STINNER Victor <vstin...@redhat.com> added the comment:

# gdb -args ./python ../bug2.py 
GNU gdb (GDB) Red Hat Enterprise Linux 8.2-5.el8

(gdb) run
...

Program received signal SIGILL, Illegal instruction.
0x0000ffffbded0058 in ?? ()

(gdb) disassemble $pc,$pc+10
Dump of assembler code from 0xffffbded0058 to 0xffffbded0062:
=> 0x0000ffffbded0058:  ldr     x16, 0xffffbded0064
   0x0000ffffbded005c:  adr     x17, 0xffffbded006c
   0x0000ffffbded0060:  br      x16
End of assembler dump.

(gdb) print *(void**)0xffffbded0064
$1 = (void *) 0xffffbdea4f64 <ffi_closure_SYSV>


According to /proc/95475/maps, 0xffffbded0064 lives in this memory mapping:

ffffbded0000-ffffbdee0000 r-xs 00000000 fd:00 34943874   /tmp/ffiQhRWVt 
(deleted)

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue36024>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to