#!/bin/bash -e # Copyright 2020 Google Inc. All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Generates NDK API txt file used by Mainline modules. NDK APIs would have value # "UND" in Ndx column and have suffix "@LIB_NAME" in Name column. # For example, current line llvm-readelf output is: # 1: 00000000 0 FUNC GLOBAL DEFAULT UND dlopen@LIBC # After the parse function below "dlopen" would be write to the output file. printHelp() { echo "**************************** Usage Instructions ****************************" echo "This script is used to generate the Mainline modules used-by NDK symbols." echo "" echo "To run this script use: ./ndk_usedby_module.sh \$BINARY_IMAGE_DIRECTORY \$BINARY_LLVM_PATH \$OUTPUT_FILE_PATH" echo "For example: If all the module image files that you would like to run is under directory '/myModule' and output write to /myModule.txt then the command would be:" echo "./ndk_usedby_module.sh /myModule \$BINARY_LLVM_PATH /myModule.txt" } parseReadelfOutput() { while IFS= read -r line do if [[ $line = *FUNC*GLOBAL*UND*@* ]] ; then echo "$line" | sed -r 's/.*UND (.*@.*)/\1/g' >> "$2" fi done < "$1" echo "" >> "$2" } unzipJarAndApk() { tmpUnzippedDir="$1"/tmpUnzipped [[ -e "$tmpUnzippedDir" ]] && rm -rf "$tmpUnzippedDir" mkdir -p "$tmpUnzippedDir" find "$1" -name "*.jar" -exec unzip -o {} -d "$tmpUnzippedDir" \; find "$1" -name "*.apk" -exec unzip -o {} -d "$tmpUnzippedDir" \; find "$tmpUnzippedDir" -name "*.MF" -exec rm {} \; } lookForExecFile() { dir="$1" readelf="$2" find "$dir" -type f -name "*.so" -exec "$2" --dyn-symbols {} >> "$dir"/../tmpReadelf.txt \; find "$dir" -type f -perm /111 ! -name "*.so" -exec "$2" --dyn-symbols {} >> "$dir"/../tmpReadelf.txt \; } if [[ "$1" == "help" ]] then printHelp elif [[ "$#" -ne 3 ]] then echo "Wrong argument length. Expecting 3 argument representing image file directory, llvm-readelf tool path, output path." else unzipJarAndApk "$1" lookForExecFile "$1" "$2" tmpReadelfOutput="$1/../tmpReadelf.txt" [[ -e "$3" ]] && rm "$3" parseReadelfOutput "$tmpReadelfOutput" "$3" [[ -e "$tmpReadelfOutput" ]] && rm "$tmpReadelfOutput" rm -rf "$1/tmpUnzipped" fi