I have seen a segmentation fault on a kamailio 5.7.0
``` Core was generated by `/usr/local/sbin/kamailio -P /run/kamailio/kamailio.pid -f /usr/local/etc/kamailio/kamailio.cfg -m 512 -M 12 --atexit=no'.
Stack trace of thread 221186: #0 0x00007fbc28ffb97d n/a (libc.so.6 + 0x19d97d) #1 0x00007fbc28ed4db1 n/a (libc.so.6 + 0x76db1) #2 0x00007fbc28f7c16a n/a (libc.so.6 + 0x11e16a) #3 0x00007fbc28f7c64a syslog (libc.so.6 + 0x11e64a) #4 0x000056472e67feeb qm_debug_check_frag (kamailio + 0x358eeb) #5 0x000056472e684788 qm_free (kamailio + 0x35d788) #6 0x000056472e69054e qm_shm_free (kamailio + 0x36954e) #7 0x00007fbc24832698 ser_free (tls.so + 0x34698) #8 0x00007fbc277028e6 ERR_pop_to_mark (libcrypto.so.3 + 0x16d8e6) #9 0x00007fbc2765119e asn1_d2i_read_bio (libcrypto.so.3 + 0xbc19e) #10 0x00007fbc277fd137 n/a (libcrypto.so.3 + 0x268137) #11 0x00007fbc277ede9d n/a (libcrypto.so.3 + 0x258e9d) #12 0x00007fbc276fe62b n/a (libcrypto.so.3 + 0x16962b) #13 0x00007fbc277ef718 n/a (libcrypto.so.3 + 0x25a718) #14 0x00007fbc276fe62b n/a (libcrypto.so.3 + 0x16962b) #15 0x00007fbc276fe901 OSSL_DECODER_from_bio (libcrypto.so.3 + 0x169901) #16 0x00007fbc276fec2e OSSL_DECODER_from_data (libcrypto.so.3 + 0x169c2e) #17 0x00007fbc277d45d4 n/a (libcrypto.so.3 + 0x23f5d4) #18 0x00007fbc27663b3b n/a (libcrypto.so.3 + 0xceb3b) #19 0x00007fbc27665388 n/a (libcrypto.so.3 + 0xd0388) #20 0x00007fbc27663cb9 n/a (libcrypto.so.3 + 0xcecb9) #21 0x00007fbc27665388 n/a (libcrypto.so.3 + 0xd0388) #22 0x00007fbc27663cb9 n/a (libcrypto.so.3 + 0xcecb9) #23 0x00007fbc27664433 ASN1_item_d2i_ex (libcrypto.so.3 + 0xcf433) #24 0x00007fbc27a44f14 n/a (libssl.so.3 + 0x6df14) #25 0x00007fbc27a3aa05 n/a (libssl.so.3 + 0x63a05) #26 0x00007fbc27a3c608 n/a (libssl.so.3 + 0x65608) #27 0x00007fbc2485b216 tls_accept (tls.so + 0x5d216) #28 0x00007fbc2486686d tls_h_read_f (tls.so + 0x6886d) #29 0x000056472e6289f3 tcp_read_headers (kamailio + 0x3019f3) #30 0x000056472e631c9d tcp_read_req (kamailio + 0x30ac9d) #31 0x000056472e638c23 handle_io (kamailio + 0x311c23) #32 0x000056472e622d70 io_wait_loop_epoll (kamailio + 0x2fbd70) #33 0x000056472e63a760 tcp_receive_loop (kamailio + 0x313760) #34 0x000056472e616dde tcp_init_children (kamailio + 0x2efdde) #35 0x000056472e36565c main_loop (kamailio + 0x3e65c) #36 0x000056472e3705b0 main (kamailio + 0x495b0) #37 0x00007fbc28e87d90 n/a (libc.so.6 + 0x29d90) #38 0x00007fbc28e87e40 __libc_start_main (libc.so.6 + 0x29e40) #39 0x000056472e351805 _start (kamailio + 0x2a805)
#0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:74 No locals. #1 0x00007fbc28ed4db1 in __vfprintf_internal (s=s@entry=0x56472ec58a00, format=format@entry=0x56472e8246e0 "%s: %.*s%s%s%sBUG: qm: fragm. %p (address %p) beginning overwritten (%lx)! Memory allocator was called from %s:%u. Fragment marked by %s:%lu. Exec from %s:%u.\n", ap=ap@entry=0x7fff8baf6450, mode_flags=mode_flags@entry=0) at ./stdio-common/vfprintf-internal.c:1517 len = <optimized out> ptrptr = 0x20 signed_number = <optimized out> step0_jumps = {0, 2488, 2400, 1600, 1512, 2624, 1408, 2728, 2976, 1864, 2888, 608, 528, 2224, 2016, 1968, 2352, 2240, 2376, -880, 48, -96, 1776, 1688, 272, -392, -876, -960, -956, 3088, 688} space = <optimized out> is_short = <optimized out> use_outdigits = <optimized out> step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 1864, 2888, 608, 528, 2224, 2016, 1968, 2352, 2240, 2376, -880, 48, -96, 1776, 1688, 272, -392, -876, -960, -956, 0, 688} group = <optimized out> prec = -1 step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2888, 608, 528, 2224, 2016, 1968, 2352, 2240, 2376, -880, 48, -96, 1776, 1688, 272, -392, -876, -960, -956, 0, 688} string = 0x6e6f73616e615020 <error: Cannot access memory at address 0x6e6f73616e615020> left = <optimized out> is_long_double = <optimized out> width = <optimized out> step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2544, 0, 0, 0, 2016, 1968, 2352, 2240, 2376, 0, 0, 0, 0, 1688, 0, 0, 0, 0, 0, 0, 688} alt = <optimized out> showsign = <optimized out> is_long = <optimized out> is_char = <optimized out> pad = <optimized out> step3b_jumps = {0 <repeats 11 times>, 528, 0, 0, 2016, 1968, 2352, 2240, 2376, -880, 48, -96, 1776, 1688, 272, -392, -876, 0, 0, 0, 688} step4_jumps = {0 <repeats 14 times>, 2016, 1968, 2352, 2240, 2376, -880, 48, -96, 1776, 1688, 272, -392, -876, 0, 0, 0, 688} is_negative = <optimized out> number = <optimized out> base = <optimized out> the_arg = {pa_wchar = 89781848 L'\x559f658', pa_int = 89781848, pa_long_int = 140445520361048, pa_long_long_int = 140445520361048, pa_u_int = 89781848, pa_u_long_int = 140445520361048, pa_u_long_long_int = 140445520361048, pa_double = 6.9389306722691122e-310, pa_long_double = <invalid float value>, pa_float128 = 1.67756396290316875220685842695669771e-4932, pa_string = 0x7fbc0559f658 "\355\357ͫ", pa_wstring = 0x7fbc0559f658 L"\xabcdefed", pa_pointer = 0x7fbc0559f658, pa_user = 0x7fbc0559f658} spec = 115 's' _cleanup_start_doit = <optimized out> _buffer = {__routine = 0x7fff8baf5f10, __arg = 0x56472ec58a00, __canceltype = 89781560, __prev = 0x7fbc047fe000} _cleanup_routine = <optimized out> thousands_sep = 0x0 grouping = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff> done = 238 f = 0x56472e824767 "s:%lu. Exec from %s:%u.\n" lead_str_end = 0x56472e8246e0 "%s: %.*s%s%s%sBUG: qm: fragm. %p (address %p) beginning overwritten (%lx)! Memory allocator was called from %s:%u. Fragment marked by %s:%lu. Exec from %s:%u.\n" end_of_spec = <optimized out> work_buffer = "`\355\177\004\274\177\000\000`\355\177\004\274\177\000\000P\241\207$\274\177\000\000(Xh.C\001\000\000\220\271\207$\274\177\000\000T\241\207$\274\177\000\000p\365Y\005\274\177\000\000\000\340\177\004\274\177\000\000\220\271\207$\274\177\000\000T\241\207$\274\177\000\000\000\366Y\005\274\177\000\000\000\340\177\004\274\177\000\000(\000\000\000\000\000\000\000\070\365Y\005\274\177\000\000\200\001\000\000\000\000\000\000\000\340\177\004\274\177\000\000\260\364Y\005\274\177\000\000\310\365Y\005\274\177\000\000\360\000\000\000\000\000\000\000\000\340\177\004\274\177\000\000\070\365Y\005\274\177\000\000X\366Y\005\274\177\000\000\001\000\000\000\000\000\000\000\310v\203\004\274\177\000\000\001\000\000\000\000\000\000\000"... workend = 0x7fff8baf62e8 "" ap_save = {{gp_offset = 16, fp_offset = 48, overflow_arg_area = 0x7fff8baf6530, reg_save_area = 0x7fff8baf6470}} nspecs_done = 10 save_errno = 0 readonly_format = 0 do_longlong_number = <optimized out> __result = <optimized out> #2 0x00007fbc28f7c16a in __vsyslog_internal (pri=<optimized out>, fmt=0x56472e8246e0 "%s: %.*s%s%s%sBUG: qm: fragm. %p (address %p) beginning overwritten (%lx)! Memory allocator was called from %s:%u. Fragment marked by %s:%lu. Exec from %s:%u.\n", ap=0x7fff8baf6450, mode_flags=0) at ./misc/syslog.c:229 __clframe = {__cancel_routine = <optimized out>, __cancel_arg = <synthetic pointer>, __do_it = 1, __cancel_type = <optimized out>} now_tm = {tm_sec = 51, tm_min = 27, tm_hour = 0, tm_mday = 9, tm_mon = 9, tm_year = 122, tm_wday = 0, tm_yday = 281, tm_isdst = 0, tm_gmtoff = 0, tm_zone = 0x56472ec59350 "UTC"} now = 1665275271 fd = <optimized out> --Type <RET> for more, q to quit, c to continue without paging-- f = 0x56472ec58a00 buf = 0x0 bufsize = 0 msgoff = 21 saved_errno = <optimized out> failbuf = "\000\340\177\004\274\177\000\000\030\027r\005\274\177\000\000\220M^\005\274\177\000\000\000\340\177\004\274" clarg = {buf = 0x0, oldaction = <optimized out>} #3 0x00007fbc28f7c64a in __syslog (pri=<optimized out>, fmt=<optimized out>) at ./misc/syslog.c:109 ap = {{gp_offset = 48, fp_offset = 48, overflow_arg_area = 0x7fff8baf6570, reg_save_area = 0x7fff8baf6470}} #4 0x000056472e67feeb in qm_debug_check_frag (qm=0x7fbc047fe000, f=0x7fbc0562dfe8, file=0x7fbc2487a154 "tls: tls_init.c", line=323, efile=0x56472e824559 "core/mem/q_malloc.c", eline=511) at core/mem/q_malloc.c:123 __llevel = -3 p = 0x56472e824554 __func__ = "qm_debug_check_frag" #5 0x000056472e684788 in qm_free (qmp=0x7fbc047fe000, p=0x7fbc0562e020, file=0x7fbc2487a154 "tls: tls_init.c", func=0x7fbc2487b990 <__func__.0> "ser_free", line=323, mname=0x7fbc2487a150 "tls") at core/mem/q_malloc.c:511 qm = 0x7fbc047fe000 f = 0x7fbc0562dfe8 size = 1016 next = 0x7fbc0562e1e8 prev = 0x7fbc0562e0f8 __func__ = "qm_free" #6 0x000056472e69054e in qm_shm_free (qmp=0x7fbc047fe000, p=0x7fbc0562e020, file=0x7fbc2487a154 "tls: tls_init.c", func=0x7fbc2487b990 <__func__.0> "ser_free", line=323, mname=0x7fbc2487a150 "tls") at core/mem/q_malloc.c:1350 No locals. #7 0x00007fbc24832698 in ser_free (ptr=0x7fbc0562e020, fname=0x7fbc278ce6e5 "../crypto/err/err_local.h", fline=86) at tls_init.c:323 __func__ = "ser_free" #8 0x00007fbc277028e6 in ERR_pop_to_mark () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #9 0x00007fbc2765119e in asn1_d2i_read_bio () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #10 0x00007fbc277fd137 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #11 0x00007fbc277ede9d in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #12 0x00007fbc276fe62b in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #13 0x00007fbc277ef718 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #14 0x00007fbc276fe62b in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #15 0x00007fbc276fe901 in OSSL_DECODER_from_bio () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #16 0x00007fbc276fec2e in OSSL_DECODER_from_data () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #17 0x00007fbc277d45d4 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #18 0x00007fbc27663b3b in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #19 0x00007fbc27665388 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #20 0x00007fbc27663cb9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #21 0x00007fbc27665388 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #22 0x00007fbc27663cb9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #23 0x00007fbc27664433 in ASN1_item_d2i_ex () from /lib/x86_64-linux-gnu/libcrypto.so.3 No symbol table info available. #24 0x00007fbc27a44f14 in ?? () from /lib/x86_64-linux-gnu/libssl.so.3 No symbol table info available. #25 0x00007fbc27a3aa05 in ?? () from /lib/x86_64-linux-gnu/libssl.so.3 No symbol table info available. #26 0x00007fbc27a3c608 in ?? () from /lib/x86_64-linux-gnu/libssl.so.3 No symbol table info available. --Type <RET> for more, q to quit, c to continue without paging-- #27 0x00007fbc2485b216 in tls_accept (c=0x7fbc056d3ef0, error=0x7fff8baf7994) at tls_server.c:468 ret = -1951434416 ssl = 0x7fbc056d82f8 cert = 0x7fbc056d2388 tls_c = 0x7fbc056d1fa0 tls_log = 612737204 __func__ = "tls_accept" pkey = 0x0 #28 0x00007fbc2486686d in tls_h_read_f (c=0x7fbc056d3ef0, flags=0x7fff8bb17e9c) at tls_server.c:1173 r = 0x7fbc056d4018 bytes_free = 16383 bytes_read = 1713 read_size = 16383 ssl_error = 0 ssl_read = 0 ssl = 0x7fbc056d82f8 rd_buf = "\026\003\003\004\071\v\000\004\065\000\004\062\000\004/0\202\004+0\202\003\023\240\003\002\001\002\002\t\000\267\207\251\066\225\277\372\335\060\r\006\t*\206H\206\367\r\001\001\v\005\000\060\201\217\061\v0\t\006\003U\004\006\023\002JP1\020\060\016\006\003U\004\b\f\aFukuoka1-0+\006\003U\004\n\f$ Panasonic System Networks co., Ltd.1?0=\006\003U\004\003\f6SIP Phone Client Authentication Self CA Certificate V2"... wr_buf = "\025\003\003\000\002\002\060\000-\003\003\210z\357o\213$\017\235\231\334~\207\233\365\026\261\307~lV\214A\277\337DOWNGRD\001\000\000=\000\000\005\377\001\000\001\000\026\003\003\026\035\v\000\026\031\000\026\026\000\006\070\060\202\006\064\060\202\005\034\240\003\002\001\002\002\020&~b\352RT\000\227\236Dq\264RL\271\304\060\r\006\t*\206H\206\367\r\001\001\v\005\000\060\201\217\061\v0\t\006\003U\004\006\023\002GB1\033\060\031\006\003U\004\b\023\022Greater Manchester1\020\060\016\006\003U\004\a\023\aSalford1\030\060\026\006\003U\004\n\023\017Sectigo Lim"... rd = {buf = 0x7fff8baf7af0 "\026\003\003\004\071\v", pos = 1086, used = 1713, size = 65536} wr = {buf = 0x7fff8bb07af0 "\025\003\003", pos = 0, used = 0, size = 65536} tls_c = 0x7fbc056d1fa0 enc_rd_buf = 0x0 n = 0 flush_flags = 0 err_src = 0x7fbc248839b0 "TLS read:" ip_buf = "10.20.0.100", '\000' <repeats 52 times> x = 0 tls_dbg = 0 __func__ = "tls_h_read_f" #29 0x000056472e6289f3 in tcp_read_headers (c=0x7fbc056d3ef0, read_flags=0x7fff8bb17e9c) at core/tcp_read.c:441 bytes = -1 remaining = 0 p = 0x7fbc054ebd60 "\002" r = 0x7fbc056d4018 mc = 2638013693 body_len = 50944 mfline = 0x7fbc054ec0e8 "REGISTER sip:voip.isip.ca:443 SIP/2.0\r\nv: SIP/2.0/TLS 89.28.64.156:52319;rport;branch=z9hG4bKPjr.w8BMId-6xgyjA5coZyVJeC2QNp6cni;alias\r\nMax-Forwards: 70\r\nf: sip:1217264@voip.isip.ca;tag=Dt75LCcpfD8Oe"... mtransid = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 0} __func__ = "tcp_read_headers" #30 0x000056472e631c9d in tcp_read_req (con=0x7fbc056d3ef0, bytes_read=0x7fff8bb17e94, read_flags=0x7fff8bb17e9c) at core/tcp_read.c:1469 bytes = -1 total_bytes = 0 resp = 1 size = 2 req = 0x7fbc056d4018 dst = {send_sock = 0x7fff8bb17e10, to = {s = {sa_family = 27615, sa_data = "E.\001\000\000\000\300}\261\213\377\177\000"}, sin = {sin_family = 27615, sin_port = 11845, sin_addr = {s_addr = 1}, sin_zero = "\300}\261\213\377\177\000"}, sin6 = {sin6_family = 27615, sin6_port = 11845, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\300}\261\213\377\177\000\000\030\000\000\000Q\000\000", __u6_addr16 = { 32192, 35761, 32767, 0, 24, 0, 81, 0}, __u6_addr32 = {2343665088, 32767, 24, 81}}}, sin6_scope_id = 4294967294}, sas = {ss_family = 27615, __ss_padding = "E.\001\000\000\000\300}\261\213\377\177\000\000\030\000\000\000Q\000\000\000\376\377\377\377\377\377\377\377\210\256p\005\274\177\000\000 \260p\005\274\177\000\000@{\221.GV\000\000p~\261\213\001 \000\000\340\204I(\274\177\000\000\320}\261\213\001\000\000\000\020\200\203\004Q\000\000\000\001\000\000\000\000\000\000\000H\275N\005\274\177\000\000\340~\261\213\377\177\000\000\b\000\000\000\000\000\000", __ss_align = 140445521849992}}, id = -2, send_flags = {f = 65535, blst_imask = 65535}, proto = 36 '$', proto_pad0 = 0 '\000', proto_pad1 = 0} c = 46 '.' ret = 778163298 __func__ = "tcp_read_req" #31 0x000056472e638c23 in handle_io (fm=0x7fbc284984e0, events=1, idx=-1) at core/tcp_read.c:1855 ret = -1 n = 0 read_flags = RD_CONN_SHORT_READ --Type <RET> for more, q to quit, c to continue without paging-- con = 0x7fbc056d3ef0 s = 36 resp = -2 t = 359788347 ee = 0x0 __func__ = "handle_io" #32 0x000056472e622d70 in io_wait_loop_epoll (h=0x56472e917980 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 n = 1 r = 0 fm = 0x7fbc284984e0 revents = 1 __func__ = "io_wait_loop_epoll" #33 0x000056472e63a760 in tcp_receive_loop (unix_sock=81) at core/tcp_read.c:1976 __func__ = "tcp_receive_loop" #34 0x000056472e616dde in tcp_init_children (woneinit=0x7fff8bb18288) at core/tcp_main.c:5236 r = 0 i = 7 reader_fd_1 = 81 pid = 0 si_desc = "tcp receiver (generic)\000\000\317jZ.GV\000\000`\202\261\213\377\177\000\000\036Xd.\000\000\000\000\340\345.(\000\000\000\000\253\066\200.GV\000\000\250\000\261\213\377\177\000\000\f\332v.GV\000\000\000\000\000\000\000\000\000\000\020\200\203\004\274\177\000\000\067\000\000\000\000\000\000\000\320\066\302\004\001\000\000\000P\202\261\213\377\177\000\000\036\334v.GV\000" si = 0x0 __func__ = "tcp_init_children" #35 0x000056472e36565c in main_loop () at main.c:1851 i = 8 pid = 221167 si = 0x0 si_desc = "udp receiver child=7 sock=10.20.20.100:5060\000\063.124.220.146:5080)\000X7\211.GV\000\000\210`{.GV\000\000\000\000\000\000\000\000\000\000s\314|.GV\000\000\067\000\000\000\000\000\000\000\260\305\367(\274\177\000\000 \204\261\213\377\177\000\000z\271Q.GV\000" nrprocs = 8 woneinit = 1 __func__ = "main_loop" #36 0x000056472e3705b0 in main (argc=10, argv=0x7fff8bb18998) at main.c:3085 cfg_stream = 0x56472eb33380 c = -1 r = 0 tmp = 0x7fff8bb18e39 "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x56472e7b9278 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3559158303 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x7fff8bb18998 p = 0x7fff8bb18910 "" st = {st_dev = 26, st_ino = 85318, st_nlink = 2, st_mode = 16888, st_uid = 114, st_gid = 121, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1665275250, tv_nsec = 283708644}, st_mtim = {tv_sec = 1665275250, tv_nsec = 283708644}, st_ctim = {tv_sec = 1665275250, tv_nsec = 283708644}, __glibc_reserved = {0, 0, 0}} tbuf = "@\003\000\000@\003\000\000@\003\000\000@\003\000\000@\003\000\000@\003\000\000@\003\000\000@\003", '\000' <repeats 50 times>, "\377\000\000\000\377\000\000\000\000\000\377\000\000\000\000\377", '/' <repeats 16 times>, "\230\r", '\000' <repeats 14 times>, "`", '\000' <repeats 15 times>, "\001", '\000' <repeats 145 times>... option_index = 12 long_options = {{name = 0x56472e7bb6b6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x56472e7b6521 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x56472e7bb6bb "alias", has_arg = 1, flag = 0x0, val = 1024}, { name = 0x56472e7bb6c1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x56472e7bb6c7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x56472e7bb6d0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, { name = 0x56472e7bb6da "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x56472e7bb6e4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x56472e7bb6ef "modparam", has_arg = 1, flag = 0x0, val = 1030}, { name = 0x56472e7bb6f8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x56472e7bb703 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x56472e7bb709 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, { name = 0x56472e7bb713 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x56472e7bb71a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) (gdb) info locals No locals. (gdb) list 69 in ../sysdeps/x86_64/multiarch/strlen-avx2.S (gdb)
```
### Additional Information
* version: kamailio 5.7.0-dev0 (x86_64/linux) da0178 flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: da0178 compiled on 19:15:18 Aug 9 2022 with gcc 11.2.0
```
* **Operating System**: ``` Distributor ID: Ubuntu Description: Ubuntu 22.04.1 LTS Release: 22.04 Codename: jammy
Linux kamailio-prod 5.15.0-1019-aws #23-Ubuntu SMP Wed Aug 17 18:33:13 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux ```