HACKING 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312
  1. 0. Useful tools.
  2. 0.0 The buildbot.
  3. http://tor-buildbot.freehaven.net:8010/
  4. - Down because nickm isn't running services at home any more. ioerror says
  5. he will resurrect it.
  6. 0.1. Useful command-lines that are non-trivial to reproduce but can
  7. help with tracking bugs or leaks.
  8. 0.1.1. Dmalloc
  9. dmalloc -l ~/dmalloc.log
  10. (run the commands it tells you)
  11. ./configure --with-dmalloc
  12. 0.2.2. Valgrind
  13. valgrind --leak-check=yes --error-limit=no --show-reachable=yes src/or/tor
  14. (Note that if you get a zillion openssl warnings, you will also need to
  15. pass --undef-value-errors=no to valgrind, or rebuild your openssl
  16. with -DPURIFY.)
  17. 0.2. Running gcov for unit test coverage
  18. make clean
  19. make CFLAGS='-g -fprofile-arcs -ftest-coverage'
  20. ./src/or/test
  21. cd src/common; gcov *.[ch]
  22. cd ../or; gcov *.[ch]
  23. Then, look at the .gcov files. '-' before a line means that the
  24. compiler generated no code for that line. '######' means that the
  25. line was never reached. Lines with numbers were called that number
  26. of times.
  27. 1. Coding conventions
  28. 1.0. Whitespace and C conformance
  29. Invoke "make check-spaces" from time to time, so it can tell you about
  30. deviations from our C whitespace style. Generally, we use:
  31. - Unix-style line endings
  32. - K&R-style indentation
  33. - No space before newlines
  34. - A blank line at the end of each file
  35. - Never more than one blank line in a row
  36. - Always spaces, never tabs
  37. - No more than 79-columns per line.
  38. - Two spaces per indent.
  39. - A space between control keywords and their corresponding paren
  40. "if (x)", "while (x)", and "switch (x)", never "if(x)", "while(x)", or
  41. "switch(x)".
  42. - A space between anything and an open brace.
  43. - No space between a function name and an opening paren. "puts(x)", not
  44. "puts (x)".
  45. - Function declarations at the start of the line.
  46. We try hard to build without warnings everywhere. In particular, if you're
  47. using gcc, you should invoke the configure script with the option
  48. "--enable-gcc-warnings". This will give a bunch of extra warning flags to
  49. the compiler, and help us find divergences from our preferred C style.
  50. 1.0.1. Getting emacs to edit Tor source properly.
  51. Hi, folks! Nick here. I like to put the following snippet in my .emacs
  52. file:
  53. (add-hook 'c-mode-hook
  54. (lambda ()
  55. (font-lock-mode 1)
  56. (set-variable 'show-trailing-whitespace t)
  57. (let ((fname (expand-file-name (buffer-file-name))))
  58. (cond
  59. ((string-match "^/home/nickm/src/libevent" fname)
  60. (set-variable 'indent-tabs-mode t)
  61. (set-variable 'c-basic-offset 4)
  62. (set-variable 'tab-width 4))
  63. ((string-match "^/home/nickm/src/tor" fname)
  64. (set-variable 'indent-tabs-mode nil)
  65. (set-variable 'c-basic-offset 2))
  66. ((string-match "^/home/nickm/src/openssl" fname)
  67. (set-variable 'indent-tabs-mode t)
  68. (set-variable 'c-basic-offset 8)
  69. (set-variable 'tab-width 8))
  70. ))))
  71. You'll note that it defaults to showing all trailing whitespace. The
  72. "cond" test detects whether the file is one of a few C free software
  73. projects that I often edit, and sets up the indentation level and tab
  74. preferences to match what they want.
  75. If you want to try this out, you'll need to change the filename regex
  76. patterns to match where you keep your Tor files.
  77. If you *only* use emacs to edit Tor, you could always just say:
  78. (add-hook 'c-mode-hook
  79. (lambda ()
  80. (font-lock-mode 1)
  81. (set-variable 'show-trailing-whitespace t)
  82. (set-variable 'indent-tabs-mode nil)
  83. (set-variable 'c-basic-offset 2)))
  84. There is probably a better way to do this. No, we are probably not going
  85. to clutter the files with emacs stuff.
  86. 1.1. Details
  87. Use tor_malloc, tor_free, tor_strdup, and tor_gettimeofday instead of their
  88. generic equivalents. (They always succeed or exit.)
  89. You can get a full list of the compatibility functions that Tor provides by
  90. looking through src/common/util.h and src/common/compat.h. You can see the
  91. available containers in src/common/containers.h. You should probably
  92. familiarize yourself with these modules before you write too much code,
  93. or else you'll wind up reinventing the wheel.
  94. Use 'INLINE' instead of 'inline', so that we work properly on Windows.
  95. 1.2. Calling and naming conventions
  96. Whenever possible, functions should return -1 on error and 0 on success.
  97. For multi-word identifiers, use lowercase words combined with
  98. underscores. (e.g., "multi_word_identifier"). Use ALL_CAPS for macros and
  99. constants.
  100. Typenames should end with "_t".
  101. Function names should be prefixed with a module name or object name. (In
  102. general, code to manipulate an object should be a module with the same
  103. name as the object, so it's hard to tell which convention is used.)
  104. Functions that do things should have imperative-verb names
  105. (e.g. buffer_clear, buffer_resize); functions that return booleans should
  106. have predicate names (e.g. buffer_is_empty, buffer_needs_resizing).
  107. If you find that you have four or more possible return code values, it's
  108. probably time to create an enum. If you find that you are passing three or
  109. more flags to a function, it's probably time to create a flags argument
  110. that takes a bitfield.
  111. 1.3. What To Optimize
  112. Don't optimize anything if it's not in the critical path. Right now,
  113. the critical path seems to be AES, logging, and the network itself.
  114. Feel free to do your own profiling to determine otherwise.
  115. 1.4. Log conventions
  116. http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LogLevels
  117. No error or warning messages should be expected during normal OR or OP
  118. operation.
  119. If a library function is currently called such that failure always
  120. means ERR, then the library function should log WARN and let the caller
  121. log ERR.
  122. [XXX Proposed convention: every message of severity INFO or higher should
  123. either (A) be intelligible to end-users who don't know the Tor source; or
  124. (B) somehow inform the end-users that they aren't expected to understand
  125. the message (perhaps with a string like "internal error"). Option (A) is
  126. to be preferred to option (B). -NM]
  127. 1.5. Doxygen
  128. We use the 'doxygen' utility to generate documentation from our
  129. source code. Here's how to use it:
  130. 1. Begin every file that should be documented with
  131. /**
  132. * \file filename.c
  133. * \brief Short description of the file.
  134. **/
  135. (Doxygen will recognize any comment beginning with /** as special.)
  136. 2. Before any function, structure, #define, or variable you want to
  137. document, add a comment of the form:
  138. /** Describe the function's actions in imperative sentences.
  139. *
  140. * Use blank lines for paragraph breaks
  141. * - and
  142. * - hyphens
  143. * - for
  144. * - lists.
  145. *
  146. * Write <b>argument_names</b> in boldface.
  147. *
  148. * \code
  149. * place_example_code();
  150. * between_code_and_endcode_commands();
  151. * \endcode
  152. */
  153. 3. Make sure to escape the characters "<", ">", "\", "%" and "#" as "\<",
  154. "\>", "\\", "\%", and "\#".
  155. 4. To document structure members, you can use two forms:
  156. struct foo {
  157. /** You can put the comment before an element; */
  158. int a;
  159. int b; /**< Or use the less-than symbol to put the comment
  160. * after the element. */
  161. };
  162. 5. To generate documentation from the Tor source code, type:
  163. $ doxygen -g
  164. To generate a file called 'Doxyfile'. Edit that file and run
  165. 'doxygen' to generate the API documentation.
  166. 6. See the Doxygen manual for more information; this summary just
  167. scratches the surface.
  168. 1.5.1. Doxygen comment conventions
  169. Say what functions do as a series of one or more imperative sentences, as
  170. though you were telling somebody how to be the function. In other words,
  171. DO NOT say:
  172. /** The strtol function parses a number.
  173. *
  174. * nptr -- the string to parse. It can include whitespace.
  175. * endptr -- a string pointer to hold the first thing that is not part
  176. * of the number, if present.
  177. * base -- the numeric base.
  178. * returns: the resulting number.
  179. */
  180. long strtol(const char *nptr, char **nptr, int base);
  181. Instead, please DO say:
  182. /** Parse a number in radix <b>base</b> from the string <b>nptr</b>,
  183. * and return the result. Skip all leading whitespace. If
  184. * <b>endptr</b> is not NULL, set *<b>endptr</b> to the first character
  185. * after the number parsed.
  186. **/
  187. long strtol(const char *nptr, char **nptr, int base);
  188. Doxygen comments are the contract in our abstraction-by-contract world: if
  189. the functions that call your function rely on it doing something, then your
  190. function should mention that it does that something in the documentation.
  191. If you rely on a function doing something beyond what is in its
  192. documentation, then you should watch out, or it might do something else
  193. later.
  194. 2. Code notes
  195. 2.1. Dataflows
  196. 2.1.1. How Incoming data is handled
  197. There are two paths for data arriving at Tor over the network: regular
  198. TCP data, and DNS.
  199. 2.1.1.1. TCP.
  200. When Tor takes information over the network, it uses the functions
  201. read_to_buf() and read_to_buf_tls() in buffers.c. These read from a
  202. socket or an SSL* into a buffer_t, which is an mbuf-style linkedlist
  203. of memory chunks.
  204. read_to_buf() and read_to_buf_tls() are called only from
  205. connection_read_to_buf() in connection.c. It takes a connection_t
  206. pointer, and reads data into it over the network, up to the
  207. connection's current bandwidth limits. It places that data into the
  208. "inbuf" field of the connection, and then:
  209. - Adjusts the connection's want-to-read/want-to-write status as
  210. appropriate.
  211. - Increments the read and written counts for the connection as
  212. appropriate.
  213. - Adjusts bandwidth buckets as appropriate.
  214. connection_read_to_buf() is called only from connection_handle_read().
  215. The connection_handle_read() function is called whenever libevent
  216. decides (based on select, poll, epoll, kqueue, etc) that there is data
  217. to read from a connection. If any data is read,
  218. connection_handle_read() calls connection_process_inbuf() to see if
  219. any of the data can be processed. If the connection was closed,
  220. connection_handle_read() calls connection_reached_eof().
  221. Connection_process_inbuf() and connection_reached_eof() both dispatch
  222. based on the connection type to determine what to do with the data
  223. that's just arrived on the connection's inbuf field. Each type of
  224. connection has its own version of these functions. For example,
  225. directory connections process incoming data in
  226. connection_dir_process_inbuf(), while OR connections process incoming
  227. data in connection_or_process_inbuf(). These
  228. connection_*_process_inbuf() functions extract data from the
  229. connection's inbuf field (a buffer_t), using functions from buffers.c.
  230. Some of these accessor functions are straightforward data extractors
  231. (like fetch_from_buf()); others do protocol-specific parsing.
  232. 2.1.1.2. DNS
  233. Tor launches (and optionally accepts) DNS requests using the code in
  234. eventdns.c, which is a copy of libevent's evdns.c. (We don't use
  235. libevent's version because it is not yet in the versions of libevent
  236. all our users have.) DNS replies are read in nameserver_read();
  237. DNS queries are read in server_port_read().