Description of problem: Illegal instruction when using openssl (originally triggered in scipy test suite in bug #1181559) Version-Release number of selected component (if applicable): $ rpm -qf /lib/libcrypto.so.10 openssl-libs-1.0.2d-2.fc23.armv7hl How reproducible: Always. Run openssl in gdb Steps to Reproduce: 1. $ gdb openssl GNU gdb (GDB) Fedora 7.10-29.fc23 Copyright (C) 2015 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "armv7hl-redhat-linux-gnueabi". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from openssl...Reading symbols from /home/fedora/tomspur/openssl...(no debugging symbols found)...done. (no debugging symbols found)...done. Missing separate debuginfos, use: dnf debuginfo-install openssl-1.0.2d-2.fc23.armv7hl (gdb) r Starting program: /usr/bin/openssl Cannot parse expression `.L967 4@r4'. warning: Probes-based dynamic linker interface failed. Reverting to original interface. [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/libthread_db.so.1". Program received signal SIGILL, Illegal instruction. 0xb6c8abe8 in _armv7_tick () from /lib/libcrypto.so.10 (gdb) bt full #0 0xb6c8abe8 in _armv7_tick () from /lib/libcrypto.so.10 No symbol table info available. #1 0xb6c86f9c in OPENSSL_cpuid_setup () from /lib/libcrypto.so.10 No symbol table info available. #2 0xb6fdf71c in call_init.part () from /lib/ld-linux-armhf.so.3 No symbol table info available. #3 0xb6fdf880 in _dl_init () from /lib/ld-linux-armhf.so.3 No symbol table info available. #4 0xb6fcfb04 in _dl_start_user () from /lib/ld-linux-armhf.so.3 No symbol table info available. Backtrace stopped: previous frame identical to this frame (corrupt stack?) Actual results: SIGILL Expected results: No SIGILL
The instruction is used for detection of CPU features. Just use 'handle SIGILL nostop noprint' in gdb.