I am trying to analyze my application which is running on arm with Valgrind. I am using ssl and libcrypto inside it. So on attempt to analyze it I am receiving SIGILL.
I've tried to disable it
--sigill-diagnostics=no
but it does not help.
I also tried to intercept the signal from within an application itself by adding
signal(SIGILL, SIG_IGN);
to the very start of my application. This does not help as well.
I've tried adding suppression file. But this also does not resolve an issue.
Is there any other methods to get valgrind running on arm with ssl ? Is it possible at all to do it?
Thanks in advance.
I faced the same problem as described by @unresolved_external on an ARMv7 based platform. Even calling valgrind with parameter --sigill-diagnostics=no in the right order did not help:
valgrind --sigill-diagnostics=no /path/to/your/program
valgrinds output complained about to different illegal instructions:
0xEBAD 0x1CCA and0xEC51 0x0F1E.With further internet research I found patches for both unhandled instructions on https://bugsfiles.kde.org:
0xEBAD 0x1CCA0xEC51 0x0F1ECompilation of valgrind using both patches resolved any error message when analyzing my executable linked to OpenSSL libcrypto.so.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With