It seems that a while ago JIT code has hard dependency on machines with SSE instruction set, as it has hardcoded xorpd instruction into the source. This breaks at least athlon-xp machines on x86 platform: Program received signal SIGILL, Illegal instruction. [Switching to Thread 0xb463b940 (LWP 10463)] 0xae14e01a in ?? () (gdb) x/8i $pc 0xae14e01a: xorpd %xmm0,%xmm0 0xae14e01e: movsd (%edi),%xmm1 0xae14e022: ucomisd %xmm1,%xmm0 0xae14e026: je 0xae14e1ce 0xae14e02c: mov $0xae340080,%eax 0xae14e031: mov 0xaf051c3c,%edx 0xae14e037: cmp 0x4(%eax),%edx 0xae14e03a: jne 0xae14e60d There's also similar bug report on debian bugtracker: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548339 processor : 0 vendor_id : AuthenticAMD cpu family : 6 model : 6 model name : AMD Athlon(tm) XP 2000+ stepping : 2 cpu MHz : 1663.937 cache size : 256 KB fdiv_bug : no hlt_bug : no f00f_bug : no coma_bug : no fpu : yes fpu_exception : yes cpuid level : 1 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 mmx fxsr sse syscall mmxext 3dnowext 3dnow bogomips : 3327.87 clflush size : 32 power management: ts
Created attachment 40254 [details] Patch v1
Comment on attachment 40254 [details] Patch v1 r=me
Committed r48830