xref: /aosp_15_r20/external/cronet/build/win/reorder-imports.py (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker#!/usr/bin/env python3
2*6777b538SAndroid Build Coastguard Worker# Copyright 2014 The Chromium Authors
3*6777b538SAndroid Build Coastguard Worker# Use of this source code is governed by a BSD-style license that can be
4*6777b538SAndroid Build Coastguard Worker# found in the LICENSE file.
5*6777b538SAndroid Build Coastguard Worker
6*6777b538SAndroid Build Coastguard Workerimport glob
7*6777b538SAndroid Build Coastguard Workerimport optparse
8*6777b538SAndroid Build Coastguard Workerimport os
9*6777b538SAndroid Build Coastguard Workerimport shutil
10*6777b538SAndroid Build Coastguard Workerimport sys
11*6777b538SAndroid Build Coastguard Worker
12*6777b538SAndroid Build Coastguard Workersys.path.insert(
13*6777b538SAndroid Build Coastguard Worker    0,
14*6777b538SAndroid Build Coastguard Worker    os.path.join(os.path.dirname(__file__), '..', '..', 'third_party',
15*6777b538SAndroid Build Coastguard Worker                 'pefile_py3'))
16*6777b538SAndroid Build Coastguard Workerimport pefile
17*6777b538SAndroid Build Coastguard Worker
18*6777b538SAndroid Build Coastguard Workerdef reorder_imports(input_dir, output_dir, architecture):
19*6777b538SAndroid Build Coastguard Worker  """Swap chrome_elf.dll to be the first import of chrome.exe.
20*6777b538SAndroid Build Coastguard Worker  Also copy over any related files that might be needed
21*6777b538SAndroid Build Coastguard Worker  (pdbs, manifests etc.).
22*6777b538SAndroid Build Coastguard Worker  """
23*6777b538SAndroid Build Coastguard Worker  # TODO(thakis): See if there is a reliable way to write the
24*6777b538SAndroid Build Coastguard Worker  # correct executable in the first place, so that this script
25*6777b538SAndroid Build Coastguard Worker  # only needs to verify that and not write a whole new exe.
26*6777b538SAndroid Build Coastguard Worker
27*6777b538SAndroid Build Coastguard Worker  input_image = os.path.join(input_dir, 'chrome.exe')
28*6777b538SAndroid Build Coastguard Worker  output_image = os.path.join(output_dir, 'chrome.exe')
29*6777b538SAndroid Build Coastguard Worker
30*6777b538SAndroid Build Coastguard Worker  # pefile mmap()s the whole executable, and then parses parts of
31*6777b538SAndroid Build Coastguard Worker  # it into python data structures for ease of processing.
32*6777b538SAndroid Build Coastguard Worker  # To write the file again, only the mmap'd data is written back,
33*6777b538SAndroid Build Coastguard Worker  # so modifying the parsed python objects generally has no effect.
34*6777b538SAndroid Build Coastguard Worker  # However, parsed raw data ends up in pe.Structure instances,
35*6777b538SAndroid Build Coastguard Worker  # and these all get serialized back when the file gets written.
36*6777b538SAndroid Build Coastguard Worker  # So things that are in a Structure must have their data set
37*6777b538SAndroid Build Coastguard Worker  # through the Structure, while other data must bet set through
38*6777b538SAndroid Build Coastguard Worker  # the set_bytes_*() methods.
39*6777b538SAndroid Build Coastguard Worker  pe = pefile.PE(input_image, fast_load=True)
40*6777b538SAndroid Build Coastguard Worker  if architecture == 'x64' or architecture == 'arm64':
41*6777b538SAndroid Build Coastguard Worker    assert pe.PE_TYPE == pefile.OPTIONAL_HEADER_MAGIC_PE_PLUS
42*6777b538SAndroid Build Coastguard Worker  else:
43*6777b538SAndroid Build Coastguard Worker    assert pe.PE_TYPE == pefile.OPTIONAL_HEADER_MAGIC_PE
44*6777b538SAndroid Build Coastguard Worker
45*6777b538SAndroid Build Coastguard Worker  pe.parse_data_directories(directories=[
46*6777b538SAndroid Build Coastguard Worker      pefile.DIRECTORY_ENTRY['IMAGE_DIRECTORY_ENTRY_IMPORT']])
47*6777b538SAndroid Build Coastguard Worker
48*6777b538SAndroid Build Coastguard Worker  found_elf = False
49*6777b538SAndroid Build Coastguard Worker  for i, peimport in enumerate(pe.DIRECTORY_ENTRY_IMPORT):
50*6777b538SAndroid Build Coastguard Worker    if peimport.dll.lower() == b'chrome_elf.dll':
51*6777b538SAndroid Build Coastguard Worker      assert not found_elf, 'only one chrome_elf.dll import expected'
52*6777b538SAndroid Build Coastguard Worker      found_elf = True
53*6777b538SAndroid Build Coastguard Worker      if i > 0:
54*6777b538SAndroid Build Coastguard Worker        swap = pe.DIRECTORY_ENTRY_IMPORT[0]
55*6777b538SAndroid Build Coastguard Worker
56*6777b538SAndroid Build Coastguard Worker        # Morally we want to swap peimport.struct and swap.struct here,
57*6777b538SAndroid Build Coastguard Worker        # but the pe module doesn't expose a public method on Structure
58*6777b538SAndroid Build Coastguard Worker        # to get all data of a Structure without explicitly listing all
59*6777b538SAndroid Build Coastguard Worker        # field names.
60*6777b538SAndroid Build Coastguard Worker        # NB: OriginalFirstThunk and Characteristics are an union both at
61*6777b538SAndroid Build Coastguard Worker        # offset 0, handling just one of them is enough.
62*6777b538SAndroid Build Coastguard Worker        peimport.struct.OriginalFirstThunk, swap.struct.OriginalFirstThunk = \
63*6777b538SAndroid Build Coastguard Worker            swap.struct.OriginalFirstThunk, peimport.struct.OriginalFirstThunk
64*6777b538SAndroid Build Coastguard Worker        peimport.struct.TimeDateStamp, swap.struct.TimeDateStamp = \
65*6777b538SAndroid Build Coastguard Worker            swap.struct.TimeDateStamp, peimport.struct.TimeDateStamp
66*6777b538SAndroid Build Coastguard Worker        peimport.struct.ForwarderChain, swap.struct.ForwarderChain = \
67*6777b538SAndroid Build Coastguard Worker            swap.struct.ForwarderChain, peimport.struct.ForwarderChain
68*6777b538SAndroid Build Coastguard Worker        peimport.struct.Name, swap.struct.Name = \
69*6777b538SAndroid Build Coastguard Worker            swap.struct.Name, peimport.struct.Name
70*6777b538SAndroid Build Coastguard Worker        peimport.struct.FirstThunk, swap.struct.FirstThunk = \
71*6777b538SAndroid Build Coastguard Worker            swap.struct.FirstThunk, peimport.struct.FirstThunk
72*6777b538SAndroid Build Coastguard Worker  assert found_elf, 'chrome_elf.dll import not found'
73*6777b538SAndroid Build Coastguard Worker
74*6777b538SAndroid Build Coastguard Worker  pe.write(filename=output_image)
75*6777b538SAndroid Build Coastguard Worker
76*6777b538SAndroid Build Coastguard Worker  for fname in glob.iglob(os.path.join(input_dir, 'chrome.exe.*')):
77*6777b538SAndroid Build Coastguard Worker    shutil.copy(fname, os.path.join(output_dir, os.path.basename(fname)))
78*6777b538SAndroid Build Coastguard Worker  return 0
79*6777b538SAndroid Build Coastguard Worker
80*6777b538SAndroid Build Coastguard Worker
81*6777b538SAndroid Build Coastguard Workerdef main(argv):
82*6777b538SAndroid Build Coastguard Worker  usage = 'reorder_imports.py -i <input_dir> -o <output_dir> -a <target_arch>'
83*6777b538SAndroid Build Coastguard Worker  parser = optparse.OptionParser(usage=usage)
84*6777b538SAndroid Build Coastguard Worker  parser.add_option('-i', '--input', help='reorder chrome.exe in DIR',
85*6777b538SAndroid Build Coastguard Worker      metavar='DIR')
86*6777b538SAndroid Build Coastguard Worker  parser.add_option('-o', '--output', help='write new chrome.exe to DIR',
87*6777b538SAndroid Build Coastguard Worker      metavar='DIR')
88*6777b538SAndroid Build Coastguard Worker  parser.add_option('-a', '--arch', help='architecture of build (optional)',
89*6777b538SAndroid Build Coastguard Worker      default='ia32')
90*6777b538SAndroid Build Coastguard Worker  opts, args = parser.parse_args()
91*6777b538SAndroid Build Coastguard Worker
92*6777b538SAndroid Build Coastguard Worker  if not opts.input or not opts.output:
93*6777b538SAndroid Build Coastguard Worker    parser.error('Please provide and input and output directory')
94*6777b538SAndroid Build Coastguard Worker  return reorder_imports(opts.input, opts.output, opts.arch)
95*6777b538SAndroid Build Coastguard Worker
96*6777b538SAndroid Build Coastguard Workerif __name__ == "__main__":
97*6777b538SAndroid Build Coastguard Worker  sys.exit(main(sys.argv[1:]))
98