This patch demonstrates a possible workaround, which enables the pth tests to pass.
This match modifies a generated file: it should be applied after running configure.
The stack pointer is hacked immediately before calling the longjmp family of functions, so that the sanity-check in the longjmp implementation is not triggered. Thanks to Andrew Stubbs for helping me to understand the problem here.
***Health warning*** at best, this is a very nasty hack--- at worst it may be totally unsafe.
Either way I DO NOT recommend attempting to merge this patch as a fix in Ubuntu unless you really know what you're doing, especially since the code is used by gpg-agent.
This patch demonstrates a possible workaround, which enables the pth tests to pass.
This match modifies a generated file: it should be applied after running configure.
The stack pointer is hacked immediately before calling the longjmp family of functions, so that the sanity-check in the longjmp implementation is not triggered. Thanks to Andrew Stubbs for helping me to understand the problem here.
***Health warning*** at best, this is a very nasty hack--- at worst it may be totally unsafe.
Either way I DO NOT recommend attempting to merge this patch as a fix in Ubuntu unless you really know what you're doing, especially since the code is used by gpg-agent.