| #!/usr/bin/python |
| |
| import glob |
| import os |
| import re |
| import string |
| import subprocess |
| import sys |
| |
| toolchain = os.environ['ANDROID_TOOLCHAIN'] |
| arch = re.sub(r'.*/linux-x86/([^/]+)/.*', r'\1', toolchain) |
| |
| def GetSymbolsFromSo(so_file): |
| |
| # Example readelf output: |
| # 264: 0001623c 4 FUNC GLOBAL DEFAULT 8 cabsf |
| # 266: 00016244 4 FUNC GLOBAL DEFAULT 8 dremf |
| # 267: 00019018 4 OBJECT GLOBAL DEFAULT 11 __fe_dfl_env |
| # 268: 00000000 0 FUNC GLOBAL DEFAULT UND __aeabi_dcmplt |
| |
| r = re.compile(r' +\d+: [0-9a-f]+ +\d+ (I?FUNC|OBJECT) +\S+ +\S+ +\d+ (\S+)') |
| |
| symbols = set() |
| |
| for line in subprocess.check_output(['readelf', '--dyn-syms', '-W', so_file]).split('\n'): |
| if ' HIDDEN ' in line or ' UND ' in line: |
| continue |
| m = r.match(line) |
| if m: |
| symbol = m.group(2) |
| symbol = re.sub('@.*', '', symbol) |
| symbols.add(symbol) |
| |
| return symbols |
| |
| def GetSymbolsFromAndroidSo(*files): |
| symbols = set() |
| for f in files: |
| symbols = symbols | GetSymbolsFromSo('%s/system/lib64/%s' % (os.environ['ANDROID_PRODUCT_OUT'], f)) |
| return symbols |
| |
| def GetSymbolsFromSystemSo(*files): |
| symbols = set() |
| for f in files: |
| f = glob.glob('/lib/x86_64-linux-gnu/%s' % f)[-1] |
| symbols = symbols | GetSymbolsFromSo(f) |
| return symbols |
| |
| glibc = GetSymbolsFromSystemSo('libc.so.*', 'librt.so.*', 'libpthread.so.*', 'libresolv.so.*', 'libm.so.*') |
| bionic = GetSymbolsFromAndroidSo('libc.so', 'libm.so') |
| |
| # bionic includes various BSD symbols to ease porting other BSD-licensed code. |
| bsd_stuff = set([ |
| 'getprogname', |
| 'setprogname', |
| 'strlcat', |
| 'strlcpy', |
| 'wcslcat', |
| 'wcslcpy' |
| ]) |
| # Some symbols are part of the FORTIFY implementation. |
| FORTIFY_stuff = set([ |
| '__FD_CLR_chk', |
| '__FD_ISSET_chk', |
| '__FD_SET_chk', |
| '__stack_chk_guard', |
| '__stpncpy_chk2', |
| '__strchr_chk', |
| '__strlcat_chk', |
| '__strlcpy_chk', |
| '__strlen_chk', |
| '__strncpy_chk2', |
| '__strrchr_chk', |
| '__umask_chk' |
| ]) |
| # Some symbols are used to implement public macros. |
| macro_stuff = set([ |
| '__assert2', |
| '__errno', |
| '__fe_dfl_env', |
| '__get_h_errno', |
| ]) |
| # bionic exposes various Linux features that glibc doesn't. |
| linux_stuff = set([ |
| 'getauxval', |
| 'gettid', |
| 'tgkill' |
| ]) |
| # Some standard stuff isn't yet in the versions of glibc we're using. |
| std_stuff = set([ |
| 'at_quick_exit' |
| ]) |
| # These have mangled names in glibc, with a macro taking the "obvious" name. |
| weird_stuff = set([ |
| 'fstat', |
| 'fstat64', |
| 'fstatat', |
| 'fstatat64', |
| 'isfinite', |
| 'isfinitef', |
| 'isfinitel', |
| 'isnormal', |
| 'isnormalf', |
| 'isnormall', |
| 'lstat', |
| 'lstat64', |
| 'mknod', |
| 'mknodat', |
| 'stat', |
| 'stat64', |
| ]) |
| |
| print 'glibc:' |
| for symbol in sorted(glibc): |
| print symbol |
| |
| print |
| print 'bionic:' |
| for symbol in sorted(bionic): |
| print symbol |
| |
| print |
| print 'in bionic but not glibc:' |
| allowed_stuff = (bsd_stuff | FORTIFY_stuff | linux_stuff | macro_stuff | std_stuff | weird_stuff) |
| for symbol in sorted((bionic - allowed_stuff).difference(glibc)): |
| print symbol |
| |
| sys.exit(0) |