blob: a306bfabb1c385ff4f750896e3775d5deffec68a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
# Copyright 1999-2018 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
EAPI=5
inherit check-reqs eutils pax-utils
DESCRIPTION="Standard ML optimizing compiler and libraries"
BASE_URI="mirror://sourceforge/${PN}"
SRC_URI="!binary? ( ${BASE_URI}/${P}.src.tgz )
binary? ( amd64? ( ${BASE_URI}/${P}-1.amd64-linux.tgz )
x86? ( ${BASE_URI}/${P}-1.x86-linux.tgz ) )"
HOMEPAGE="http://www.mlton.org"
LICENSE="HPND MIT"
SLOT="0/${PV}"
# there is support for ppc64 and ia64, but no
# binaries are provided and there is no native
# code generation for these platforms
KEYWORDS="-* ~amd64 ~x86"
IUSE="binary doc"
DEPEND="dev-libs/gmp:*
doc? ( virtual/latex-base )"
RDEPEND="dev-libs/gmp:*"
QA_PRESTRIPPED="binary? (
usr/bin/mlnlffigen
usr/bin/mllex
usr/bin/mlprof
usr/bin/mlyacc
usr/lib/mlton/mlton-compile
)"
# The resident set size of mlton-compile is 10GB on amd64
CHECKREQS_MEMORY="4G"
pkg_pretend() {
if use !binary; then
check-reqs_pkg_pretend
fi
}
src_unpack() {
if use !binary; then
unpack ${A}
else
mkdir -p "${S}" || die "Could not create ${S} directory"
pushd "${S}" || die "Could not cd to ${S}"
unpack ${A}
popd
fi
}
src_prepare() {
if use !binary; then
# The patch removing executable permissions from mmap'd memory regions is not upstreamed:
# http://pkgs.fedoraproject.org/cgit/mlton.git/tree/mlton-20070826-no-execmem.patch
epatch "${FILESDIR}/${PN}-20070826-no-execmem.patch"
# PIE in hardened requires executables to be linked with -fPIC. mlton by default tries
# to link executables against the non PIC objects in libmlton.a. We may be bootstrapping
# with an old mlton install, if we tried to patch it (to link with libmlton-pic.a) we would
# need a patched binary.
# http://mlton.org/MLtonWorld says Executables that save and load worlds are incompatible
# with address space layout randomization (ASLR) of the executable.
epatch "${FILESDIR}/${PN}-20130715-no-PIE.patch"
# Remove dirs runtime compiler from all-no-docs to avoid repeating these steps.
# As we need to pax-mark the mlton-compiler executable.
epatch "${FILESDIR}/${PN}-20130715-split-make-for-pax-mark.patch"
fi
}
src_compile() {
if use !binary; then
has_version dev-lang/mlton || die "emerge with binary use flag first"
# Fix location in which to install man pages
sed -i 's@^MAN_PREFIX_EXTRA :=.*@MAN_PREFIX_EXTRA := /share@' \
Makefile || die 'sed Makefile failed'
emake -j1 dirs runtime compiler CFLAGS="${CFLAGS}" || die
pax-mark m "${S}/mlton/mlton-compile"
pax-mark m "${S}/build/lib/mlton-compile"
# Does not support parallel make
emake -j1 all-no-docs CFLAGS="${CFLAGS}" || die
if use doc; then
export VARTEXFONTS="${T}/fonts"
emake docs || die "failed to create documentation"
fi
fi
}
src_install() {
if use binary; then
# Fix location in which to install man pages
mv "${S}/usr/man" "${S}/usr/share" || die "mv man failed"
pax-mark m "${S}/usr/lib/mlton/mlton-compile"
pax-mark m "${S}/usr/bin/mllex"
pax-mark m "${S}/usr/bin/mlyacc"
mv "${S}/usr" "${D}" || die "mv failed"
else
emake DESTDIR="${D}" install-no-docs || die
if use doc; then emake DESTDIR="${D}" TDOC="${D}"/usr/share/doc/${P} install-docs || die; fi
fi
}
pkg_postinst() {
# There are PIC objects in libmlton-pic.a. -link-opt -lmlton-pic does not help as mlton
# specifies -lmlton before -lmlton-pic. It appears that it would be necessary to patch mlton
# to convince mlton to use the lib*-pic.a libraries when linking an executable.
ewarn 'PIE in Gentoo hardened requires executables to be linked with -fPIC. mlton by default links'
ewarn 'executables against the non PIC objects in libmlton.a. http://mlton.org/MLtonWorld notes:'
ewarn 'Executables that save and load worlds are incompatible with address space layout'
ewarn 'randomization (ASLR) of the executable.'
ewarn 'To suppress the generation of position-independent executables.'
ewarn '-link-opt -fno-PIE'
}
|