blob: 0d3ed5a29a7e5f375abe1fdb00e61180e49d8616 [file] [log] [blame]
#!/bin/bash -e
# Copyright 2020 Google Inc. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Generates NDK API txt file used by Mainline modules. NDK APIs would have value
# "UND" in Ndx column and have suffix "@LIB_NAME" in Name column.
# For example, current line llvm-readelf output is:
# 1: 00000000 0 FUNC GLOBAL DEFAULT UND dlopen@LIBC
# After the parse function below "dlopen" would be write to the output file.
printHelp() {
echo "**************************** Usage Instructions ****************************"
echo "This script is used to generate the Mainline modules used-by NDK symbols."
echo ""
echo "To run this script use: ./ndk_usedby_module.sh \$BINARY_IMAGE_DIRECTORY \$BINARY_LLVM_PATH \$OUTPUT_FILE_PATH"
echo "For example: If all the module image files that you would like to run is under directory '/myModule' and output write to /myModule.txt then the command would be:"
echo "./ndk_usedby_module.sh /myModule \$BINARY_LLVM_PATH /myModule.txt"
}
parseReadelfOutput() {
while IFS= read -r line
do
if [[ $line = *FUNC*GLOBAL*UND*@* ]] ;
then
echo "$line" | sed -r 's/.*UND (.*@.*)/\1/g' >> "$2"
fi
done < "$1"
echo "" >> "$2"
}
unzipJarAndApk() {
tmpUnzippedDir="$1"/tmpUnzipped
[[ -e "$tmpUnzippedDir" ]] && rm -rf "$tmpUnzippedDir"
mkdir -p "$tmpUnzippedDir"
find "$1" -name "*.jar" -exec unzip -o {} -d "$tmpUnzippedDir" \;
find "$1" -name "*.apk" -exec unzip -o {} -d "$tmpUnzippedDir" \;
find "$tmpUnzippedDir" -name "*.MF" -exec rm {} \;
}
lookForExecFile() {
dir="$1"
readelf="$2"
find "$dir" -type f -name "*.so" -exec "$2" --dyn-symbols {} >> "$dir"/../tmpReadelf.txt \;
find "$dir" -type f -perm /111 ! -name "*.so" -exec "$2" --dyn-symbols {} >> "$dir"/../tmpReadelf.txt \;
}
if [[ "$1" == "help" ]]
then
printHelp
elif [[ "$#" -ne 3 ]]
then
echo "Wrong argument length. Expecting 3 argument representing image file directory, llvm-readelf tool path, output path."
else
unzipJarAndApk "$1"
lookForExecFile "$1" "$2"
tmpReadelfOutput="$1/../tmpReadelf.txt"
[[ -e "$3" ]] && rm "$3"
parseReadelfOutput "$tmpReadelfOutput" "$3"
[[ -e "$tmpReadelfOutput" ]] && rm "$tmpReadelfOutput"
rm -rf "$1/tmpUnzipped"
fi