DEBUG: crash using an invalid opcode on aarch64 instead of an invalid access

On aarch64 there's also a guaranted invalid instruction, called UDF, and
which even supports an optional 16-bit immediate operand:

   https://developer.arm.com/documentation/ddi0596/2021-12/Base-Instructions/UDF--Permanently-Undefined-?lang=en

It's conveniently encoded as 4 zeroes (when the operand is zero). It's
unclear when support for it was added into GAS, if at all; even a
not-so-old 2.27 doesn't know about it. Let's byte-encode it.

Tested on an A72 and works as expected.
diff --git a/include/haproxy/bug.h b/include/haproxy/bug.h
index a07a6c3..6ce2066 100644
--- a/include/haproxy/bug.h
+++ b/include/haproxy/bug.h
@@ -54,6 +54,13 @@
 		my_unreachable();					\
 	} while (0)
 
+#elif defined(__aarch64__)
+#define ha_crash_now() do {						\
+		/* udf#imm16: 4 bytes (), raises illegal instruction */	\
+		__asm__ volatile(".byte 0x00,0x00,0x00,0x00\n");	\
+		my_unreachable();					\
+	} while (0)
+
 #else // not x86
 
 /* generic implementation, causes a segfault */