On Wed, 27 Mar 2024 11:06:39 -0300 Felipe Wilhelms Damasio <felip...@taghos.com.br> wrote:
> kernel: traps: haproxy[2057993] trap invalid opcode ip:5b3e26 sp:7fd7c002f100 > error:0 in haproxy[42c000+1f7000] In our build, this would be where instruction pointer was: (gdb) list *0x5b10e6 0x5b10e6 is in __task_queue (src/task.c:285). 280 (wq != &tg_ctx->timers && wq != &th_ctx->timers)); 281 #endif 282 /* if this happens the process is doomed anyway, so better catch it now 283 * so that we have the caller in the stack. 284 */ 285 BUG_ON(task->expire == TICK_ETERNITY); 286 287 if (likely(task_in_wq(task))) 288 __task_unlink_wq(task); 289 However, we can't produce a stack trace from only the instruction pointer; at least I don't know how (but would love to learn if it is possible). We are trying to get a core dump, too. Cheers, -- Ricardo Nabinger Sanchez https://www.taghos.com.br/