On Wed, 27 Mar 2024 11:06:39 -0300
Felipe Wilhelms Damasio <felip...@taghos.com.br> wrote:

> kernel: traps: haproxy[2057993] trap invalid opcode ip:5b3e26 sp:7fd7c002f100 
> error:0 in haproxy[42c000+1f7000]

In our build, this would be where instruction pointer was:

(gdb) list *0x5b10e6
0x5b10e6 is in __task_queue (src/task.c:285).
280                    (wq != &tg_ctx->timers && wq != &th_ctx->timers));
281     #endif
282             /* if this happens the process is doomed anyway, so better 
catch it now
283              * so that we have the caller in the stack.
284              */
285             BUG_ON(task->expire == TICK_ETERNITY);
286
287             if (likely(task_in_wq(task)))
288                     __task_unlink_wq(task);
289

However, we can't produce a stack trace from only the instruction
pointer; at least I don't know how (but would love to learn if it is
possible).

We are trying to get a core dump, too.

Cheers,

-- 
Ricardo Nabinger Sanchez             https://www.taghos.com.br/

Reply via email to