2 .\" Copyright (c) 2007, Sun Microsystems, Inc. All Rights Reserved.
3 .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
4 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
5 .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
6 .TH ATTRIBUTES 5 "May 13, 2017"
8 attributes, architecture, availability, CSI, stability, MT-Level, standard \-
9 attributes of interfaces
12 The \fBATTRIBUTES\fR section of a manual page contains a table defining
13 attribute types and their corresponding values. The following is an example of
14 an attributes table. Not all attribute types are appropriate for all types of
21 ATTRIBUTE TYPE ATTRIBUTE VALUE
27 Interface Stability Committed
31 Standard See \fBstandards\fR(5).
36 Architecture defines processor or specific hardware. See \fB-p\fR option of
37 \fBuname\fR(1). In some cases, it may indicate required adapters or
39 .SS "Code Set Independence (CSI)"
41 \fBOS\fR utilities and libraries free of dependencies on the properties of any
42 code sets are said to have Code Set Independence (CSI). They have the attribute
43 of being \fBCSI\fR enabled. This is in contrast to many commands and utilities,
44 for example, that work only with Extended Unix Codesets (EUC), an encoding
45 method that allows concurrent support for up to four code sets and is commonly
46 used to represent Asian character sets.
49 For practical reasons, however, this independence is not absolute. Certain
50 assumptions are still applied to the current \fBCSI\fR implementation:
55 File code is a superset of \fBASCII\fR.
61 To support multi-byte characters and null-terminated \fBUNIX\fR file names,
62 the \fINULL\fR and \fB/\fR (slash) characters cannot be part of any multi-byte
69 Only "stateless" file code encodings are supported. Stateless encoding avoids
70 shift, locking shift, designation, invocation, and so forth, although single
71 shift is not excluded.
77 Process code (\fBwchar_t\fR values) is implementation dependent and can change
78 over time or between implementations or between locales.
84 Not every object can have names composed of arbitrary characters. The names of
85 the following objects must be composed of \fBASCII\fR characters:
90 User names, group name, and passwords
102 Names of printers and special devices
108 Names of terminals (/\fBdev/tty*\fR)
114 Process \fBID\fR numbers
120 Message queues, semaphores, and shared memory labels.
126 The following may be composed of \fBISO\fR Latin-1 or \fBEUC\fR characters:
149 Shell variables and environmental variable names
155 Mount points for file systems
161 \fBNIS\fR key names and domain names
169 The names of \fBNFS\fR shared files should be composed of \fBASCII\fR
170 characters. Although files and directories may have names and contents composed
171 of characters from non-\fBASCII\fR code sets, using only the \fBASCII\fR
172 codeset allows \fBNFS\fR mounting across any machine, regardless of
173 localization. For the commands and utilities that are \fBCSI\fR enabled, all
174 can handle single-byte and multi-byte locales released in 2.6. For applications
175 to get full support of internationalization services, dynamic binding has to be
176 applied. Statically bound programs will only get support for C and POSIX
179 .SS "Interface Stability"
181 Sun often provides developers with early access to new technologies, which
182 allows developers to evaluate with them as soon as possible. Unfortunately, new
183 technologies are prone to changes and standardization often results in
184 interface incompatibility from previous versions.
187 To make reasonable risk assessments, developers need to know how likely an
188 interface is to change in future releases. To aid developers in making these
189 assessments, interface stability information is included on some manual pages
190 for commands, entry-points, and file formats.
193 The more stable interfaces can safely be used by nearly all applications,
194 because Sun will endeavor to ensure that these continue to work in future minor
195 releases. Applications that depend only on Committed interfaces should reliably
196 continue to function correctly on future minor releases (but not necessarily on
197 earlier major releases).
200 The less stable interfaces allow experimentation and prototyping, but should be
201 used only with the understanding that they might change incompatibly or even be
202 dropped or replaced with alternatives in future minor releases.
205 "Interfaces" that Sun does not document (for example, most kernel data
206 structures and some symbols in system header files) may be implementation
207 artifacts. Such internal interfaces are not only subject to incompatible change
208 or removal, but we are unlikely to mention such a change in release notes.
211 Products are given release levels, as well as names, to aid compatibility
212 discussions. Each release level may also include changes suitable for lower
220 Release Version Significance
223 Likely to contain major feature additions; adhere to different, possibly incompatible standard revisions; and though unlikely, could change, drop, or replace Committed interfaces. Initial product releases are usually 1.0.
227 Compared to an x.0 or earlier release (y!=0), it is likely to contain: feature additions, compatible changes to Committed interfaces, or likely incompatible changes to Uncommitted or Volatile interfaces.
231 Intended to be interface compatible with the previous release (z!=0), but likely to add bug fixes, performance enhancements, and support for additional hardware. Incompatible changes to Volatile interfaces are possible.
237 In the context of interface stability, update releases (occasionally referred
238 to as patch releases) should be considered equivalent to Micro Releases.
239 .SS "Classifications"
241 The following table summarizes how stability level classifications relate to
242 release level. The first column lists the Stability Level. The second column
243 lists the Release Level for Incompatible Changes, and the third column lists
244 other comments. For a complete discussion of individual classifications, see
245 the appropriate subsection below.
252 Stability Release Comments
254 Committed Major (x.0) Incompatibilities are exceptional.
256 Uncommitted Minor (x.y) Incompatibilities are common.
258 Volatile Micro (x.y.z) Incompatibilities are common.
263 The interface stability level classifications described on this manual page
264 apply to both source and binary interfaces unless otherwise stated. All
265 stability level classifications are public, with the exception of the
266 \fBPrivate\fR classification. The precise stability level of a public interface
267 (one that is documented in the manual pages) is unspecified unless explicitly
268 stated. The stability level of an undocumented interface is implicitly
272 The existence of documentation other than the documentation that is a component
273 of the Solaris product should not be construed to imply any level of stability
274 for interfaces provided by the Solaris product. The only source of stability
275 level information is Solaris manual pages.
279 \fB\fBCommitted\fR\fR
283 The intention of a Committed interface is to enable third parties to develop
284 applications to these interfaces, release them, and have confidence that they
285 will run on all releases of the product after the one in which the interface
286 was introduced, and within the same Major release. Even at a Major release,
287 incompatible changes are expected to be rare, and to have strong
290 Interfaces defined and controlled as industry standards are most often treated
291 as Committed interfaces. In this case, the controlling body and/or public,
292 versioned document is typically noted in a "Standard" entry in the Attributes
293 table or elsewhere in the documentation.
295 Although a truly exceptional event, incompatible changes are possible in any
296 release if the associated defect is serious enough as outlined in the
297 Exceptions section of this document or in a Minor release by following the End
298 of Feature process. If support of a Committed interface must be discontinued,
299 Sun will attempt to provide notification and the stability level will be marked
306 \fB\fBUncommitted\fR\fR
310 No commitment is made about either source or binary compatibility of these
311 interfaces from one Minor release to the next. Even the drastic incompatible
312 change of removal of the interface in a Minor release is possible. Uncommitted
313 interfaces are generally not appropriate for use by release-independent
316 Incompatible changes to the interface are intended to be motivated by true
317 improvement to the interface which may include ease of use considerations. The
318 general expectation should be that Uncommitted interfaces are not likely to
319 change incompatibly and if such changes occur they will be small in impact and
320 may often have a mitigation plan.
322 Uncommitted interfaces generally fall into one of the following subcategories:
326 Interfaces that are experimental or transitional. They are typically used to
327 give outside developers early access to new or rapidly changing technology, or
328 to provide an interim solution to a problem where a more general solution is
334 Interfaces whose specification is controlled by an outside body yet Sun
335 expects to make a reasonable effort to maintain compatibility with previous
336 releases until the next Minor release at which time Sun expects to synchronize
337 with the external specification.
342 Interfaces whose target audience values innovation (and possibly ease of
343 use) over stability. This attribute is often associated with administrative
344 interfaces for higher tier components.
346 For Uncommitted interfaces, Sun makes no claims about either source or binary
347 compatibility from one minor release to another. Applications developed based
348 on these interfaces may not work in future minor releases.
358 Volatile interfaces can change at any time and for any reason.
360 The Volatile interface stability level allows Sun products to quickly track a
361 fluid, rapidly evolving specification. In many cases, this is preferred to
362 providing additional stability to the interface, as it may better meet the
363 expectations of the consumer.
365 The most common application of this taxonomy level is to interfaces that are
366 controlled by a body other than Sun, but unlike specifications controlled by
367 standards bodies or Free or Open Source Software (FOSS) communities which value
368 interface compatibility, it can not be asserted that an incompatible change to
369 the interface specification would be exceedingly rare. It may also be applied
370 to FOSS controlled software where it is deemed more important to track the
371 community with minimal latency than to provide stability to our customers.
373 It also common to apply the Volatile classification level to interfaces in the
374 process of being defined by trusted or widely accepted organization. These are
375 generically referred to as draft standards. An "IETF Internet draft" is a well
376 understood example of a specification under development.
378 Volatile can also be applied to experimental interfaces.
380 No assertion is made regarding either source or binary compatibility of
381 Volatile interfaces between any two releases, including patches. Applications
382 containing these interfaces might fail to function properly in any future
389 \fB\fBNot-an-Interface\fR\fR
393 The situation occasionally occurs where there exists an entity that could be
394 inferred to be an interface, but actually is not. Common examples are output
395 from CLIs intended only for human consumption and the exact layout of a GUI.
397 This classification is a convenience term to be used to clarify such situations
398 where such confusion is identified as likely. Failure to apply this term to an
399 entity is not an indication that the entity is some form of interface. It only
400 indicates that the potential for confusion was not identified.
410 A Private interface is an interface provided by a component (or product)
411 intended only for the use of that component. A Private interface might still be
412 visible to or accessible by other components. Because the use of interfaces
413 private to another component carries great stability risks, such use is
414 explicitly not supported. Components not supplied by Sun Microsystems should
415 not use Private interfaces.
417 Most Private interfaces are not documented. It is an exceptional case when a
418 Private interface is documented. Reasons for documenting a Private interface
419 include, but are not limited to, the intention that the interface might be
420 reclassified to one of the public stability level classifications in the future
421 or the fact that the interface is inordinately visible.
431 Obsolete is a modifier that can appear in conjunction with the above
432 classification levels. The Obsolete modifier indicates an interface that is
433 "deprecated" and/or no longer advised for general use. An existing interface
434 may be downgraded from some other status (such as Committed or Uncommitted) by
435 the application of the Obsolete modifier to encourage customers to migrate from
436 that interface before it may be removed (or incompatibly changed).
438 An Obsolete interface is supported in the current release, but is scheduled to
439 be removed in a future (minor) release. When support of an interface is to be
440 discontinued, Sun will attempt to provide notification before discontinuing
441 support. Use of an Obsolete interface may produce warning messages.
446 There are rare instances when it is in the best interest of both Sun and the
447 customer to break the interface stability commitment. The following list
448 contains the common, known reasons for the interface provider to violate an
449 interface stability commitment, but does not preclude others.
453 Security holes where the vulnerability is inherent in the interface.
458 Data corruption where the vulnerability is inherent in the interface.
463 Standards violations uncovered by a change in interpretation or enhancement
464 of conformance tests.
469 An interface specification which isn't controlled by Sun has been changed
470 incompatibly and the vast majority of interface consumers expect the newer
476 Not making the incompatible change would be incomprehensible to our
477 customers. One example of this would to have not incompatibly changed pcfs
478 when the DOS 8.3 naming restrictions were abandoned.
482 Incompatible changes allowed by exception will always be delivered in the "most
483 major" release vehicle possible. However, often the consequences of the
484 vulnerabilities or contractual branding requirements will force delivery in a
486 .SS "Compatibility with Earlier Interface Classification Schemes"
488 In releases up to and including Solaris 10, a different interface
489 classification scheme was used. The following table summarizes the mapping
490 between the old and new classification schemes.
499 Standard Committed T{
500 An entry in the attributes table for the Standard attribute type should appear.
502 Stable Committed Name change.
503 Evolving Uncommitted Actual commitments match.
504 Unstable Uncommitted Name change.
506 Name change with expansion of allowed usage.
508 Obsolete (Obsolete) Was a classification, now a modifier.
513 The increased importance of Free or Open Source Software motivated the name
514 change from Stable/Unstable to Committed/Uncommitted. Stable conflicted with
515 the common use of the term in FOSS communities.
518 Ambiguity in the definition of Evolving was causing difficulty in
519 interpretation. As part of the migration to the new classification scheme, many
520 formerly Evolving interfaces were upgraded to Committed. However, upon
521 encountering the term Evolving, Uncommitted should be inferred.
524 Libraries are classified into categories that define their ability to support
525 multiple threads. Manual pages containing functions that are of multiple or
526 differing levels describe this in their \fBNOTES\fR or \fBUSAGE\fR section.
534 Safe is an attribute of code that can be called from a multithreaded
535 application. The effect of calling into a Safe interface or a safe code segment
536 is that the results are valid even when called by multiple threads. Often
537 overlooked is the fact that the result of this Safe interface or safe code
538 segment can have global consequences that affect all threads. For example, the
539 action of opening or closing a file from one thread is visible by all the
540 threads within a process. A multithreaded application has the responsibility
541 for using these interfaces in a safe manner, which is different from whether or
542 not the interface is Safe. For example, a multithreaded application that closes
543 a file that is still in use by other threads within the application is not
544 using the \fBclose\fR(2) interface safely.
554 An Unsafe library contains global and static data that is not protected. It is
555 not safe to use unless the application arranges for only one thread at time to
556 execute within the library. Unsafe libraries might contain functions that are
557 Safe; however, most of the library's functions are unsafe to call. Some
558 functions that are Unsafe have reentrant counterparts that are MT-Safe.
559 Reentrant functions are designated by the \fB_r\fR suffix appended to the
570 An MT-Safe library is fully prepared for multithreaded access. It protects its
571 global and static data with locks, and can provide a reasonable amount of
572 concurrency. A library can be safe to use, but not MT-Safe. For example,
573 surrounding an entire library with a monitor makes the library Safe, but it
574 supports no concurrency so it is not considered MT-Safe. An MT-Safe library
575 must permit a reasonable amount of concurrency. (This definition's purpose is
576 to give precision to what is meant when a library is described as Safe. The
577 definition of a Safe library does not specify if the library supports
578 concurrency. The MT-Safe definition makes it clear that the library is Safe,
579 and supports some concurrency. This clarifies the Safe definition, which can
580 mean anything from being single threaded to being any degree of multithreaded.)
586 \fB\fBAsync-Signal-Safe\fR\fR
590 Async-Signal-Safe refers to particular library functions that can be safely
591 called from a signal handler. A thread that is executing an Async-Signal-Safe
592 function will not deadlock with itself if interrupted by a signal. Signals are
593 only a problem for MT-Safe functions that acquire locks.
595 Async-Signal-Safe functions are also MT-Safe. Signals are disabled when locks
596 are acquired in Async-Signal-Safe functions. These signals prevent a signal
597 handler that might acquire the same lock from being called.
603 \fB\fBMT-Safe with Exceptions\fR\fR
607 See the \fBNOTES\fR or \fBUSAGE\fR sections of these pages for a description of
614 \fB\fBSafe with Exceptions\fR\fR
618 See the \fBNOTES\fR or \fBUSAGE\fR sections of these pages for a description of
625 \fB\fBFork-Safe\fR\fR
629 The \fBfork\fR(2) function replicates only the calling thread in the child
630 process. The \fBfork1\fR(2) function exists for compatibility with the past and
631 is synonymous with \fBfork()\fR. If a thread other than the one performing the
632 fork holds a lock when \fBfork()\fR is called, the lock will still be held in
633 the child process but there will be no lock owner since the owning thread was
634 not replicated. A child calling a function that attempts to acquire the lock
635 will deadlock itself.
637 When \fBfork()\fR is called, a Fork-Safe library arranges to have all of its
638 internal locks held only by the thread performing the fork. This is usually
639 accomplished with \fBpthread_atfork\fR(3C), which is called when the library is
642 The \fBforkall\fR(2) function provides the capability for the rare case when a
643 process needs to replicate all of its threads when performing a fork. No
644 \fBpthread_atfork()\fR actions are performed when \fBforkall()\fR is called.
645 There are dangers associated with calling \fBforkall()\fR. If some threads in a
646 process are performing I/O operations when another thread calls
647 \fBforkall()\fR, they will continue performing the same I/O operations in both
648 the parent and child processes, possibly causing data corruption. For this and
649 other race-condition reasons, the use of \fBforkall()\fR is discouraged.
651 In all Solaris releases prior to Solaris 10, the behavior of \fBfork()\fR
652 depended on whether or not the application was linked with \fB-lpthread\fR
653 (POSIX threads, see \fBstandards\fR(5)). If linked with \fB-lpthread\fR,
654 \fBfork()\fR behaved like \fBfork1()\fR; otherwise it behaved like
655 \fBforkall()\fR. To avoid any confusion concerning the behavior of
656 \fBfork()\fR, applications can specifically call \fBfork1()\fR or
657 \fBforkall()\fR as appropriate.
663 \fB\fBCancel-Safety\fR\fR
667 If a multithreaded application uses \fBpthread_cancel\fR(3C) to cancel (that
668 is, kill) a thread, it is possible that the target thread is killed while
669 holding a resource, such as a lock or allocated memory. If the thread has not
670 installed the appropriate cancellation cleanup handlers to release the
671 resources appropriately (see \fBpthread_cancel\fR(3C)), the application is
672 "cancel-unsafe", that is, it is not safe with respect to cancellation. This
673 unsafety could result in deadlocks due to locks not released by a thread that
674 gets cancelled, or resource leaks; for example, memory not being freed on
675 thread cancellation. All applications that use \fBpthread_cancel\fR(3C) should
676 ensure that they operate in a Cancel-Safe environment. Libraries that have
677 cancellation points and which acquire resources such as locks or allocate
678 memory dynamically, also contribute to the cancel-unsafety of applications that
679 are linked with these libraries. This introduces another level of safety for
680 libraries in a multithreaded program: Cancel-Safety. There are two
681 sub-categories of Cancel-Safety: Deferred-Cancel-Safety, and
682 Asynchronous-Cancel-Safety. An application is considered to be
683 Deferred-Cancel-Safe when it is Cancel-Safe for threads whose cancellation type
684 is \fBPTHREAD_CANCEL_DEFERRED\fR. An application is considered to be
685 Asynchronous-Cancel-Safe when it is Cancel-Safe for threads whose cancellation
686 type is \fBPTHREAD_CANCEL_ASYNCHRONOUS\fR. Deferred-Cancel-Safety is easier to
687 achieve than Asynchronous-Cancel-Safety, since a thread with the deferred
688 cancellation type can be cancelled only at well-defined cancellation points,
689 whereas a thread with the asynchronous cancellation type can be cancelled
690 anywhere. Since all threads are created by default to have the deferred
691 cancellation type, it might never be necessary to worry about asynchronous
692 cancel safety. Most applications and libraries are expected to always be
693 Asynchronous-Cancel-Unsafe. An application which is Asynchronous-Cancel-Safe is
694 also, by definition, Deferred-Cancel-Safe.
699 Many interfaces are defined and controlled as industry standards. When this is
700 the case, the controlling body and/or public, versioned document is noted in
704 Programmers producing portable applications should rely on the interface
705 descriptions present in the standard or specification to which the application
706 is intended to conform, rather than the manual page descriptions of interfaces
707 based upon a public standard. When the standard or specification allows
708 alternative implementation choices, the manual page usually only describes the
709 alternative implemented by Sun. The manual page also describes any compatible
710 extensions to the base definition of Standard interfaces provided by Sun.
713 No endorsement of the referenced controlling body or document should be
714 inferred by its presence as a "Standard" entry. The controlling body may be a
715 very formal organization, as in ISO or ANSII, a less formal, but generally
716 accepted organization such as IETF, or as informal as the sole contributor in
717 the case of FOSS (Free or Open Source Software).
720 \fBuname\fR(1), \fBIntro\fR(3), \fBstandards\fR(5)