1*6777b538SAndroid Build Coastguard Worker#!/usr/bin/env python3 2*6777b538SAndroid Build Coastguard Worker# Copyright 2014 The Chromium Authors 3*6777b538SAndroid Build Coastguard Worker# Use of this source code is governed by a BSD-style license that can be 4*6777b538SAndroid Build Coastguard Worker# found in the LICENSE file. 5*6777b538SAndroid Build Coastguard Worker 6*6777b538SAndroid Build Coastguard Workerimport glob 7*6777b538SAndroid Build Coastguard Workerimport optparse 8*6777b538SAndroid Build Coastguard Workerimport os 9*6777b538SAndroid Build Coastguard Workerimport shutil 10*6777b538SAndroid Build Coastguard Workerimport sys 11*6777b538SAndroid Build Coastguard Worker 12*6777b538SAndroid Build Coastguard Workersys.path.insert( 13*6777b538SAndroid Build Coastguard Worker 0, 14*6777b538SAndroid Build Coastguard Worker os.path.join(os.path.dirname(__file__), '..', '..', 'third_party', 15*6777b538SAndroid Build Coastguard Worker 'pefile_py3')) 16*6777b538SAndroid Build Coastguard Workerimport pefile 17*6777b538SAndroid Build Coastguard Worker 18*6777b538SAndroid Build Coastguard Workerdef reorder_imports(input_dir, output_dir, architecture): 19*6777b538SAndroid Build Coastguard Worker """Swap chrome_elf.dll to be the first import of chrome.exe. 20*6777b538SAndroid Build Coastguard Worker Also copy over any related files that might be needed 21*6777b538SAndroid Build Coastguard Worker (pdbs, manifests etc.). 22*6777b538SAndroid Build Coastguard Worker """ 23*6777b538SAndroid Build Coastguard Worker # TODO(thakis): See if there is a reliable way to write the 24*6777b538SAndroid Build Coastguard Worker # correct executable in the first place, so that this script 25*6777b538SAndroid Build Coastguard Worker # only needs to verify that and not write a whole new exe. 26*6777b538SAndroid Build Coastguard Worker 27*6777b538SAndroid Build Coastguard Worker input_image = os.path.join(input_dir, 'chrome.exe') 28*6777b538SAndroid Build Coastguard Worker output_image = os.path.join(output_dir, 'chrome.exe') 29*6777b538SAndroid Build Coastguard Worker 30*6777b538SAndroid Build Coastguard Worker # pefile mmap()s the whole executable, and then parses parts of 31*6777b538SAndroid Build Coastguard Worker # it into python data structures for ease of processing. 32*6777b538SAndroid Build Coastguard Worker # To write the file again, only the mmap'd data is written back, 33*6777b538SAndroid Build Coastguard Worker # so modifying the parsed python objects generally has no effect. 34*6777b538SAndroid Build Coastguard Worker # However, parsed raw data ends up in pe.Structure instances, 35*6777b538SAndroid Build Coastguard Worker # and these all get serialized back when the file gets written. 36*6777b538SAndroid Build Coastguard Worker # So things that are in a Structure must have their data set 37*6777b538SAndroid Build Coastguard Worker # through the Structure, while other data must bet set through 38*6777b538SAndroid Build Coastguard Worker # the set_bytes_*() methods. 39*6777b538SAndroid Build Coastguard Worker pe = pefile.PE(input_image, fast_load=True) 40*6777b538SAndroid Build Coastguard Worker if architecture == 'x64' or architecture == 'arm64': 41*6777b538SAndroid Build Coastguard Worker assert pe.PE_TYPE == pefile.OPTIONAL_HEADER_MAGIC_PE_PLUS 42*6777b538SAndroid Build Coastguard Worker else: 43*6777b538SAndroid Build Coastguard Worker assert pe.PE_TYPE == pefile.OPTIONAL_HEADER_MAGIC_PE 44*6777b538SAndroid Build Coastguard Worker 45*6777b538SAndroid Build Coastguard Worker pe.parse_data_directories(directories=[ 46*6777b538SAndroid Build Coastguard Worker pefile.DIRECTORY_ENTRY['IMAGE_DIRECTORY_ENTRY_IMPORT']]) 47*6777b538SAndroid Build Coastguard Worker 48*6777b538SAndroid Build Coastguard Worker found_elf = False 49*6777b538SAndroid Build Coastguard Worker for i, peimport in enumerate(pe.DIRECTORY_ENTRY_IMPORT): 50*6777b538SAndroid Build Coastguard Worker if peimport.dll.lower() == b'chrome_elf.dll': 51*6777b538SAndroid Build Coastguard Worker assert not found_elf, 'only one chrome_elf.dll import expected' 52*6777b538SAndroid Build Coastguard Worker found_elf = True 53*6777b538SAndroid Build Coastguard Worker if i > 0: 54*6777b538SAndroid Build Coastguard Worker swap = pe.DIRECTORY_ENTRY_IMPORT[0] 55*6777b538SAndroid Build Coastguard Worker 56*6777b538SAndroid Build Coastguard Worker # Morally we want to swap peimport.struct and swap.struct here, 57*6777b538SAndroid Build Coastguard Worker # but the pe module doesn't expose a public method on Structure 58*6777b538SAndroid Build Coastguard Worker # to get all data of a Structure without explicitly listing all 59*6777b538SAndroid Build Coastguard Worker # field names. 60*6777b538SAndroid Build Coastguard Worker # NB: OriginalFirstThunk and Characteristics are an union both at 61*6777b538SAndroid Build Coastguard Worker # offset 0, handling just one of them is enough. 62*6777b538SAndroid Build Coastguard Worker peimport.struct.OriginalFirstThunk, swap.struct.OriginalFirstThunk = \ 63*6777b538SAndroid Build Coastguard Worker swap.struct.OriginalFirstThunk, peimport.struct.OriginalFirstThunk 64*6777b538SAndroid Build Coastguard Worker peimport.struct.TimeDateStamp, swap.struct.TimeDateStamp = \ 65*6777b538SAndroid Build Coastguard Worker swap.struct.TimeDateStamp, peimport.struct.TimeDateStamp 66*6777b538SAndroid Build Coastguard Worker peimport.struct.ForwarderChain, swap.struct.ForwarderChain = \ 67*6777b538SAndroid Build Coastguard Worker swap.struct.ForwarderChain, peimport.struct.ForwarderChain 68*6777b538SAndroid Build Coastguard Worker peimport.struct.Name, swap.struct.Name = \ 69*6777b538SAndroid Build Coastguard Worker swap.struct.Name, peimport.struct.Name 70*6777b538SAndroid Build Coastguard Worker peimport.struct.FirstThunk, swap.struct.FirstThunk = \ 71*6777b538SAndroid Build Coastguard Worker swap.struct.FirstThunk, peimport.struct.FirstThunk 72*6777b538SAndroid Build Coastguard Worker assert found_elf, 'chrome_elf.dll import not found' 73*6777b538SAndroid Build Coastguard Worker 74*6777b538SAndroid Build Coastguard Worker pe.write(filename=output_image) 75*6777b538SAndroid Build Coastguard Worker 76*6777b538SAndroid Build Coastguard Worker for fname in glob.iglob(os.path.join(input_dir, 'chrome.exe.*')): 77*6777b538SAndroid Build Coastguard Worker shutil.copy(fname, os.path.join(output_dir, os.path.basename(fname))) 78*6777b538SAndroid Build Coastguard Worker return 0 79*6777b538SAndroid Build Coastguard Worker 80*6777b538SAndroid Build Coastguard Worker 81*6777b538SAndroid Build Coastguard Workerdef main(argv): 82*6777b538SAndroid Build Coastguard Worker usage = 'reorder_imports.py -i <input_dir> -o <output_dir> -a <target_arch>' 83*6777b538SAndroid Build Coastguard Worker parser = optparse.OptionParser(usage=usage) 84*6777b538SAndroid Build Coastguard Worker parser.add_option('-i', '--input', help='reorder chrome.exe in DIR', 85*6777b538SAndroid Build Coastguard Worker metavar='DIR') 86*6777b538SAndroid Build Coastguard Worker parser.add_option('-o', '--output', help='write new chrome.exe to DIR', 87*6777b538SAndroid Build Coastguard Worker metavar='DIR') 88*6777b538SAndroid Build Coastguard Worker parser.add_option('-a', '--arch', help='architecture of build (optional)', 89*6777b538SAndroid Build Coastguard Worker default='ia32') 90*6777b538SAndroid Build Coastguard Worker opts, args = parser.parse_args() 91*6777b538SAndroid Build Coastguard Worker 92*6777b538SAndroid Build Coastguard Worker if not opts.input or not opts.output: 93*6777b538SAndroid Build Coastguard Worker parser.error('Please provide and input and output directory') 94*6777b538SAndroid Build Coastguard Worker return reorder_imports(opts.input, opts.output, opts.arch) 95*6777b538SAndroid Build Coastguard Worker 96*6777b538SAndroid Build Coastguard Workerif __name__ == "__main__": 97*6777b538SAndroid Build Coastguard Worker sys.exit(main(sys.argv[1:])) 98