Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1672)

Unified Diff: build/mac/change_mach_o_flags.py

Issue 8667008: Fix python scripts in src/build/ (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: . Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: build/mac/change_mach_o_flags.py
diff --git a/build/mac/change_mach_o_flags.py b/build/mac/change_mach_o_flags.py
index 1dfe07f69f4ab2a96b5db498b046bba4c4638090..c2aeaec9b10351d0448834f918862b03cbb1aa4f 100755
--- a/build/mac/change_mach_o_flags.py
+++ b/build/mac/change_mach_o_flags.py
@@ -1,78 +1,77 @@
-#!/usr/bin/python
-
+#!/usr/bin/env python
# Copyright (c) 2011 The Chromium Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-# Usage: change_mach_o_flags.py [--executable-heap] [--no-pie] <executable_path>
-#
-# Arranges for the executable at |executable_path| to have its data (heap)
-# pages protected to prevent execution on Mac OS X 10.7 ("Lion"), and to have
-# the PIE (position independent executable) bit set to enable ASLR (address
-# space layout randomization). With --executable-heap or --no-pie, the
-# respective bits are cleared instead of set, making the heap executable or
-# disabling PIE/ASLR.
-#
-# This script is able to operate on thin (single-architecture) Mach-O files
-# and fat (universal, multi-architecture) files. When operating on fat files,
-# it will set or clear the bits for each architecture contained therein.
-#
-# NON-EXECUTABLE HEAP
-#
-# Traditionally in Mac OS X, 32-bit processes did not have data pages set to
-# prohibit execution. Although user programs could call mprotect and
-# mach_vm_protect to deny execution of code in data pages, the kernel would
-# silently ignore such requests without updating the page tables, and the
-# hardware would happily execute code on such pages. 64-bit processes were
-# always given proper hardware protection of data pages. This behavior was
-# controllable on a system-wide level via the vm.allow_data_exec sysctl, which
-# is set by default to 1. The bit with value 1 (set by default) allows code
-# execution on data pages for 32-bit processes, and the bit with value 2
-# (clear by default) does the same for 64-bit processes.
-#
-# In Mac OS X 10.7, executables can "opt in" to having hardware protection
-# against code execution on data pages applied. This is done by setting a new
-# bit in the |flags| field of an executable's |mach_header|. When
-# MH_NO_HEAP_EXECUTION is set, proper protections will be applied, regardless
-# of the setting of vm.allow_data_exec. See xnu-1699.22.73/osfmk/vm/vm_map.c
-# override_nx and xnu-1699.22.73/bsd/kern/mach_loader.c load_machfile.
-#
-# The Apple toolchain has been revised to set the MH_NO_HEAP_EXECUTION when
-# producing executables, provided that -allow_heap_execute is not specified
-# at link time. Only linkers shipping with Xcode 4.0 and later (ld64-123.2 and
-# later) have this ability. See ld64-123.2.1/src/ld/Options.cpp
-# Options::reconfigureDefaults() and
-# ld64-123.2.1/src/ld/HeaderAndLoadCommands.hpp
-# HeaderAndLoadCommandsAtom<A>::flags().
-#
-# This script sets the MH_NO_HEAP_EXECUTION bit on Mach-O executables. It is
-# intended for use with executables produced by a linker that predates Apple's
-# modifications to set this bit itself. It is also useful for setting this bit
-# for non-i386 executables, including x86_64 executables. Apple's linker only
-# sets it for 32-bit i386 executables, presumably under the assumption that
-# the value of vm.allow_data_exec is set in stone. However, if someone were to
-# change vm.allow_data_exec to 2 or 3, 64-bit x86_64 executables would run
-# without hardware protection against code execution on data pages. This
-# script can set the bit for x86_64 executables, guaranteeing that they run
-# with appropriate protection even when vm.allow_data_exec has been tampered
-# with.
-#
-# POSITION-INDEPENDENT EXECUTABLES/ADDRESS SPACE LAYOUT RANDOMIZATION
-#
-# This script sets or clears the MH_PIE bit in an executable's Mach-O header,
-# enabling or disabling position independence on Mac OS X 10.5 and later.
-# Processes running position-independent executables have varying levels of
-# ASLR protection depending on the OS release. The main executable's load
-# address, shared library load addresess, and the heap and stack base
-# addresses may be randomized. Position-independent executables are produced
-# by supplying the -pie flag to the linker (or defeated by supplying -no_pie).
-# Executables linked with a deployment target of 10.7 or higher have PIE on
-# by default.
-#
-# This script is never strictly needed during the build to enable PIE, as all
-# linkers used are recent enough to support -pie. However, it's used to
-# disable the PIE bit as needed on already-linked executables.
-
+"""Usage: change_mach_o_flags.py [--executable-heap] [--no-pie] <executablepath>
+
+Arranges for the executable at |executable_path| to have its data (heap)
+pages protected to prevent execution on Mac OS X 10.7 ("Lion"), and to have
+the PIE (position independent executable) bit set to enable ASLR (address
+space layout randomization). With --executable-heap or --no-pie, the
+respective bits are cleared instead of set, making the heap executable or
+disabling PIE/ASLR.
+
+This script is able to operate on thin (single-architecture) Mach-O files
+and fat (universal, multi-architecture) files. When operating on fat files,
+it will set or clear the bits for each architecture contained therein.
+
+NON-EXECUTABLE HEAP
+
+Traditionally in Mac OS X, 32-bit processes did not have data pages set to
+prohibit execution. Although user programs could call mprotect and
+mach_vm_protect to deny execution of code in data pages, the kernel would
+silently ignore such requests without updating the page tables, and the
+hardware would happily execute code on such pages. 64-bit processes were
+always given proper hardware protection of data pages. This behavior was
+controllable on a system-wide level via the vm.allow_data_exec sysctl, which
+is set by default to 1. The bit with value 1 (set by default) allows code
+execution on data pages for 32-bit processes, and the bit with value 2
+(clear by default) does the same for 64-bit processes.
+
+In Mac OS X 10.7, executables can "opt in" to having hardware protection
+against code execution on data pages applied. This is done by setting a new
+bit in the |flags| field of an executable's |mach_header|. When
+MH_NO_HEAP_EXECUTION is set, proper protections will be applied, regardless
+of the setting of vm.allow_data_exec. See xnu-1699.22.73/osfmk/vm/vm_map.c
+override_nx and xnu-1699.22.73/bsd/kern/mach_loader.c load_machfile.
+
+The Apple toolchain has been revised to set the MH_NO_HEAP_EXECUTION when
+producing executables, provided that -allow_heap_execute is not specified
+at link time. Only linkers shipping with Xcode 4.0 and later (ld64-123.2 and
+later) have this ability. See ld64-123.2.1/src/ld/Options.cpp
+Options::reconfigureDefaults() and
+ld64-123.2.1/src/ld/HeaderAndLoadCommands.hpp
+HeaderAndLoadCommandsAtom<A>::flags().
+
+This script sets the MH_NO_HEAP_EXECUTION bit on Mach-O executables. It is
+intended for use with executables produced by a linker that predates Apple's
+modifications to set this bit itself. It is also useful for setting this bit
+for non-i386 executables, including x86_64 executables. Apple's linker only
+sets it for 32-bit i386 executables, presumably under the assumption that
+the value of vm.allow_data_exec is set in stone. However, if someone were to
+change vm.allow_data_exec to 2 or 3, 64-bit x86_64 executables would run
+without hardware protection against code execution on data pages. This
+script can set the bit for x86_64 executables, guaranteeing that they run
+with appropriate protection even when vm.allow_data_exec has been tampered
+with.
+
+POSITION-INDEPENDENT EXECUTABLES/ADDRESS SPACE LAYOUT RANDOMIZATION
+
+This script sets or clears the MH_PIE bit in an executable's Mach-O header,
+enabling or disabling position independence on Mac OS X 10.5 and later.
+Processes running position-independent executables have varying levels of
+ASLR protection depending on the OS release. The main executable's load
+address, shared library load addresess, and the heap and stack base
+addresses may be randomized. Position-independent executables are produced
+by supplying the -pie flag to the linker (or defeated by supplying -no_pie).
+Executables linked with a deployment target of 10.7 or higher have PIE on
+by default.
+
+This script is never strictly needed during the build to enable PIE, as all
+linkers used are recent enough to support -pie. However, it's used to
+disable the PIE bit as needed on already-linked executables.
+"""
import optparse
import os
@@ -267,8 +266,8 @@ def main(me, args):
raise MachOError, '%s is not a Mach-O or fat file' % executable_file
executable_file.close()
-
return 0
+
if __name__ == '__main__':
sys.exit(main(sys.argv[0], sys.argv[1:]))

Powered by Google App Engine
This is Rietveld 408576698