mirror of
				https://sourceware.org/git/glibc.git
				synced 2025-10-31 22:10:34 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			1507 lines
		
	
	
		
			63 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			1507 lines
		
	
	
		
			63 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| @node Introduction, Error Reporting, Top, Top
 | |
| @chapter Introduction
 | |
| @c %MENU% Purpose of the GNU C Library
 | |
| 
 | |
| The C language provides no built-in facilities for performing such
 | |
| common operations as input/output, memory management, string
 | |
| manipulation, and the like.  Instead, these facilities are defined
 | |
| in a standard @dfn{library}, which you compile and link with your
 | |
| programs.
 | |
| @cindex library
 | |
| 
 | |
| @Theglibc{}, described in this document, defines all of the
 | |
| library functions that are specified by the @w{ISO C} standard, as well as
 | |
| additional features specific to POSIX and other derivatives of the Unix
 | |
| operating system, and extensions specific to @gnusystems{}.
 | |
| 
 | |
| The purpose of this manual is to tell you how to use the facilities
 | |
| of @theglibc{}.  We have mentioned which features belong to which
 | |
| standards to help you identify things that are potentially non-portable
 | |
| to other systems.  But the emphasis in this manual is not on strict
 | |
| portability.
 | |
| 
 | |
| @menu
 | |
| * Getting Started::             What this manual is for and how to use it.
 | |
| * Standards and Portability::   Standards and sources upon which the GNU
 | |
|                                  C library is based.
 | |
| * Using the Library::           Some practical uses for the library.
 | |
| * Roadmap to the Manual::       Overview of the remaining chapters in
 | |
|                                  this manual.
 | |
| @end menu
 | |
| 
 | |
| @node Getting Started, Standards and Portability,  , Introduction
 | |
| @section Getting Started
 | |
| 
 | |
| This manual is written with the assumption that you are at least
 | |
| somewhat familiar with the C programming language and basic programming
 | |
| concepts.  Specifically, familiarity with ISO standard C
 | |
| (@pxref{ISO C}), rather than ``traditional'' pre-ISO C dialects, is
 | |
| assumed.
 | |
| 
 | |
| @Theglibc{} includes several @dfn{header files}, each of which
 | |
| provides definitions and declarations for a group of related facilities;
 | |
| this information is used by the C compiler when processing your program.
 | |
| For example, the header file @file{stdio.h} declares facilities for
 | |
| performing input and output, and the header file @file{string.h}
 | |
| declares string processing utilities.  The organization of this manual
 | |
| generally follows the same division as the header files.
 | |
| 
 | |
| If you are reading this manual for the first time, you should read all
 | |
| of the introductory material and skim the remaining chapters.  There are
 | |
| a @emph{lot} of functions in @theglibc{} and it's not realistic to
 | |
| expect that you will be able to remember exactly @emph{how} to use each
 | |
| and every one of them.  It's more important to become generally familiar
 | |
| with the kinds of facilities that the library provides, so that when you
 | |
| are writing your programs you can recognize @emph{when} to make use of
 | |
| library functions, and @emph{where} in this manual you can find more
 | |
| specific information about them.
 | |
| 
 | |
| 
 | |
| @node Standards and Portability, Using the Library, Getting Started, Introduction
 | |
| @section Standards and Portability
 | |
| @cindex standards
 | |
| 
 | |
| This section discusses the various standards and other sources that @theglibc{}
 | |
| is based upon.  These sources include the @w{ISO C} and
 | |
| POSIX standards, and the System V and Berkeley Unix implementations.
 | |
| 
 | |
| The primary focus of this manual is to tell you how to make effective
 | |
| use of the @glibcadj{} facilities.  But if you are concerned about
 | |
| making your programs compatible with these standards, or portable to
 | |
| operating systems other than GNU, this can affect how you use the
 | |
| library.  This section gives you an overview of these standards, so that
 | |
| you will know what they are when they are mentioned in other parts of
 | |
| the manual.
 | |
| 
 | |
| @xref{Library Summary}, for an alphabetical list of the functions and
 | |
| other symbols provided by the library.  This list also states which
 | |
| standards each function or symbol comes from.
 | |
| 
 | |
| @menu
 | |
| * ISO C::                       The international standard for the C
 | |
|                                  programming language.
 | |
| * POSIX::                       The ISO/IEC 9945 (aka IEEE 1003) standards
 | |
|                                  for operating systems.
 | |
| * Berkeley Unix::               BSD and SunOS.
 | |
| * SVID::                        The System V Interface Description.
 | |
| * XPG::                         The X/Open Portability Guide.
 | |
| @end menu
 | |
| 
 | |
| @node ISO C, POSIX,  , Standards and Portability
 | |
| @subsection ISO C
 | |
| @cindex ISO C
 | |
| 
 | |
| @Theglibc{} is compatible with the C standard adopted by the
 | |
| American National Standards Institute (ANSI):
 | |
| @cite{American National Standard X3.159-1989---``ANSI C''} and later
 | |
| by the International Standardization Organization (ISO):
 | |
| @cite{ISO/IEC 9899:1990, ``Programming languages---C''}.
 | |
| We here refer to the standard as @w{ISO C} since this is the more
 | |
| general standard in respect of ratification.
 | |
| The header files and library facilities that make up @theglibc{} are
 | |
| a superset of those specified by the @w{ISO C} standard.@refill
 | |
| 
 | |
| @pindex gcc
 | |
| If you are concerned about strict adherence to the @w{ISO C} standard, you
 | |
| should use the @samp{-ansi} option when you compile your programs with
 | |
| the GNU C compiler.  This tells the compiler to define @emph{only} ISO
 | |
| standard features from the library header files, unless you explicitly
 | |
| ask for additional features.  @xref{Feature Test Macros}, for
 | |
| information on how to do this.
 | |
| 
 | |
| Being able to restrict the library to include only @w{ISO C} features is
 | |
| important because @w{ISO C} puts limitations on what names can be defined
 | |
| by the library implementation, and the GNU extensions don't fit these
 | |
| limitations.  @xref{Reserved Names}, for more information about these
 | |
| restrictions.
 | |
| 
 | |
| This manual does not attempt to give you complete details on the
 | |
| differences between @w{ISO C} and older dialects.  It gives advice on how
 | |
| to write programs to work portably under multiple C dialects, but does
 | |
| not aim for completeness.
 | |
| 
 | |
| 
 | |
| @node POSIX, Berkeley Unix, ISO C, Standards and Portability
 | |
| @subsection POSIX (The Portable Operating System Interface)
 | |
| @cindex POSIX
 | |
| @cindex POSIX.1
 | |
| @cindex IEEE Std 1003.1
 | |
| @cindex ISO/IEC 9945-1
 | |
| @cindex POSIX.2
 | |
| @cindex IEEE Std 1003.2
 | |
| @cindex ISO/IEC 9945-2
 | |
| 
 | |
| @Theglibc{} is also compatible with the ISO @dfn{POSIX} family of
 | |
| standards, known more formally as the @dfn{Portable Operating System
 | |
| Interface for Computer Environments} (ISO/IEC 9945).  They were also
 | |
| published as ANSI/IEEE Std 1003.  POSIX is derived mostly from various
 | |
| versions of the Unix operating system.
 | |
| 
 | |
| The library facilities specified by the POSIX standards are a superset
 | |
| of those required by @w{ISO C}; POSIX specifies additional features for
 | |
| @w{ISO C} functions, as well as specifying new additional functions.  In
 | |
| general, the additional requirements and functionality defined by the
 | |
| POSIX standards are aimed at providing lower-level support for a
 | |
| particular kind of operating system environment, rather than general
 | |
| programming language support which can run in many diverse operating
 | |
| system environments.@refill
 | |
| 
 | |
| @Theglibc{} implements all of the functions specified in
 | |
| @cite{ISO/IEC 9945-1:1996, the POSIX System Application Program
 | |
| Interface}, commonly referred to as POSIX.1.  The primary extensions to
 | |
| the @w{ISO C} facilities specified by this standard include file system
 | |
| interface primitives (@pxref{File System Interface}), device-specific
 | |
| terminal control functions (@pxref{Low-Level Terminal Interface}), and
 | |
| process control functions (@pxref{Processes}).
 | |
| 
 | |
| Some facilities from @cite{ISO/IEC 9945-2:1993, the POSIX Shell and
 | |
| Utilities standard} (POSIX.2) are also implemented in @theglibc{}.
 | |
| These include utilities for dealing with regular expressions and other
 | |
| pattern matching facilities (@pxref{Pattern Matching}).
 | |
| 
 | |
| @menu
 | |
| * POSIX Safety Concepts::       Safety concepts from POSIX.
 | |
| * Unsafe Features::             Features that make functions unsafe.
 | |
| * Conditionally Safe Features:: Features that make functions unsafe
 | |
|                                  in the absence of workarounds.
 | |
| * Other Safety Remarks::        Additional safety features and remarks.
 | |
| @end menu
 | |
| 
 | |
| @comment Roland sez:
 | |
| @comment The GNU C library as it stands conforms to 1003.2 draft 11, which
 | |
| @comment specifies:
 | |
| @comment
 | |
| @comment Several new macros in <limits.h>.
 | |
| @comment popen, pclose
 | |
| @comment <regex.h> (which is not yet fully implemented--wait on this)
 | |
| @comment fnmatch
 | |
| @comment getopt
 | |
| @comment <glob.h>
 | |
| @comment <wordexp.h> (not yet implemented)
 | |
| @comment confstr
 | |
| 
 | |
| @node POSIX Safety Concepts, Unsafe Features, , POSIX
 | |
| @subsubsection POSIX Safety Concepts
 | |
| @cindex POSIX Safety Concepts
 | |
| 
 | |
| This manual documents various safety properties of @glibcadj{}
 | |
| functions, in lines that follow their prototypes and look like:
 | |
| 
 | |
| @sampsafety{@prelim{}@mtsafe{}@assafe{}@acsafe{}}
 | |
| 
 | |
| The properties are assessed according to the criteria set forth in the
 | |
| POSIX standard for such safety contexts as Thread-, Async-Signal- and
 | |
| Async-Cancel- -Safety.  Intuitive definitions of these properties,
 | |
| attempting to capture the meaning of the standard definitions, follow.
 | |
| 
 | |
| @itemize @bullet
 | |
| 
 | |
| @item
 | |
| @cindex MT-Safe
 | |
| @cindex Thread-Safe
 | |
| @code{MT-Safe} or Thread-Safe functions are safe to call in the presence
 | |
| of other threads.  MT, in MT-Safe, stands for Multi Thread.
 | |
| 
 | |
| Being MT-Safe does not imply a function is atomic, nor that it uses any
 | |
| of the memory synchronization mechanisms POSIX exposes to users.  It is
 | |
| even possible that calling MT-Safe functions in sequence does not yield
 | |
| an MT-Safe combination.  For example, having a thread call two MT-Safe
 | |
| functions one right after the other does not guarantee behavior
 | |
| equivalent to atomic execution of a combination of both functions, since
 | |
| concurrent calls in other threads may interfere in a destructive way.
 | |
| 
 | |
| Whole-program optimizations that could inline functions across library
 | |
| interfaces may expose unsafe reordering, and so performing inlining
 | |
| across the @glibcadj{} interface is not recommended.  The documented
 | |
| MT-Safety status is not guaranteed under whole-program optimization.
 | |
| However, functions defined in user-visible headers are designed to be
 | |
| safe for inlining.
 | |
| 
 | |
| 
 | |
| @item
 | |
| @cindex AS-Safe
 | |
| @cindex Async-Signal-Safe
 | |
| @code{AS-Safe} or Async-Signal-Safe functions are safe to call from
 | |
| asynchronous signal handlers.  AS, in AS-Safe, stands for Asynchronous
 | |
| Signal.
 | |
| 
 | |
| Many functions that are AS-Safe may set @code{errno}, or modify the
 | |
| floating-point environment, because their doing so does not make them
 | |
| unsuitable for use in signal handlers.  However, programs could
 | |
| misbehave should asynchronous signal handlers modify this thread-local
 | |
| state, and the signal handling machinery cannot be counted on to
 | |
| preserve it.  Therefore, signal handlers that call functions that may
 | |
| set @code{errno} or modify the floating-point environment @emph{must}
 | |
| save their original values, and restore them before returning.
 | |
| 
 | |
| 
 | |
| @item
 | |
| @cindex AC-Safe
 | |
| @cindex Async-Cancel-Safe
 | |
| @code{AC-Safe} or Async-Cancel-Safe functions are safe to call when
 | |
| asynchronous cancellation is enabled.  AC in AC-Safe stands for
 | |
| Asynchronous Cancellation.
 | |
| 
 | |
| The POSIX standard defines only three functions to be AC-Safe, namely
 | |
| @code{pthread_cancel}, @code{pthread_setcancelstate}, and
 | |
| @code{pthread_setcanceltype}.  At present @theglibc{} provides no
 | |
| guarantees beyond these three functions, but does document which
 | |
| functions are presently AC-Safe.  This documentation is provided for use
 | |
| by @theglibc{} developers.
 | |
| 
 | |
| Just like signal handlers, cancellation cleanup routines must configure
 | |
| the floating point environment they require.  The routines cannot assume
 | |
| a floating point environment, particularly when asynchronous
 | |
| cancellation is enabled.  If the configuration of the floating point
 | |
| environment cannot be performed atomically then it is also possible that
 | |
| the environment encountered is internally inconsistent.
 | |
| 
 | |
| 
 | |
| @item
 | |
| @cindex MT-Unsafe
 | |
| @cindex Thread-Unsafe
 | |
| @cindex AS-Unsafe
 | |
| @cindex Async-Signal-Unsafe
 | |
| @cindex AC-Unsafe
 | |
| @cindex Async-Cancel-Unsafe
 | |
| @code{MT-Unsafe}, @code{AS-Unsafe}, @code{AC-Unsafe} functions are not
 | |
| safe to call within the safety contexts described above.  Calling them
 | |
| within such contexts invokes undefined behavior.
 | |
| 
 | |
| Functions not explicitly documented as safe in a safety context should
 | |
| be regarded as Unsafe.
 | |
| 
 | |
| 
 | |
| @item
 | |
| @cindex Preliminary
 | |
| @code{Preliminary} safety properties are documented, indicating these
 | |
| properties may @emph{not} be counted on in future releases of
 | |
| @theglibc{}.
 | |
| 
 | |
| Such preliminary properties are the result of an assessment of the
 | |
| properties of our current implementation, rather than of what is
 | |
| mandated and permitted by current and future standards.
 | |
| 
 | |
| Although we strive to abide by the standards, in some cases our
 | |
| implementation is safe even when the standard does not demand safety,
 | |
| and in other cases our implementation does not meet the standard safety
 | |
| requirements.  The latter are most likely bugs; the former, when marked
 | |
| as @code{Preliminary}, should not be counted on: future standards may
 | |
| require changes that are not compatible with the additional safety
 | |
| properties afforded by the current implementation.
 | |
| 
 | |
| Furthermore, the POSIX standard does not offer a detailed definition of
 | |
| safety.  We assume that, by ``safe to call'', POSIX means that, as long
 | |
| as the program does not invoke undefined behavior, the ``safe to call''
 | |
| function behaves as specified, and does not cause other functions to
 | |
| deviate from their specified behavior.  We have chosen to use its loose
 | |
| definitions of safety, not because they are the best definitions to use,
 | |
| but because choosing them harmonizes this manual with POSIX.
 | |
| 
 | |
| Please keep in mind that these are preliminary definitions and
 | |
| annotations, and certain aspects of the definitions are still under
 | |
| discussion and might be subject to clarification or change.
 | |
| 
 | |
| Over time, we envision evolving the preliminary safety notes into stable
 | |
| commitments, as stable as those of our interfaces.  As we do, we will
 | |
| remove the @code{Preliminary} keyword from safety notes.  As long as the
 | |
| keyword remains, however, they are not to be regarded as a promise of
 | |
| future behavior.
 | |
| 
 | |
| 
 | |
| @end itemize
 | |
| 
 | |
| Other keywords that appear in safety notes are defined in subsequent
 | |
| sections.
 | |
| 
 | |
| 
 | |
| @node Unsafe Features, Conditionally Safe Features, POSIX Safety Concepts, POSIX
 | |
| @subsubsection Unsafe Features
 | |
| @cindex Unsafe Features
 | |
| 
 | |
| Functions that are unsafe to call in certain contexts are annotated with
 | |
| keywords that document their features that make them unsafe to call.
 | |
| AS-Unsafe features in this section indicate the functions are never safe
 | |
| to call when asynchronous signals are enabled.  AC-Unsafe features
 | |
| indicate they are never safe to call when asynchronous cancellation is
 | |
| enabled.  There are no MT-Unsafe marks in this section.
 | |
| 
 | |
| @itemize @bullet
 | |
| 
 | |
| @item @code{lock}
 | |
| @cindex lock
 | |
| 
 | |
| Functions marked with @code{lock} as an AS-Unsafe feature may be
 | |
| interrupted by a signal while holding a non-recursive lock.  If the
 | |
| signal handler calls another such function that takes the same lock, the
 | |
| result is a deadlock.
 | |
| 
 | |
| Functions annotated with @code{lock} as an AC-Unsafe feature may, if
 | |
| cancelled asynchronously, fail to release a lock that would have been
 | |
| released if their execution had not been interrupted by asynchronous
 | |
| thread cancellation.  Once a lock is left taken, attempts to take that
 | |
| lock will block indefinitely.
 | |
| 
 | |
| 
 | |
| @item @code{corrupt}
 | |
| @cindex corrupt
 | |
| 
 | |
| Functions marked with @code{corrupt} as an AS-Unsafe feature may corrupt
 | |
| data structures and misbehave when they interrupt, or are interrupted
 | |
| by, another such function.  Unlike functions marked with @code{lock},
 | |
| these take recursive locks to avoid MT-Safety problems, but this is not
 | |
| enough to stop a signal handler from observing a partially-updated data
 | |
| structure.  Further corruption may arise from the interrupted function's
 | |
| failure to notice updates made by signal handlers.
 | |
| 
 | |
| Functions marked with @code{corrupt} as an AC-Unsafe feature may leave
 | |
| data structures in a corrupt, partially updated state.  Subsequent uses
 | |
| of the data structure may misbehave.
 | |
| 
 | |
| @c A special case, probably not worth documenting separately, involves
 | |
| @c reallocing, or even freeing pointers.  Any case involving free could
 | |
| @c be easily turned into an ac-safe leak by resetting the pointer before
 | |
| @c releasing it; I don't think we have any case that calls for this sort
 | |
| @c of fixing.  Fixing the realloc cases would require a new interface:
 | |
| @c instead of @code{ptr=realloc(ptr,size)} we'd have to introduce
 | |
| @c @code{acsafe_realloc(&ptr,size)} that would modify ptr before
 | |
| @c releasing the old memory.  The ac-unsafe realloc could be implemented
 | |
| @c in terms of an internal interface with this semantics (say
 | |
| @c __acsafe_realloc), but since realloc can be overridden, the function
 | |
| @c we call to implement realloc should not be this internal interface,
 | |
| @c but another internal interface that calls __acsafe_realloc if realloc
 | |
| @c was not overridden, and calls the overridden realloc with async
 | |
| @c cancel disabled.  --lxoliva
 | |
| 
 | |
| 
 | |
| @item @code{heap}
 | |
| @cindex heap
 | |
| 
 | |
| Functions marked with @code{heap} may call heap memory management
 | |
| functions from the @code{malloc}/@code{free} family of functions and are
 | |
| only as safe as those functions.  This note is thus equivalent to:
 | |
| 
 | |
| @sampsafety{@asunsafe{@asulock{}}@acunsafe{@aculock{} @acsfd{} @acsmem{}}}
 | |
| 
 | |
| 
 | |
| @c Check for cases that should have used plugin instead of or in
 | |
| @c addition to this.  Then, after rechecking gettext, adjust i18n if
 | |
| @c needed.
 | |
| @item @code{dlopen}
 | |
| @cindex dlopen
 | |
| 
 | |
| Functions marked with @code{dlopen} use the dynamic loader to load
 | |
| shared libraries into the current execution image.  This involves
 | |
| opening files, mapping them into memory, allocating additional memory,
 | |
| resolving symbols, applying relocations and more, all of this while
 | |
| holding internal dynamic loader locks.
 | |
| 
 | |
| The locks are enough for these functions to be AS- and AC-Unsafe, but
 | |
| other issues may arise.  At present this is a placeholder for all
 | |
| potential safety issues raised by @code{dlopen}.
 | |
| 
 | |
| @c dlopen runs init and fini sections of the module; does this mean
 | |
| @c dlopen always implies plugin?
 | |
| 
 | |
| 
 | |
| @item @code{plugin}
 | |
| @cindex plugin
 | |
| 
 | |
| Functions annotated with @code{plugin} may run code from plugins that
 | |
| may be external to @theglibc{}.  Such plugin functions are assumed to be
 | |
| MT-Safe, AS-Unsafe and AC-Unsafe.  Examples of such plugins are stack
 | |
| @cindex NSS
 | |
| unwinding libraries, name service switch (NSS) and character set
 | |
| @cindex iconv
 | |
| conversion (iconv) back-ends.
 | |
| 
 | |
| Although the plugins mentioned as examples are all brought in by means
 | |
| of dlopen, the @code{plugin} keyword does not imply any direct
 | |
| involvement of the dynamic loader or the @code{libdl} interfaces, those
 | |
| are covered by @code{dlopen}.  For example, if one function loads a
 | |
| module and finds the addresses of some of its functions, while another
 | |
| just calls those already-resolved functions, the former will be marked
 | |
| with @code{dlopen}, whereas the latter will get the @code{plugin}.  When
 | |
| a single function takes all of these actions, then it gets both marks.
 | |
| 
 | |
| 
 | |
| @item @code{i18n}
 | |
| @cindex i18n
 | |
| 
 | |
| Functions marked with @code{i18n} may call internationalization
 | |
| functions of the @code{gettext} family and will be only as safe as those
 | |
| functions.  This note is thus equivalent to:
 | |
| 
 | |
| @sampsafety{@mtsafe{@mtsenv{}}@asunsafe{@asucorrupt{} @ascuheap{} @ascudlopen{}}@acunsafe{@acucorrupt{}}}
 | |
| 
 | |
| 
 | |
| @item @code{timer}
 | |
| @cindex timer
 | |
| 
 | |
| Functions marked with @code{timer} use the @code{alarm} function or
 | |
| similar to set a time-out for a system call or a long-running operation.
 | |
| In a multi-threaded program, there is a risk that the time-out signal
 | |
| will be delivered to a different thread, thus failing to interrupt the
 | |
| intended thread.  Besides being MT-Unsafe, such functions are always
 | |
| AS-Unsafe, because calling them in signal handlers may interfere with
 | |
| timers set in the interrupted code, and AC-Unsafe, because there is no
 | |
| safe way to guarantee an earlier timer will be reset in case of
 | |
| asynchronous cancellation.
 | |
| 
 | |
| @end itemize
 | |
| 
 | |
| 
 | |
| @node Conditionally Safe Features, Other Safety Remarks, Unsafe Features, POSIX
 | |
| @subsubsection Conditionally Safe Features
 | |
| @cindex Conditionally Safe Features
 | |
| 
 | |
| For some features that make functions unsafe to call in certain
 | |
| contexts, there are known ways to avoid the safety problem other than
 | |
| refraining from calling the function altogether.  The keywords that
 | |
| follow refer to such features, and each of their definitions indicate
 | |
| how the whole program needs to be constrained in order to remove the
 | |
| safety problem indicated by the keyword.  Only when all the reasons that
 | |
| make a function unsafe are observed and addressed, by applying the
 | |
| documented constraints, does the function become safe to call in a
 | |
| context.
 | |
| 
 | |
| @itemize @bullet
 | |
| 
 | |
| @item @code{init}
 | |
| @cindex init
 | |
| 
 | |
| Functions marked with @code{init} as an MT-Unsafe feature perform
 | |
| MT-Unsafe initialization when they are first called.
 | |
| 
 | |
| Calling such a function at least once in single-threaded mode removes
 | |
| this specific cause for the function to be regarded as MT-Unsafe.  If no
 | |
| other cause for that remains, the function can then be safely called
 | |
| after other threads are started.
 | |
| 
 | |
| Functions marked with @code{init} as an AS- or AC-Unsafe feature use the
 | |
| internal @code{libc_once} machinery or similar to initialize internal
 | |
| data structures.
 | |
| 
 | |
| If a signal handler interrupts such an initializer, and calls any
 | |
| function that also performs @code{libc_once} initialization, it will
 | |
| deadlock if the thread library has been loaded.
 | |
| 
 | |
| Furthermore, if an initializer is partially complete before it is
 | |
| canceled or interrupted by a signal whose handler requires the same
 | |
| initialization, some or all of the initialization may be performed more
 | |
| than once, leaking resources or even resulting in corrupt internal data.
 | |
| 
 | |
| Applications that need to call functions marked with @code{init} as an
 | |
| AS- or AC-Unsafe feature should ensure the initialization is performed
 | |
| before configuring signal handlers or enabling cancellation, so that the
 | |
| AS- and AC-Safety issues related with @code{libc_once} do not arise.
 | |
| 
 | |
| @c We may have to extend the annotations to cover conditions in which
 | |
| @c initialization may or may not occur, since an initial call in a safe
 | |
| @c context is no use if the initialization doesn't take place at that
 | |
| @c time: it doesn't remove the risk for later calls.
 | |
| 
 | |
| 
 | |
| @item @code{race}
 | |
| @cindex race
 | |
| 
 | |
| Functions annotated with @code{race} as an MT-Safety issue operate on
 | |
| objects in ways that may cause data races or similar forms of
 | |
| destructive interference out of concurrent execution.  In some cases,
 | |
| the objects are passed to the functions by users; in others, they are
 | |
| used by the functions to return values to users; in others, they are not
 | |
| even exposed to users.
 | |
| 
 | |
| We consider access to objects passed as (indirect) arguments to
 | |
| functions to be data race free.  The assurance of data race free objects
 | |
| is the caller's responsibility.  We will not mark a function as
 | |
| MT-Unsafe or AS-Unsafe if it misbehaves when users fail to take the
 | |
| measures required by POSIX to avoid data races when dealing with such
 | |
| objects.  As a general rule, if a function is documented as reading from
 | |
| an object passed (by reference) to it, or modifying it, users ought to
 | |
| use memory synchronization primitives to avoid data races just as they
 | |
| would should they perform the accesses themselves rather than by calling
 | |
| the library function.  @code{FILE} streams are the exception to the
 | |
| general rule, in that POSIX mandates the library to guard against data
 | |
| races in many functions that manipulate objects of this specific opaque
 | |
| type.  We regard this as a convenience provided to users, rather than as
 | |
| a general requirement whose expectations should extend to other types.
 | |
| 
 | |
| In order to remind users that guarding certain arguments is their
 | |
| responsibility, we will annotate functions that take objects of certain
 | |
| types as arguments.  We draw the line for objects passed by users as
 | |
| follows: objects whose types are exposed to users, and that users are
 | |
| expected to access directly, such as memory buffers, strings, and
 | |
| various user-visible @code{struct} types, do @emph{not} give reason for
 | |
| functions to be annotated with @code{race}.  It would be noisy and
 | |
| redundant with the general requirement, and not many would be surprised
 | |
| by the library's lack of internal guards when accessing objects that can
 | |
| be accessed directly by users.
 | |
| 
 | |
| As for objects that are opaque or opaque-like, in that they are to be
 | |
| manipulated only by passing them to library functions (e.g.,
 | |
| @code{FILE}, @code{DIR}, @code{obstack}, @code{iconv_t}), there might be
 | |
| additional expectations as to internal coordination of access by the
 | |
| library.  We will annotate, with @code{race} followed by a colon and the
 | |
| argument name, functions that take such objects but that do not take
 | |
| care of synchronizing access to them by default.  For example,
 | |
| @code{FILE} stream @code{unlocked} functions will be annotated, but
 | |
| those that perform implicit locking on @code{FILE} streams by default
 | |
| will not, even though the implicit locking may be disabled on a
 | |
| per-stream basis.
 | |
| 
 | |
| In either case, we will not regard as MT-Unsafe functions that may
 | |
| access user-supplied objects in unsafe ways should users fail to ensure
 | |
| the accesses are well defined.  The notion prevails that users are
 | |
| expected to safeguard against data races any user-supplied objects that
 | |
| the library accesses on their behalf.
 | |
| 
 | |
| @c The above describes @mtsrace; @mtasurace is described below.
 | |
| 
 | |
| This user responsibility does not apply, however, to objects controlled
 | |
| by the library itself, such as internal objects and static buffers used
 | |
| to return values from certain calls.  When the library doesn't guard
 | |
| them against concurrent uses, these cases are regarded as MT-Unsafe and
 | |
| AS-Unsafe (although the @code{race} mark under AS-Unsafe will be omitted
 | |
| as redundant with the one under MT-Unsafe).  As in the case of
 | |
| user-exposed objects, the mark may be followed by a colon and an
 | |
| identifier.  The identifier groups all functions that operate on a
 | |
| certain unguarded object; users may avoid the MT-Safety issues related
 | |
| with unguarded concurrent access to such internal objects by creating a
 | |
| non-recursive mutex related with the identifier, and always holding the
 | |
| mutex when calling any function marked as racy on that identifier, as
 | |
| they would have to should the identifier be an object under user
 | |
| control.  The non-recursive mutex avoids the MT-Safety issue, but it
 | |
| trades one AS-Safety issue for another, so use in asynchronous signals
 | |
| remains undefined.
 | |
| 
 | |
| When the identifier relates to a static buffer used to hold return
 | |
| values, the mutex must be held for as long as the buffer remains in use
 | |
| by the caller.  Many functions that return pointers to static buffers
 | |
| offer reentrant variants that store return values in caller-supplied
 | |
| buffers instead.  In some cases, such as @code{tmpname}, the variant is
 | |
| chosen not by calling an alternate entry point, but by passing a
 | |
| non-@code{NULL} pointer to the buffer in which the returned values are
 | |
| to be stored.  These variants are generally preferable in multi-threaded
 | |
| programs, although some of them are not MT-Safe because of other
 | |
| internal buffers, also documented with @code{race} notes.
 | |
| 
 | |
| 
 | |
| @item @code{const}
 | |
| @cindex const
 | |
| 
 | |
| Functions marked with @code{const} as an MT-Safety issue non-atomically
 | |
| modify internal objects that are better regarded as constant, because a
 | |
| substantial portion of @theglibc{} accesses them without
 | |
| synchronization.  Unlike @code{race}, that causes both readers and
 | |
| writers of internal objects to be regarded as MT-Unsafe and AS-Unsafe,
 | |
| this mark is applied to writers only.  Writers remain equally MT- and
 | |
| AS-Unsafe to call, but the then-mandatory constness of objects they
 | |
| modify enables readers to be regarded as MT-Safe and AS-Safe (as long as
 | |
| no other reasons for them to be unsafe remain), since the lack of
 | |
| synchronization is not a problem when the objects are effectively
 | |
| constant.
 | |
| 
 | |
| The identifier that follows the @code{const} mark will appear by itself
 | |
| as a safety note in readers.  Programs that wish to work around this
 | |
| safety issue, so as to call writers, may use a non-recursve
 | |
| @code{rwlock} associated with the identifier, and guard @emph{all} calls
 | |
| to functions marked with @code{const} followed by the identifier with a
 | |
| write lock, and @emph{all} calls to functions marked with the identifier
 | |
| by itself with a read lock.  The non-recursive locking removes the
 | |
| MT-Safety problem, but it trades one AS-Safety problem for another, so
 | |
| use in asynchronous signals remains undefined.
 | |
| 
 | |
| @c But what if, instead of marking modifiers with const:id and readers
 | |
| @c with just id, we marked writers with race:id and readers with ro:id?
 | |
| @c Instead of having to define each instance of “id”, we'd have a
 | |
| @c general pattern governing all such “id”s, wherein race:id would
 | |
| @c suggest the need for an exclusive/write lock to make the function
 | |
| @c safe, whereas ro:id would indicate “id” is expected to be read-only,
 | |
| @c but if any modifiers are called (while holding an exclusive lock),
 | |
| @c then ro:id-marked functions ought to be guarded with a read lock for
 | |
| @c safe operation.  ro:env or ro:locale, for example, seems to convey
 | |
| @c more clearly the expectations and the meaning, than just env or
 | |
| @c locale.
 | |
| 
 | |
| 
 | |
| @item @code{sig}
 | |
| @cindex sig
 | |
| 
 | |
| Functions marked with @code{sig} as a MT-Safety issue (that implies an
 | |
| identical AS-Safety issue, omitted for brevity) may temporarily install
 | |
| a signal handler for internal purposes, which may interfere with other
 | |
| uses of the signal, identified after a colon.
 | |
| 
 | |
| This safety problem can be worked around by ensuring that no other uses
 | |
| of the signal will take place for the duration of the call.  Holding a
 | |
| non-recursive mutex while calling all functions that use the same
 | |
| temporary signal; blocking that signal before the call and resetting its
 | |
| handler afterwards is recommended.
 | |
| 
 | |
| There is no safe way to guarantee the original signal handler is
 | |
| restored in case of asynchronous cancellation, therefore so-marked
 | |
| functions are also AC-Unsafe.
 | |
| 
 | |
| @c fixme: at least deferred cancellation should get it right, and would
 | |
| @c obviate the restoring bit below, and the qualifier above.
 | |
| 
 | |
| Besides the measures recommended to work around the MT- and AS-Safety
 | |
| problem, in order to avert the cancellation problem, disabling
 | |
| asynchronous cancellation @emph{and} installing a cleanup handler to
 | |
| restore the signal to the desired state and to release the mutex are
 | |
| recommended.
 | |
| 
 | |
| 
 | |
| @item @code{term}
 | |
| @cindex term
 | |
| 
 | |
| Functions marked with @code{term} as an MT-Safety issue may change the
 | |
| terminal settings in the recommended way, namely: call @code{tcgetattr},
 | |
| modify some flags, and then call @code{tcsetattr}; this creates a window
 | |
| in which changes made by other threads are lost.  Thus, functions marked
 | |
| with @code{term} are MT-Unsafe.  The same window enables changes made by
 | |
| asynchronous signals to be lost.  These functions are also AS-Unsafe,
 | |
| but the corresponding mark is omitted as redundant.
 | |
| 
 | |
| It is thus advisable for applications using the terminal to avoid
 | |
| concurrent and reentrant interactions with it, by not using it in signal
 | |
| handlers or blocking signals that might use it, and holding a lock while
 | |
| calling these functions and interacting with the terminal.  This lock
 | |
| should also be used for mutual exclusion with functions marked with
 | |
| @code{@mtasurace{:tcattr(fd)}}, where @var{fd} is a file descriptor for
 | |
| the controlling terminal.  The caller may use a single mutex for
 | |
| simplicity, or use one mutex per terminal, even if referenced by
 | |
| different file descriptors.
 | |
| 
 | |
| Functions marked with @code{term} as an AC-Safety issue are supposed to
 | |
| restore terminal settings to their original state, after temporarily
 | |
| changing them, but they may fail to do so if cancelled.
 | |
| 
 | |
| @c fixme: at least deferred cancellation should get it right, and would
 | |
| @c obviate the restoring bit below, and the qualifier above.
 | |
| 
 | |
| Besides the measures recommended to work around the MT- and AS-Safety
 | |
| problem, in order to avert the cancellation problem, disabling
 | |
| asynchronous cancellation @emph{and} installing a cleanup handler to
 | |
| restore the terminal settings to the original state and to release the
 | |
| mutex are recommended.
 | |
| 
 | |
| 
 | |
| @end itemize
 | |
| 
 | |
| 
 | |
| @node Other Safety Remarks, , Conditionally Safe Features, POSIX
 | |
| @subsubsection Other Safety Remarks
 | |
| @cindex Other Safety Remarks
 | |
| 
 | |
| Additional keywords may be attached to functions, indicating features
 | |
| that do not make a function unsafe to call, but that may need to be
 | |
| taken into account in certain classes of programs:
 | |
| 
 | |
| @itemize @bullet
 | |
| 
 | |
| @item @code{locale}
 | |
| @cindex locale
 | |
| 
 | |
| Functions annotated with @code{locale} as an MT-Safety issue read from
 | |
| the locale object without any form of synchronization.  Functions
 | |
| annotated with @code{locale} called concurrently with locale changes may
 | |
| behave in ways that do not correspond to any of the locales active
 | |
| during their execution, but an unpredictable mix thereof.
 | |
| 
 | |
| We do not mark these functions as MT- or AS-Unsafe, however, because
 | |
| functions that modify the locale object are marked with
 | |
| @code{const:locale} and regarded as unsafe.  Being unsafe, the latter
 | |
| are not to be called when multiple threads are running or asynchronous
 | |
| signals are enabled, and so the locale can be considered effectively
 | |
| constant in these contexts, which makes the former safe.
 | |
| 
 | |
| @c Should the locking strategy suggested under @code{const} be used,
 | |
| @c failure to guard locale uses is not as fatal as data races in
 | |
| @c general: unguarded uses will @emph{not} follow dangling pointers or
 | |
| @c access uninitialized, unmapped or recycled memory.  Each access will
 | |
| @c read from a consistent locale object that is or was active at some
 | |
| @c point during its execution.  Without synchronization, however, it
 | |
| @c cannot even be assumed that, after a change in locale, earlier
 | |
| @c locales will no longer be used, even after the newly-chosen one is
 | |
| @c used in the thread.  Nevertheless, even though unguarded reads from
 | |
| @c the locale will not violate type safety, functions that access the
 | |
| @c locale multiple times may invoke all sorts of undefined behavior
 | |
| @c because of the unexpected locale changes.
 | |
| 
 | |
| 
 | |
| @item @code{env}
 | |
| @cindex env
 | |
| 
 | |
| Functions marked with @code{env} as an MT-Safety issue access the
 | |
| environment with @code{getenv} or similar, without any guards to ensure
 | |
| safety in the presence of concurrent modifications.
 | |
| 
 | |
| We do not mark these functions as MT- or AS-Unsafe, however, because
 | |
| functions that modify the environment are all marked with
 | |
| @code{const:env} and regarded as unsafe.  Being unsafe, the latter are
 | |
| not to be called when multiple threads are running or asynchronous
 | |
| signals are enabled, and so the environment can be considered
 | |
| effectively constant in these contexts, which makes the former safe.
 | |
| 
 | |
| 
 | |
| @item @code{hostid}
 | |
| @cindex hostid
 | |
| 
 | |
| The function marked with @code{hostid} as an MT-Safety issue reads from
 | |
| the system-wide data structures that hold the ``host ID'' of the
 | |
| machine.  These data structures cannot generally be modified atomically.
 | |
| Since it is expected that the ``host ID'' will not normally change, the
 | |
| function that reads from it (@code{gethostid}) is regarded as safe,
 | |
| whereas the function that modifies it (@code{sethostid}) is marked with
 | |
| @code{@mtasuconst{:@mtshostid{}}}, indicating it may require special
 | |
| care if it is to be called.  In this specific case, the special care
 | |
| amounts to system-wide (not merely intra-process) coordination.
 | |
| 
 | |
| 
 | |
| @item @code{sigintr}
 | |
| @cindex sigintr
 | |
| 
 | |
| Functions marked with @code{sigintr} as an MT-Safety issue access the
 | |
| @code{_sigintr} internal data structure without any guards to ensure
 | |
| safety in the presence of concurrent modifications.
 | |
| 
 | |
| We do not mark these functions as MT- or AS-Unsafe, however, because
 | |
| functions that modify the this data structure are all marked with
 | |
| @code{const:sigintr} and regarded as unsafe.  Being unsafe, the latter
 | |
| are not to be called when multiple threads are running or asynchronous
 | |
| signals are enabled, and so the data structure can be considered
 | |
| effectively constant in these contexts, which makes the former safe.
 | |
| 
 | |
| 
 | |
| @item @code{fd}
 | |
| @cindex fd
 | |
| 
 | |
| Functions annotated with @code{fd} as an AC-Safety issue may leak file
 | |
| descriptors if asynchronous thread cancellation interrupts their
 | |
| execution.
 | |
| 
 | |
| Functions that allocate or deallocate file descriptors will generally be
 | |
| marked as such.  Even if they attempted to protect the file descriptor
 | |
| allocation and deallocation with cleanup regions, allocating a new
 | |
| descriptor and storing its number where the cleanup region could release
 | |
| it cannot be performed as a single atomic operation.  Similarly,
 | |
| releasing the descriptor and taking it out of the data structure
 | |
| normally responsible for releasing it cannot be performed atomically.
 | |
| There will always be a window in which the descriptor cannot be released
 | |
| because it was not stored in the cleanup handler argument yet, or it was
 | |
| already taken out before releasing it.  It cannot be taken out after
 | |
| release: an open descriptor could mean either that the descriptor still
 | |
| has to be closed, or that it already did so but the descriptor was
 | |
| reallocated by another thread or signal handler.
 | |
| 
 | |
| Such leaks could be internally avoided, with some performance penalty,
 | |
| by temporarily disabling asynchronous thread cancellation.  However,
 | |
| since callers of allocation or deallocation functions would have to do
 | |
| this themselves, to avoid the same sort of leak in their own layer, it
 | |
| makes more sense for the library to assume they are taking care of it
 | |
| than to impose a performance penalty that is redundant when the problem
 | |
| is solved in upper layers, and insufficient when it is not.
 | |
| 
 | |
| This remark by itself does not cause a function to be regarded as
 | |
| AC-Unsafe.  However, cumulative effects of such leaks may pose a
 | |
| problem for some programs.  If this is the case, suspending asynchronous
 | |
| cancellation for the duration of calls to such functions is recommended.
 | |
| 
 | |
| 
 | |
| @item @code{mem}
 | |
| @cindex mem
 | |
| 
 | |
| Functions annotated with @code{mem} as an AC-Safety issue may leak
 | |
| memory if asynchronous thread cancellation interrupts their execution.
 | |
| 
 | |
| The problem is similar to that of file descriptors: there is no atomic
 | |
| interface to allocate memory and store its address in the argument to a
 | |
| cleanup handler, or to release it and remove its address from that
 | |
| argument, without at least temporarily disabling asynchronous
 | |
| cancellation, which these functions do not do.
 | |
| 
 | |
| This remark does not by itself cause a function to be regarded as
 | |
| generally AC-Unsafe.  However, cumulative effects of such leaks may be
 | |
| severe enough for some programs that disabling asynchronous cancellation
 | |
| for the duration of calls to such functions may be required.
 | |
| 
 | |
| 
 | |
| @item @code{cwd}
 | |
| @cindex cwd
 | |
| 
 | |
| Functions marked with @code{cwd} as an MT-Safety issue may temporarily
 | |
| change the current working directory during their execution, which may
 | |
| cause relative pathnames to be resolved in unexpected ways in other
 | |
| threads or within asynchronous signal or cancellation handlers.
 | |
| 
 | |
| This is not enough of a reason to mark so-marked functions as MT- or
 | |
| AS-Unsafe, but when this behavior is optional (e.g., @code{nftw} with
 | |
| @code{FTW_CHDIR}), avoiding the option may be a good alternative to
 | |
| using full pathnames or file descriptor-relative (e.g. @code{openat})
 | |
| system calls.
 | |
| 
 | |
| 
 | |
| @item @code{!posix}
 | |
| @cindex !posix
 | |
| 
 | |
| This remark, as an MT-, AS- or AC-Safety note to a function, indicates
 | |
| the safety status of the function is known to differ from the specified
 | |
| status in the POSIX standard.  For example, POSIX does not require a
 | |
| function to be Safe, but our implementation is, or vice-versa.
 | |
| 
 | |
| For the time being, the absence of this remark does not imply the safety
 | |
| properties we documented are identical to those mandated by POSIX for
 | |
| the corresponding functions.
 | |
| 
 | |
| 
 | |
| @item @code{:identifier}
 | |
| @cindex :identifier
 | |
| 
 | |
| Annotations may sometimes be followed by identifiers, intended to group
 | |
| several functions that e.g. access the data structures in an unsafe way,
 | |
| as in @code{race} and @code{const}, or to provide more specific
 | |
| information, such as naming a signal in a function marked with
 | |
| @code{sig}.  It is envisioned that it may be applied to @code{lock} and
 | |
| @code{corrupt} as well in the future.
 | |
| 
 | |
| In most cases, the identifier will name a set of functions, but it may
 | |
| name global objects or function arguments, or identifiable properties or
 | |
| logical components associated with them, with a notation such as
 | |
| e.g. @code{:buf(arg)} to denote a buffer associated with the argument
 | |
| @var{arg}, or @code{:tcattr(fd)} to denote the terminal attributes of a
 | |
| file descriptor @var{fd}.
 | |
| 
 | |
| The most common use for identifiers is to provide logical groups of
 | |
| functions and arguments that need to be protected by the same
 | |
| synchronization primitive in order to ensure safe operation in a given
 | |
| context.
 | |
| 
 | |
| 
 | |
| @item @code{/condition}
 | |
| @cindex /condition
 | |
| 
 | |
| Some safety annotations may be conditional, in that they only apply if a
 | |
| boolean expression involving arguments, global variables or even the
 | |
| underlying kernel evaluates to true.  Such conditions as
 | |
| @code{/hurd} or @code{/!linux!bsd} indicate the preceding marker only
 | |
| applies when the underlying kernel is the HURD, or when it is neither
 | |
| Linux nor a BSD kernel, respectively.  @code{/!ps} and
 | |
| @code{/one_per_line} indicate the preceding marker only applies when
 | |
| argument @var{ps} is NULL, or global variable @var{one_per_line} is
 | |
| nonzero.
 | |
| 
 | |
| When all marks that render a function unsafe are adorned with such
 | |
| conditions, and none of the named conditions hold, then the function can
 | |
| be regarded as safe.
 | |
| 
 | |
| 
 | |
| @end itemize
 | |
| 
 | |
| 
 | |
| @node Berkeley Unix, SVID, POSIX, Standards and Portability
 | |
| @subsection Berkeley Unix
 | |
| @cindex BSD Unix
 | |
| @cindex 4.@var{n} BSD Unix
 | |
| @cindex Berkeley Unix
 | |
| @cindex SunOS
 | |
| @cindex Unix, Berkeley
 | |
| 
 | |
| @Theglibc{} defines facilities from some versions of Unix which
 | |
| are not formally standardized, specifically from the 4.2 BSD, 4.3 BSD,
 | |
| and 4.4 BSD Unix systems (also known as @dfn{Berkeley Unix}) and from
 | |
| @dfn{SunOS} (a popular 4.2 BSD derivative that includes some Unix System
 | |
| V functionality).  These systems support most of the @w{ISO C} and POSIX
 | |
| facilities, and 4.4 BSD and newer releases of SunOS in fact support them all.
 | |
| 
 | |
| The BSD facilities include symbolic links (@pxref{Symbolic Links}), the
 | |
| @code{select} function (@pxref{Waiting for I/O}), the BSD signal
 | |
| functions (@pxref{BSD Signal Handling}), and sockets (@pxref{Sockets}).
 | |
| 
 | |
| @node SVID, XPG, Berkeley Unix, Standards and Portability
 | |
| @subsection SVID (The System V Interface Description)
 | |
| @cindex SVID
 | |
| @cindex System V Unix
 | |
| @cindex Unix, System V
 | |
| 
 | |
| The @dfn{System V Interface Description} (SVID) is a document describing
 | |
| the AT&T Unix System V operating system.  It is to some extent a
 | |
| superset of the POSIX standard (@pxref{POSIX}).
 | |
| 
 | |
| @Theglibc{} defines most of the facilities required by the SVID
 | |
| that are not also required by the @w{ISO C} or POSIX standards, for
 | |
| compatibility with  System V Unix and other Unix systems (such as
 | |
| SunOS) which include these facilities.  However, many of the more
 | |
| obscure and less generally useful facilities required by the SVID are
 | |
| not included.  (In fact, Unix System V itself does not provide them all.)
 | |
| 
 | |
| The supported facilities from System V include the methods for
 | |
| inter-process communication and shared memory, the @code{hsearch} and
 | |
| @code{drand48} families of functions, @code{fmtmsg} and several of the
 | |
| mathematical functions.
 | |
| 
 | |
| @node XPG, , SVID, Standards and Portability
 | |
| @subsection XPG (The X/Open Portability Guide)
 | |
| 
 | |
| The X/Open Portability Guide, published by the X/Open Company, Ltd., is
 | |
| a more general standard than POSIX.  X/Open owns the Unix copyright and
 | |
| the XPG specifies the requirements for systems which are intended to be
 | |
| a Unix system.
 | |
| 
 | |
| @Theglibc{} complies to the X/Open Portability Guide, Issue 4.2,
 | |
| with all extensions common to XSI (X/Open System Interface)
 | |
| compliant systems and also all X/Open UNIX extensions.
 | |
| 
 | |
| The additions on top of POSIX are mainly derived from functionality
 | |
| available in @w{System V} and BSD systems.  Some of the really bad
 | |
| mistakes in @w{System V} systems were corrected, though.  Since
 | |
| fulfilling the XPG standard with the Unix extensions is a
 | |
| precondition for getting the Unix brand chances are good that the
 | |
| functionality is available on commercial systems.
 | |
| 
 | |
| 
 | |
| @node Using the Library, Roadmap to the Manual, Standards and Portability, Introduction
 | |
| @section Using the Library
 | |
| 
 | |
| This section describes some of the practical issues involved in using
 | |
| @theglibc{}.
 | |
| 
 | |
| @menu
 | |
| * Header Files::                How to include the header files in your
 | |
|                                  programs.
 | |
| * Macro Definitions::           Some functions in the library may really
 | |
|                                  be implemented as macros.
 | |
| * Reserved Names::              The C standard reserves some names for
 | |
|                                  the library, and some for users.
 | |
| * Feature Test Macros::         How to control what names are defined.
 | |
| @end menu
 | |
| 
 | |
| @node Header Files, Macro Definitions,  , Using the Library
 | |
| @subsection Header Files
 | |
| @cindex header files
 | |
| 
 | |
| Libraries for use by C programs really consist of two parts: @dfn{header
 | |
| files} that define types and macros and declare variables and
 | |
| functions; and the actual library or @dfn{archive} that contains the
 | |
| definitions of the variables and functions.
 | |
| 
 | |
| (Recall that in C, a @dfn{declaration} merely provides information that
 | |
| a function or variable exists and gives its type.  For a function
 | |
| declaration, information about the types of its arguments might be
 | |
| provided as well.  The purpose of declarations is to allow the compiler
 | |
| to correctly process references to the declared variables and functions.
 | |
| A @dfn{definition}, on the other hand, actually allocates storage for a
 | |
| variable or says what a function does.)
 | |
| @cindex definition (compared to declaration)
 | |
| @cindex declaration (compared to definition)
 | |
| 
 | |
| In order to use the facilities in @theglibc{}, you should be sure
 | |
| that your program source files include the appropriate header files.
 | |
| This is so that the compiler has declarations of these facilities
 | |
| available and can correctly process references to them.  Once your
 | |
| program has been compiled, the linker resolves these references to
 | |
| the actual definitions provided in the archive file.
 | |
| 
 | |
| Header files are included into a program source file by the
 | |
| @samp{#include} preprocessor directive.  The C language supports two
 | |
| forms of this directive; the first,
 | |
| 
 | |
| @smallexample
 | |
| #include "@var{header}"
 | |
| @end smallexample
 | |
| 
 | |
| @noindent
 | |
| is typically used to include a header file @var{header} that you write
 | |
| yourself; this would contain definitions and declarations describing the
 | |
| interfaces between the different parts of your particular application.
 | |
| By contrast,
 | |
| 
 | |
| @smallexample
 | |
| #include <file.h>
 | |
| @end smallexample
 | |
| 
 | |
| @noindent
 | |
| is typically used to include a header file @file{file.h} that contains
 | |
| definitions and declarations for a standard library.  This file would
 | |
| normally be installed in a standard place by your system administrator.
 | |
| You should use this second form for the C library header files.
 | |
| 
 | |
| Typically, @samp{#include} directives are placed at the top of the C
 | |
| source file, before any other code.  If you begin your source files with
 | |
| some comments explaining what the code in the file does (a good idea),
 | |
| put the @samp{#include} directives immediately afterwards, following the
 | |
| feature test macro definition (@pxref{Feature Test Macros}).
 | |
| 
 | |
| For more information about the use of header files and @samp{#include}
 | |
| directives, @pxref{Header Files,,, cpp.info, The GNU C Preprocessor
 | |
| Manual}.@refill
 | |
| 
 | |
| @Theglibc{} provides several header files, each of which contains
 | |
| the type and macro definitions and variable and function declarations
 | |
| for a group of related facilities.  This means that your programs may
 | |
| need to include several header files, depending on exactly which
 | |
| facilities you are using.
 | |
| 
 | |
| Some library header files include other library header files
 | |
| automatically.  However, as a matter of programming style, you should
 | |
| not rely on this; it is better to explicitly include all the header
 | |
| files required for the library facilities you are using.  The @glibcadj{}
 | |
| header files have been written in such a way that it doesn't
 | |
| matter if a header file is accidentally included more than once;
 | |
| including a header file a second time has no effect.  Likewise, if your
 | |
| program needs to include multiple header files, the order in which they
 | |
| are included doesn't matter.
 | |
| 
 | |
| @strong{Compatibility Note:} Inclusion of standard header files in any
 | |
| order and any number of times works in any @w{ISO C} implementation.
 | |
| However, this has traditionally not been the case in many older C
 | |
| implementations.
 | |
| 
 | |
| Strictly speaking, you don't @emph{have to} include a header file to use
 | |
| a function it declares; you could declare the function explicitly
 | |
| yourself, according to the specifications in this manual.  But it is
 | |
| usually better to include the header file because it may define types
 | |
| and macros that are not otherwise available and because it may define
 | |
| more efficient macro replacements for some functions.  It is also a sure
 | |
| way to have the correct declaration.
 | |
| 
 | |
| @node Macro Definitions, Reserved Names, Header Files, Using the Library
 | |
| @subsection Macro Definitions of Functions
 | |
| @cindex shadowing functions with macros
 | |
| @cindex removing macros that shadow functions
 | |
| @cindex undefining macros that shadow functions
 | |
| 
 | |
| If we describe something as a function in this manual, it may have a
 | |
| macro definition as well.  This normally has no effect on how your
 | |
| program runs---the macro definition does the same thing as the function
 | |
| would.  In particular, macro equivalents for library functions evaluate
 | |
| arguments exactly once, in the same way that a function call would.  The
 | |
| main reason for these macro definitions is that sometimes they can
 | |
| produce an inline expansion that is considerably faster than an actual
 | |
| function call.
 | |
| 
 | |
| Taking the address of a library function works even if it is also
 | |
| defined as a macro.  This is because, in this context, the name of the
 | |
| function isn't followed by the left parenthesis that is syntactically
 | |
| necessary to recognize a macro call.
 | |
| 
 | |
| You might occasionally want to avoid using the macro definition of a
 | |
| function---perhaps to make your program easier to debug.  There are
 | |
| two ways you can do this:
 | |
| 
 | |
| @itemize @bullet
 | |
| @item
 | |
| You can avoid a macro definition in a specific use by enclosing the name
 | |
| of the function in parentheses.  This works because the name of the
 | |
| function doesn't appear in a syntactic context where it is recognizable
 | |
| as a macro call.
 | |
| 
 | |
| @item
 | |
| You can suppress any macro definition for a whole source file by using
 | |
| the @samp{#undef} preprocessor directive, unless otherwise stated
 | |
| explicitly in the description of that facility.
 | |
| @end itemize
 | |
| 
 | |
| For example, suppose the header file @file{stdlib.h} declares a function
 | |
| named @code{abs} with
 | |
| 
 | |
| @smallexample
 | |
| extern int abs (int);
 | |
| @end smallexample
 | |
| 
 | |
| @noindent
 | |
| and also provides a macro definition for @code{abs}.  Then, in:
 | |
| 
 | |
| @smallexample
 | |
| #include <stdlib.h>
 | |
| int f (int *i) @{ return abs (++*i); @}
 | |
| @end smallexample
 | |
| 
 | |
| @noindent
 | |
| the reference to @code{abs} might refer to either a macro or a function.
 | |
| On the other hand, in each of the following examples the reference is
 | |
| to a function and not a macro.
 | |
| 
 | |
| @smallexample
 | |
| #include <stdlib.h>
 | |
| int g (int *i) @{ return (abs) (++*i); @}
 | |
| 
 | |
| #undef abs
 | |
| int h (int *i) @{ return abs (++*i); @}
 | |
| @end smallexample
 | |
| 
 | |
| Since macro definitions that double for a function behave in
 | |
| exactly the same way as the actual function version, there is usually no
 | |
| need for any of these methods.  In fact, removing macro definitions usually
 | |
| just makes your program slower.
 | |
| 
 | |
| 
 | |
| @node Reserved Names, Feature Test Macros, Macro Definitions, Using the Library
 | |
| @subsection Reserved Names
 | |
| @cindex reserved names
 | |
| @cindex name space
 | |
| 
 | |
| The names of all library types, macros, variables and functions that
 | |
| come from the @w{ISO C} standard are reserved unconditionally; your program
 | |
| @strong{may not} redefine these names.  All other library names are
 | |
| reserved if your program explicitly includes the header file that
 | |
| defines or declares them.  There are several reasons for these
 | |
| restrictions:
 | |
| 
 | |
| @itemize @bullet
 | |
| @item
 | |
| Other people reading your code could get very confused if you were using
 | |
| a function named @code{exit} to do something completely different from
 | |
| what the standard @code{exit} function does, for example.  Preventing
 | |
| this situation helps to make your programs easier to understand and
 | |
| contributes to modularity and maintainability.
 | |
| 
 | |
| @item
 | |
| It avoids the possibility of a user accidentally redefining a library
 | |
| function that is called by other library functions.  If redefinition
 | |
| were allowed, those other functions would not work properly.
 | |
| 
 | |
| @item
 | |
| It allows the compiler to do whatever special optimizations it pleases
 | |
| on calls to these functions, without the possibility that they may have
 | |
| been redefined by the user.  Some library facilities, such as those for
 | |
| dealing with variadic arguments (@pxref{Variadic Functions})
 | |
| and non-local exits (@pxref{Non-Local Exits}), actually require a
 | |
| considerable amount of cooperation on the part of the C compiler, and
 | |
| with respect to the implementation, it might be easier for the compiler
 | |
| to treat these as built-in parts of the language.
 | |
| @end itemize
 | |
| 
 | |
| In addition to the names documented in this manual, reserved names
 | |
| include all external identifiers (global functions and variables) that
 | |
| begin with an underscore (@samp{_}) and all identifiers regardless of
 | |
| use that begin with either two underscores or an underscore followed by
 | |
| a capital letter are reserved names.  This is so that the library and
 | |
| header files can define functions, variables, and macros for internal
 | |
| purposes without risk of conflict with names in user programs.
 | |
| 
 | |
| Some additional classes of identifier names are reserved for future
 | |
| extensions to the C language or the POSIX.1 environment.  While using these
 | |
| names for your own purposes right now might not cause a problem, they do
 | |
| raise the possibility of conflict with future versions of the C
 | |
| or POSIX standards, so you should avoid these names.
 | |
| 
 | |
| @itemize @bullet
 | |
| @item
 | |
| Names beginning with a capital @samp{E} followed a digit or uppercase
 | |
| letter may be used for additional error code names.  @xref{Error
 | |
| Reporting}.
 | |
| 
 | |
| @item
 | |
| Names that begin with either @samp{is} or @samp{to} followed by a
 | |
| lowercase letter may be used for additional character testing and
 | |
| conversion functions.  @xref{Character Handling}.
 | |
| 
 | |
| @item
 | |
| Names that begin with @samp{LC_} followed by an uppercase letter may be
 | |
| used for additional macros specifying locale attributes.
 | |
| @xref{Locales}.
 | |
| 
 | |
| @item
 | |
| Names of all existing mathematics functions (@pxref{Mathematics})
 | |
| suffixed with @samp{f} or @samp{l} are reserved for corresponding
 | |
| functions that operate on @code{float} and @code{long double} arguments,
 | |
| respectively.
 | |
| 
 | |
| @item
 | |
| Names that begin with @samp{SIG} followed by an uppercase letter are
 | |
| reserved for additional signal names.  @xref{Standard Signals}.
 | |
| 
 | |
| @item
 | |
| Names that begin with @samp{SIG_} followed by an uppercase letter are
 | |
| reserved for additional signal actions.  @xref{Basic Signal Handling}.
 | |
| 
 | |
| @item
 | |
| Names beginning with @samp{str}, @samp{mem}, or @samp{wcs} followed by a
 | |
| lowercase letter are reserved for additional string and array functions.
 | |
| @xref{String and Array Utilities}.
 | |
| 
 | |
| @item
 | |
| Names that end with @samp{_t} are reserved for additional type names.
 | |
| @end itemize
 | |
| 
 | |
| In addition, some individual header files reserve names beyond
 | |
| those that they actually define.  You only need to worry about these
 | |
| restrictions if your program includes that particular header file.
 | |
| 
 | |
| @itemize @bullet
 | |
| @item
 | |
| The header file @file{dirent.h} reserves names prefixed with
 | |
| @samp{d_}.
 | |
| @pindex dirent.h
 | |
| 
 | |
| @item
 | |
| The header file @file{fcntl.h} reserves names prefixed with
 | |
| @samp{l_}, @samp{F_}, @samp{O_}, and @samp{S_}.
 | |
| @pindex fcntl.h
 | |
| 
 | |
| @item
 | |
| The header file @file{grp.h} reserves names prefixed with @samp{gr_}.
 | |
| @pindex grp.h
 | |
| 
 | |
| @item
 | |
| The header file @file{limits.h} reserves names suffixed with @samp{_MAX}.
 | |
| @pindex limits.h
 | |
| 
 | |
| @item
 | |
| The header file @file{pwd.h} reserves names prefixed with @samp{pw_}.
 | |
| @pindex pwd.h
 | |
| 
 | |
| @item
 | |
| The header file @file{signal.h} reserves names prefixed with @samp{sa_}
 | |
| and @samp{SA_}.
 | |
| @pindex signal.h
 | |
| 
 | |
| @item
 | |
| The header file @file{sys/stat.h} reserves names prefixed with @samp{st_}
 | |
| and @samp{S_}.
 | |
| @pindex sys/stat.h
 | |
| 
 | |
| @item
 | |
| The header file @file{sys/times.h} reserves names prefixed with @samp{tms_}.
 | |
| @pindex sys/times.h
 | |
| 
 | |
| @item
 | |
| The header file @file{termios.h} reserves names prefixed with @samp{c_},
 | |
| @samp{V}, @samp{I}, @samp{O}, and @samp{TC}; and names prefixed with
 | |
| @samp{B} followed by a digit.
 | |
| @pindex termios.h
 | |
| @end itemize
 | |
| 
 | |
| @comment Include the section on Creature Nest Macros.
 | |
| @include creature.texi
 | |
| 
 | |
| @node Roadmap to the Manual,  , Using the Library, Introduction
 | |
| @section Roadmap to the Manual
 | |
| 
 | |
| Here is an overview of the contents of the remaining chapters of
 | |
| this manual.
 | |
| 
 | |
| @c The chapter overview ordering is:
 | |
| @c Error Reporting (2)
 | |
| @c Virtual Memory Allocation and Paging (3)
 | |
| @c Character Handling (4)
 | |
| @c Strings and Array Utilities (5)
 | |
| @c Character Set Handling (6)
 | |
| @c Locales and Internationalization (7)
 | |
| @c Searching and Sorting (9)
 | |
| @c Pattern Matching (10)
 | |
| @c Input/Output Overview (11)
 | |
| @c Input/Output on Streams (12)
 | |
| @c Low-level Input/Ooutput (13)
 | |
| @c File System Interface (14)
 | |
| @c Pipes and FIFOs (15)
 | |
| @c Sockets (16)
 | |
| @c Low-Level Terminal Interface (17)
 | |
| @c Syslog (18)
 | |
| @c Mathematics (19)
 | |
| @c Aritmetic Functions (20)
 | |
| @c Date and Time (21)
 | |
| @c Non-Local Exist (23)
 | |
| @c Signal Handling (24)
 | |
| @c The Basic Program/System Interface (25)
 | |
| @c Processes (26)
 | |
| @c Job Control (28)
 | |
| @c System Databases and Name Service Switch (29)
 | |
| @c Users and Groups (30) -- References `User Database' and `Group Database'
 | |
| @c System Management (31)
 | |
| @c System Configuration Parameters (32)
 | |
| @c C Language Facilities in the Library (AA)
 | |
| @c Summary of Library Facilities (AB)
 | |
| @c Installing (AC)
 | |
| @c Library Maintenance (AD)
 | |
| 
 | |
| @c The following chapters need overview text to be added:
 | |
| @c Message Translation (8)
 | |
| @c Resource Usage And Limitations (22)
 | |
| @c Inter-Process Communication (27)
 | |
| @c DES Encryption and Password Handling (33)
 | |
| @c Debugging support (34)
 | |
| @c POSIX Threads (35)
 | |
| @c Internal Probes (36)
 | |
| @c Platform-specific facilities (AE)
 | |
| @c Contributors to (AF)
 | |
| @c Free Software Needs Free Documentation (AG)
 | |
| @c GNU Lesser General Public License (AH)
 | |
| @c GNU Free Documentation License (AI)
 | |
| 
 | |
| @itemize @bullet
 | |
| @item
 | |
| @ref{Error Reporting}, describes how errors detected by the library
 | |
| are reported.
 | |
| 
 | |
| 
 | |
| @item
 | |
| @ref{Memory}, describes @theglibc{}'s facilities for managing and
 | |
| using virtual and real memory, including dynamic allocation of virtual
 | |
| memory.  If you do not know in advance how much memory your program
 | |
| needs, you can allocate it dynamically instead, and manipulate it via
 | |
| pointers.
 | |
| 
 | |
| @item
 | |
| @ref{Character Handling}, contains information about character
 | |
| classification functions (such as @code{isspace}) and functions for
 | |
| performing case conversion.
 | |
| 
 | |
| @item
 | |
| @ref{String and Array Utilities}, has descriptions of functions for
 | |
| manipulating strings (null-terminated character arrays) and general
 | |
| byte arrays, including operations such as copying and comparison.
 | |
| 
 | |
| @item
 | |
| @ref{Character Set Handling}, contains information about manipulating
 | |
| characters and strings using character sets larger than will fit in
 | |
| the usual @code{char} data type.
 | |
| 
 | |
| @item
 | |
| @ref{Locales}, describes how selecting a particular country
 | |
| or language affects the behavior of the library.  For example, the locale
 | |
| affects collation sequences for strings and how monetary values are
 | |
| formatted.
 | |
| 
 | |
| @item
 | |
| @ref{Searching and Sorting}, contains information about functions
 | |
| for searching and sorting arrays.  You can use these functions on any
 | |
| kind of array by providing an appropriate comparison function.
 | |
| 
 | |
| @item
 | |
| @ref{Pattern Matching}, presents functions for matching regular expressions
 | |
| and shell file name patterns, and for expanding words as the shell does.
 | |
| 
 | |
| @item
 | |
| @ref{I/O Overview}, gives an overall look at the input and output
 | |
| facilities in the library, and contains information about basic concepts
 | |
| such as file names.
 | |
| 
 | |
| @item
 | |
| @ref{I/O on Streams}, describes I/O operations involving streams (or
 | |
| @w{@code{FILE *}} objects).  These are the normal C library functions
 | |
| from @file{stdio.h}.
 | |
| 
 | |
| @item
 | |
| @ref{Low-Level I/O}, contains information about I/O operations
 | |
| on file descriptors.  File descriptors are a lower-level mechanism
 | |
| specific to the Unix family of operating systems.
 | |
| 
 | |
| @item
 | |
| @ref{File System Interface}, has descriptions of operations on entire
 | |
| files, such as functions for deleting and renaming them and for creating
 | |
| new directories.  This chapter also contains information about how you
 | |
| can access the attributes of a file, such as its owner and file protection
 | |
| modes.
 | |
| 
 | |
| @item
 | |
| @ref{Pipes and FIFOs}, contains information about simple interprocess
 | |
| communication mechanisms.  Pipes allow communication between two related
 | |
| processes (such as between a parent and child), while FIFOs allow
 | |
| communication between processes sharing a common file system on the same
 | |
| machine.
 | |
| 
 | |
| @item
 | |
| @ref{Sockets}, describes a more complicated interprocess communication
 | |
| mechanism that allows processes running on different machines to
 | |
| communicate over a network.  This chapter also contains information about
 | |
| Internet host addressing and how to use the system network databases.
 | |
| 
 | |
| @item
 | |
| @ref{Low-Level Terminal Interface}, describes how you can change the
 | |
| attributes of a terminal device.  If you want to disable echo of
 | |
| characters typed by the user, for example, read this chapter.
 | |
| 
 | |
| @item
 | |
| @ref{Mathematics}, contains information about the math library
 | |
| functions.  These include things like random-number generators and
 | |
| remainder functions on integers as well as the usual trigonometric and
 | |
| exponential functions on floating-point numbers.
 | |
| 
 | |
| @item
 | |
| @ref{Arithmetic,, Low-Level Arithmetic Functions}, describes functions
 | |
| for simple arithmetic, analysis of floating-point values, and reading
 | |
| numbers from strings.
 | |
| 
 | |
| @item
 | |
| @ref{Date and Time}, describes functions for measuring both calendar time
 | |
| and CPU time, as well as functions for setting alarms and timers.
 | |
| 
 | |
| @item
 | |
| @ref{Non-Local Exits}, contains descriptions of the @code{setjmp} and
 | |
| @code{longjmp} functions.  These functions provide a facility for
 | |
| @code{goto}-like jumps which can jump from one function to another.
 | |
| 
 | |
| @item
 | |
| @ref{Signal Handling}, tells you all about signals---what they are,
 | |
| how to establish a handler that is called when a particular kind of
 | |
| signal is delivered, and how to prevent signals from arriving during
 | |
| critical sections of your program.
 | |
| 
 | |
| @item
 | |
| @ref{Program Basics}, tells how your programs can access their
 | |
| command-line arguments and environment variables.
 | |
| 
 | |
| @item
 | |
| @ref{Processes}, contains information about how to start new processes
 | |
| and run programs.
 | |
| 
 | |
| @item
 | |
| @ref{Job Control}, describes functions for manipulating process groups
 | |
| and the controlling terminal.  This material is probably only of
 | |
| interest if you are writing a shell or other program which handles job
 | |
| control specially.
 | |
| 
 | |
| @item
 | |
| @ref{Name Service Switch}, describes the services which are available
 | |
| for looking up names in the system databases, how to determine which
 | |
| service is used for which database, and how these services are
 | |
| implemented so that contributors can design their own services.
 | |
| 
 | |
| @item
 | |
| @ref{User Database}, and @ref{Group Database}, tell you how to access
 | |
| the system user and group databases.
 | |
| 
 | |
| @item
 | |
| @ref{System Management}, describes functions for controlling and getting
 | |
| information about the hardware and software configuration your program
 | |
| is executing under.
 | |
| 
 | |
| @item
 | |
| @ref{System Configuration}, tells you how you can get information about
 | |
| various operating system limits.  Most of these parameters are provided for
 | |
| compatibility with POSIX.
 | |
| 
 | |
| @item
 | |
| @ref{Language Features}, contains information about library support for
 | |
| standard parts of the C language, including things like the @code{sizeof}
 | |
| operator and the symbolic constant @code{NULL}, how to write functions
 | |
| accepting variable numbers of arguments, and constants describing the
 | |
| ranges and other properties of the numerical types.  There is also a simple
 | |
| debugging mechanism which allows you to put assertions in your code, and
 | |
| have diagnostic messages printed if the tests fail.
 | |
| 
 | |
| @item
 | |
| @ref{Library Summary}, gives a summary of all the functions, variables, and
 | |
| macros in the library, with complete data types and function prototypes,
 | |
| and says what standard or system each is derived from.
 | |
| 
 | |
| @item
 | |
| @ref{Installation}, explains how to build and install @theglibc{} on
 | |
| your system, and how to report any bugs you might find.
 | |
| 
 | |
| @item
 | |
| @ref{Maintenance}, explains how to add new functions or port the
 | |
| library to a new system.
 | |
| @end itemize
 | |
| 
 | |
| If you already know the name of the facility you are interested in, you
 | |
| can look it up in @ref{Library Summary}.  This gives you a summary of
 | |
| its syntax and a pointer to where you can find a more detailed
 | |
| description.  This appendix is particularly useful if you just want to
 | |
| verify the order and type of arguments to a function, for example.  It
 | |
| also tells you what standard or system each function, variable, or macro
 | |
| is derived from.
 |