Port-arm archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: SIGILL in libcrypto.so.14 on NetBSD 9.0 PinebookPro
Dear Piotr,
(Apologies for the top-posting). I can reproduce the SIGSEGV
on amd64. Does it work if you change your TERM setting? If I export
TERM=xterm then mutt seems to work here.
On 2020-07-08, Piotr Kolasiński wrote:
> Yes - I've continued in gdb and two times more received SIGILL, but later SIGSEGV.
> That is why I started mutt in gdb, because the final error is SIGSEGV.
> But this happens only when I run mutt in pure st terminal emulator (from
> suckless.org). This not happens when I run it in xterm and (what is more
> interesting) in st with tmux running.u
> So I will dig more and try catch where the problem exists.
>
> Thanks
> Piotr
>
> On Wed, Jul 08, 2020 at 08:32:09PM +0200, Martin Husemann wrote:
> > On Wed, Jul 08, 2020 at 08:21:18PM +0200, Piotr Kolasi?ski wrote:
> > > Hi
> > >
> > > I try to run mutt on PinebookPro NetBSD 9.0 and receive SIGILL.
> > > When I start it in gdb, it points to libcrypto.so.14 function
> > > _arm8_sha512_probe. The name suggest some checks, and $pc register point
> > > to sha512su0, which is probably not supported on this chip. I found that
> > > it exists only if ARMv8.2-SHA is implemented. I'm wondering is it
> > > mistake in compiler settings or maybe in the library dynamic checking of
> > > this feature should be implemented.
> >
> > This is normal openssl probing for cpu features, it should catch the
> > signal and not use the asm code using that instructions.
> >
> > Just continue in gdb and all should be fine.
> >
> > Martin
--
Kind regards,
Yorick Hardy
Home |
Main Index |
Thread Index |
Old Index