# gdb -args ./python ../bug2.py
GNU gdb (GDB) Red Hat Enterprise Linux 8.2-5.el8
(gdb) run
...
Program received signal SIGILL, Illegal instruction.
0x0000ffffbded0058 in ?? ()
(gdb) disassemble $pc,$pc+10
Dump of assembler code from 0xffffbded0058 to 0xffffbded0062:
=> 0x0000ffffbded0058: ldr x16, 0xffffbded0064
0x0000ffffbded005c: adr x17, 0xffffbded006c
0x0000ffffbded0060: br x16
End of assembler dump.
(gdb) print *(void**)0xffffbded0064
$1 = (void *) 0xffffbdea4f64 <ffi_closure_SYSV>
According to /proc/95475/maps, 0xffffbded0064 lives in this memory mapping:
ffffbded0000-ffffbdee0000 r-xs 00000000 fd:00 34943874 /tmp/ffiQhRWVt (deleted) |