APPCERT(1) User Commands APPCERT(1)
NAME
appcert - examine application-level products for unstable use of
Solaris interfaces
SYNOPSIS
appcert [
-h] [
-n] [
-f infile] [
-w working_dir] [
-B] [
-L]
[
-S] {
obj |
dir}...
DESCRIPTION
The
appcert utility examines an application's conformance to the
Solaris Application Binary Interface (
ABI). The Solaris
ABI defines
the runtime library interfaces in Solaris that are safe and stable
for application use. More specifically,
appcert identifies any
dependencies on unstable runtime interfaces, as well as certain other
risks that could cause the product to fail to work on a subsequent
release of Solaris.
appcert checks for:
o
Private symbol usage in Solaris libraries. These are
private symbols, that is, functions or data, that are not
intended for developer consumption. They are interfaces
that Solaris libraries use to call one another. These
symbols might change their semantic behavior or even
disappear altogether (so-called
demoted symbols), so it
is a good practice to make sure your application does not
depend upon any of them.
o
Static linking. In particular, this refers to static
linking of archives
libc.a,
libsocket.a, and
libnsl.a,
that is, instead of dynamically linking the corresponding
shared object
.so's. Because the semantics of private
symbol calls from one Solaris library to another can
change from one release to another, it is not a good
practice to hardwire library code into your binary
objects.
o
Unbound symbols. These are library symbols (that is,
functions or data) that the dynamic linker could not
resolve when
appcert was run. This might be an environment
problem (for example,
LD_LIBRARY_PATH) or a build problem
(for example, not specifying
-llib and/or
-z defs with
compiling). They are flagged to point these problems out
and in case a more serious problem is indicated.
An entire product can be readily examined by
appcert (that is, if the
product is a collection of many programs and supporting shared
objects) by referring
appcert to the directories where the product is
installed.
To perform its task,
appcert constructs a profile of interface
dependencies for each object file within the product (whether an
executable object or shared object), to determine all the Solaris
system interfaces that are depended upon. (Notice that
appcert uses
the Solaris runtime linker to make this determination.) These
dependency profiles are then compared to a definition of the Solaris
ABI to identify any interfaces that are Private (unsafe and unstable
for application-level use).
appcert generates a simple roll-up report that indicates which of the
product's components, if any, had liabilities and what those
liabilities were. The report aids developers who are examining their
product's release-to-release stability.
Notice that
appcert produces complete interface dependency
information, both the Public (safe and stable) Solaris interfaces and
the Private (non-ABI) interfaces. This information can also be
examined for each product component, if you want.
IMPORTANT:
appcert must run in the same environment in which the
application being checked runs. See NOTES.
OPTIONS
The following options are supported:
-B If
appcert is run in batch mode, the output report
will contain one line per binary, beginning with
PASS if no problems were detected for the binary,
FAIL if any problems were found, or
INC if the
binary could not be completely checked. Do not
interpret these labels too literally. For example,
PASS just means that none of the
appcert warnings
were triggered. These strings are flush left and so
can be selected via
grep ^FAIL ..., and so forth.
-f infile Specifies the file
infile that contains a list of
files (one per line) to check. This list is
appended to the list determined from the command
line operands (see OPERANDS below).
-h Prints out the usage information.
-L appcert examines your product for the presence of
shared objects. If it finds some, it appends the
directories they reside in to
LD_LIBRARY_PATH. Use
this flag to prevent
appcert from doing this.
-n When searching directories for binaries to check,
this option does not follow symbolic links. See
find(1).
-S Appends Solaris library directories (that is,
/usr/openwin/lib:/usr/dt/lib) to
LD_LIBRARY_PATH.
-w working_dir Identifies the directory in which to run the
library components and create temporary files
(default is
/tmp).
OPERANDS
The following operands are supported:
{obj |
dir} ...
A complete list of objects and/or directories
that contain the objects constituting the product
to be checked.
appcert recursively searches
directories looking for object files; non-object
files are ignored.
EXIT STATUS
The following exit values are returned:
0 appcert ran successfully and found no potential binary stability
problems.
1 appcert failed to run successfully.
2 Some of the objects checked have potential binary stability
problems.
3 No binary objects were located that could be checked.
LIMITATIONS
If the object file to be examined depends on libraries, those
dependencies must be recorded in it (by using the compiler's
-l switch).
If the object file to be examined depends on other shared libraries,
those libraries must be accessible via
LD_LIBRARY_PATH or
RUNPATH when
appcert is run.
To check 64-bit applications, the machine must be running the 64-bit
Solaris kernel. See
isalist(1). Also, the checks for static linking
are currently not done on 64-bit applications.
appcert cannot examine:
o Object files that are completely or partially statically
linked.
Completely statically linked objects are reported as
unstable.
o Executable files that do not have execute permission set.
These are skipped. Shared objects without execute
permission are not skipped.
o Object files that are setuid root.
Due to limitations in
ldd(1), these are skipped. Copy
and/or change the permissions to check them.
o Non-
ELF file executables such as shell scripts.
o Non-C language interfaces to Solaris; for example, C++ and
Java.
The code itself need not be in C as long as the calls to
Solaris libraries are in C.
OUTPUT FILES
appcert records its findings in the following files in the working
directory (
/tmp/appcert.????? by default):
Index A mapping between checked binaries and the subdirectory in
the working directory in which the output specific to that
binary can be found.
Report A copy of the rollup report that was displayed on stdout
when
appcert was run.
Skipped A list of binaries that
appcert was asked to check but had
to skip, along with a brief reason why each was skipped.
In addition, there is per-object information in the subdirectories
under
appcert.?????/objects/, in the following files:
check.demoted_symbols A list of symbols suspected to be demoted
Solaris symbols.
check.dynamic.private A list of private Solaris symbols to which
the object makes direct bindings.
check.dynamic.public A list of public Solaris symbols to which
the object makes direct bindings.
check.dynamic.unbound A list of symbols not bound by the dynamic
linker when
ldd -r was run. For convenience,
ldd output lines containing
file not found are also included.
summary.dynamic A pretty-printed summary of dynamic bindings
for the objects examined, including tables
of Public and Private symbols used from each
Solaris library.
Other files are temporary files used internally by
appcert.
OUTPUT MESSAGES
Private Symbol Use
Private symbols are functions or data variables in a Solaris library
that are not intended for developer or external use. These symbols
are interfaces that the Solaris libraries use to call and communicate
with one another. They are marked in
pvs(1) output with the symbol
version name
SUNWprivate.
Private symbols can change their semantic behavior or even disappear
altogether (
demoted or
deprecated symbols), so your application
should not depend upon any of them.
Demoted Symbols
Demoted symbols are functions or data variables in a Solaris library
that were once private to that library and have been removed (or
possibly scoped local to the library) in a later Solaris release. If
your application directly calls one of these demoted symbols, it will
fail to run (relocation error) on the release in which the symbol was
removed and releases thereafter.
In some rare cases, a demoted symbol will return in a later release,
but nevertheless there are still some releases on which the
application will not run.
Sun Microsystems Inc. performed most of the library scoping in the
transition from Solaris 2.5.1 to 2.6. This action was done to
increase binary stability. By making these completely internal
interfaces invisible (that is, they cannot be dynamically linked
against), a developer cannot accidentally or intentionally call these
interfaces. For more information, see the
Linker and Libraries Guide,
in particular the chapter on versioning. This document may be found
online at
http://docs.sun.com.
Unbound Symbols
Unbound symbols are library symbols (that is, functions or data)
referenced by the application that the dynamic linker could not
resolve when
appcert was run.
Note: appcert does not actually run
your application, so some aspect of the environment that affects
dynamic linking might not be set properly.
Unbound symbols do not necessarily indicate a potential binary
stability problem. They only mean that when
appcert was run, the
runtime dynamic linker could not resolve these symbols.
Unbound symbols might be due to
LD_LIBRARY_PATH not being correctly
set. Make sure it is set, so that all of your binary objects can
find all of the libraries they depend on (either your product's own
libraries, Solaris libraries, or those of a third party). Then re-run
appcert.
You might find it useful to write a shell script that sets up the
environment correctly and then runs
appcert on the binaries you want
to check.
Another common cause for unbound symbols is when a shared object
under test has not recorded its dynamic dependencies, that is, at
build time the
-l switch was
not supplied to the compiler and
ld(1).
So the shared object requires that the
executables that link against
it have the correct dependencies recorded.
Notice that such a shared object can either be linked in the standard
way (that is, specified at an executable's build time) or dynamically
opened (for example, an executable calls
dlopen(3C) on the shared
object sometimes when running). Either case can give rise to unbound
symbols when
appcert is run. The former can usually be resolved by
setting
LD_LIBRARY_PATH appropriately before running
appcert. The
latter (
dlopen) is usually difficult to resolve. Under some
circumstances, you might be able to set
LD_PRELOAD appropriately to
preload the needed libraries, but this procedure does not always
work.
How do you know if the environment has been set up correctly so that
there will be no unbound symbols? It must be set up so that running
ldd -r on the binary yields no "
file not found" or "
symbol not found"
errors. See
ld.so.1(1) and
ldd(1) for more information on dynamic
linking.
In any event,
appcert flags unbound symbols as a warning in case they
might indicate a more serious problem. Unbound symbols can be an
indicator of dependencies on demoted symbols (symbols that have been
removed from a library or scoped local to it). Dependencies on
demoted symbols will lead to serious binary stability problems.
However, setting up the environment properly should remove most
unbound symbols. In general, it is good practice to record library
dependencies at build time whenever possible because it helps make
the binary object better defined and self-contained. Also recommended
is using the
-z defs flag when building shared objects, to force the
resolution of all symbols during compilation. See
ld(1) for more
information.
No Bindings Found
appcert runs
/bin/ldd -r on each binary object to be tested. It sets
the environment variable
LD_DEBUG="
files,bindings". (See
ldd(1) and
ld.so.1(1) for more information). If that command fails for some
reason,
appcert will have no dynamic symbol binding information and
will find "
no bindings".
appcert can fail if any of the following is true:
o The binary object does not have read permission.
o The binary object is SUID or SGID and the user does not
have sufficient privileges.
o The binary object is an executable without the execute
permission bit set.
o The binary object is completely statically linked.
o The binary object has no library dependency information
recorded.
Other cases exist as well (for example, out of memory). In general,
this flag means that
appcert could not completely examine the object
due to permissions or environment. Try to modify the permissions or
environment so that the dynamic bindings can be recorded.
Obsolete Library
An obsolete library is one whose use is deprecated and that might, in
some future release, be removed from Solaris altogether.
appcert flags these because applications depending on them might not run in
future releases of Solaris. All interfaces, including Private ones,
in an obsolete library are frozen and will not change.
Use of sys_errlist/sys_nerr Direct use of the symbols
sys_errlist or
sys_nerr presents a risk in
which reference might be made past the end of the
sys_errlist array.
These symbols are deprecated in 32-bit versions of Solaris and are
absent altogether in 64-bit versions. Use
strerror(3C) instead.
Use of Strong vs. Weak Symbols The "strong" symbols (for example,
_socket) associated with "weak"
symbols (for example,
socket ) are reserved as private (their
behavior could change in the future). Your application should only
directly reference the weak symbol (usually the strong symbols begin
with "
_").
Note: Under certain build environments, the strong/private symbol
dependency gets recorded into your binary instead of the weak/public
one, even though the source code doesn't appear to reference the
private symbol. Nevertheless, steps should be taken to trace down
why this is occurring and fix the dependency.
NOTES
appcert needs to run in the same environment in which the application
being checked runs. Otherwise it might not be able to resolve
references correctly to interfaces in the Solaris libraries. Take the
following steps:
1. Make sure that
LD_LIBRARY_PATH and any other aspects of
the environment are set to whatever settings are used when
the application is run. Also make sure that it contains
the directories containing any non-Solaris shared objects
that are part of the product, so that they can be found
when referenced.
2. Make sure that all the binaries to be checked:
o Are dynamically linked
ELF objects
o Have execute permission set on executables (this is
not necessary for shared objects)
o Are not
SUID root (otherwise you will have to be root
to check them; make non-
SUID copies and check those if
necessary).
You might find it useful to write a shell script that sets up the
environment correctly and then runs
appcert.
Some potential problems that can be encountered are:
o
appcert reports unbound symbols that appear to be part of
Solaris libraries.
This is probably caused when the application uses
dlopen(3C) to access a shared object that does not have
its Solaris dependencies recorded.
appcert cannot resolve
symbol use in such cases, since the dynamic linker is
never invoked on the shared object, and there is no other
dependency information that could be used to resolve the
Solaris symbol bindings. This can also occur with non-
Solaris symbols.
To avoid this problem, make sure that when a shared object
is built, its dependencies on Solaris libraries are
explicitly recorded by using the
-llib option on the
compile line (see
cc(1) and
ld(1)).
o
appcert reports that the application uses a Solaris
private symbol that is not referenced in the application's
source code.
This problem is most likely due to static linking of a
Solaris library that references that symbol. Since
appcert uses the dynamic linker to resolve symbols, statically
linked libraries appear to
appcert to be part of the
application code (which, in a sense, they are). This can
also sometimes happen as a result of macro substitution in
a Solaris header file.
To avoid this problem, whenever possible do not statically
link Solaris library archives into your application.
o
appcert does not recognize a library as part of Solaris.
Some obsolete Solaris libraries are so old that they were
obsoleted before their symbols could be versioned.
Consequently,
appcert cannot recognize them as being part
of Solaris.
BUGS
The use of the terms "
public" and "
private" as equivalent to "
stable"
and "
unstable" is unfortunately somewhat confusing. In particular,
experimental or evolving interfaces are public in the sense that they
are documented and their use is encouraged. But they are unstable,
because an application built with them might not run on subsequent
releases. Thus, they are classified as private for
appcert's purposes
until they are no longer evolving. Conversely, obsolete interfaces
will eventually disappear, and so are unstable, even though they have
been public and stable in the past and are still treated as public by
appcert. Fortunately, these two situations are rare.
ATTRIBUTES
See
attributes(7) for descriptions of the following attributes:
+--------------------+-----------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+-----------------+
|Interface stability | Stable |
+--------------------+-----------------+
SEE ALSO
cc(1),
find(1),
isalist(1),
ld(1),
ld.so.1(1),
ldd(1),
pvs(1),
dlopen(3C),
strerror(3C),
Intro(5),
attributes(7) March 10, 2023 APPCERT(1)