User Commands appcert(1)
NAME
appcert - examine application-level products for unstable
use of Solaris interfaces
SYNOPSIS
appcert [-h] [-n] [ -f infile] [ -w working_dir] [-B] [-L]
[-S] {obj | dir} ...
DESCRIPTION
The appcert utility examines an application's conformance to
the Solaris Application Binary Interface (ABI). The Solaris
ABI defines the runtime library interfaces in Solaris that
are safe and stable for application use. More specifically,
appcert identifies any dependencies on unstable runtime
interfaces, as well as certain other risks that could cause
the product to fail to work on a subsequent release of
Solaris.
appcert checks for:
o Private symbol usage in Solaris libraries. These are
private symbols, that is, functions or data, that are
not intended for developer consumption. They are inter-
faces that Solaris libraries use to call one another.
These symbols might change their semantic behavior or
even disappear altogether (so-called "demoted" sym-
bols), so it is a good practice to make sure your
application does not depend upon any of them.
o Static linking. In particular, this refers to static
linking of archives libc.a, libsocket.a, and libnsl.a,
that is, instead of dynamically linking the correspond-
ing shared object .so's. Because the semantics of
private symbol calls from one Solaris library to
another can change from one release to another, it is
not a good practice to "hardwire" library code into
your binary objects.
o Unbound symbols. These are library symbols (that is,
functions or data) that the dynamic linker could not
resolve when appcert was run. This might be an environ-
ment problem (for example, LD_LIBRARY_PATH) or a build
problem (for example, not specifying -llib and/or -z
defs with compiling). They are flagged to point these
problems out and in case a more serious problem is
indicated.
An entire product can be readily examined by appcert (that
is, if the product is a collection of many programs and sup-
porting shared objects) by referring appcert to the direc-
tories where the product is installed.
SunOS 5.10 Last change: 1 Mar 2004 1
User Commands appcert(1)
To perform its task, appcert constructs a profile of inter-
face dependencies for each object file within the product
(whether an executable object or shared object), to deter-
mine all the Solaris system interfaces that are depended
upon. (Notice that appcert uses the Solaris runtime linker
to make this determination.) These dependency profiles are
then compared to a definition of the Solaris ABI to identify
any interfaces that are Private (unsafe and unstable for
application-level use).
appcert generates a simple roll-up report that indicates
which of the product's components, if any, had liabilities
and what those liabilities were. The report aids developers
who are examining their product's release-to-release stabil-
ity.
Notice that appcert produces complete interface dependency
information, both the Public (safe and stable) Solaris
interfaces and the Private (non-ABI) interfaces. This infor-
mation can also be examined for each product component, if
you want.
IMPORTANT: appcert must run in the same environment in which
the application being checked runs. See NOTES.
OPTIONS
The following options are supported:
-B If appcert is run in "batch" mode, the out-
put report will contain one line per binary,
beginning with PASS if no problems were
detected for the binary, FAIL if any prob-
lems were found, or INC if the binary could
not be completely checked. Do not interpret
these labels too literally. For example,
PASS just means that none of the appcert
warnings were triggered. These strings are
flush left and so can be selected via grep
^FAIL ..., and so forth.
-f infile Specifies the file infile that contains a
list of files (one per line) to check. This
list is appended to the list determined from
the command line operands (see OPERANDS
below).
-h Prints out the usage information.
SunOS 5.10 Last change: 1 Mar 2004 2
User Commands appcert(1)
-L appcert examines your product for the pres-
ence of shared objects. If it finds some, it
appends the directories they reside in to
LD_LIBRARY_PATH. Use this flag to prevent
appcert from doing this.
-n When searching directories for binaries to
check, this option does not follow symbolic
links. See find(1).
-S Appends Solaris library directories (that
is, /usr/openwin/lib:/usr/dt/lib) to
LD_LIBRARY_PATH.
-w working_dir Identifies the directory in which to run the
library components and create temporary
files (default is /tmp).
OPERANDS
The following operands are supported:
{ obj | dir} ..A complete list of objects and/or direc-
tories that contain the objects constituting
the product to be checked. appcert recur-
sively searches directories looking for
object files; non-object files are ignored.
EXIT STATUS
The following exit values are returned:
0 appcert ran successfully and found no potential
binary stability problems.
1 appcert failed to run successfully.
2 Some of the objects checked have potential binary
stability problems.
SunOS 5.10 Last change: 1 Mar 2004 3
User Commands appcert(1)
3 No binary objects were located that could be
checked.
LIMITATIONS
If the object file to be examined depends on libraries,
those dependencies must be recorded in it (by using the
compiler's -l switch).
If the object file to be examined depends on other shared
libraries, those libraries must be accessible via
LD_LIBRARY_PATH or RPATH when appcert is run.
To check 64-bit applications, the machine must be running
the 64-bit Solaris kernel. See isalist(1). Also, the checks
for static linking are currently not done on 64-bit applica-
tions.
appcert cannot examine:
o Object files that are completely or partially stati-
cally linked.
Completely statically linked objects are
reported as unstable.
o Executable files that do not have execute permission set.
These are skipped. Shared objects without
execute permission are not skipped.
o Object files that are setuid root.
Due to limitations in ldd(1), these are
skipped. Copy and/or change the permissions
to check them.
o Non-ELF file executables such as shell scripts.
o Non-C language interfaces to Solaris; for example, C++ and
Java.
The code itself need not be in C as long as
the calls to Solaris libaries are in C.
OUTPUT FILES
appcert records its findings in the following files in the
working directory (/tmp/appcert.????? by default):
SunOS 5.10 Last change: 1 Mar 2004 4
User Commands appcert(1)
Index A mapping between checked binaries and the
subdirectory in the working directory in
which the output specific to that binary can
be found.
Report A copy of the rollup report that was
displayed on stdout when appcert was run.
Skipped A list of binaries that appcert was asked to
check but had to skip, along with a brief
reason why each was skipped.
In addition, there is per-object information in the sub-
directories under appcert.?????/objects/, in the following
files:
check.demoted_symbols A list of symbols suspected to be
demoted Solaris symbols.
check.dynamic.private A list of private Solaris symbols to
which the object makes direct bind-
ings.
check.dynamic.public A list of public Solaris symbols to
which the object makes direct bind-
ings.
check.dynamic.unbound A list of symbols not bound by the
dynamic linker when ldd -r was run.
For convenience, ldd output lines
containing "file not found" are also
included.
summary.dynamic A pretty-printed summary of dynamic
bindings for the objects examined,
including tables of Public and
Private symbols used from each
SunOS 5.10 Last change: 1 Mar 2004 5
User Commands appcert(1)
Solaris library.
Other files are temporary files used internally by appcert.
OUTPUT MESSAGES
Private Symbol Use
Private symbols are functions or data variables in a Solaris
library that are not intended for developer or external use.
These symbols are interfaces that the Solaris libraries use
to call and communicate with one another. They are marked in
pvs(1) output with the symbol version name "SUNWprivate".
Private symbols can change their semantic behavior or even
disappear altogether ("demoted" or "deprecated" symbols), so
your application should not depend upon any of them.
Demoted Symbols
Demoted symbols are functions or data variables in a Solaris
library that were once private to that library and have been
removed (or possibly scoped local to the library) in a later
Solaris release. If your application directly calls one of
these demoted symbols, it will fail to run (relocation
error) on the release in which the symbol was removed and
releases thereafter.
In some rare cases, a demoted symbol will return in a later
release, but nevertheless there are still some releases on
which the application will not run.
Sun Microsystems Inc. performed most of the library scoping
in the transition from Solaris 2.5.1 to 2.6. This action was
done to increase binary stability. By making these com-
pletely internal interfaces invisible (that is, they cannot
be dynamically linked against), a developer cannot acciden-
tally or intentionally call these interfaces. For more
information, see the Linker and Libraries Guide, in particu-
lar the chapter on versioning. This document may be found
online at http://docs.sun.com.
Unbound Symbols
Unbound symbols are library symbols (that is, functions or
data) referenced by the application that the dynamic linker
could not resolve when appcert was run. Note: appcert does
not actually run your application, so some aspect of the
environment that affects dynamic linking might not be set
properly.
Unbound symbols do not necessarily indicate a potential
binary stability problem. They only mean that when appcert
SunOS 5.10 Last change: 1 Mar 2004 6
User Commands appcert(1)
was run, the runtime dynamic linker could not resolve these
symbols.
Unbound symbols might be due to LD_LIBRARY_PATH not being
correctly set. Make sure it is set, so that all of your
binary objects can find all of the libraries they depend on
(either your product's own libraries, Solaris libraries, or
those of a third party). Then re-run appcert.
You might find it useful to write a shell script that sets
up the environment correctly and then runs appcert on the
binaries you want to check.
Another common cause for unbound symbols is when a shared
object under test has not recorded its dynamic dependencies,
that is, at build time the -l switch was not supplied to the
compiler and ld(1). So the shared object requires that the
executables that link against it have the correct dependen-
cies recorded.
Notice that such a shared object can either be linked in the
standard way (that is, specified at an executable's build
time) or dynamically opened (for example, an executable
calls dlopen(3C) on the shared object sometimes when run-
ning). Either case can give rise to unbound symbols when
appcert is run. The former can usually be resolved by set-
ting LD_LIBRARY_PATH appropriately before running appcert.
The latter (dlopen) is usually difficult to resolve. Under
some circumstances, you might be able to set LD_PRELOAD
appropriately to preload the needed libraries, but this pro-
cedure does not always work.
How do you know if the environment has been set up correctly
so that there will be no unbound symbols? It must be set up
so that running ldd -r on the binary yields no "file not
found" or "symbol not found" errors. See ld.so.1(1) and
ldd(1) for more information on dynamic linking.
In any event, appcert flags unbound symbols as a warning in
case they might indicate a more serious problem. Unbound
symbols can be an indicator of dependencies on demoted sym-
bols (symbols that have been removed from a library or
scoped local to it). Dependencies on demoted symbols will
lead to serious binary stability problems.
However, setting up the environment properly should remove
most unbound symbols. In general, it is good practice to
record library dependencies at build time whenever possible
because it helps make the binary object better defined and
self-contained. Also recommended is using the -z defs flag
when building shared objects, to force the resolution of all
symbols during compilation. See ld(1) for more information.
SunOS 5.10 Last change: 1 Mar 2004 7
User Commands appcert(1)
No Bindings Found
appcert runs /bin/ldd -r on each binary object to be tested.
It sets the environment variable LD_DEBUG="files,bindings".
(See ldd(1) and ld.so.1(1) for more information). If that
command fails for some reason, appcert will have no dynamic
symbol binding information and will find "no bindings".
appcert can fail if any of the following is true:
o The binary object does not have read permission.
o The binary object is SUID or SGID and the user does not
have sufficient privileges.
o The binary object is an executable without the execute
permission bit set.
o The binary object is completely statically linked.
o The binary object has no library dependency information
recorded.
Other cases exist as well (for example, out of memory). In
general, this flag means that appcert could not completely
examine the object due to permissions or environment. Try to
modify the permissions or environment so that the dynamic
bindings can be recorded.
Obsolete Library
An obsolete library is one whose use is deprecated and that
might, in some future release, be removed from Solaris alto-
gether. appcert flags these because applications depending
on them might not run in future releases of Solaris. All
interfaces, including Private ones, in an obsolete library
are frozen and will not change.
Use of sys_errlist/sys_nerr
Direct use of the symbols sys_errlist or sys_nerr presents a
risk in which reference might be made past the end of the
sys_errlist array. These symbols are deprecated in 32-bit
versions of Solaris and are absent altogether in 64-bit ver-
sions. Use strerror(3C) instead.
Use of Strong vs. Weak Symbols
The "strong" symbols (for example, _socket) associated with
"weak" symbols (for example, socket ) are reserved as
private (their behavior could change in the future). Your
application should only directly reference the weak symbol
(usually the strong symbols begin with "_").
SunOS 5.10 Last change: 1 Mar 2004 8
User Commands appcert(1)
Note: Under certain build environments, the strong/private
symbol dependency gets recorded into your binary instead of
the weak/public one, even though the source code doesn't
appear to reference the private symbol. Nevertheless, steps
should be taken to trace down why this is occurring and fix
the dependency.
NOTES
appcert needs to run in the same environment in which the
application being checked runs. Otherwise it might not be
able to resolve references correctly to interfaces in the
Solaris libraries. Take the following steps:
1. Make sure that LD_LIBRARY_PATH and any other aspects of
the environment are set to whatever settings are used
when the application is run. Also make sure that it con-
tains the directories containing any non-Solaris shared
objects that are part of the product, so that they can
be found when referenced.
2. Make sure that all the binaries to be checked:
o Are dynamically linked ELF objects
o Have execute permission set on executables (this is
not necessary for shared objects)
o Are not SUID root (otherwise you will have to be
root to check them; make non-SUID copies and check
those if necessary).
You might find it useful to write a shell script that sets
up the environment correctly and then runs appcert.
Some potential problems that can be encountered are:
o appcert reports unbound symbols that appear to be part
of Solaris libraries.
This is probably caused when the application uses
dlopen(3C) to access a shared object that does not have
its Solaris dependencies recorded. appcert cannot
resolve symbol use in such cases, since the dynamic
linker is never invoked on the shared object, and there
is no other dependency information that could be used
to resolve the Solaris symbol bindings. This can also
occur with non-Solaris symbols.
To avoid this problem, make sure that when a shared
SunOS 5.10 Last change: 1 Mar 2004 9
User Commands appcert(1)
object is built, its dependencies on Solaris libraries
are explicitly recorded by using the -llib option on
the compile line (see cc(1) and ld(1)).
o appcert reports that the application uses a Solaris
private symbol that is not referenced in the
application's source code.
This problem is most likely due to static linking of a
Solaris library that references that symbol. Since
appcert uses the dynamic linker to resolve symbols,
statically linked libraries appear to appcert to be
part of the application code (which, in a sense, they
are). This can also sometimes happen as a result of
macro substitution in a Solaris header file.
To avoid this problem, whenever possible do not stati-
cally link Solaris library archives into your applica-
tion.
o appcert does not recognize a library as part of
Solaris.
Some obsolete Solaris libraries are so old that they
were obsoleted before their symbols could be versioned.
Consequently, appcert cannot recognize them as being
part of Solaris.
BUGS
The use of the terms "public" and "private" as equivalent to
"stable" and "unstable" is unfortunately somewhat confusing.
In particular, experimental or evolving interfaces are pub-
lic in the sense that they are documented and their use is
encouraged. But they are unstable, because an application
built with them might not run on subsequent releases. Thus,
they are classified as private for appcert's purposes until
they are no longer evolving. Conversely, obsolete interfaces
will eventually disappear, and so are unstable, even though
they have been public and stable in the past and are still
treated as public by appcert. Fortunately, these two situa-
tions are rare.
ATTRIBUTES
See attributes(5) for descriptions of the following attri-
butes:
SunOS 5.10 Last change: 1 Mar 2004 10
User Commands appcert(1)
____________________________________________________________
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
|_____________________________|_____________________________|
| Availability | SUNWapct |
|_____________________________|_____________________________|
| Interface stability | Stable |
|_____________________________|_____________________________|
SEE ALSO
cc(1), find(1), isalist(1), ld(1), ldd(1), ld.so.1(1),
pvs(1), dlopen(3C), strerror(3C), intro(4), attributes(5)
Linker and Libraries Guide
SunOS 5.10 Last change: 1 Mar 2004 11
Friday, 1 January 2010
appcert man page
Labels:
Solaris
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment