseCommandLineAfpacket(suri, optarg) != TM_ECODE_OK) {
1951  return TM_ECODE_FAILED;
1952  }
1953 #else /* not afpacket */
1954  /* warn user if netmap is available */
1955 #if defined HAVE_NETMAP
1956  int i = 0;
1957 #ifdef HAVE_NETMAP
1958  i++;
1959 #endif
1960  SCLogWarning("faster capture "
1961  "option%s %s available:"
1962 #ifdef HAVE_NETMAP
1963  " NETMAP (--netmap=%s)"
1964 #endif
1965  ". Use --pcap=%s to suppress this warning",
1966  i == 1 ? "" : "s", i == 1 ? "is" : "are"
1967 #ifdef HAVE_NETMAP
1968  ,
1969  optarg
1970 #endif
1971  ,
1972  optarg);
1973 #endif /* have faster methods */
1974  if (ParseCommandLinePcapLive(suri, optarg) != TM_ECODE_OK) {
1975  return TM_ECODE_FAILED;
1976  }
1977 #endif
1978  break;
1979  case 'l':
1980  if (optarg == NULL) {
1981  SCLogError("no option argument (optarg) for -l");
1982  return TM_ECODE_FAILED;
1983  }
1984 
1985  if (ConfigSetLogDirectory(optarg) != TM_ECODE_OK) {
1986  SCLogError("Failed to set log directory.");
1987  return TM_ECODE_FAILED;
1988  }
1989  if (ConfigCheckLogDirectoryExists(optarg) != TM_ECODE_OK) {
1990  SCLogError("The logging directory \"%s\""
1991  " supplied at the command-line (-l %s) doesn't "
1992  "exist. Shutting down the engine.",
1993  optarg, optarg);
1994  return TM_ECODE_FAILED;
1995  }
1996  if (!IsLogDirectoryWritable(optarg)) {
1997  SCLogError("The logging directory \"%s\""
1998  " supplied at the command-line (-l %s) is not "
1999  "writable. Shutting down the engine.",
2000  optarg, optarg);
2001  return TM_ECODE_FAILED;
2002  }
2003  suri->set_logdir = true;
2004 
2005  break;
2006  case 'q':
2007 #ifdef NFQ
2008  if (suri->run_mode == RUNMODE_UNKNOWN) {
2009  suri->run_mode = RUNMODE_NFQ;
2010  EngineModeSetIPS();
2011  if (NFQParseAndRegisterQueues(optarg) == -1)
2012  return TM_ECODE_FAILED;
2013  } else if (suri->run_mode == RUNMODE_NFQ) {
2014  if (NFQParseAndRegisterQueues(optarg) == -1)
2015  return TM_ECODE_FAILED;
2016  } else {
2017  SCLogError("more than one run mode "
2018  "has been specified");
2019  PrintUsage(argv[0]);
2020  return TM_ECODE_FAILED;
2021  }
2022 #else
2023  SCLogError("NFQUEUE not enabled. Make sure to pass --enable-nfqueue to configure when "
2024  "building.");
2025  return TM_ECODE_FAILED;
2026 #endif /* NFQ */
2027  break;
2028  case 'd':
2029 #ifdef IPFW
2030  if (suri->run_mode == RUNMODE_UNKNOWN) {
2031  suri->run_mode = RUNMODE_IPFW;
2032  EngineModeSetIPS();
2033  if (IPFWRegisterQueue(optarg) == -1)
2034  return TM_ECODE_FAILED;
2035  } else if (suri->run_mode == RUNMODE_IPFW) {
2036  if (IPFWRegisterQueue(optarg) == -1)
2037  return TM_ECODE_FAILED;
2038  } else {
2039  SCLogError("more than one run mode "
2040  "has been specified");
2041  PrintUsage(argv[0]);
2042  return TM_ECODE_FAILED;
2043  }
2044 #else
2045  SCLogError("IPFW not enabled. Make sure to pass --enable-ipfw to configure when "
2046  "building.");
2047  return TM_ECODE_FAILED;
2048 #endif /* IPFW */
2049  break;
2050  case 'r':
2051  BUG_ON(optarg == NULL); /* for static analysis */
2052  if (suri->run_mode == RUNMODE_UNKNOWN) {
2053  suri->run_mode = RUNMODE_PCAP_FILE;
2054  } else {
2055  SCLogError("more than one run mode "
2056  "has been specified");
2057  PrintUsage(argv[0]);
2058  return TM_ECODE_FAILED;
2059  }
2060  SCStat buf;
2061  if (SCStatFn(optarg, &buf) != 0) {
2062  SCLogError("pcap file '%s': %s", optarg, strerror(errno));
2063  return TM_ECODE_FAILED;
2064  }
2065  if (SCConfSetFinal("pcap-file.file", optarg) != 1) {
2066  SCLogError("ERROR: Failed to set pcap-file.file\n");
2067  return TM_ECODE_FAILED;
2068  }
2069 
2070  break;
2071  case 's':
2072  if (suri->sig_file != NULL) {
2073  SCLogError("can't have multiple -s options or mix -s and -S.");
2074  return TM_ECODE_FAILED;
2075  }
2076  suri->sig_file = optarg;
2077  break;
2078  case 'S':
2079  if (suri->sig_file != NULL) {
2080  SCLogError("can't have multiple -S options or mix -s and -S.");
2081  return TM_ECODE_FAILED;
2082  }
2083  suri->sig_file = optarg;
2084  suri->sig_file_exclusive = true;
2085  break;
2086  case 'u':
2087 #ifdef UNITTESTS
2088  if (suri->run_mode == RUNMODE_UNKNOWN) {
2089  suri->run_mode = RUNMODE_UNITTEST;
2090  } else {
2091  SCLogError("more than one run mode has"
2092  " been specified");
2093  PrintUsage(argv[0]);
2094  return TM_ECODE_FAILED;
2095  }
2096 #else
2097  SCLogError("unit tests not enabled. Make sure to pass --enable-unittests to configure "
2098  "when building.");
2099  return TM_ECODE_FAILED;
2100 #endif /* UNITTESTS */
2101  break;
2102  case 'U':
2103 #ifdef UNITTESTS
2104  suri->regex_arg = optarg;
2105 
2106  if(strlen(suri->regex_arg) == 0)
2107  suri->regex_arg = NULL;
2108 #endif
2109  break;
2110  case 'V':
2112  return TM_ECODE_OK;
2113  case 'F':
2114  if (optarg == NULL) {
2115  SCLogError("no option argument (optarg) for -F");
2116  return TM_ECODE_FAILED;
2117  }
2118 
2119  SetBpfStringFromFile(optarg);
2120  break;
2121  case 'v': {
2122  static bool ignore_extra = false;
2123  if (suri->verbose < VERBOSE_MAX)
2124  suri->verbose++;
2125  else if (!ignore_extra) {
2126  SCLogNotice("extraneous verbose option(s) ignored");
2127  ignore_extra = true;
2128  }
2129  } break;
2130  case 'k':
2131  if (optarg == NULL) {
2132  SCLogError("no option argument (optarg) for -k");
2133  return TM_ECODE_FAILED;
2134  }
2135  if (!strcmp("all", optarg))
2136  suri->checksum_validation = 1;
2137  else if (!strcmp("none", optarg))
2138  suri->checksum_validation = 0;
2139  else {
2140  SCLogError("option '%s' invalid for -k", optarg);
2141  return TM_ECODE_FAILED;
2142  }
2143  break;
2144  default:
2145  PrintUsage(argv[0]);
2146  return TM_ECODE_FAILED;
2147  }
2148  }
2149 
2150  if (is_firewall) {
2151  suri->is_firewall = true;
2152  }
2153 
2154  if (suri->disabled_detect && (suri->sig_file != NULL || suri->firewall_rule_file != NULL)) {
2155  SCLogError("can't use -s/-S or --firewall-rules-exclusive when detection is disabled");
2156  return TM_ECODE_FAILED;
2157  }
2158 
2159  /* save the runmode from the command-line (if any) */
2160  suri->aux_run_mode = suri->run_mode;
2161 
2162  if (list_app_layer_protocols)
2164  if (list_rule_protocols)
2166  if (list_app_layer_hooks)
2168  if (list_app_layer_frames)
2170  if (list_keywords)
2172  if (list_unittests)
2174  if (dump_config)
2175  suri->run_mode = RUNMODE_DUMP_CONFIG;
2176  if (dump_features)
2178  if (conf_test)
2179  suri->run_mode = RUNMODE_CONF_TEST;
2180  if (engine_analysis)
2182 
2183  suri->offline = IsRunModeOffline(suri->run_mode);
2184  g_system = suri->system = IsRunModeSystem(suri->run_mode);
2185 
2186  ret = SetBpfString(optind, argv);
2187  if (ret != TM_ECODE_OK)
2188  return ret;
2189 
2190  return TM_ECODE_OK;
2191 }
2192 
2193 #ifdef OS_WIN32
2194 int WindowsInitService(int argc, char **argv)
2195 {
2196  if (SCRunningAsService()) {
2197  char path[MAX_PATH];
2198  char *p = NULL;
2199  strlcpy(path, argv[0], MAX_PATH);
2200  if ((p = strrchr(path, '\\'))) {
2201  *p = '\0';
2202  }
2203  if (!SetCurrentDirectory(path)) {
2204  SCLogError("Can't set current directory to: %s", path);
2205  return -1;
2206  }
2207  SCLogInfo("Current directory is set to: %s", path);
2208  SCServiceInit(argc, argv);
2209  }
2210 
2211  /* Windows socket subsystem initialization */
2212  WSADATA wsaData;
2213  if (0 != WSAStartup(MAKEWORD(2, 2), &wsaData)) {
2214  SCLogError("Can't initialize Windows sockets: %d", WSAGetLastError());
2215  return -1;
2216  }
2217 
2218  return 0;
2219 }
2220 #endif /* OS_WIN32 */
2221 
2222 static int MayDaemonize(SCInstance *suri)
2223 {
2224  if (suri->daemon == 1 && suri->pid_filename == NULL) {
2225  const char *pid_filename;
2226 
2227  if (SCConfGet("pid-file", &pid_filename) == 1) {
2228  SCLogInfo("Use pid file %s from config file.", pid_filename);
2229  } else {
2230  pid_filename = DEFAULT_PID_FILENAME;
2231  }
2232  /* The pid file name may be in config memory, but is needed later. */
2233  suri->pid_filename = SCStrdup(pid_filename);
2234  if (suri->pid_filename == NULL) {
2235  SCLogError("strdup failed: %s", strerror(errno));
2236  return TM_ECODE_FAILED;
2237  }
2238  }
2239 
2240  if (suri->pid_filename != NULL && SCPidfileTestRunning(suri->pid_filename) != 0) {
2241  SCFree(suri->pid_filename);
2242  suri->pid_filename = NULL;
2243  return TM_ECODE_FAILED;
2244  }
2245 
2246  if (suri->daemon == 1) {
2247  Daemonize();
2248  }
2249 
2250  if (suri->pid_filename != NULL) {
2251  if (SCPidfileCreate(suri->pid_filename) != 0) {
2252  SCFree(suri->pid_filename);
2253  suri->pid_filename = NULL;
2254  SCLogError("Unable to create PID file, concurrent run of"
2255  " Suricata can occur.");
2256  SCLogError("PID file creation WILL be mandatory for daemon mode"
2257  " in future version");
2258  }
2259  }
2260 
2261  return TM_ECODE_OK;
2262 }
2263 
2264 /* Initialize the user and group Suricata is to run as. */
2265 static int InitRunAs(SCInstance *suri)
2266 {
2267 #ifndef OS_WIN32
2268  /* Try to get user/group to run suricata as if
2269  command line as not decide of that */
2270  if (!suri->do_setuid && !suri->do_setgid) {
2271  const char *id;
2272  if (SCConfGet("run-as.user", &id) == 1) {
2273  suri->do_setuid = true;
2274  suri->user_name = id;
2275  }
2276  if (SCConfGet("run-as.group", &id) == 1) {
2277  suri->do_setgid = true;
2278  suri->group_name = id;
2279  }
2280  }
2281  /* Get the suricata user ID to given user ID */
2282  if (suri->do_setuid) {
2283  SCGetUserID(suri->user_name, suri->group_name, &suri->userid, &suri->groupid);
2284  sc_set_caps = true;
2285  /* Get the suricata group ID to given group ID */
2286  } else if (suri->do_setgid) {
2287  SCGetGroupID(suri->group_name, &suri->groupid);
2288  sc_set_caps = true;
2289  }
2290 #endif
2291  return TM_ECODE_OK;
2292 }
2293 
2294 static int InitSignalHandler(SCInstance *suri)
2295 {
2296  /* registering signals we use */
2297 #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
2298  UtilSignalHandlerSetup(SIGINT, SignalHandlerSigint);
2299  UtilSignalHandlerSetup(SIGTERM, SignalHandlerSigterm);
2300 #if HAVE_LIBUNWIND
2301  int enabled;
2302  if (SCConfGetBool("logging.stacktrace-on-signal", &enabled) == 0) {
2303  enabled = 1;
2304  }
2305 
2306  if (enabled) {
2307  SCLogInfo("Preparing unexpected signal handling");
2308  struct sigaction stacktrace_action;
2309  memset(&stacktrace_action, 0, sizeof(stacktrace_action));
2310  stacktrace_action.sa_sigaction = SignalHandlerUnexpected;
2311  stacktrace_action.sa_flags = SA_SIGINFO;
2312  sigaction(SIGSEGV, &stacktrace_action, NULL);
2313  sigaction(SIGABRT, &stacktrace_action, NULL);
2314  }
2315 #endif /* HAVE_LIBUNWIND */
2316 #endif
2317 #ifndef OS_WIN32
2318  UtilSignalHandlerSetup(SIGHUP, SignalHandlerSigHup);
2319  UtilSignalHandlerSetup(SIGPIPE, SIG_IGN);
2320  UtilSignalHandlerSetup(SIGSYS, SIG_IGN);
2321 #endif /* OS_WIN32 */
2322 
2323  return TM_ECODE_OK;
2324 }
2325 
2326 /* initialization code for both the main modes and for
2327  * unix socket mode.
2328  *
2329  * Will be run once per pcap in unix-socket mode */
2330 void PreRunInit(const int runmode)
2331 {
2332  if (runmode == RUNMODE_UNIX_SOCKET)
2333  return;
2334 
2335  StatsInit();
2336 #ifdef PROFILE_RULES
2337  SCProfilingRulesGlobalInit();
2338 #endif
2339 #ifdef PROFILING
2343 #endif /* PROFILING */
2344 #ifdef PROFILE_RULES
2345  SCProfilingInit();
2346 #endif
2347  DefragInit();
2356 }
2357 
2358 /* tasks we need to run before packets start flowing,
2359  * but after we dropped privs */
2360 void PreRunPostPrivsDropInit(const int runmode)
2361 {
2362  if (runmode == RUNMODE_UNIX_SOCKET) {
2363  return;
2364  }
2365 
2368  DatasetsInit();
2370 }
2371 
2372 /** \brief clean up / shutdown code for packet modes
2373  *
2374  * Shuts down packet modes, so regular packet runmodes and the
2375  * per pcap mode in the unix socket. */
2376 void PostRunDeinit(const int runmode, struct timeval *start_time)
2377 {
2378  if (runmode == RUNMODE_UNIX_SOCKET)
2379  return;
2380 
2382 
2383  /* needed by FlowWorkToDoCleanup */
2384  PacketPoolInit();
2385 
2386  /* handle graceful shutdown of the flow engine, it's helper
2387  * threads and the packet threads */
2389  /* disable capture */
2391  /* tell relevant packet threads to enter flow timeout loop */
2394  /* run cleanup on the flow hash */
2396  /* gracefully shut down all packet threads */
2398  SCPrintElapsedTime(start_time);
2400 
2401  /* kill the stats threads */
2404 
2405  /* kill packet threads -- already in 'disabled' state */
2408 
2410 
2411  /* mgt and ppt threads killed, we can run non thread-safe
2412  * shutdown functions */
2415  RunModeShutDown();
2416  FlowShutdown();
2417  IPPairShutdown();
2418  HostCleanup();
2420  DefragDestroy();
2422 #ifdef HAVE_HWLOC
2423  TopologyDestroy();
2424 #endif /* HAVE_HWLOC */
2425 
2426  TmqResetQueues();
2427 #ifdef PROFILING
2429  SCProfilingDump();
2431 #endif
2432 }
2433 
2434 int SCStartInternalRunMode(int argc, char **argv)
2435 {
2436  SCInstance *suri = &suricata;
2437  /* Treat internal running mode */
2438  switch (suri->run_mode) {
2439  case RUNMODE_LIST_KEYWORDS:
2440  return ListKeywords(suri->keyword_info);
2442  if (suri->conf_filename != NULL) {
2443  return ListRuleProtocols(suri->conf_filename);
2444  } else {
2446  }
2448  if (suri->conf_filename != NULL) {
2449  return ListAppLayerProtocols(suri->conf_filename);
2450  } else {
2452  }
2454  if (suri->conf_filename != NULL) {
2455  return ListAppLayerHooks(suri->conf_filename);
2456  } else {
2458  }
2460  if (suri->conf_filename != NULL) {
2461  return ListAppLayerFrames(suri->conf_filename);
2462  } else {
2464  }
2465  case RUNMODE_PRINT_VERSION:
2466  PrintVersion();
2467  return TM_ECODE_DONE;
2469  PrintBuildInfo();
2470  return TM_ECODE_DONE;
2471  case RUNMODE_PRINT_USAGE:
2472  PrintUsage(argv[0]);
2473  return TM_ECODE_DONE;
2474  case RUNMODE_LIST_RUNMODES:
2476  return TM_ECODE_DONE;
2477  case RUNMODE_LIST_UNITTEST:
2478  RunUnittests(1, suri->regex_arg);
2479  case RUNMODE_UNITTEST:
2480  RunUnittests(0, suri->regex_arg);
2481 #ifdef OS_WIN32
2482  case RUNMODE_INSTALL_SERVICE:
2483  if (SCServiceInstall(argc, argv)) {
2484  return TM_ECODE_FAILED;
2485  }
2486  SCLogInfo("Suricata service has been successfully installed.");
2487  return TM_ECODE_DONE;
2488  case RUNMODE_REMOVE_SERVICE:
2489  if (SCServiceRemove()) {
2490  return TM_ECODE_FAILED;
2491  }
2492  SCLogInfo("Suricata service has been successfully removed.");
2493  return TM_ECODE_DONE;
2494  case RUNMODE_CHANGE_SERVICE_PARAMS:
2495  if (SCServiceChangeParams(argc, argv)) {
2496  return TM_ECODE_FAILED;
2497  }
2498  SCLogInfo("Suricata service startup parameters has been successfully changed.");
2499  return TM_ECODE_DONE;
2500 #endif /* OS_WIN32 */
2501  default:
2502  /* simply continue for other running mode */
2503  break;
2504  }
2505  return TM_ECODE_OK;
2506 }
2507 
2509 {
2510  SCInstance *suri = &suricata;
2511  switch (suri->run_mode) {
2512  case RUNMODE_UNKNOWN:
2513  PrintUsage(suri->progname);
2514  return TM_ECODE_FAILED;
2515  default:
2516  break;
2517  }
2518 
2519  if (!CheckValidDaemonModes(suri->daemon, suri->run_mode)) {
2520  return TM_ECODE_FAILED;
2521  }
2522 
2523  return TM_ECODE_OK;
2524 }
2525 
2526 static void SetupDelayedDetect(SCInstance *suri)
2527 {
2528  /* In offline mode delayed init of detect is a bad idea */
2529  if (suri->offline) {
2530  suri->delayed_detect = 0;
2531  } else {
2532  if (SCConfGetBool("detect.delayed-detect", &suri->delayed_detect) != 1) {
2533  SCConfNode *denode = NULL;
2534  SCConfNode *decnf = SCConfGetNode("detect-engine");
2535  if (decnf != NULL) {
2536  TAILQ_FOREACH(denode, &decnf->head, next) {
2537  if (strcmp(denode->val, "delayed-detect") == 0) {
2539  denode, "delayed-detect", &suri->delayed_detect);
2540  }
2541  }
2542  }
2543  }
2544  }
2545 
2546  SCLogConfig("Delayed detect %s", suri->delayed_detect ? "enabled" : "disabled");
2547  if (suri->delayed_detect) {
2548  SCLogInfo("Packets will start being processed before signatures are active.");
2549  }
2550 
2551 }
2552 
2553 static int LoadSignatures(DetectEngineCtx *de_ctx, SCInstance *suri)
2554 {
2556 
2557  if (SigLoadSignatures(de_ctx, suri->sig_file, suri->sig_file_exclusive) < 0) {
2558  SCLogError("Loading signatures failed.");
2559  if (de_ctx->failure_fatal)
2560  return TM_ECODE_FAILED;
2561  }
2562 
2563  return TM_ECODE_OK;
2564 }
2565 
2566 static int ConfigGetCaptureValue(SCInstance *suri)
2567 {
2568  /* Pull the max pending packets from the config, if not found fall
2569  * back on a sane default. */
2570  intmax_t tmp_max_pending_packets;
2571  if (SCConfGetInt("max-pending-packets", &tmp_max_pending_packets) != 1)
2572  tmp_max_pending_packets = DEFAULT_MAX_PENDING_PACKETS;
2573  if (tmp_max_pending_packets < 1 || tmp_max_pending_packets > 2147483648) {
2574  SCLogError("Maximum max-pending-packets setting is 2147483648 and must be greater than 0. "
2575  "Please check %s for errors",
2576  suri->conf_filename);
2577  return TM_ECODE_FAILED;
2578  } else {
2579  max_pending_packets = (uint32_t)tmp_max_pending_packets;
2580  }
2581 
2582  SCLogDebug("Max pending packets set to %" PRIu32, max_pending_packets);
2583 
2584  /* Pull the default packet size from the config, if not found fall
2585  * back on a sane default. */
2586  const char *temp_default_packet_size;
2587  if ((SCConfGet("default-packet-size", &temp_default_packet_size)) != 1) {
2588  int lthread;
2589  int nlive;
2590  int strip_trailing_plus = 0;
2591  switch (suri->run_mode) {
2592  case RUNMODE_AFP_DEV:
2593  /* For AF_PACKET we delay setting the
2594  * default-packet-size until we know more about the
2595  * configuration. */
2596  break;
2597 #ifdef WINDIVERT
2598  case RUNMODE_WINDIVERT: {
2599  /* by default, WinDivert collects from all devices */
2600  const int mtu = GetGlobalMTUWin32();
2601 
2602  if (mtu > 0) {
2603  /* SLL_HEADER_LEN is the longest header + 8 for VLAN */
2604  default_packet_size = mtu + SLL_HEADER_LEN + 8;
2605  break;
2606  }
2608  break;
2609  }
2610 #endif /* WINDIVERT */
2611  case RUNMODE_NETMAP:
2612  /* in netmap igb0+ has a special meaning, however the
2613  * interface really is igb0 */
2614  strip_trailing_plus = 1;
2615  /* fall through */
2616  case RUNMODE_PLUGIN:
2617  case RUNMODE_PCAP_DEV:
2618  case RUNMODE_AFXDP_DEV:
2619  nlive = LiveGetDeviceCount();
2620  for (lthread = 0; lthread < nlive; lthread++) {
2621  const char *live_dev = LiveGetDeviceName(lthread);
2622  char dev[128]; /* need to be able to support GUID names on Windows */
2623  (void)strlcpy(dev, live_dev, sizeof(dev));
2624 
2625  if (strip_trailing_plus) {
2626  size_t len = strlen(dev);
2627  if (len &&
2628  (dev[len-1] == '+' ||
2629  dev[len-1] == '^' ||
2630  dev[len-1] == '*'))
2631  {
2632  dev[len-1] = '\0';
2633  }
2634  }
2635  LiveDevice *ld = LiveGetDevice(dev);
2636  unsigned int iface_max_packet_size = GetIfaceMaxPacketSize(ld);
2637  if (iface_max_packet_size > default_packet_size)
2638  default_packet_size = iface_max_packet_size;
2639  }
2640  if (default_packet_size)
2641  break;
2642  /* fall through */
2643  default:
2645  }
2646  } else {
2647  if (ParseSizeStringU32(temp_default_packet_size, &default_packet_size) < 0) {
2648  SCLogError("Error parsing max-pending-packets "
2649  "from conf file - %s. Killing engine",
2650  temp_default_packet_size);
2651  return TM_ECODE_FAILED;
2652  }
2653  }
2654 
2655  SCLogDebug("Default packet size set to %"PRIu32, default_packet_size);
2656 
2657  return TM_ECODE_OK;
2658 }
2659 
2660 static void PostRunStartedDetectSetup(const SCInstance *suri)
2661 {
2662 #ifndef OS_WIN32
2663  /* registering signal handlers we use. We setup usr2 here, so that one
2664  * can't call it during the first sig load phase or while threads are still
2665  * starting up. */
2666  if (DetectEngineEnabled() && suri->delayed_detect == 0) {
2667  UtilSignalHandlerSetup(SIGUSR2, SignalHandlerSigusr2);
2668  UtilSignalUnblock(SIGUSR2);
2669  }
2670 #endif
2671  if (suri->delayed_detect) {
2672  /* force 'reload', this will load the rules and swap engines */
2673  DetectEngineReload(suri);
2674  SCLogNotice("Signature(s) loaded, Detect thread(s) activated.");
2675 #ifndef OS_WIN32
2676  UtilSignalHandlerSetup(SIGUSR2, SignalHandlerSigusr2);
2677  UtilSignalUnblock(SIGUSR2);
2678 #endif
2679  }
2680 }
2681 
2683 {
2684  DetectEngineCtx *de_ctx = NULL;
2685  if (!suri->disabled_detect) {
2686  SetupDelayedDetect(suri);
2687  int mt_enabled = 0;
2688  (void)SCConfGetBool("multi-detect.enabled", &mt_enabled);
2689  int default_tenant = 0;
2690  if (mt_enabled)
2691  (void)SCConfGetBool("multi-detect.default", &default_tenant);
2693  FatalError("initializing multi-detect "
2694  "detection engine contexts failed.");
2695  }
2696  if (suri->delayed_detect && suri->run_mode != RUNMODE_CONF_TEST) {
2698  } else if (mt_enabled && !default_tenant && suri->run_mode != RUNMODE_CONF_TEST) {
2700  } else {
2702  }
2703  if (de_ctx == NULL) {
2704  FatalError("initializing detection engine failed.");
2705  }
2706 
2708  if (LoadSignatures(de_ctx, suri) != TM_ECODE_OK)
2709  exit(EXIT_FAILURE);
2710  }
2711 
2712  gettimeofday(&de_ctx->last_reload, NULL);
2717  }
2718 }
2719 
2720 static void PostConfLoadedSetupHostMode(void)
2721 {
2722  const char *hostmode = NULL;
2723 
2724  if (SCConfGet("host-mode", &hostmode) == 1) {
2725  if (!strcmp(hostmode, "router")) {
2727  } else if (!strcmp(hostmode, "sniffer-only")) {
2729  } else {
2730  if (strcmp(hostmode, "auto") != 0) {
2731  WarnInvalidConfEntry("host-mode", "%s", "auto");
2732  }
2733  if (EngineModeIsIPS()) {
2735  } else {
2737  }
2738  }
2739  } else {
2740  if (EngineModeIsIPS()) {
2742  SCLogInfo("No 'host-mode': suricata is in IPS mode, using "
2743  "default setting 'router'");
2744  } else {
2746  SCLogInfo("No 'host-mode': suricata is in IDS mode, using "
2747  "default setting 'sniffer-only'");
2748  }
2749  }
2750 }
2751 
2752 static void SetupUserMode(SCInstance *suri)
2753 {
2754  /* apply 'user mode' config updates here */
2755  if (!suri->system) {
2756  if (!suri->set_logdir) {
2757  /* override log dir to current work dir" */
2758  if (ConfigSetLogDirectory((char *)".") != TM_ECODE_OK) {
2759  FatalError("could not set USER mode logdir");
2760  }
2761  }
2762  if (!suri->set_datadir) {
2763  /* override data dir to current work dir" */
2764  if (ConfigSetDataDirectory((char *)".") != TM_ECODE_OK) {
2765  FatalError("could not set USER mode datadir");
2766  }
2767  }
2768  }
2769 }
2770 
2771 /**
2772  * This function is meant to contain code that needs
2773  * to be run once the configuration has been loaded.
2774  */
2776 {
2777  int cnf_firewall_enabled = 0;
2778  if (SCConfGetBool("firewall.enabled", &cnf_firewall_enabled) == 1) {
2779  if (cnf_firewall_enabled == 1) {
2780  suri->is_firewall = true;
2781  } else {
2782  if (suri->is_firewall) {
2783  FatalError("firewall mode enabled through commandline, but disabled in config");
2784  }
2785  }
2786  }
2787  if (suri->is_firewall) {
2788  SCLogWarning("firewall mode is EXPERIMENTAL and subject to change");
2790  }
2791 
2792  /* load the pattern matchers */
2793  MpmTableSetup();
2794  SpmTableSetup();
2795 
2796  int disable_offloading;
2797  if (SCConfGetBool("capture.disable-offloading", &disable_offloading) == 0)
2798  disable_offloading = 1;
2799  if (disable_offloading) {
2801  } else {
2803  }
2804 
2805  if (suri->checksum_validation == -1) {
2806  const char *cv = NULL;
2807  if (SCConfGet("capture.checksum-validation", &cv) == 1) {
2808  if (strcmp(cv, "none") == 0) {
2809  suri->checksum_validation = 0;
2810  } else if (strcmp(cv, "all") == 0) {
2811  suri->checksum_validation = 1;
2812  }
2813  }
2814  }
2815  switch (suri->checksum_validation) {
2816  case 0:
2817  SCConfSet("stream.checksum-validation", "0");
2818  break;
2819  case 1:
2820  SCConfSet("stream.checksum-validation", "1");
2821  break;
2822  }
2823 
2824  if (suri->runmode_custom_mode) {
2825  SCConfSet("runmode", suri->runmode_custom_mode);
2826  }
2827 
2828  SCStorageInit();
2829 #ifdef HAVE_PACKET_EBPF
2830  if (suri->run_mode == RUNMODE_AFP_DEV) {
2831  EBPFRegisterExtension();
2833  }
2834 #endif
2836 
2839 
2840  SigTableInit();
2841 
2842 #ifdef HAVE_PLUGINS
2844 #endif
2845 
2846  LiveDeviceFinalize(); // must be after EBPF extension registration
2847 
2850  FatalError("IPS mode setup failed");
2851  }
2852 
2853  if (EngineModeIsUnknown()) { // if still uninitialized, set the default
2854  SCLogInfo("Setting engine mode to IDS mode by default");
2855  EngineModeSetIDS();
2856  }
2857 
2859 
2860  SCConfNode *eps = SCConfGetNode("stats.exception-policy");
2861  if (eps != NULL) {
2862  if (SCConfNodeChildValueIsTrue(eps, "per-app-proto-errors")) {
2864  }
2865  }
2866 
2867  /* Must occur prior to output mod registration
2868  and app layer setup. */
2870 
2871  AppLayerSetup();
2872 
2873  /* Suricata will use this umask if provided. By default it will use the
2874  umask passed on from the shell. */
2875  const char *custom_umask;
2876  if (SCConfGet("umask", &custom_umask) == 1) {
2877  uint16_t mask;
2878  if (StringParseUint16(&mask, 8, (uint16_t)strlen(custom_umask), custom_umask) > 0) {
2879  umask((mode_t)mask);
2880  }
2881  }
2882 
2883  if (ConfigGetCaptureValue(suri) != TM_ECODE_OK) {
2885  }
2886 
2887 #ifdef NFQ
2888  if (suri->run_mode == RUNMODE_NFQ)
2889  NFQInitConfig(false);
2890 #endif
2891 
2892  /* Load the Host-OS lookup. */
2894 
2895  if (suri->run_mode == RUNMODE_ENGINE_ANALYSIS) {
2896  SCLogInfo("== Carrying out Engine Analysis ==");
2897  const char *temp = NULL;
2898  if (SCConfGet("engine-analysis", &temp) == 0) {
2899  SCLogInfo("no engine-analysis parameter(s) defined in conf file. "
2900  "Please define/enable them in the conf to use this "
2901  "feature.");
2903  }
2904  }
2905 
2906  /* hardcoded initialization code */
2907  SigTableSetup(); /* load the rule keywords */
2909  TmqhSetup();
2910 
2911  TagInitCtx();
2913  ThresholdInit();
2914  HostBitInitCtx();
2915  IPPairBitInitCtx();
2916 
2917  if (DetectAddressTestConfVars() < 0) {
2918  SCLogError(
2919  "basic address vars test failed. Please check %s for errors", suri->conf_filename);
2921  }
2922  if (DetectPortTestConfVars() < 0) {
2923  SCLogError("basic port vars test failed. Please check %s for errors", suri->conf_filename);
2925  }
2926 
2929 
2931 
2932  TmModuleRunInit();
2933 
2934  if (MayDaemonize(suri) != TM_ECODE_OK)
2936 
2937  if (suri->install_signal_handlers) {
2938  if (InitSignalHandler(suri) != TM_ECODE_OK)
2940  }
2941 
2942  /* Check for the existence of the default logging directory which we pick
2943  * from suricata.yaml. If not found, shut the engine down */
2944  suri->log_dir = SCConfigGetLogDirectory();
2945 
2947  SCLogError("The logging directory \"%s\" "
2948  "supplied by %s (default-log-dir) doesn't exist. "
2949  "Shutting down the engine",
2950  suri->log_dir, suri->conf_filename);
2952  }
2953  if (!IsLogDirectoryWritable(suri->log_dir)) {
2954  SCLogError("The logging directory \"%s\" "
2955  "supplied by %s (default-log-dir) is not writable. "
2956  "Shutting down the engine",
2957  suri->log_dir, suri->conf_filename);
2959  }
2960 
2961  if (suri->disabled_detect) {
2962  SCLogConfig("detection engine disabled");
2963  /* disable raw reassembly */
2964  (void)SCConfSetFinal("stream.reassembly.raw", "false");
2965  }
2966 
2968 
2970 
2972 
2973  /* hostmode depends on engine mode being set */
2974  PostConfLoadedSetupHostMode();
2975 
2976  PreRunInit(suri->run_mode);
2977 
2979 }
2980 
2982 {
2983  SCInstance *suri = &suricata;
2984  while(1) {
2985  if (sigterm_count || sigint_count) {
2987  }
2988 
2990  SCLogNotice("Signal Received. Stopping engine.");
2991  break;
2992  }
2993 
2995 
2996  if (sighup_count > 0) {
2998  sighup_count--;
2999  }
3000 
3001  if (sigusr2_count > 0) {
3002  if (!(DetectEngineReloadIsStart())) {
3004  DetectEngineReload(suri);
3006  sigusr2_count--;
3007  }
3008 
3009  } else if (DetectEngineReloadIsStart()) {
3010  DetectEngineReload(suri);
3012  }
3013 
3014  usleep(10* 1000);
3015  }
3016 }
3017 
3018 /**
3019  * \brief Global initialization common to all runmodes.
3020  *
3021  * This can be used by fuzz targets.
3022  */
3023 
3024 int InitGlobal(void)
3025 {
3026  SC_ATOMIC_INIT(engine_stage);
3027 
3028  /* initialize the logging subsys */
3029  SCLogInitLogModule(NULL);
3030 
3031  SCSetThreadName("Suricata-Main");
3032 
3033  /* Ignore SIGUSR2 as early as possible. We redeclare interest
3034  * once we're done launching threads. The goal is to either die
3035  * completely or handle any and all SIGUSR2s correctly.
3036  */
3037 #ifndef OS_WIN32
3038  UtilSignalHandlerSetup(SIGUSR2, SIG_IGN);
3039  if (UtilSignalBlock(SIGUSR2)) {
3040  SCLogError("SIGUSR2 initialization error");
3041  return EXIT_FAILURE;
3042  }
3043 #endif
3044 
3045  ParseSizeInit();
3047 
3048  /* Initialize the configuration module. */
3049  SCConfInit();
3051 
3052  VarNameStoreInit();
3053 
3054  // zero all module storage
3055  memset(tmm_modules, 0, TMM_SIZE * sizeof(TmModule));
3056 
3057  return 0;
3058 }
3059 
3060 void SuricataPreInit(const char *progname)
3061 {
3062  SCInstanceInit(&suricata, progname);
3063 
3064  if (InitGlobal() != 0) {
3065  exit(EXIT_FAILURE);
3066  }
3067 }
3068 
3069 void SuricataInit(void)
3070 {
3071  /* Initializations for global vars, queues, etc (memsets, mutex init..) */
3073 
3075  SCConfDump();
3076  exit(EXIT_SUCCESS);
3077  }
3078 
3079  int tracking = 1;
3080  if (SCConfGetBool("vlan.use-for-tracking", &tracking) == 1 && !tracking) {
3081  /* Ignore vlan_ids when comparing flows. */
3082  g_vlan_mask = 0x0000;
3083  }
3084  SCLogDebug("vlan tracking is %s", tracking == 1 ? "enabled" : "disabled");
3085  if (SCConfGetBool("livedev.use-for-tracking", &tracking) == 1 && !tracking) {
3086  /* Ignore livedev id when comparing flows. */
3087  g_livedev_mask = 0x0000;
3088  }
3089  if (SCConfGetBool("decoder.recursion-level.use-for-tracking", &tracking) == 1 && !tracking) {
3090  /* Ignore recursion level when comparing flows. */
3091  g_recurlvl_mask = 0x00;
3092  }
3093  SetupUserMode(&suricata);
3094  InitRunAs(&suricata);
3095 
3096  /* Since our config is now loaded we can finish configuring the
3097  * logging module. */
3099 
3100  LogVersion(&suricata);
3103 
3105  SCLogInfo("Running suricata under test mode");
3106 
3107  if (suricata.verbose) {
3108  SCLogInfo(
3109  "Running with verbose level %s", SCLogLevel2Name(suricata.verbose + SC_LOG_NOTICE));
3110  }
3111 
3112  if (ParseInterfacesList(suricata.aux_run_mode, suricata.pcap_dev) != TM_ECODE_OK) {
3113  exit(EXIT_FAILURE);
3114  }
3115 
3117  exit(EXIT_FAILURE);
3118  }
3119 
3121 
3122  /* Re-enable coredumps after privileges are dropped. */
3123  CoredumpEnable();
3124 
3127  }
3128 
3130 
3131  SCOnLoggingReady();
3132 
3134 
3137  goto out;
3138  } else if (suricata.run_mode == RUNMODE_CONF_TEST){
3139  SCLogNotice("Configuration provided was successfully loaded. Exiting.");
3140  goto out;
3141  } else if (suricata.run_mode == RUNMODE_DUMP_FEATURES) {
3142  FeatureDump();
3143  goto out;
3144  }
3145 
3148 
3149  SCSetStartTime(&suricata);
3152  }
3155  return;
3156 
3157 out:
3158  GlobalsDestroy();
3159  exit(EXIT_SUCCESS);
3160 }
3161 
3163 {
3164  /* Update the engine stage/status flag */
3165  SC_ATOMIC_SET(engine_stage, SURICATA_DEINIT);
3166 
3169  /* kill remaining threads */
3171 }
3172 
3174 {
3175  /* Wait till all the threads have been initialized */
3178  FatalError("Engine initialization failed, "
3179  "aborting...");
3180  }
3181 
3182  int limit_nproc = 0;
3183  if (SCConfGetBool("security.limit-noproc", &limit_nproc) == 0) {
3184  limit_nproc = 0;
3185  }
3186 
3187 #if defined(SC_ADDRESS_SANITIZER)
3188  if (limit_nproc) {
3189  SCLogWarning(
3190  "\"security.limit-noproc\" (setrlimit()) not set when using address sanitizer");
3191  limit_nproc = 0;
3192  }
3193 #endif
3194 
3195  if (limit_nproc) {
3196 #if defined(HAVE_SYS_RESOURCE_H)
3197 #ifdef linux
3198  if (geteuid() == 0) {
3199  SCLogWarning("setrlimit has no effect when running as root.");
3200  }
3201 #endif
3202  struct rlimit r = { 0, 0 };
3203  if (setrlimit(RLIMIT_NPROC, &r) != 0) {
3204  SCLogWarning("setrlimit failed to prevent process creation.");
3205  }
3206 #else
3207  SCLogWarning("setrlimit unavailable.");
3208 #endif
3209  }
3210 
3211  SC_ATOMIC_SET(engine_stage, SURICATA_RUNTIME);
3213 
3214  /* pledge before allowing threads to continue to avoid an issue with pcap file directory mode,
3215  * see ticket #8300. */
3216  SCPledge();
3217 
3218  /* Un-pause all the paused threads */
3220 
3221  /* Must ensure all threads are fully operational before continuing with init process */
3224  exit(EXIT_FAILURE);
3225  }
3226 
3227  /* Print notice and send OS specific notification of threads in running state */
3228  OnNotifyRunning();
3229 
3230  PostRunStartedDetectSetup(&suricata);
3231  if (suricata.run_mode == RUNMODE_DPDK) { // only DPDK uses hpages at the moment
3235  SystemHugepageSnapshotDestroy(postrun_snap);
3236  }
3237 }
RUNMODE_LIST_APP_LAYERS
@ RUNMODE_LIST_APP_LAYERS
Definition: runmodes.h:47
SCRunMode
enum SCRunModes SCRunMode
RUNMODE_ENGINE_ANALYSIS
@ RUNMODE_ENGINE_ANALYSIS
Definition: runmodes.h:58
util-device-private.h
DefragDestroy
void DefragDestroy(void)
Definition: defrag.c:1129
util-byte.h
SCInstance_::is_firewall
bool is_firewall
Definition: suricata.h:145
TmModuleUnixManagerRegister
void TmModuleUnixManagerRegister(void)
Definition: unix-manager.c:1289
StatsReleaseResources
void StatsReleaseResources(void)
Releases the resources allotted by the Stats API.
Definition: counters.c:1386
DETECT_ENGINE_MPM_CACHE_OP_PRUNE
#define DETECT_ENGINE_MPM_CACHE_OP_PRUNE
Definition: detect.h:1712
source-nflog.h
TagInitCtx
void TagInitCtx(void)
Definition: detect-engine-tag.c:52
TmModuleReceiveIPFWRegister
void TmModuleReceiveIPFWRegister(void)
Registration Function for RecieveIPFW.
Definition: source-ipfw.c:151
flow-bypass.h
len
uint8_t len
Definition: app-layer-dnp3.h:2
SuricataMainLoop
void SuricataMainLoop(void)
Definition: suricata.c:2981
ExceptionSimulationCommandLineParser
int ExceptionSimulationCommandLineParser(const char *name, const char *arg)
Definition: util-exception-policy.c:395
SCInstance_::run_mode
enum SCRunModes run_mode
Definition: suricata.h:134
ippair.h
g_livedev_mask
uint16_t g_livedev_mask
Definition: suricata.c:210
SCInstance_::firewall_rule_file
char * firewall_rule_file
Definition: suricata.h:142
RUNMODE_AFXDP_DEV
@ RUNMODE_AFXDP_DEV
Definition: runmodes.h:37
app-layer-htp-range.h
AppLayerHtpNeedFileInspection
void AppLayerHtpNeedFileInspection(void)
Sets a flag that informs the HTP app layer that some module in the engine needs the http request file...
Definition: app-layer-htp.c:579
detect-engine.h
source-pcap.h
SCInstance_::groupid
uint32_t groupid
Definition: suricata.h:156
g_system
bool g_system
Definition: suricata.c:195
TmThreadDisablePacketThreads
void TmThreadDisablePacketThreads(const uint16_t set, const uint16_t check, const uint8_t module_flags)
Disable all packet threads.
Definition: tm-threads.c:1540
win32-syscall.h
SCInstance_::aux_run_mode
enum SCRunModes aux_run_mode
Definition: suricata.h:135
SCInstance_::daemon
int daemon
Definition: suricata.h:167
SCStorageInit
void SCStorageInit(void)
Definition: util-storage.c:68
IPPairInitConfig
void IPPairInitConfig(bool quiet)
initialize the configuration
Definition: ippair.c:162
SCLogInitLogModule
void SCLogInitLogModule(SCLogInitData *sc_lid)
Initializes the logging module.
Definition: util-debug.c:1396
SLL_HEADER_LEN
#define SLL_HEADER_LEN
Definition: decode-sll.h:27
SCInstance_::checksum_validation
int checksum_validation
Definition: suricata.h:170
SCEnableDefaultSignalHandlers
void SCEnableDefaultSignalHandlers(void)
Enable default signal handlers.
Definition: suricata.c:299
LiveDeviceListClean
int LiveDeviceListClean(void)
Definition: util-device.c:334
SCInstance_::do_setuid
bool do_setuid
Definition: suricata.h:152
DetectEngineDeReference
void DetectEngineDeReference(DetectEngineCtx **de_ctx)
Definition: detect-engine.c:4664
SCInstance_::start_time
struct timeval start_time
Definition: suricata.h:173
IsRunModeOffline
bool IsRunModeOffline(enum SCRunModes run_mode_to_check)
Definition: runmodes.c:557
SC_ATOMIC_INIT
#define SC_ATOMIC_INIT(name)
wrapper for initializing an atomic variable.
Definition: util-atomic.h:314
prerun_snap
SystemHugepageSnapshot * prerun_snap
Definition: suricata.c:221
TmThreadContinueThreads
void TmThreadContinueThreads(void)
Unpauses all threads present in tv_root.
Definition: tm-threads.c:1972
RUNMODE_NFLOG
@ RUNMODE_NFLOG
Definition: runmodes.h:32
source-pcap-file.h
SCInstance_::do_setgid
bool do_setgid
Definition: suricata.h:153
CLS
#define CLS
Definition: suricata-common.h:69
SURI_HOST_IS_SNIFFER_ONLY
@ SURI_HOST_IS_SNIFFER_ONLY
Definition: suricata.h:125
stream-tcp.h
DetectEngineCtx_::type
enum DetectEngineType type
Definition: detect.h:1061
SigLoadSignatures
int SigLoadSignatures(DetectEngineCtx *de_ctx, char *sig_file, bool sig_file_exclusive)
Load signatures.
Definition: detect-engine-loader.c:372
runmode-af-packet.h
SCInstance_::group_name
const char * group_name
Definition: suricata.h:151
DetectEngineCtx_::firewall_rule_file_exclusive
const char * firewall_rule_file_exclusive
Definition: detect.h:1152
unlikely
#define unlikely(expr)
Definition: util-optimize.h:35
SC_ATOMIC_SET
#define SC_ATOMIC_SET(name, val)
Set the value for the atomic variable.
Definition: util-atomic.h:386
runmode-unittests.h
RUNMODE_UNKNOWN
@ RUNMODE_UNKNOWN
Definition: runmodes.h:28
TmqhSetup
void TmqhSetup(void)
Definition: tm-queuehandlers.c:39
RUNMODE_LIST_APP_LAYER_FRAMES
@ RUNMODE_LIST_APP_LAYER_FRAMES
Definition: runmodes.h:50
SCConfGetRootNode
SCConfNode * SCConfGetRootNode(void)
Get the root configuration node.
Definition: conf.c:223
ENGINE_MODE_FIREWALL
@ ENGINE_MODE_FIREWALL
Definition: suricata.h:111
DetectEngineCtxInitStubForDD
DetectEngineCtx * DetectEngineCtxInitStubForDD(void)
Definition: detect-engine.c:2608
LiveDevRegisterExtension
void LiveDevRegisterExtension(void)
Definition: util-device.c:485
OutputTxShutdown
void OutputTxShutdown(void)
Definition: output-tx.c:667
THV_FLOW_LOOP
#define THV_FLOW_LOOP
Definition: threadvars.h:48
SCLogDebug
#define SCLogDebug(...)
Definition: util-debug.h:282
AppLayerHtpPrintStats
void AppLayerHtpPrintStats(void)
Definition: app-layer-htp.c:2426
util-hugepages.h
StatsSetupPostConfigPreOutput
void StatsSetupPostConfigPreOutput(void)
Definition: counters.c:971
SCInstance_::runmode_custom_mode
char * runmode_custom_mode
Definition: suricata.h:148
util-coredump-config.h
next
struct HtpBodyChunk_ * next
Definition: app-layer-htp.h:0
SigTableSetup
void SigTableSetup(void)
Definition: detect-engine-register.c:528
name
const char * name
Definition: detect-engine-proto.c:48
TmModuleReceiveNFQRegister
void TmModuleReceiveNFQRegister(void)
Definition: source-nfq.c:170
DetectEngineMpmCacheService
void DetectEngineMpmCacheService(uint32_t op_flags)
Definition: detect-engine.c:2452
LiveBuildDeviceList
int LiveBuildDeviceList(const char *runmode)
Definition: util-device.c:294
RunModeShutDown
void RunModeShutDown(void)
Definition: runmodes.c:575
SuricataInit
void SuricataInit(void)
Definition: suricata.c:3069
TM_ECODE_DONE
@ TM_ECODE_DONE
Definition: tm-threads-common.h:83
SCProtoNameInit
void SCProtoNameInit(void)
Definition: util-proto-name.c:414
SuricataPostInit
void SuricataPostInit(void)
Definition: suricata.c:3173
ippair-bit.h
RunModeDispatch
void RunModeDispatch(int runmode, const char *custom_mode, const char *capture_plugin_name, const char *capture_plugin_args)
Definition: runmodes.c:405
util-macset.h
sigint_count
volatile sig_atomic_t sigint_count
Definition: suricata.c:157
SC_ATOMIC_DECLARE
SC_ATOMIC_DECLARE(unsigned int, engine_stage)
RUNMODE_NFQ
@ RUNMODE_NFQ
Definition: runmodes.h:31
TmModuleRunDeInit
void TmModuleRunDeInit(void)
Definition: tm-modules.c:119
TmThreadsUnsealThreads
void TmThreadsUnsealThreads(void)
Definition: tm-threads.c:2163
RegisterFlowBypassInfo
void RegisterFlowBypassInfo(void)
Definition: flow-util.c:240
SCSetThreadName
#define SCSetThreadName(n)
Definition: threads.h:305
SCConfYamlHandleInclude
int SCConfYamlHandleInclude(SCConfNode *parent, const char *filename)
Include a file in the configuration.
Definition: conf-yaml-loader.c:115
sc_set_caps
bool sc_set_caps
Definition: suricata.c:193
SCLogDeInitLogModule
void SCLogDeInitLogModule(void)
De-Initializes the logging module.
Definition: util-debug.c:1600
LiveDevice_
Definition: util-device-private.h:32
util-pidfile.h
TmModuleDecodeErfFileRegister
void TmModuleDecodeErfFileRegister(void)
Register the ERF file decoder module.
Definition: source-erf-file.c:98
DetectEngineCtx_
main detection engine ctx
Definition: detect.h:937
StringParseUint16
int StringParseUint16(uint16_t *res, int base, size_t len, const char *str)
Definition: util-byte.c:296
SigTableInit
void SigTableInit(void)
Definition: detect-engine-register.c:516
DetectEngineReloadSetIdle
void DetectEngineReloadSetIdle(void)
Definition: detect-engine.c:1914
SCInstance_::userid
uint32_t userid
Definition: suricata.h:155
source-windivert-prototypes.h
SCConfGet
int SCConfGet(const char *name, const char **vptr)
Retrieve the value of a configuration node.
Definition: conf.c:351
DetectEngineGetCurrent
DetectEngineCtx * DetectEngineGetCurrent(void)
Definition: detect-engine.c:3862
EngineModeIsUnknown
int EngineModeIsUnknown(void)
Definition: suricata.c:234
VarNameStoreInit
void VarNameStoreInit(void)
TmModuleFlowRecyclerRegister
void TmModuleFlowRecyclerRegister(void)
Definition: flow-manager.c:1313
g_skip_prefilter
int g_skip_prefilter
Definition: detect-engine-mpm.c:1121
SCConfNodeChildValueIsTrue
int SCConfNodeChildValueIsTrue(const SCConfNode *node, const char *key)
Test if a configuration node has a true value.
Definition: conf.c:896
Daemonize
void Daemonize(void)
Daemonize the process.
Definition: util-daemon.c:101
UtilSignalHandlerSetup
void UtilSignalHandlerSetup(int sig, void(*handler)(int))
Definition: util-signal.c:60
TAILQ_FOREACH
#define TAILQ_FOREACH(var, head, field)
Definition: queue.h:252
TmModuleDecodeAFPRegister
void TmModuleDecodeAFPRegister(void)
Registration Function for DecodeAFP.
Definition: source-af-packet.c:599
TmModuleDecodeWinDivertRegister
void TmModuleDecodeWinDivertRegister(void)
Definition: source-windivert.c:75
SURICATA_STOP
#define SURICATA_STOP
Definition: suricata.h:94
DetectEngineAddToMaster
int DetectEngineAddToMaster(DetectEngineCtx *de_ctx)
Definition: detect-engine.c:4688
SCConfGetChildValueBool
int SCConfGetChildValueBool(const SCConfNode *base, const char *name, int *val)
Definition: conf.c:516
TmModuleStatsLoggerRegister
void TmModuleStatsLoggerRegister(void)
Definition: output-stats.c:169
RegisterAllModules
void RegisterAllModules(void)
Definition: suricata.c:968
ENGINE_MODE_IPS
@ ENGINE_MODE_IPS
Definition: suricata.h:110
DetectEngineMultiTenantSetup
int DetectEngineMultiTenantSetup(const bool unix_socket)
setup multi-detect / multi-tenancy
Definition: detect-engine.c:4322
flow-bit.h
SC_LOG_NOTICE
@ SC_LOG_NOTICE
Definition: util-debug.h:40
SupportFastPatternForSigMatchTypes
void SupportFastPatternForSigMatchTypes(void)
Registers the keywords(SMs) that should be given fp support.
Definition: detect-fast-pattern.c:142
util-var-name.h
SCParseCommandLine
TmEcode SCParseCommandLine(int argc, char **argv)
Definition: suricata.c:1420
SCPledge
#define SCPledge(...)
Definition: util-privs.h:99
CheckValidDaemonModes
int CheckValidDaemonModes(int daemon, int mode)
Check for a valid combination daemon/mode.
Definition: util-daemon.c:177
SCGetGroupID
void SCGetGroupID(const char *group_name, uint32_t *gid)
Function to get the group ID from the specified group name.
Definition: util-privs.c:210
SCConfGetBool
int SCConfGetBool(const char *name, int *val)
Retrieve a configuration value as a boolean.
Definition: conf.c:498
unittests_fatal
int unittests_fatal
Definition: util-unittest.c:52
TmThreadDisableReceiveThreads
void TmThreadDisableReceiveThreads(void)
Disable all threads having the specified TMs.
Definition: tm-threads.c:1388
StatsInit
void StatsInit(void)
Initializes the perf counter api. Things are hard coded currently. More work to be done when we imple...
Definition: counters.c:961
util-privs.h
PreRunInit
void PreRunInit(const int runmode)
Definition: suricata.c:2330
SURICATA_DONE
#define SURICATA_DONE
Definition: suricata.h:96
MacSetRegisterFlowStorage
void MacSetRegisterFlowStorage(void)
Definition: util-macset.c:61
EngineModeSetFirewall
void EngineModeSetFirewall(void)
Definition: suricata.c:258
SuricataShutdown
void SuricataShutdown(void)
Definition: suricata.c:3162
SCInstance_::conf_filename
const char * conf_filename
Definition: suricata.h:177
GetIfaceMTU
int GetIfaceMTU(const char *dev)
output the link MTU
Definition: util-ioctl.c:82
GlobalsInitPreConfig
void GlobalsInitPreConfig(void)
Definition: suricata.c:392
TmModuleReceiveNetmapRegister
void TmModuleReceiveNetmapRegister(void)
Definition: source-netmap.c:75
PacketPoolPostRunmodes
void PacketPoolPostRunmodes(void)
Set the max_pending_return_packets value.
Definition: tmqh-packetpool.c:450
NFQInitConfig
void NFQInitConfig(bool quiet)
To initialize the NFQ global configuration data.
Definition: source-nfq.c:208
TmModuleReceiveWinDivertRegister
void TmModuleReceiveWinDivertRegister(void)
Definition: source-windivert.c:61
SystemHugepageSnapshot
Definition: util-hugepages.h:44
EngineModeIsFirewall
bool EngineModeIsFirewall(void)
Definition: suricata.c:239
REVISION
#define REVISION
Definition: suricata-common.h:61
HOST_VERBOSE
#define HOST_VERBOSE
Definition: host.h:92
TM_ECODE_FAILED
@ TM_ECODE_FAILED
Definition: tm-threads-common.h:82
SCProfilingDestroy
void SCProfilingDestroy(void)
Free resources used by profiling.
Definition: util-profiling.c:276
AFPPeersListClean
void AFPPeersListClean(void)
Clean the global peers list.
Definition: source-af-packet.c:581
RunModeInitializeOutputs
void RunModeInitializeOutputs(void)
Definition: runmodes.c:768
DetectPortTestConfVars
int DetectPortTestConfVars(void)
Definition: detect-engine-port.c:1058
SCThresholdConfGlobalInit
void SCThresholdConfGlobalInit(void)
Definition: util-threshold-config.c:102
DecodeUnregisterCounters
void DecodeUnregisterCounters(void)
Definition: decode.c:608
SCInstance_::capture_plugin_name
const char * capture_plugin_name
Definition: suricata.h:182
SCConfYamlLoadFile
int SCConfYamlLoadFile(const char *filename)
Load configuration from a YAML file.
Definition: conf-yaml-loader.c:490
HostBitInitCtx
void HostBitInitCtx(void)
Definition: host-bit.c:49
EngineMode
EngineMode
Definition: suricata.h:106
SCInstance_::set_datadir
bool set_datadir
Definition: suricata.h:160
tmqh-packetpool.h
IsRunModeSystem
bool IsRunModeSystem(enum SCRunModes run_mode_to_check)
Definition: runmodes.c:544
g_ut_covered
int g_ut_covered
Definition: suricata.c:966
SCInstance_::capture_plugin_args
const char * capture_plugin_args
Definition: suricata.h:183
g_recurlvl_mask
uint8_t g_recurlvl_mask
Definition: suricata.c:214
ThresholdRegisterGlobalCounters
void ThresholdRegisterGlobalCounters(void)
Definition: detect-engine-threshold.c:130
TmModuleLoggerRegister
void TmModuleLoggerRegister(void)
Definition: output.c:906
host_mode
uint8_t host_mode
Definition: suricata.c:184
FeatureDump
void FeatureDump(void)
Definition: feature.c:139
PacketPoolInit
void PacketPoolInit(void)
Definition: tmqh-packetpool.c:235
TM_ECODE_OK
@ TM_ECODE_OK
Definition: tm-threads-common.h:81
AppLayerDeSetup
int AppLayerDeSetup(void)
De initializes the app layer.
Definition: app-layer.c:1100
RUNMODE_LIST_APP_LAYER_HOOKS
@ RUNMODE_LIST_APP_LAYER_HOOKS
Definition: runmodes.h:49
RUNMODE_UNIX_SOCKET
@ RUNMODE_UNIX_SOCKET
Definition: runmodes.h:42
strlcpy
size_t strlcpy(char *dst, const char *src, size_t siz)
Definition: util-strlcpyu.c:43
PcapTranslateIPToDevice
void PcapTranslateIPToDevice(char *pcap_dev, size_t len)
Definition: source-pcap.c:651
FlowDisableFlowRecyclerThread
void FlowDisableFlowRecyclerThread(void)
Used to disable flow recycler thread(s).
Definition: flow-manager.c:1241
SCRunmodeSet
void SCRunmodeSet(SCRunMode run_mode)
Set the current run mode.
Definition: suricata.c:294
ParseSizeInit
void ParseSizeInit(void)
Definition: util-misc.c:36
TmModuleDecodePcapFileRegister
void TmModuleDecodePcapFileRegister(void)
Definition: source-pcap-file.c:130
TmModuleBypassedFlowManagerRegister
void TmModuleBypassedFlowManagerRegister(void)
Definition: flow-bypass.c:220
IPPairShutdown
void IPPairShutdown(void)
shutdown the flow engine
Definition: ippair.c:290
source-erf-dag.h
THV_RUNNING_DONE
#define THV_RUNNING_DONE
Definition: threadvars.h:46
SCConfInit
void SCConfInit(void)
Initialize the configuration system.
Definition: conf.c:121
util-signal.h
DetectParseFreeRegexes
void DetectParseFreeRegexes(void)
Definition: detect-parse.c:3552
SCConfDump
void SCConfDump(void)
Dump configuration to stdout.
Definition: conf.c:792
TmModuleDecodeNFLOGRegister
void TmModuleDecodeNFLOGRegister(void)
Definition: source-nflog.c:55
NFQParseAndRegisterQueues
int NFQParseAndRegisterQueues(const char *queues)
Parses and adds Netfilter queue(s).
Definition: source-nfq.c:881
RUNMODE_NETMAP
@ RUNMODE_NETMAP
Definition: runmodes.h:38
FlowInitConfig
void FlowInitConfig(bool quiet)
initialize the configuration
Definition: flow.c:571
AppLayerSetup
int AppLayerSetup(void)
Setup the app layer.
Definition: app-layer.c:1083
SURI_HOST_IS_ROUTER
@ SURI_HOST_IS_ROUTER
Definition: suricata.h:126
FeatureTrackingRegister
void FeatureTrackingRegister(void)
Definition: feature.c:147
TmModuleReceiveDPDKRegister
void TmModuleReceiveDPDKRegister(void)
Definition: source-dpdk.c:51
UnixManagerThreadSpawnNonRunmode
void UnixManagerThreadSpawnNonRunmode(const bool unix_socket_enabled)
Definition: unix-manager.c:1283
RunModeInitializeThreadSettings
void RunModeInitializeThreadSettings(void)
Definition: runmodes.c:953
StreamTcpInitConfig
void StreamTcpInitConfig(bool)
To initialize the stream global configuration data.
Definition: stream-tcp.c:498
ENGINE_MODE_UNKNOWN
@ ENGINE_MODE_UNKNOWN
Definition: suricata.h:107
app-layer-htp.h
util-flow-rate.h
datasets.h
GetIfaceMaxPacketSize
int GetIfaceMaxPacketSize(LiveDevice *ld)
output max packet size for a link
Definition: util-ioctl.c:121
SCRunmodeGet
SCRunMode SCRunmodeGet(void)
Get the current run mode.
Definition: suricata.c:289
TmModuleDecodeNetmapRegister
void TmModuleDecodeNetmapRegister(void)
Registration Function for DecodeNetmap.
Definition: source-netmap.c:85
PreRunPostPrivsDropInit
void PreRunPostPrivsDropInit(const int runmode)
Definition: suricata.c:2360
feature.h
decode.h
SigTableCleanup
void SigTableCleanup(void)
Definition: detect-engine-register.c:476
DetectEngineMoveToFreeList
int DetectEngineMoveToFreeList(DetectEngineCtx *de_ctx)
Definition: detect-engine.c:4748
sigterm_count
volatile sig_atomic_t sigterm_count
Definition: suricata.c:159
source-nfq.h
TVT_PPT
@ TVT_PPT
Definition: tm-threads-common.h:88
de_ctx
DetectEngineCtx * de_ctx
Definition: fuzz_siginit.c:19
TmThreadWaitOnThreadInit
TmEcode TmThreadWaitOnThreadInit(void)
Used to check if all threads have finished their initialization. On finding an un-initialized thread,...
Definition: tm-threads.c:2011
SCLogLevel2Name
const char * SCLogLevel2Name(const SCLogLevel lvl)
Definition: util-debug.c:1071
TmModuleVerdictNFQRegister
void TmModuleVerdictNFQRegister(void)
Definition: source-nfq.c:185
AppLayerRegisterGlobalCounters
void AppLayerRegisterGlobalCounters(void)
HACK to work around our broken unix manager (re)init loop.
Definition: app-layer.c:1164
RunModeListRunmodes
void RunModeListRunmodes(void)
Lists all registered runmodes.
Definition: runmodes.c:256
strlcat
size_t strlcat(char *, const char *src, size_t siz)
Definition: util-strlcatu.c:45
util-cpu.h
suricata
SCInstance suricata
Definition: suricata.c:227
SCInstance_::unix_socket_enabled
bool unix_socket_enabled
Definition: suricata.h:161
LiveSetOffloadDisable
void LiveSetOffloadDisable(void)
Definition: util-device.c:77
StatsSetupPostConfigPostOutput
void StatsSetupPostConfigPostOutput(void)
Definition: counters.c:976
EngineModeSetIDS
void EngineModeSetIDS(void)
Definition: suricata.c:274
RUNMODE_LIST_KEYWORDS
@ RUNMODE_LIST_KEYWORDS
Definition: runmodes.h:46
SpmTableSetup
void SpmTableSetup(void)
Definition: util-spm.c:131
TmModuleReceiveAFPRegister
void TmModuleReceiveAFPRegister(void)
Registration Function for RecieveAFP.
Definition: source-af-packet.c:381
RUNMODE_UNITTEST
@ RUNMODE_UNITTEST
Definition: runmodes.h:41
LiveBuildDeviceListCustom
int LiveBuildDeviceListCustom(const char *runmode, const char *itemname)
Definition: util-device.c:299
util-exception-policy.h
LiveGetDevice
LiveDevice * LiveGetDevice(const char *name)
Get a pointer to the device at idx.
Definition: util-device.c:268
UnixSocketKillSocketThread
void UnixSocketKillSocketThread(void)
Definition: unix-manager.c:1279
TmModuleVerdictIPFWRegister
void TmModuleVerdictIPFWRegister(void)
Registration Function for VerdictIPFW.
Definition: source-ipfw.c:172
flow-worker.h
SCConfGetInt
int SCConfGetInt(const char *name, intmax_t *val)
Retrieve a configuration value as an integer.
Definition: conf.c:415
g_stats_eps_per_app_proto_errors
bool g_stats_eps_per_app_proto_errors
Definition: suricata.c:224
HttpRangeContainersInit
void HttpRangeContainersInit(void)
Definition: app-layer-htp-range.c:169
util-reference-config.h
DetectEngineCtx_::last_reload
struct timeval last_reload
Definition: detect.h:1107
SCInstance_::delayed_detect
int delayed_detect
Definition: suricata.h:165
TmModuleVerdictWinDivertRegister
void TmModuleVerdictWinDivertRegister(void)
Definition: source-windivert.c:68
DetectEngineCtx_::failure_fatal
bool failure_fatal
Definition: detect.h:938
SCInstance_::progname
const char * progname
Definition: suricata.h:176
HostCleanup
void HostCleanup(void)
Cleanup the host engine.
Definition: host.c:332
SCEnter
#define SCEnter(...)
Definition: util-debug.h:284
FlowDisableFlowManagerThread
void FlowDisableFlowManagerThread(void)
Used to disable flow manager thread(s).
Definition: flow-manager.c:133
RUNMODE_DAG
@ RUNMODE_DAG
Definition: runmodes.h:35
util-ebpf.h
SCInstance_::pcap_dev
char pcap_dev[128]
Definition: suricata.h:137
detect.h
util-affinity.h
UtilSignalUnblock
int UtilSignalUnblock(int signum)
Definition: util-signal.c:46
DetectEngineEnabled
int DetectEngineEnabled(void)
Check if detection is enabled.
Definition: detect-engine.c:3829
TmThreadClearThreadsFamily
void TmThreadClearThreadsFamily(int family)
Definition: tm-threads.c:1681
THV_KILL
#define THV_KILL
Definition: threadvars.h:40
THV_REQ_FLOW_LOOP
#define THV_REQ_FLOW_LOOP
Definition: threadvars.h:47
FlowRateRegisterFlowStorage
void FlowRateRegisterFlowStorage(void)
Definition: util-flow-rate.c:60
TmModuleRunInit
void TmModuleRunInit(void)
Definition: tm-modules.c:104
detect-engine-port.h
EngineModeSetIPS
void EngineModeSetIPS(void)
Definition: suricata.c:263
SCInstance_::user_name
const char * user_name
Definition: suricata.h:150
HTPAtExitPrintStats
void HTPAtExitPrintStats(void)
Print the stats of the HTTP requests.
Definition: app-layer-htp.c:1582
util-time.h
UtilSignalBlock
int UtilSignalBlock(int signum)
Definition: util-signal.c:29
SCProfilingPrefilterGlobalInit
void SCProfilingPrefilterGlobalInit(void)
Definition: util-profiling-prefilter.c:61
ThresholdDestroy
void ThresholdDestroy(void)
Definition: detect-engine-threshold.c:139
SCLogWarning
#define SCLogWarning(...)
Macro used to log WARNING messages.
Definition: util-debug.h:262
PostConfLoadedSetup
int PostConfLoadedSetup(SCInstance *suri)
Definition: suricata.c:2775
GetProgramVersion
const char * GetProgramVersion(void)
get string with program version
Definition: suricata.c:1207
engine_analysis
int engine_analysis
app-layer-parser.h
TmModuleReceivePcapFileRegister
void TmModuleReceivePcapFileRegister(void)
Definition: source-pcap-file.c:117
BUG_ON
#define BUG_ON(x)
Definition: suricata-common.h:317
runmode-netmap.h
CoredumpLoadConfig
int32_t CoredumpLoadConfig(void)
Configures the core dump size.
Definition: util-coredump-config.c:95
detect-engine-tag.h
IPFWRegisterQueue
int IPFWRegisterQueue(char *queue)
Add an IPFW divert.
Definition: source-ipfw.c:700
xstr
#define xstr(s)
Definition: suricata-common.h:307
util-profiling.h
ListAppLayerHooks
int ListAppLayerHooks(const char *conf_filename)
Definition: util-running-modes.c:78
ListAppLayerProtocols
int ListAppLayerProtocols(const char *conf_filename)
Definition: util-running-modes.c:46
SCInstance_::offline
int offline
Definition: suricata.h:168
DatasetsDestroy
void DatasetsDestroy(void)
Definition: datasets.c:770
UtilCpuPrintSummary
void UtilCpuPrintSummary(void)
Print a summary of CPUs detected (configured and online)
Definition: util-cpu.c:140
profiling_packets_enabled
int profiling_packets_enabled
Definition: util-profiling.c:94
SystemDNotifyReady
int SystemDNotifyReady(void)
TmThreadKillThreads
void TmThreadKillThreads(void)
Definition: tm-threads.c:1627
OutputDeregisterAll
void OutputDeregisterAll(void)
Deregister all modules. Useful for a memory clean exit.
Definition: output.c:654
source-pcap-file-helper.h
PostConfLoadedDetectSetup
void PostConfLoadedDetectSetup(SCInstance *suri)
Definition: suricata.c:2682
EngineModeIsIDS
int EngineModeIsIDS(void)
Definition: suricata.c:252
RUNMODE_PLUGIN
@ RUNMODE_PLUGIN
Definition: runmodes.h:44
util-systemd.h
tmm_modules
TmModule tmm_modules[TMM_SIZE]
Definition: tm-modules.c:29
conf-yaml-loader.h
SURICATA_DEINIT
@ SURICATA_DEINIT
Definition: suricata.h:102
decode-sll.h
SCConfigGetLogDirectory
const char * SCConfigGetLogDirectory(void)
Definition: util-conf.c:38
coverage_unittests
int coverage_unittests
Definition: suricata.c:964
DatasetsSave
void DatasetsSave(void)
Definition: datasets.c:848
detect-engine-alert.h
conf.h
util-landlock.h
source-ipfw.h
TMM_SIZE
@ TMM_SIZE
Definition: tm-threads-common.h:76
source-netmap.h
OutputNotifyFileRotation
void OutputNotifyFileRotation(void)
Notifies all registered file rotation notification flags.
Definition: output.c:731
RUNMODE_WINDIVERT
@ RUNMODE_WINDIVERT
Definition: runmodes.h:43
VarNameStoreDestroy
void VarNameStoreDestroy(void)
Definition: util-var-name.c:116
SCInstance_::verbose
int verbose
Definition: suricata.h:169
source-lib.h
TmEcode
TmEcode
Definition: tm-threads-common.h:80
source-windivert.h
TmModuleFlowWorkerRegister
void TmModuleFlowWorkerRegister(void)
Definition: flow-worker.c:794
max_pending_packets
uint32_t max_pending_packets
Definition: suricata.c:187
util-plugin.h
SCInstance_::additional_configs
const char ** additional_configs
Definition: suricata.h:178
flow-timeout.h
DEFAULT_PID_FILENAME
#define DEFAULT_PID_FILENAME
Definition: suricata.h:88
RUNMODE_AFP_DEV
@ RUNMODE_AFP_DEV
Definition: runmodes.h:36
sighup_count
volatile sig_atomic_t sighup_count
Definition: suricata.c:158
ConfigSetDataDirectory
TmEcode ConfigSetDataDirectory(char *name)
Definition: util-conf.c:66
TmModuleDecodeErfDagRegister
void TmModuleDecodeErfDagRegister(void)
Register the ERF file decoder module.
Definition: source-erf-dag.c:151
SCInstance_::set_logdir
bool set_logdir
Definition: suricata.h:159
SCDropMainThreadCaps
#define SCDropMainThreadCaps(...)
Definition: util-privs.h:90
TmModuleDebugList
void TmModuleDebugList(void)
Definition: tm-modules.c:31
TmModuleDecodeNFQRegister
void TmModuleDecodeNFQRegister(void)
Definition: source-nfq.c:194
util-proto-name.h
STREAM_VERBOSE
#define STREAM_VERBOSE
Definition: stream-tcp.h:35
defrag.h
SCProtoNameRelease
void SCProtoNameRelease(void)
Definition: util-proto-name.c:435
MpmTableSetup
void MpmTableSetup(void)
Definition: util-mpm.c:224
SCInstance_::log_dir
const char * log_dir
Definition: suricata.h:175
RunmodeIsUnittests
int RunmodeIsUnittests(void)
Definition: suricata.c:280
source-nfq-prototypes.h
SCLogInfo
#define SCLogInfo(...)
Macro used to log INFORMATIONAL messages.
Definition: util-debug.h:232
TmModuleReceiveNFLOGRegister
void TmModuleReceiveNFLOGRegister(void)
Definition: source-nflog.c:49
DEFAULT_PACKET_SIZE
#define DEFAULT_PACKET_SIZE
Definition: decode.h:699
WarnInvalidConfEntry
#define WarnInvalidConfEntry(param_name, format, value)
Generic API that can be used by all to log an invalid conf entry.
Definition: util-misc.h:35
TM_FLAG_RECEIVE_TM
#define TM_FLAG_RECEIVE_TM
Definition: tm-modules.h:32
util-host-os-info.h
TmModuleReceiveErfFileRegister
void TmModuleReceiveErfFileRegister(void)
Register the ERF file receiver (reader) module.
Definition: source-erf-file.c:80
SCConfSetFromString
int SCConfSetFromString(const char *input, int final)
Set a configuration parameter from a string.
Definition: conf.c:265
RUNMODE_PRINT_USAGE
@ RUNMODE_PRINT_USAGE
Definition: runmodes.h:54
SCConfSetFinal
int SCConfSetFinal(const char *name, const char *val)
Set a final configuration value.
Definition: conf.c:319
TmModule_
Definition: tm-modules.h:47
SCRealloc
#define SCRealloc(ptr, sz)
Definition: util-mem.h:50
TmModuleDecodeAFXDPRegister
void TmModuleDecodeAFXDPRegister(void)
Registration Function for DecodeAFXDP.
Definition: source-af-xdp.c:91
default_packet_size
uint32_t default_packet_size
Definition: decode.c:77
tm-queuehandlers.h
SigTableApplyStrictCommandLineOption
void SigTableApplyStrictCommandLineOption(const char *str)
Definition: detect-parse.c:343
DETECT_ENGINE_TYPE_NORMAL
@ DETECT_ENGINE_TYPE_NORMAL
Definition: detect.h:907
PROG_NAME
#define PROG_NAME
Definition: suricata.h:75
TmThreadKillThreadsFamily
void TmThreadKillThreadsFamily(int family)
Definition: tm-threads.c:1598
detect-fast-pattern.h
FeatureTrackingRelease
void FeatureTrackingRelease(void)
Definition: feature.c:131
TmqhCleanup
void TmqhCleanup(void)
Clean up registration time allocs.
Definition: tm-queuehandlers.c:49
util-dpdk.h
util-conf.h
StreamTcpFreeConfig
void StreamTcpFreeConfig(bool quiet)
Definition: stream-tcp.c:869
source-dpdk.h
flow-manager.h
DecodeGlobalConfig
void DecodeGlobalConfig(void)
Definition: decode.c:1071
SCInstance_::strict_rule_parsing_string
char * strict_rule_parsing_string
Definition: suricata.h:180
SuriHasSigFile
int SuriHasSigFile(void)
Definition: suricata.c:229
suricata-common.h
DetectEngineCtxInitStubForMT
DetectEngineCtx * DetectEngineCtxInitStubForMT(void)
Definition: detect-engine.c:2603
util-path.h
util-daemon.h
LiveGetDeviceName
const char * LiveGetDeviceName(int number)
Get a pointer to the device name at idx.
Definition: util-device.c:204
VERBOSE_MAX
#define VERBOSE_MAX
Definition: suricata.c:173
FlowShutdown
void FlowShutdown(void)
shutdown the flow engine
Definition: flow.c:715
SCHInfoLoadFromConfig
void SCHInfoLoadFromConfig(void)
Load the host os policy information from the configuration.
Definition: util-host-os-info.c:281
DetectEngineBumpVersion
void DetectEngineBumpVersion(void)
Definition: detect-engine.c:3853
source-af-xdp.h
TmModuleFlowManagerRegister
void TmModuleFlowManagerRegister(void)
Definition: flow-manager.c:1299
SCStartInternalRunMode
int SCStartInternalRunMode(int argc, char **argv)
Definition: suricata.c:2434
SCPidfileTestRunning
int SCPidfileTestRunning(const char *pid_filename)
Check the Suricata pid file (used at the startup)
Definition: util-pidfile.c:105
HostShutdown
void HostShutdown(void)
shutdown the flow engine
Definition: host.c:296
DOC_URL
#define DOC_URL
Definition: suricata.h:90
SCFstatFn
#define SCFstatFn(fd, statbuf)
Definition: util-path.h:34
output-filestore.h
LiveSetOffloadWarn
void LiveSetOffloadWarn(void)
Definition: util-device.c:82
ParseSizeDeinit
void ParseSizeDeinit(void)
Definition: util-misc.c:55
util-classification-config.h
SCConfDeInit
void SCConfDeInit(void)
De-initializes the configuration system.
Definition: conf.c:734
RunModeRegisterRunModes
void RunModeRegisterRunModes(void)
Register all runmodes in the engine.
Definition: runmodes.c:231
ListRuleProtocols
int ListRuleProtocols(const char *conf_filename)
Definition: util-running-modes.c:59
SCStrdup
#define SCStrdup(s)
Definition: util-mem.h:56
FatalError
#define FatalError(...)
Definition: util-debug.h:517
SCProfilingDump
void SCProfilingDump(void)
Definition: util-profiling.c:311
TmModuleReceiveAFXDPRegister
void TmModuleReceiveAFXDPRegister(void)
Definition: source-af-xdp.c:77
EngineStop
void EngineStop(void)
make sure threads can stop the engine by calling this function. Purpose: pcap file mode needs to be a...
Definition: suricata.c:480
SCInstance_::sig_file
char * sig_file
Definition: suricata.h:138
RUNMODE_PRINT_VERSION
@ RUNMODE_PRINT_VERSION
Definition: runmodes.h:52
ParseSizeStringU32
int ParseSizeStringU32(const char *size, uint32_t *res)
Definition: util-misc.c:174
TmModuleReceiveErfDagRegister
void TmModuleReceiveErfDagRegister(void)
Register the ERF file receiver (reader) module.
Definition: source-erf-dag.c:133
IPPairBitInitCtx
void IPPairBitInitCtx(void)
Definition: ippair-bit.c:49
ConfigSetLogDirectory
TmEcode ConfigSetLogDirectory(const char *name)
Definition: util-conf.c:33
util-validate.h
TmModuleDecodeIPFWRegister
void TmModuleDecodeIPFWRegister(void)
Registration Function for DecodeIPFW.
Definition: source-ipfw.c:188
source-af-packet.h
ConfUnixSocketIsEnable
int ConfUnixSocketIsEnable(void)
Definition: util-conf.c:141
TM_FLAG_PACKET_ALL
#define TM_FLAG_PACKET_ALL
Definition: tm-modules.h:40
SCLogConfig
struct SCLogConfig_ SCLogConfig
Holds the config state used by the logging api.
DETECT_ENGINE_MPM_CACHE_OP_SAVE
#define DETECT_ENGINE_MPM_CACHE_OP_SAVE
Definition: detect.h:1713
g_vlan_mask
uint16_t g_vlan_mask
Definition: suricata.c:206
RUNMODE_ERF_FILE
@ RUNMODE_ERF_FILE
Definition: runmodes.h:34
DatasetsInit
int DatasetsInit(void)
Definition: datasets.c:618
RUNMODE_DUMP_CONFIG
@ RUNMODE_DUMP_CONFIG
Definition: runmodes.h:55
sigusr2_count
volatile sig_atomic_t sigusr2_count
Definition: suricata.c:160
SystemHugepageSnapshotDestroy
void SystemHugepageSnapshotDestroy(SystemHugepageSnapshot *s)
Definition: util-hugepages.c:302
TmModuleDecodePcapRegister
void TmModuleDecodePcapRegister(void)
Registration Function for DecodePcap.
Definition: source-pcap.c:153
util-running-modes.h
SCLoadYamlConfig
TmEcode SCLoadYamlConfig(void)
Definition: suricata.c:1033
unix-manager.h
runmode-af-xdp.h
str
#define str(s)
Definition: suricata-common.h:308
ConfigCheckDataDirectory
TmEcode ConfigCheckDataDirectory(const char *data_dir)
Definition: util-conf.c:104
SCConfGetNode
SCConfNode * SCConfGetNode(const char *name)
Get a SCConfNode by name.
Definition: conf.c:182
SCLogError
#define SCLogError(...)
Macro used to log ERROR messages.
Definition: util-debug.h:274
g_detect_disabled
int g_detect_disabled
Definition: suricata.c:190
DetectEngineReloadStart
int DetectEngineReloadStart(void)
Definition: detect-engine.c:1888
SCFree
#define SCFree(p)
Definition: util-mem.h:61
TopologyDestroy
void TopologyDestroy(void)
DEFAULT_CONF_FILE
#define DEFAULT_CONF_FILE
Definition: suricata.h:84
SC_LOG_MAX_LOG_MSG_LEN
#define SC_LOG_MAX_LOG_MSG_LEN
Definition: util-debug.h:92
AppLayerParserPostStreamSetup
void AppLayerParserPostStreamSetup(void)
Definition: app-layer-parser.c:272
TmModuleReceivePcapRegister
void TmModuleReceivePcapRegister(void)
Registration Function for ReceivePcap.
Definition: source-pcap.c:135
RUNMODE_DPDK
@ RUNMODE_DPDK
Definition: runmodes.h:39
SCGetUserID
void SCGetUserID(const char *user_name, const char *group_name, uint32_t *uid, uint32_t *gid)
Function to get the user and group ID from the specified user name.
Definition: util-privs.c:143
util-ioctl.h
detect-parse.h
RUNMODE_PCAP_DEV
@ RUNMODE_PCAP_DEV
Definition: runmodes.h:29
SCInstance_::system
bool system
Definition: suricata.h:158
SCInstance_::pid_filename
char * pid_filename
Definition: suricata.h:140
SCInstance_::install_signal_handlers
bool install_signal_handlers
Definition: suricata.h:163
TmModuleRespondRejectRegister
void TmModuleRespondRejectRegister(void)
Definition: respond-reject.c:50
CoredumpEnable
void CoredumpEnable(void)
Enable coredumps on systems where coredumps can and need to be enabled.
Definition: util-coredump-config.c:62
RunUnittests
void RunUnittests(int list_unittests, const char *regex_arg)
Definition: runmode-unittests.c:239
source-erf-file.h
ConfigCheckLogDirectoryExists
TmEcode ConfigCheckLogDirectoryExists(const char *log_dir)
Definition: util-conf.c:56
SCConfSet
int SCConfSet(const char *name, const char *val)
Set a configuration value.
Definition: conf.c:240
TimeDeinit
void TimeDeinit(void)
Definition: util-time.c:87
PacketAlertTagInit
void PacketAlertTagInit(void)
Definition: detect-engine-alert.c:47
RunModeEngineIsIPS
int RunModeEngineIsIPS(int capture_mode, const char *runmode, const char *capture_plugin_name)
Definition: runmodes.c:375
SURICATA_RUNTIME
@ SURICATA_RUNTIME
Definition: suricata.h:101
DetectEngineCtxInit
DetectEngineCtx * DetectEngineCtxInit(void)
Definition: detect-engine.c:2613
TVT_MGMT
@ TVT_MGMT
Definition: tm-threads-common.h:89
SCOnLoggingReady
void SCOnLoggingReady(void)
Invokes all registered logging ready callbacks.
Definition: output.c:774
TmModuleDecodeLibRegister
void TmModuleDecodeLibRegister(void)
register a "Decode" module for suricata as a library.
Definition: source-lib.c:107
EngineModeIsIPS
int EngineModeIsIPS(void)
Definition: suricata.c:246
ListAppLayerFrames
int ListAppLayerFrames(const char *conf_filename)
Definition: util-running-modes.c:128
SCProfilingKeywordsGlobalInit
void SCProfilingKeywordsGlobalInit(void)
Definition: util-profiling-keywords.c:61
suricata.h
EngineDone
void EngineDone(void)
Used to indicate that the current task is done.
Definition: suricata.c:491
SCInstance_::firewall_rule_file_exclusive
bool firewall_rule_file_exclusive
Definition: suricata.h:143
FLOW_QUIET
#define FLOW_QUIET
Definition: flow.h:43
GetDocURL
const char * GetDocURL(void)
Definition: suricata.c:1186
util-mpm-hs.h
PostRunDeinit
void PostRunDeinit(const int runmode, struct timeval *start_time)
clean up / shutdown code for packet modes
Definition: suricata.c:2376
HostInitConfig
void HostInitConfig(bool quiet)
initialize the configuration
Definition: host.c:168
TmThreadWaitOnThreadRunning
TmEcode TmThreadWaitOnThreadRunning(void)
Waits for all threads to be in a running state.
Definition: tm-threads.c:1903
HttpRangeContainersDestroy
void HttpRangeContainersDestroy(void)
Definition: app-layer-htp-range.c:202
RUNMODE_CONF_TEST
@ RUNMODE_CONF_TEST
Definition: runmodes.h:56
SCLogLoadConfig
void SCLogLoadConfig(int daemon, int verbose, uint32_t userid, uint32_t groupid)
Definition: util-debug.c:1426
DetectEngineReload
int DetectEngineReload(const SCInstance *suri)
Reload the detection engine.
Definition: detect-engine.c:4815
DEFAULT_MAX_PENDING_PACKETS
#define DEFAULT_MAX_PENDING_PACKETS
Definition: suricata.c:170
SCInstance_
Definition: suricata.h:133
DetectEngineClearMaster
void DetectEngineClearMaster(void)
Definition: detect-engine.c:4788
SetMasterExceptionPolicy
void SetMasterExceptionPolicy(void)
Definition: util-exception-policy.c:65
TmThreadCheckThreadState
void TmThreadCheckThreadState(void)
Used to check the thread for certain conditions of failure.
Definition: tm-threads.c:1988
OutputFilestoreRegisterGlobalCounters
void OutputFilestoreRegisterGlobalCounters(void)
Definition: output-filestore.c:537
InitGlobal
int InitGlobal(void)
Global initialization common to all runmodes.
Definition: suricata.c:3024
SCInstance_::disabled_detect
int disabled_detect
Definition: suricata.h:166
LiveGetDeviceCount
int LiveGetDeviceCount(void)
Get the number of registered devices.
Definition: util-device.c:170
SystemHugepageSnapshotCreate
SystemHugepageSnapshot * SystemHugepageSnapshotCreate(void)
The function creates a snapshot of the system's hugepage usage per NUMA node and per hugepage size....
Definition: util-hugepages.c:321
SCProfilingSghsGlobalInit
void SCProfilingSghsGlobalInit(void)
Definition: util-profiling-rulegroups.c:61
RUNMODE_LIST_RULE_PROTOS
@ RUNMODE_LIST_RULE_PROTOS
Definition: runmodes.h:48
SCPidfileCreate
int SCPidfileCreate(const char *pidfile)
Write a pid file (used at the startup) This commonly needed by the init scripts.
Definition: util-pidfile.c:42
LiveRegisterDeviceName
int LiveRegisterDeviceName(const char *dev)
Add a device for monitoring.
Definition: util-device.c:103
SCStatFn
#define SCStatFn(pathname, statbuf)
Definition: util-path.h:35
ENGINE_MODE_IDS
@ ENGINE_MODE_IDS
Definition: suricata.h:108
LiveDeviceFinalize
void LiveDeviceFinalize(void)
Definition: util-device.c:462
TmModuleDecodeDPDKRegister
void TmModuleDecodeDPDKRegister(void)
Registration Function for DecodeDPDK.
Definition: source-dpdk.c:65
SCInstance_::sig_file_exclusive
bool sig_file_exclusive
Definition: suricata.h:139
PROG_VER
#define PROG_VER
Definition: suricata.h:76
util-misc.h
PacketPoolDestroy
void PacketPoolDestroy(void)
Definition: tmqh-packetpool.c:265
HTPFreeConfig
void HTPFreeConfig(void)
Clears the HTTP server configuration memory used by HTP library.
Definition: app-layer-htp.c:1595
flow.h
LandlockSandboxing
void LandlockSandboxing(SCInstance *suri)
Definition: util-landlock.c:36
respond-reject.h
SCInstance_::regex_arg
char * regex_arg
Definition: suricata.h:141
ListKeywords
int ListKeywords(const char *keyword_info)
Definition: util-running-modes.c:34
SCLogNotice
#define SCLogNotice(...)
Macro used to log NOTICE messages.
Definition: util-debug.h:250
SuricataPreInit
void SuricataPreInit(const char *progname)
Definition: suricata.c:3060
SCInstance_::additional_plugins
const char ** additional_plugins
Definition: suricata.h:179
RUNMODE_PCAP_FILE
@ RUNMODE_PCAP_FILE
Definition: runmodes.h:30
DPDKCleanupEAL
void DPDKCleanupEAL(void)
Definition: util-dpdk.c:30
SCCalloc
#define SCCalloc(nm, sz)
Definition: util-mem.h:53
util-enum.h
SCReturnInt
#define SCReturnInt(x)
Definition: util-debug.h:288
RUNMODE_PRINT_BUILDINFO
@ RUNMODE_PRINT_BUILDINFO
Definition: runmodes.h:53
SCConfNode_
Definition: conf.h:37
SCPidfileRemove
void SCPidfileRemove(const char *pid_filename)
Remove the pid file (used at the startup)
Definition: util-pidfile.c:83
SCConfNode_::val
char * val
Definition: conf.h:39
ThresholdInit
void ThresholdInit(void)
Definition: detect-engine-threshold.c:123
TimeInit
void TimeInit(void)
Definition: util-time.c:79
SCInstance_::keyword_info
char * keyword_info
Definition: suricata.h:147
RUNMODE_LIST_UNITTEST
@ RUNMODE_LIST_UNITTEST
Definition: runmodes.h:57
NFQContextsClean
void NFQContextsClean(void)
Clean global contexts. Must be called on exit.
Definition: source-nfq.c:1303
SystemHugepageEvaluateHugepages
void SystemHugepageEvaluateHugepages(SystemHugepageSnapshot *pre_s, SystemHugepageSnapshot *post_s)
The function compares two hugepage snapshots and prints out recommendations for hugepage configuratio...
Definition: util-hugepages.c:361
DEBUG_VALIDATE_BUG_ON
#define DEBUG_VALIDATE_BUG_ON(exp)
Definition: util-validate.h:102
SCFinalizeRunMode
int SCFinalizeRunMode(void)
Definition: suricata.c:2508
SCStat
struct stat SCStat
Definition: util-path.h:33
SCProfilingInit
void SCProfilingInit(void)
Initialize profiling.
Definition: util-profiling.c:133
g_ut_modules
int g_ut_modules
Definition: suricata.c:965
detect-engine-address.h
GlobalsDestroy
void GlobalsDestroy(void)
Definition: suricata.c:400
output.h
util-threshold-config.h
DefragInit
void DefragInit(void)
Definition: defrag.c:1109
DetectEngineReloadIsStart
int DetectEngineReloadIsStart(void)
Definition: detect-engine.c:1902
SCStorageFinalize
int SCStorageFinalize(void)
Definition: util-storage.c:135
suricata_ctl_flags
volatile uint8_t suricata_ctl_flags
Definition: suricata.c:176
RUNMODE_IPFW
@ RUNMODE_IPFW
Definition: runmodes.h:33
host-bit.h
detect-engine-threshold.h
TM_FLAG_FLOWWORKER_TM
#define TM_FLAG_FLOWWORKER_TM
Definition: tm-modules.h:34
RUNMODE_LIST_RUNMODES
@ RUNMODE_LIST_RUNMODES
Definition: runmodes.h:51
app-layer.h
TagDestroyCtx
void TagDestroyCtx(void)
Destroy tag context hash tables.
Definition: detect-engine-tag.c:72
DetectAddressTestConfVars
int DetectAddressTestConfVars(void)
Definition: detect-engine-address.c:1214
g_disable_randomness
int g_disable_randomness
Definition: suricata.c:199
geteuid
#define geteuid()
Definition: win32-misc.h:41
FlowWorkToDoCleanup
void FlowWorkToDoCleanup(void)
Clean up all the flows that have unprocessed segments and have some work to do in the detection engin...
Definition: flow-timeout.c:422
MpmHSGlobalCleanup
void MpmHSGlobalCleanup(void)
SCPluginsLoad
void SCPluginsLoad(const char *capture_plugin_name, const char *capture_plugin_args, const char **additional_plugins)
RUNMODE_DUMP_FEATURES
@ RUNMODE_DUMP_FEATURES
Definition: runmodes.h:64
g_disable_hashing
bool g_disable_hashing
Definition: suricata.c:218
TmqResetQueues
void TmqResetQueues(void)
Definition: tm-queues.c:80