--- Begin Message ---
Subject: |
Re: configure checking for csh hash hack |
Date: |
Fri, 16 Dec 2016 17:20:24 +0100 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0 |
Hi Werner,
I tested your csh hack fix from
https://lists.gnu.org/archive/html/bug-groff/2015-05/msg00017.html
But it does not work on my Gentoo system.
It seems the blockage is connected to a bug in tcsh when used with GCC 5
(GCC 5 optimizes away a required check because a variable which must not
be optimized away is not marked as volatile):
https://bugs.archlinux.org/task/45602
http://mx.gw.com/pipermail/tcsh-bugs/2015-May/000944.html
So the solution is to update to tcsh 6.20 (or rather require either tcsh
>= 6.20 or no csh at all) which fixes the issue.
In short: Nothing to be done in groff. The bug is between tcsh and gcc5
and already fixed in tcsh 6.20.00
Best wishes,
Arne
--
Karlsruher Institut für Technologie (KIT)
IMK-ASF
Dr. Arne Babenhauserheide
Wissenschaftlicher Mitarbeiter, Gruppe: GHG/SAT
Postfach 36 40
Gebäude 448, Raum 208
76021 Karlsruhe
Telefon: +49 721 608-28143
E-Mail: address@hidden
KIT – Die Forschungsuniversität in der Helmholtz-Gemeinschaft
0xA70DA09E.asc
Description: application/pgp-keys
arne_babenhauserheide.vcf
Description: Vcard
signature.asc
Description: OpenPGP digital signature
--- End Message ---