1 # Some Information for Contributors
2 Thank you for considering to make a contribution to tcpdump! Please use the
3 guidelines below to achieve the best results and experience for everyone.
5 ## How to report bugs and other problems
6 **To report a security issue (segfault, buffer overflow, infinite loop, arbitrary
7 code execution etc) please send an e-mail to security@tcpdump.org, do not use
10 To report a non-security problem (failure to compile, incorrect output in the
11 protocol printout, missing support for a particular protocol etc) please check
12 first that it reproduces with the latest stable release of tcpdump and the latest
13 stable release of libpcap. If it does, please check that the problem reproduces
14 with the current git master branch of tcpdump and the current git master branch of
15 libpcap. If it does (and it is not a security-related problem, otherwise see
16 above), please navigate to the
17 [bug tracker](https://github.com/the-tcpdump-group/tcpdump/issues)
18 and check if the problem has already been reported. If it has not, please open
19 a new issue and provide the following details:
21 * tcpdump and libpcap version (`tcpdump --version`)
22 * operating system name and version and any other details that may be relevant
23 (`uname -a`, compiler name and version, CPU type etc.)
24 * custom `configure`/`cmake` flags, if any
25 * statement of the problem
28 Please note that if you know exactly how to solve the problem and the solution
29 would not be too intrusive, it would be best to contribute some development time
30 and to open a pull request instead as discussed below.
32 Still not sure how to do? Feel free to
33 [subscribe to the mailing list](https://www.tcpdump.org/#mailing-lists)
37 ## How to add new code and to update existing code
39 0) Check that there isn't a pull request already opened for the changes you
42 1) [Fork](https://help.github.com/articles/fork-a-repo/) the Tcpdump
43 [repository](https://github.com/the-tcpdump-group/tcpdump).
45 2) The easiest way to test your changes on multiple operating systems and
46 architectures is to let the upstream CI test your pull request (more on
49 3) Setup your git working copy
51 git clone https://github.com/<username>/tcpdump.git
53 git remote add upstream https://github.com/the-tcpdump-group/tcpdump
57 4) Do a `touch .devel` in your working directory.
58 Currently, the effect is
59 * add (via `configure`, in `Makefile`) some warnings options (`-Wall`,
60 `-Wmissing-prototypes`, `-Wstrict-prototypes`, ...) to the compiler if it
61 supports these options,
62 * have the `Makefile` support `make depend` and the `configure` script run it.
64 5) Configure and build
66 ./configure && make -s && make check
70 The `tests` directory contains regression tests of the dissection of captured
71 packets. Those captured packets were saved running tcpdump with option
72 `-w sample.pcap`. Additional options, such as `-n`, are used to create relevant
73 and reproducible output; `-#` is used to indicate which particular packets
74 have output that differs. The tests are run with the `TZ` environment
75 variable set to `GMT0`, so that UTC, rather than the local time where the
76 tests are being run, is used when "local time" values are printed. The
77 actual test compares the current text output with the expected result
78 (`sample.out`) saved from a previous version.
80 Any new/updated fields in a dissector must be present in a `sample.pcap` file
81 and the corresponding output file.
83 Configuration is set in `tests/TESTLIST`.
84 Each line in this file has the following format:
86 test-name sample.pcap sample.out tcpdump-options
89 The `sample.out` file can be produced as follows:
91 (cd tests && TZ=GMT0 ../tcpdump -# -n -r sample.pcap tcpdump-options > sample.out)
94 Or, for convenience, use `./update-test.sh test-name`
96 It is often useful to have test outputs with different verbosity levels
97 (none, `-v`, `-vv`, `-vvv`, etc.) depending on the code.
99 7) Test using `make check` (current build options) and `./build_matrix.sh`
100 (a multitude of build options, build systems and compilers). If you can,
101 test on more than one operating system. Don't send a pull request until
104 8) Try to rebase your commits to keep the history simple.
107 git rebase upstream/master
109 (If the rebase fails and you cannot resolve, issue `git rebase --abort`
110 and ask for help in the pull request comment.)
112 9) Once 100% happy, put your work into your forked repository using `git push`.
114 10) [Initiate and send](https://help.github.com/articles/using-pull-requests/)
116 This will trigger the upstream repository CI tests.
119 ## Code style and generic remarks
120 * A thorough reading of some other printers code is useful.
122 * Put the normative reference if any as comments (RFC, etc.).
124 * Put the format of packets/headers/options as comments if there is no
125 published normative reference.
127 * The printer may receive incomplete packet in the buffer, truncated at any
128 random position, for example by capturing with `-s size` option.
129 If your code reads and decodes every byte of the protocol packet, then to
130 ensure proper and complete bounds checks it would be sufficient to read all
131 packet data using the `GET_*()` macros, typically:
135 GET_BE_U_n(p), n in { 2, 3, 4, 5, 6, 7, 8 }
136 GET_BE_S_n(p), n in { 2, 3, 4, 5, 6, 7, 8 }
138 If your code uses the macros above only on some packet data, then the gaps
139 would have to be bounds-checked using the `ND_TCHECK_*()` macros:
141 ND_TCHECK_n(p), n in { 1, 2, 3, 4, 5, 6, 7, 8, 16 }
145 For the `ND_TCHECK_*` macros (if not already done):
146 * Assign: `ndo->ndo_protocol = "protocol";`
147 * Define: `ND_LONGJMP_FROM_TCHECK` before including `netdissect.h`
148 * Make sure that the intersection of `GET_*()` and `ND_TCHECK_*()` is minimal,
149 but at the same time their union covers all packet data in all cases.
151 You can test the code via:
153 sudo ./tcpdump -s snaplen [-v][v][...] -i lo # in a terminal
154 sudo tcpreplay -i lo sample.pcap # in another terminal
156 You should try several values for snaplen to do various truncation.
158 * Do invalid packet checks in code: Think that your code can receive in input
159 not only a valid packet but any arbitrary random sequence of octets (packet
160 * built malformed originally by the sender or by a fuzz tester,
161 * became corrupted in transit or for some other reason).
163 Print with: `nd_print_invalid(ndo); /* to print " (invalid)" */`
165 * Use `struct tok` for indexed strings and print them with
166 `tok2str()` or `bittok2str()` (for flags).
168 * Avoid empty lines in output of printers.
170 * A commit message must have:
172 First line: Capitalized short summary in the imperative (50 chars or less)
174 Body: Detailed explanatory text, if necessary. Fold it to approximately
175 72 characters. There must be an empty line separating the summary from
179 * Avoid non-ASCII characters in code and commit messages.
181 * Use the style of the modified sources.
183 * Don't mix declarations and code.
185 * Don't use `//` for comments.
186 Not all C compilers accept C++/C99 comments by default.
188 * Avoid trailing tabs/spaces