This patch demonstrates a possible workaround, which enables the pth
tests to pass.

This match modifies a generated file: it should be applied after running
configure.

The stack pointer is hacked immediately before calling the longjmp
family of functions, so that the sanity-check in the longjmp
implementation is not triggered.  Thanks to Andrew Stubbs for helping me
to understand the problem here.

***Health warning*** at best, this is a very nasty hack--- at worst it
may be totally unsafe.

Either way I DO NOT recommend attempting to merge this patch as a fix in
Ubuntu unless you really know what you're doing, especially since the
code is used by gpg-agent.


** Patch added: "horrific, non-portable, possibly-unsafe workaround"
   
https://bugs.launchpad.net/ubuntu/+source/pth/+bug/599862/+attachment/1523396/+files/pth_HACK_lie-brazenly-to-longjmp.diff

-- 
pth_init() aborts on armel with "longjmp causes uninitialized stack frame"
https://bugs.launchpad.net/bugs/599862
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to