This patch demonstrates a possible workaround, which enables the pth tests to pass.
This match modifies a generated file: it should be applied after running configure. The stack pointer is hacked immediately before calling the longjmp family of functions, so that the sanity-check in the longjmp implementation is not triggered. Thanks to Andrew Stubbs for helping me to understand the problem here. ***Health warning*** at best, this is a very nasty hack--- at worst it may be totally unsafe. Either way I DO NOT recommend attempting to merge this patch as a fix in Ubuntu unless you really know what you're doing, especially since the code is used by gpg-agent. ** Patch added: "horrific, non-portable, possibly-unsafe workaround" https://bugs.launchpad.net/ubuntu/+source/pth/+bug/599862/+attachment/1523396/+files/pth_HACK_lie-brazenly-to-longjmp.diff -- pth_init() aborts on armel with "longjmp causes uninitialized stack frame" https://bugs.launchpad.net/bugs/599862 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs