Coverage Report

Created: 2025-11-09 06:39

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/yara/libyara/scanner.c
Line
Count
Source
1
/*
2
Copyright (c) 2018. The YARA Authors. All Rights Reserved.
3
4
Redistribution and use in source and binary forms, with or without modification,
5
are permitted provided that the following conditions are met:
6
7
1. Redistributions of source code must retain the above copyright notice, this
8
list of conditions and the following disclaimer.
9
10
2. Redistributions in binary form must reproduce the above copyright notice,
11
this list of conditions and the following disclaimer in the documentation and/or
12
other materials provided with the distribution.
13
14
3. Neither the name of the copyright holder nor the names of its contributors
15
may be used to endorse or promote products derived from this software without
16
specific prior written permission.
17
18
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
19
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
20
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
21
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR
22
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
23
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
24
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
25
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
27
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28
*/
29
30
#include <stdlib.h>
31
#include <yara/ahocorasick.h>
32
#include <yara/error.h>
33
#include <yara/exec.h>
34
#include <yara/exefiles.h>
35
#include <yara/libyara.h>
36
#include <yara/mem.h>
37
#include <yara/object.h>
38
#include <yara/proc.h>
39
#include <yara/scanner.h>
40
#include <yara/strutils.h>
41
#include <yara/types.h>
42
43
#include "exception.h"
44
45
static int _yr_scanner_scan_mem_block(
46
    YR_SCANNER* scanner,
47
    const uint8_t* block_data,
48
    YR_MEMORY_BLOCK* block)
49
27.6k
{
50
27.6k
  YR_DEBUG_FPRINTF(
51
27.6k
      2,
52
27.6k
      stderr,
53
27.6k
      "+ %s(block_data=%p block->base=0x%" PRIx64 " block->size=%zu) {\n",
54
27.6k
      __FUNCTION__,
55
27.6k
      block_data,
56
27.6k
      block->base,
57
27.6k
      block->size);
58
59
27.6k
  int result = ERROR_SUCCESS;
60
61
27.6k
  YR_RULES* rules = scanner->rules;
62
27.6k
  YR_AC_TRANSITION* transition_table = rules->ac_transition_table;
63
27.6k
  uint32_t* match_table = rules->ac_match_table;
64
65
27.6k
  YR_AC_MATCH* match;
66
27.6k
  YR_AC_TRANSITION transition;
67
68
27.6k
  size_t i = 0;
69
27.6k
  uint32_t state = YR_AC_ROOT_STATE;
70
27.6k
  uint16_t index;
71
27.6k
  YR_STRING* report_string = NULL;
72
27.6k
  YR_RULE* rule = NULL;
73
74
512M
  while (i < block->size)
75
512M
  {
76
512M
    if (i % 4096 == 0 && scanner->timeout > 0)
77
0
    {
78
0
      if (yr_stopwatch_elapsed_ns(&scanner->stopwatch) > scanner->timeout)
79
0
      {
80
0
        result = ERROR_SCAN_TIMEOUT;
81
0
        goto _exit;
82
0
      }
83
0
    }
84
85
#if 2 == YR_DEBUG_VERBOSITY
86
    if (0 != state)
87
      YR_DEBUG_FPRINTF(
88
          2,
89
          stderr,
90
          "- match_table[state=%u]=%'u i=%'ld "
91
          "block_data=%p block->base=0x%" PRIx64 " // %s()\n",
92
          state,
93
          match_table[state],
94
          i,
95
          block_data,
96
          block->base,
97
          __FUNCTION__);
98
#endif
99
100
512M
    if (match_table[state] != 0)
101
0
    {
102
      // If the entry corresponding to state N in the match table is zero, it
103
      // means that there's no match associated to the state. If it's non-zero,
104
      // its value is the 1-based index within ac_match_pool where the first
105
      // match resides.
106
107
0
      match = &rules->ac_match_pool[match_table[state] - 1];
108
109
0
      if (scanner->matches->count >= YR_SLOW_STRING_MATCHES)
110
0
      {
111
0
        report_string = match->string;
112
0
        rule = report_string
113
0
                   ? &scanner->rules->rules_table[report_string->rule_idx]
114
0
                   : NULL;
115
0
      }
116
117
0
      while (match != NULL)
118
0
      {
119
0
        if (match->backtrack <= i)
120
0
        {
121
0
          GOTO_EXIT_ON_ERROR(yr_scan_verify_match(
122
0
              scanner,
123
0
              match,
124
0
              block_data,
125
0
              block->size,
126
0
              block->base,
127
0
              i - match->backtrack));
128
0
        }
129
130
0
        match = match->next;
131
0
      }
132
0
    }
133
134
512M
    index = block_data[i++] + 1;
135
512M
    transition = transition_table[state + index];
136
137
512M
    while (YR_AC_INVALID_TRANSITION(transition, index))
138
512M
    {
139
512M
      if (state != YR_AC_ROOT_STATE)
140
0
      {
141
0
        state = YR_AC_NEXT_STATE(transition_table[state]);
142
0
        transition = transition_table[state + index];
143
0
      }
144
512M
      else
145
512M
      {
146
512M
        transition = 0;
147
512M
        break;
148
512M
      }
149
512M
    }
150
151
512M
    state = YR_AC_NEXT_STATE(transition);
152
512M
  }
153
154
27.6k
  if (match_table[state] != 0)
155
0
  {
156
0
    match = &rules->ac_match_pool[match_table[state] - 1];
157
158
0
    while (match != NULL)
159
0
    {
160
0
      if (match->backtrack <= i)
161
0
      {
162
0
        GOTO_EXIT_ON_ERROR(yr_scan_verify_match(
163
0
            scanner,
164
0
            match,
165
0
            block_data,
166
0
            block->size,
167
0
            block->base,
168
0
            i - match->backtrack));
169
0
      }
170
171
0
      match = match->next;
172
0
    }
173
0
  }
174
175
27.6k
  if (rule != NULL && scanner->matches->count >= YR_SLOW_STRING_MATCHES &&
176
0
      scanner->matches->count < YR_MAX_STRING_MATCHES)
177
0
  {
178
0
    if (rule != NULL && report_string != NULL)
179
0
    {
180
0
      result = scanner->callback(
181
0
          scanner,
182
0
          CALLBACK_MSG_TOO_SLOW_SCANNING,
183
0
          (void*) report_string,
184
0
          scanner->user_data);
185
0
      if (result != CALLBACK_CONTINUE)
186
0
      {
187
0
        result = ERROR_TOO_SLOW_SCANNING;
188
0
        goto _exit;
189
0
      }
190
0
    }
191
0
  }
192
193
27.6k
_exit:
194
195
27.6k
  YR_DEBUG_FPRINTF(
196
27.6k
      2,
197
27.6k
      stderr,
198
27.6k
      "} = %d AKA %s // %s()\n",
199
27.6k
      result,
200
27.6k
      yr_debug_error_as_string(result),
201
27.6k
      __FUNCTION__);
202
203
27.6k
  return result;
204
27.6k
}
205
206
static void _yr_scanner_clean_matches(YR_SCANNER* scanner)
207
27.6k
{
208
27.6k
  YR_DEBUG_FPRINTF(2, stderr, "- %s() {} \n", __FUNCTION__);
209
210
27.6k
  memset(
211
27.6k
      scanner->rule_matches_flags,
212
27.6k
      0,
213
27.6k
      sizeof(YR_BITMASK) * YR_BITMASK_SIZE(scanner->rules->num_rules));
214
215
27.6k
  memset(
216
27.6k
      scanner->required_eval,
217
27.6k
      0,
218
27.6k
      sizeof(YR_BITMASK) * YR_BITMASK_SIZE(scanner->rules->num_rules));
219
220
27.6k
  memset(
221
27.6k
      scanner->ns_unsatisfied_flags,
222
27.6k
      0,
223
27.6k
      sizeof(YR_BITMASK) * YR_BITMASK_SIZE(scanner->rules->num_namespaces));
224
225
27.6k
  memset(
226
27.6k
      scanner->strings_temp_disabled,
227
27.6k
      0,
228
27.6k
      sizeof(YR_BITMASK) * YR_BITMASK_SIZE(scanner->rules->num_strings));
229
230
27.6k
  memset(scanner->matches, 0, sizeof(YR_MATCHES) * scanner->rules->num_strings);
231
232
27.6k
  memset(
233
27.6k
      scanner->unconfirmed_matches,
234
27.6k
      0,
235
27.6k
      sizeof(YR_MATCHES) * scanner->rules->num_strings);
236
27.6k
}
237
238
YR_API int yr_scanner_create(YR_RULES* rules, YR_SCANNER** scanner)
239
27.6k
{
240
27.6k
  YR_DEBUG_FPRINTF(2, stderr, "- %s() {} \n", __FUNCTION__);
241
242
27.6k
  YR_EXTERNAL_VARIABLE* external;
243
27.6k
  YR_SCANNER* new_scanner;
244
245
27.6k
  new_scanner = (YR_SCANNER*) yr_calloc(1, sizeof(YR_SCANNER));
246
247
27.6k
  if (new_scanner == NULL)
248
0
    return ERROR_INSUFFICIENT_MEMORY;
249
250
27.6k
  FAIL_ON_ERROR_WITH_CLEANUP(
251
27.6k
      yr_hash_table_create(64, &new_scanner->objects_table),
252
27.6k
      yr_free(new_scanner));
253
254
27.6k
  new_scanner->rules = rules;
255
27.6k
  new_scanner->entry_point = YR_UNDEFINED;
256
27.6k
  new_scanner->file_size = YR_UNDEFINED;
257
27.6k
  new_scanner->canary = rand();
258
259
  // By default report both matching and non-matching rules.
260
27.6k
  new_scanner->flags = SCAN_FLAGS_REPORT_RULES_MATCHING |
261
27.6k
                       SCAN_FLAGS_REPORT_RULES_NOT_MATCHING;
262
263
27.6k
  new_scanner->rule_matches_flags = (YR_BITMASK*) yr_calloc(
264
27.6k
      sizeof(YR_BITMASK), YR_BITMASK_SIZE(rules->num_rules));
265
266
27.6k
  new_scanner->required_eval = (YR_BITMASK*) yr_calloc(
267
27.6k
      sizeof(YR_BITMASK), YR_BITMASK_SIZE(rules->num_rules));
268
269
27.6k
  new_scanner->ns_unsatisfied_flags = (YR_BITMASK*) yr_calloc(
270
27.6k
      sizeof(YR_BITMASK), YR_BITMASK_SIZE(rules->num_namespaces));
271
272
27.6k
  new_scanner->strings_temp_disabled = (YR_BITMASK*) yr_calloc(
273
27.6k
      sizeof(YR_BITMASK), YR_BITMASK_SIZE(rules->num_strings));
274
275
27.6k
  new_scanner->matches = (YR_MATCHES*) yr_calloc(
276
27.6k
      rules->num_strings, sizeof(YR_MATCHES));
277
278
27.6k
  new_scanner->unconfirmed_matches = (YR_MATCHES*) yr_calloc(
279
27.6k
      rules->num_strings, sizeof(YR_MATCHES));
280
281
27.6k
  if (new_scanner->rule_matches_flags == NULL ||
282
27.6k
      new_scanner->required_eval == NULL ||
283
27.6k
      new_scanner->ns_unsatisfied_flags == NULL ||
284
27.6k
      new_scanner->strings_temp_disabled == NULL ||
285
27.6k
      (new_scanner->matches == NULL && rules->num_strings > 0) ||
286
27.6k
      (new_scanner->unconfirmed_matches == NULL && rules->num_strings > 0))
287
0
  {
288
0
    yr_scanner_destroy(new_scanner);
289
0
    return ERROR_INSUFFICIENT_MEMORY;
290
0
  }
291
292
#ifdef YR_PROFILING_ENABLED
293
  new_scanner->profiling_info = yr_calloc(
294
      rules->num_rules, sizeof(YR_PROFILING_INFO));
295
296
  if (new_scanner->profiling_info == NULL && rules->num_rules > 0)
297
  {
298
    yr_scanner_destroy(new_scanner);
299
    return ERROR_INSUFFICIENT_MEMORY;
300
  }
301
#else
302
27.6k
  new_scanner->profiling_info = NULL;
303
27.6k
#endif
304
305
27.6k
  external = rules->ext_vars_table;
306
307
27.6k
  while (!EXTERNAL_VARIABLE_IS_NULL(external))
308
0
  {
309
0
    YR_OBJECT* object;
310
311
0
    FAIL_ON_ERROR_WITH_CLEANUP(
312
0
        yr_object_from_external_variable(external, &object),
313
        // cleanup
314
0
        yr_scanner_destroy(new_scanner));
315
316
0
    FAIL_ON_ERROR_WITH_CLEANUP(yr_hash_table_add(
317
0
                                   new_scanner->objects_table,
318
0
                                   external->identifier,
319
0
                                   NULL,
320
0
                                   (void*) object),
321
                               // cleanup
322
0
                               yr_object_destroy(object);
323
0
                               yr_scanner_destroy(new_scanner));
324
325
0
    yr_object_set_canary(object, new_scanner->canary);
326
0
    external++;
327
0
  }
328
329
27.6k
  *scanner = new_scanner;
330
331
27.6k
  return ERROR_SUCCESS;
332
27.6k
}
333
334
YR_API void yr_scanner_destroy(YR_SCANNER* scanner)
335
27.6k
{
336
27.6k
  YR_DEBUG_FPRINTF(2, stderr, "- %s() {} \n", __FUNCTION__);
337
338
27.6k
  RE_FIBER* fiber = scanner->re_fiber_pool.fibers.head;
339
340
27.6k
  while (fiber != NULL)
341
0
  {
342
0
    RE_FIBER* next = fiber->next;
343
0
    yr_free(fiber);
344
0
    fiber = next;
345
0
  }
346
347
27.6k
  RE_FAST_EXEC_POSITION* position = scanner->re_fast_exec_position_pool.head;
348
349
27.6k
  while (position != NULL)
350
0
  {
351
0
    RE_FAST_EXEC_POSITION* next = position->next;
352
0
    yr_free(position);
353
0
    position = next;
354
0
  }
355
356
27.6k
  if (scanner->objects_table != NULL)
357
27.6k
  {
358
27.6k
    yr_hash_table_destroy(
359
27.6k
        scanner->objects_table,
360
27.6k
        (YR_HASH_TABLE_FREE_VALUE_FUNC) yr_object_destroy);
361
27.6k
  }
362
363
#ifdef YR_PROFILING_ENABLED
364
  yr_free(scanner->profiling_info);
365
#endif
366
367
27.6k
  yr_free(scanner->rule_matches_flags);
368
27.6k
  yr_free(scanner->ns_unsatisfied_flags);
369
27.6k
  yr_free(scanner->required_eval);
370
27.6k
  yr_free(scanner->strings_temp_disabled);
371
27.6k
  yr_free(scanner->matches);
372
27.6k
  yr_free(scanner->unconfirmed_matches);
373
27.6k
  yr_free(scanner);
374
27.6k
}
375
376
YR_API void yr_scanner_set_callback(
377
    YR_SCANNER* scanner,
378
    YR_CALLBACK_FUNC callback,
379
    void* user_data)
380
27.6k
{
381
27.6k
  scanner->callback = callback;
382
27.6k
  scanner->user_data = user_data;
383
27.6k
}
384
385
YR_API void yr_scanner_set_timeout(YR_SCANNER* scanner, int timeout)
386
27.6k
{
387
  // Convert timeout from seconds to nanoseconds.
388
27.6k
  scanner->timeout = timeout * 1000000000ULL;
389
27.6k
}
390
391
YR_API void yr_scanner_set_flags(YR_SCANNER* scanner, int flags)
392
27.6k
{
393
  // For backward compatibility, if neither SCAN_FLAGS_REPORT_RULES_MATCHING
394
  // nor SCAN_FLAGS_REPORT_RULES_NOT_MATCHING are specified, both are assumed.
395
396
27.6k
  if (!(flags & SCAN_FLAGS_REPORT_RULES_MATCHING) &&
397
27.6k
      !(flags & SCAN_FLAGS_REPORT_RULES_NOT_MATCHING))
398
27.6k
  {
399
27.6k
    flags |= SCAN_FLAGS_REPORT_RULES_MATCHING |
400
27.6k
             SCAN_FLAGS_REPORT_RULES_NOT_MATCHING;
401
27.6k
  }
402
403
27.6k
  scanner->flags = flags;
404
27.6k
}
405
406
YR_API int yr_scanner_define_integer_variable(
407
    YR_SCANNER* scanner,
408
    const char* identifier,
409
    int64_t value)
410
0
{
411
0
  YR_OBJECT* obj = (YR_OBJECT*) yr_hash_table_lookup(
412
0
      scanner->objects_table, identifier, NULL);
413
414
0
  if (obj == NULL)
415
0
    return ERROR_INVALID_ARGUMENT;
416
417
0
  if (obj->type != OBJECT_TYPE_INTEGER)
418
0
    return ERROR_INVALID_EXTERNAL_VARIABLE_TYPE;
419
420
0
  return yr_object_set_integer(value, obj, NULL);
421
0
}
422
423
YR_API int yr_scanner_define_boolean_variable(
424
    YR_SCANNER* scanner,
425
    const char* identifier,
426
    int value)
427
0
{
428
0
  return yr_scanner_define_integer_variable(scanner, identifier, value);
429
0
}
430
431
YR_API int yr_scanner_define_float_variable(
432
    YR_SCANNER* scanner,
433
    const char* identifier,
434
    double value)
435
0
{
436
0
  YR_OBJECT* obj = (YR_OBJECT*) yr_hash_table_lookup(
437
0
      scanner->objects_table, identifier, NULL);
438
439
0
  if (obj == NULL)
440
0
    return ERROR_INVALID_ARGUMENT;
441
442
0
  if (obj->type != OBJECT_TYPE_FLOAT)
443
0
    return ERROR_INVALID_EXTERNAL_VARIABLE_TYPE;
444
445
0
  return yr_object_set_float(value, obj, NULL);
446
0
}
447
448
YR_API int yr_scanner_define_string_variable(
449
    YR_SCANNER* scanner,
450
    const char* identifier,
451
    const char* value)
452
0
{
453
0
  YR_OBJECT* obj = (YR_OBJECT*) yr_hash_table_lookup(
454
0
      scanner->objects_table, identifier, NULL);
455
456
0
  if (obj == NULL)
457
0
    return ERROR_INVALID_ARGUMENT;
458
459
0
  if (obj->type != OBJECT_TYPE_STRING)
460
0
    return ERROR_INVALID_EXTERNAL_VARIABLE_TYPE;
461
462
0
  return yr_object_set_string(value, strlen(value), obj, NULL);
463
0
}
464
465
YR_API int yr_scanner_scan_mem_blocks(
466
    YR_SCANNER* scanner,
467
    YR_MEMORY_BLOCK_ITERATOR* iterator)
468
27.6k
{
469
27.6k
  YR_DEBUG_FPRINTF(2, stderr, "+ %s() {\n", __FUNCTION__);
470
471
27.6k
  YR_RULES* rules;
472
27.6k
  YR_RULE* rule;
473
27.6k
  YR_MEMORY_BLOCK* block;
474
475
27.6k
  int i, result = ERROR_SUCCESS;
476
477
27.6k
  if (scanner->callback == NULL)
478
0
  {
479
0
    result = ERROR_CALLBACK_REQUIRED;
480
0
    goto _exit;
481
0
  }
482
483
27.6k
  scanner->iterator = iterator;
484
27.6k
  rules = scanner->rules;
485
486
27.6k
  if (iterator->last_error == ERROR_BLOCK_NOT_READY)
487
0
  {
488
    // The caller is invoking yr_scanner_scan_mem_blocks again because the
489
    // previous call returned ERROR_BLOCK_NOT_READY.
490
0
    block = iterator->next(iterator);
491
0
  }
492
27.6k
  else
493
27.6k
  {
494
    // Create the notebook that will hold the YR_MATCH structures representing
495
    // each match found. This notebook will also contain snippets of the
496
    // matching data (the "data" field in YR_MATCH points to the snippet
497
    // corresponding to the match). Each notebook's page can store up to 1024
498
    // matches.
499
27.6k
    uint32_t max_match_data;
500
501
27.6k
    FAIL_ON_ERROR(
502
27.6k
        yr_get_configuration_uint32(YR_CONFIG_MAX_MATCH_DATA, &max_match_data));
503
504
27.6k
    result = yr_notebook_create(
505
27.6k
        1024 * (sizeof(YR_MATCH) + max_match_data), &scanner->matches_notebook);
506
507
27.6k
    if (result != ERROR_SUCCESS)
508
0
      goto _exit;
509
510
    // Every rule that doesn't require a matching string must be evaluated
511
    // regardless of whether a string matched or not.
512
27.6k
    memcpy(
513
27.6k
        scanner->required_eval,
514
27.6k
        scanner->rules->no_required_strings,
515
27.6k
        sizeof(YR_BITMASK) * YR_BITMASK_SIZE(rules->num_rules));
516
517
27.6k
    yr_stopwatch_start(&scanner->stopwatch);
518
519
27.6k
    block = iterator->first(iterator);
520
27.6k
  }
521
522
27.6k
  YR_TRYCATCH(
523
27.6k
      !(scanner->flags & SCAN_FLAGS_NO_TRYCATCH),
524
27.6k
      {
525
27.6k
        while (block != NULL)
526
27.6k
        {
527
27.6k
          const uint8_t* data = yr_fetch_block_data(block);
528
529
          // fetch_data may fail and return NULL.
530
27.6k
          if (data == NULL)
531
27.6k
          {
532
27.6k
            block = iterator->next(iterator);
533
27.6k
            continue;
534
27.6k
          }
535
536
27.6k
          if (scanner->entry_point == YR_UNDEFINED)
537
27.6k
          {
538
27.6k
            if (scanner->flags & SCAN_FLAGS_PROCESS_MEMORY)
539
27.6k
              scanner->entry_point = yr_get_entry_point_address(
540
27.6k
                  data, block->size, block->base);
541
27.6k
            else
542
27.6k
              scanner->entry_point = yr_get_entry_point_offset(
543
27.6k
                  data, block->size);
544
27.6k
          }
545
27.6k
          result = _yr_scanner_scan_mem_block(scanner, data, block);
546
27.6k
          if (result != ERROR_SUCCESS)
547
27.6k
          {
548
27.6k
            break;
549
27.6k
          }
550
27.6k
          block = iterator->next(iterator);
551
27.6k
        }
552
27.6k
      },
553
27.6k
      { result = ERROR_COULD_NOT_MAP_FILE; });
554
555
27.6k
  if (result != ERROR_SUCCESS)
556
0
    goto _exit;
557
558
27.6k
  result = iterator->last_error;
559
560
27.6k
  if (result != ERROR_SUCCESS)
561
0
    goto _exit;
562
563
  // If the iterator has a file_size function, ask the function for the file's
564
  // size, if not file size is undefined.
565
27.6k
  if (iterator->file_size != NULL)
566
27.6k
    scanner->file_size = iterator->file_size(iterator);
567
0
  else
568
0
    scanner->file_size = YR_UNDEFINED;
569
570
27.6k
  YR_TRYCATCH(
571
27.6k
      !(scanner->flags & SCAN_FLAGS_NO_TRYCATCH),
572
27.6k
      { result = yr_execute_code(scanner); },
573
27.6k
      { result = ERROR_COULD_NOT_MAP_FILE; });
574
575
27.6k
  if (result != ERROR_SUCCESS)
576
0
    goto _exit;
577
578
47.6k
  for (i = 0, rule = rules->rules_table; !RULE_IS_NULL(rule); i++, rule++)
579
20.0k
  {
580
20.0k
    int message = 0;
581
582
20.0k
    if (yr_bitmask_is_set(scanner->rule_matches_flags, i) &&
583
760
        yr_bitmask_is_not_set(scanner->ns_unsatisfied_flags, rule->ns->idx))
584
760
    {
585
760
      if (scanner->flags & SCAN_FLAGS_REPORT_RULES_MATCHING)
586
760
        message = CALLBACK_MSG_RULE_MATCHING;
587
760
    }
588
19.2k
    else
589
19.2k
    {
590
19.2k
      if (scanner->flags & SCAN_FLAGS_REPORT_RULES_NOT_MATCHING)
591
19.2k
        message = CALLBACK_MSG_RULE_NOT_MATCHING;
592
19.2k
    }
593
594
20.0k
    if (message != 0 && !RULE_IS_PRIVATE(rule))
595
20.0k
    {
596
20.0k
      switch (scanner->callback(scanner, message, rule, scanner->user_data))
597
20.0k
      {
598
0
      case CALLBACK_ABORT:
599
0
        result = ERROR_SUCCESS;
600
0
        goto _exit;
601
602
0
      case CALLBACK_ERROR:
603
0
        result = ERROR_CALLBACK_ERROR;
604
0
        goto _exit;
605
20.0k
      }
606
20.0k
    }
607
20.0k
  }
608
609
27.6k
  scanner->callback(
610
27.6k
      scanner, CALLBACK_MSG_SCAN_FINISHED, NULL, scanner->user_data);
611
612
27.6k
_exit:
613
614
  // If error is ERROR_BLOCK_NOT_READY we don't clean the matches and don't
615
  // destroy the notebook yet. ERROR_BLOCK_NOT_READY is not a permament error,
616
  // the caller can still call this function again for a retry.
617
27.6k
  if (result != ERROR_BLOCK_NOT_READY)
618
27.6k
  {
619
27.6k
    _yr_scanner_clean_matches(scanner);
620
621
27.6k
    if (scanner->matches_notebook != NULL)
622
27.6k
    {
623
27.6k
      yr_notebook_destroy(scanner->matches_notebook);
624
27.6k
      scanner->matches_notebook = NULL;
625
27.6k
    }
626
27.6k
  }
627
628
27.6k
  YR_DEBUG_FPRINTF(
629
27.6k
      2,
630
27.6k
      stderr,
631
27.6k
      "} = %d AKA %s // %s()\n",
632
27.6k
      result,
633
27.6k
      yr_debug_error_as_string(result),
634
27.6k
      __FUNCTION__);
635
636
27.6k
  return result;
637
27.6k
}
638
639
static YR_MEMORY_BLOCK* _yr_get_first_block(YR_MEMORY_BLOCK_ITERATOR* iterator)
640
55.2k
{
641
55.2k
  YR_MEMORY_BLOCK* result = (YR_MEMORY_BLOCK*) iterator->context;
642
643
55.2k
  YR_DEBUG_FPRINTF(
644
55.2k
      2,
645
55.2k
      stderr,
646
55.2k
      "- %s() {} = %p // default iterator; single memory block, blocking\n",
647
55.2k
      __FUNCTION__,
648
55.2k
      result);
649
650
55.2k
  return result;
651
55.2k
}
652
653
static YR_MEMORY_BLOCK* _yr_get_next_block(YR_MEMORY_BLOCK_ITERATOR* iterator)
654
33.2k
{
655
33.2k
  YR_MEMORY_BLOCK* result = NULL;
656
657
33.2k
  YR_DEBUG_FPRINTF(
658
33.2k
      2,
659
33.2k
      stderr,
660
33.2k
      "- %s() {} = %p // default iterator; single memory block, blocking\n",
661
33.2k
      __FUNCTION__,
662
33.2k
      result);
663
664
33.2k
  return result;
665
33.2k
}
666
667
static uint64_t _yr_get_file_size(YR_MEMORY_BLOCK_ITERATOR* iterator)
668
27.6k
{
669
27.6k
  uint64_t file_size = ((YR_MEMORY_BLOCK*) iterator->context)->size;
670
671
27.6k
  YR_DEBUG_FPRINTF(
672
27.6k
      2,
673
27.6k
      stderr,
674
27.6k
      "- %s() {} = %" PRIu64
675
27.6k
      "  // default iterator; single memory block, blocking\n",
676
27.6k
      __FUNCTION__,
677
27.6k
      file_size);
678
679
27.6k
  return file_size;
680
27.6k
}
681
682
static const uint8_t* _yr_fetch_block_data(YR_MEMORY_BLOCK* block)
683
55.2k
{
684
55.2k
  return (const uint8_t*) block->context;
685
55.2k
}
686
687
YR_API const uint8_t* yr_fetch_block_data(YR_MEMORY_BLOCK* block)
688
55.2k
{
689
55.2k
  const uint8_t* data = block->fetch_data(block);
690
55.2k
  if (data == NULL)
691
0
  {
692
0
    return NULL;
693
0
  }
694
55.2k
  jumpinfo* info = (jumpinfo*) yr_thread_storage_get_value(
695
55.2k
      &yr_trycatch_trampoline_tls);
696
55.2k
  if (info == NULL)  // Not called from YR_TRYCATCH
697
55.2k
  {
698
55.2k
    return data;
699
55.2k
  }
700
0
  info->memfault_from = (void*) data;
701
0
  info->memfault_to = (void*) (data + block->size);
702
0
  return data;
703
55.2k
}
704
705
YR_API int yr_scanner_scan_mem(
706
    YR_SCANNER* scanner,
707
    const uint8_t* buffer,
708
    size_t buffer_size)
709
27.6k
{
710
27.6k
  YR_DEBUG_FPRINTF(
711
27.6k
      2,
712
27.6k
      stderr,
713
27.6k
      "+ %s(buffer=%p buffer_size=%zu) {\n",
714
27.6k
      __FUNCTION__,
715
27.6k
      buffer,
716
27.6k
      buffer_size);
717
718
27.6k
  YR_MEMORY_BLOCK block;
719
27.6k
  YR_MEMORY_BLOCK_ITERATOR iterator;
720
27.6k
  int result;
721
722
27.6k
  block.size = buffer_size;
723
27.6k
  block.base = 0;
724
27.6k
  block.fetch_data = _yr_fetch_block_data;
725
27.6k
  block.context = (void*) buffer;
726
727
27.6k
  iterator.context = &block;
728
27.6k
  iterator.first = _yr_get_first_block;
729
27.6k
  iterator.next = _yr_get_next_block;
730
27.6k
  iterator.file_size = _yr_get_file_size;
731
27.6k
  iterator.last_error = ERROR_SUCCESS;
732
733
  // Detect cases where every byte of input is checked for match and input size
734
  // is bigger then 0.2 MB
735
27.6k
  if (scanner->rules->ac_match_table[YR_AC_ROOT_STATE] != 0 &&
736
0
      buffer_size > YR_FILE_SIZE_THRESHOLD)
737
0
  {
738
0
    YR_STRING* report_string =
739
0
        scanner->rules->ac_match_pool[YR_AC_ROOT_STATE].string;
740
0
    result = scanner->callback(
741
0
        scanner,
742
0
        CALLBACK_MSG_TOO_SLOW_SCANNING,
743
0
        (void*) report_string,
744
0
        scanner->user_data);
745
0
    if (result != CALLBACK_CONTINUE)
746
0
      return ERROR_TOO_SLOW_SCANNING;
747
0
  }
748
749
27.6k
  result = yr_scanner_scan_mem_blocks(scanner, &iterator);
750
751
27.6k
  YR_DEBUG_FPRINTF(
752
27.6k
      2,
753
27.6k
      stderr,
754
27.6k
      "} = %d AKA %s // %s()\n",
755
27.6k
      result,
756
27.6k
      yr_debug_error_as_string(result),
757
27.6k
      __FUNCTION__);
758
759
27.6k
  return result;
760
27.6k
}
761
762
YR_API int yr_scanner_scan_file(YR_SCANNER* scanner, const char* filename)
763
0
{
764
0
  YR_MAPPED_FILE mfile;
765
766
0
  int result = yr_filemap_map(filename, &mfile);
767
768
0
  if (result == ERROR_SUCCESS)
769
0
  {
770
0
    result = yr_scanner_scan_mem(scanner, mfile.data, mfile.size);
771
0
    yr_filemap_unmap(&mfile);
772
0
  }
773
774
0
  return result;
775
0
}
776
777
YR_API int yr_scanner_scan_fd(YR_SCANNER* scanner, YR_FILE_DESCRIPTOR fd)
778
0
{
779
0
  YR_MAPPED_FILE mfile;
780
781
0
  int result = yr_filemap_map_fd(fd, 0, 0, &mfile);
782
783
0
  if (result == ERROR_SUCCESS)
784
0
  {
785
0
    result = yr_scanner_scan_mem(scanner, mfile.data, mfile.size);
786
0
    yr_filemap_unmap_fd(&mfile);
787
0
  }
788
789
0
  return result;
790
0
}
791
792
YR_API int yr_scanner_scan_proc(YR_SCANNER* scanner, int pid)
793
0
{
794
0
  YR_MEMORY_BLOCK_ITERATOR iterator;
795
796
0
  int result = yr_process_open_iterator(pid, &iterator);
797
798
0
  if (result == ERROR_SUCCESS)
799
0
  {
800
0
    int prev_flags = scanner->flags;
801
0
    scanner->flags |= SCAN_FLAGS_PROCESS_MEMORY;
802
0
    result = yr_scanner_scan_mem_blocks(scanner, &iterator);
803
0
    scanner->flags = prev_flags;
804
0
    yr_process_close_iterator(&iterator);
805
0
  }
806
807
0
  return result;
808
0
}
809
810
YR_API YR_STRING* yr_scanner_last_error_string(YR_SCANNER* scanner)
811
0
{
812
0
  return scanner->last_error_string;
813
0
}
814
815
YR_API YR_RULE* yr_scanner_last_error_rule(YR_SCANNER* scanner)
816
0
{
817
0
  if (scanner->last_error_string == NULL)
818
0
    return NULL;
819
820
0
  return &scanner->rules->rules_table[scanner->last_error_string->rule_idx];
821
0
}
822
823
static int sort_by_cost_desc(
824
    const struct YR_RULE_PROFILING_INFO* r1,
825
    const struct YR_RULE_PROFILING_INFO* r2)
826
0
{
827
0
  if (r1->cost < r2->cost)
828
0
    return 1;
829
830
0
  if (r1->cost > r2->cost)
831
0
    return -1;
832
833
0
  return 0;
834
0
}
835
836
//
837
// yr_scanner_get_profiling_info
838
//
839
// Returns a pointer to an array of YR_RULE_PROFILING_INFO structures with
840
// information about the cost of each rule. The rules are sorted by cost
841
// in descending order and the last item in the array has rule == NULL.
842
// The caller is responsible for freeing the returned array by calling
843
// yr_free. Calling this function only makes sense if YR_PROFILING_ENABLED
844
// is defined, if not, the cost for each rule won't be computed, it will be
845
// set to 0 for all rules.
846
//
847
YR_API YR_RULE_PROFILING_INFO* yr_scanner_get_profiling_info(
848
    YR_SCANNER* scanner)
849
0
{
850
0
  YR_RULE_PROFILING_INFO* profiling_info = yr_malloc(
851
0
      (scanner->rules->num_rules + 1) * sizeof(YR_RULE_PROFILING_INFO));
852
853
0
  if (profiling_info == NULL)
854
0
    return NULL;
855
856
0
  for (uint32_t i = 0; i < scanner->rules->num_rules; i++)
857
0
  {
858
0
    profiling_info[i].rule = &scanner->rules->rules_table[i];
859
#ifdef YR_PROFILING_ENABLED
860
    profiling_info[i].cost = scanner->profiling_info[i].exec_time +
861
                             (scanner->profiling_info[i].atom_matches *
862
                              scanner->profiling_info[i].match_time) /
863
                                 YR_MATCH_VERIFICATION_PROFILING_RATE;
864
#else
865
0
    memset(&profiling_info[i], 0, sizeof(YR_RULE_PROFILING_INFO));
866
0
#endif
867
0
  }
868
869
0
  qsort(
870
0
      profiling_info,
871
0
      scanner->rules->num_rules,
872
0
      sizeof(YR_RULE_PROFILING_INFO),
873
0
      (int (*)(const void*, const void*)) sort_by_cost_desc);
874
875
0
  profiling_info[scanner->rules->num_rules].rule = NULL;
876
0
  profiling_info[scanner->rules->num_rules].cost = 0;
877
878
0
  return profiling_info;
879
0
}
880
881
YR_API void yr_scanner_reset_profiling_info(YR_SCANNER* scanner)
882
0
{
883
#ifdef YR_PROFILING_ENABLED
884
  memset(
885
      scanner->profiling_info,
886
      0,
887
      scanner->rules->num_rules * sizeof(YR_PROFILING_INFO));
888
#endif
889
0
}
890
891
YR_API int yr_scanner_print_profiling_info(YR_SCANNER* scanner)
892
0
{
893
0
  printf("\n===== PROFILING INFORMATION =====\n\n");
894
895
0
  YR_RULE_PROFILING_INFO* info = yr_scanner_get_profiling_info(scanner);
896
897
0
  if (info == NULL)
898
0
    return ERROR_INSUFFICIENT_MEMORY;
899
900
0
  YR_RULE_PROFILING_INFO* rpi = info;
901
902
0
  while (rpi->rule != NULL)
903
0
  {
904
0
    printf(
905
0
        "%10" PRIu64 " %s:%s: \n",
906
0
        rpi->cost,
907
0
        rpi->rule->ns->name,
908
0
        rpi->rule->identifier);
909
910
0
    rpi++;
911
0
  }
912
913
0
  printf("\n=================================\n");
914
915
0
  yr_free(info);
916
917
0
  return ERROR_SUCCESS;
918
0
}