blob: 913b20b94d990731c4dbadd9a38134e8b0ec2413 [file] [log] [blame]
Elliott Hughes5a93e882014-05-16 14:44:38 -07001#!/usr/bin/python
2
3import glob
4import os
5import re
6import string
7import subprocess
8import sys
9
10toolchain = os.environ['ANDROID_TOOLCHAIN']
11arch = re.sub(r'.*/linux-x86/([^/]+)/.*', r'\1', toolchain)
12
13def GetSymbolsFromSo(so_file):
14
15 # Example readelf output:
16 # 264: 0001623c 4 FUNC GLOBAL DEFAULT 8 cabsf
17 # 266: 00016244 4 FUNC GLOBAL DEFAULT 8 dremf
18 # 267: 00019018 4 OBJECT GLOBAL DEFAULT 11 __fe_dfl_env
19 # 268: 00000000 0 FUNC GLOBAL DEFAULT UND __aeabi_dcmplt
20
21 r = re.compile(r' +\d+: [0-9a-f]+ +\d+ (I?FUNC|OBJECT) +\S+ +\S+ +\d+ (\S+)')
22
23 symbols = set()
24
25 for line in subprocess.check_output(['readelf', '--dyn-syms', '-W', so_file]).split('\n'):
26 if ' HIDDEN ' in line or ' UND ' in line:
27 continue
28 m = r.match(line)
29 if m:
30 symbol = m.group(2)
31 symbol = re.sub('@.*', '', symbol)
32 symbols.add(symbol)
33
34 return symbols
35
36def GetSymbolsFromAndroidSo(*files):
37 symbols = set()
38 for f in files:
39 symbols = symbols | GetSymbolsFromSo('%s/system/lib64/%s' % (os.environ['ANDROID_PRODUCT_OUT'], f))
40 return symbols
41
42def GetSymbolsFromSystemSo(*files):
43 symbols = set()
44 for f in files:
45 f = glob.glob('/lib/x86_64-linux-gnu/%s' % f)[-1]
46 symbols = symbols | GetSymbolsFromSo(f)
47 return symbols
48
49glibc = GetSymbolsFromSystemSo('libc.so.*', 'librt.so.*', 'libpthread.so.*', 'libresolv.so.*', 'libm.so.*')
50bionic = GetSymbolsFromAndroidSo('libc.so', 'libm.so')
51
52# bionic includes various BSD symbols to ease porting other BSD-licensed code.
53bsd_stuff = set([
Elliott Hughes45bf4c32014-05-22 18:53:21 -070054 'basename_r',
55 'dirname_r',
56 'fgetln',
57 'fpurge',
58 'funopen',
59 'gamma_r',
60 'gammaf_r',
Elliott Hughes5a93e882014-05-16 14:44:38 -070061 'getprogname',
62 'setprogname',
63 'strlcat',
64 'strlcpy',
Elliott Hughes45bf4c32014-05-22 18:53:21 -070065 'sys_signame',
Elliott Hughes5a93e882014-05-16 14:44:38 -070066 'wcslcat',
67 'wcslcpy'
68])
69# Some symbols are part of the FORTIFY implementation.
70FORTIFY_stuff = set([
71 '__FD_CLR_chk',
72 '__FD_ISSET_chk',
73 '__FD_SET_chk',
74 '__stack_chk_guard',
75 '__stpncpy_chk2',
76 '__strchr_chk',
77 '__strlcat_chk',
78 '__strlcpy_chk',
79 '__strlen_chk',
80 '__strncpy_chk2',
81 '__strrchr_chk',
82 '__umask_chk'
83])
Elliott Hughesb497c432014-05-20 20:37:56 -070084# Some symbols are used to implement public macros.
85macro_stuff = set([
86 '__assert2',
87 '__errno',
88 '__fe_dfl_env',
89 '__get_h_errno',
90])
Elliott Hughes5a93e882014-05-16 14:44:38 -070091# bionic exposes various Linux features that glibc doesn't.
92linux_stuff = set([
93 'getauxval',
94 'gettid',
95 'tgkill'
96])
97# Some standard stuff isn't yet in the versions of glibc we're using.
98std_stuff = set([
99 'at_quick_exit'
100])
101# These have mangled names in glibc, with a macro taking the "obvious" name.
102weird_stuff = set([
103 'fstat',
104 'fstat64',
105 'fstatat',
106 'fstatat64',
107 'isfinite',
108 'isfinitef',
109 'isfinitel',
110 'isnormal',
111 'isnormalf',
112 'isnormall',
113 'lstat',
114 'lstat64',
115 'mknod',
116 'mknodat',
117 'stat',
118 'stat64',
119])
120
121print 'glibc:'
122for symbol in sorted(glibc):
123 print symbol
124
125print
126print 'bionic:'
127for symbol in sorted(bionic):
128 print symbol
129
130print
131print 'in bionic but not glibc:'
Elliott Hughesb497c432014-05-20 20:37:56 -0700132allowed_stuff = (bsd_stuff | FORTIFY_stuff | linux_stuff | macro_stuff | std_stuff | weird_stuff)
133for symbol in sorted((bionic - allowed_stuff).difference(glibc)):
Elliott Hughes5a93e882014-05-16 14:44:38 -0700134 print symbol
135
136sys.exit(0)