Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Datasets locking/v9 #12564

Closed
wants to merge 4 commits into from
Closed

Conversation

inashivb
Copy link
Member

Link to ticket: https://redmine.openinfosecfoundation.org/issues/7398

Previous PR: #12550

Changes since v8:

  • made FatalErrorOnInit a macro on Rust side
  • renamed fns as per review
  • replaced fns w MSRV compatible Ipv6 parsing fns
  • rebased on top of latest master

SV_BRANCH=OISF/suricata-verify#2225

In a recent warning reported by scan-build, datasets were found to be
using a blocking call in a critical section.

datasets.c:187:12: warning: Call to blocking function 'fgets' inside of critical section [unix.BlockInCriticalSection]
  187 |     while (fgets(line, (int)sizeof(line), fp) != NULL) {
      |            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
datasets.c:292:12: warning: Call to blocking function 'fgets' inside of critical section [unix.BlockInCriticalSection]
  292 |     while (fgets(line, (int)sizeof(line), fp) != NULL) {
      |            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
datasets.c:368:12: warning: Call to blocking function 'fgets' inside of critical section [unix.BlockInCriticalSection]
  368 |     while (fgets(line, (int)sizeof(line), fp) != NULL) {
      |            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
datasets.c:442:12: warning: Call to blocking function 'fgets' inside of critical section [unix.BlockInCriticalSection]
  442 |     while (fgets(line, (int)sizeof(line), fp) != NULL) {
      |            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
datasets.c:512:12: warning: Call to blocking function 'fgets' inside of critical section [unix.BlockInCriticalSection]
  512 |     while (fgets(line, (int)sizeof(line), fp) != NULL) {
      |            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
5 warnings generated.

These calls are blocking in the multi tenant mode where several tenants
may be trying to load the same dataset in parallel.
In a single tenant mode, this operation is performed as a part of a
single thread before the engine startup.

In order to evade the warning and simplify the code, the initial file
reading is moved to Rust with this commit with a much simpler handling
of dataset and datarep.

Bug 7398
@inashivb inashivb force-pushed the datasets-locking/v9 branch from f39944c to 9a11039 Compare February 12, 2025 06:48
Copy link

codecov bot commented Feb 12, 2025

Codecov Report

Attention: Patch coverage is 77.31481% with 49 lines in your changes missing coverage. Please review.

Project coverage is 80.72%. Comparing base (0165830) to head (9a11039).

Additional details and impacted files
@@            Coverage Diff             @@
##           master   #12564      +/-   ##
==========================================
+ Coverage   80.70%   80.72%   +0.01%     
==========================================
  Files         928      929       +1     
  Lines      259013   258998      -15     
==========================================
+ Hits       209033   209069      +36     
+ Misses      49980    49929      -51     
Flag Coverage Δ
fuzzcorpus 56.98% <19.44%> (+0.02%) ⬆️
livemode 19.40% <0.00%> (+<0.01%) ⬆️
pcap 44.20% <0.46%> (+0.01%) ⬆️
suricata-verify 63.42% <79.14%> (+0.01%) ⬆️
unittests 58.38% <0.46%> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

@suricata-qa
Copy link

Information: QA ran without warnings.

Pipeline 24694

@suricata-qa
Copy link

Information: QA ran without warnings.

Pipeline 24696

@inashivb inashivb mentioned this pull request Feb 13, 2025
@inashivb inashivb closed this Feb 13, 2025
@inashivb inashivb deleted the datasets-locking/v9 branch February 13, 2025 05:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants