_gcry_ath_mutex_lock: Assertion

David Goulet dgoulet at ev0ke.net
Mon Aug 4 15:00:28 CEST 2014

On 04 Aug (11:37:18), Werner Koch wrote:
> On Wed, 30 Jul 2014 18:01, dgoulet at ev0ke.net said:
> > I see that in libgcrypt 1.6, it has been removed so is there a way to
> > avoid the issue for < 1.6 without defining NDEBUG?
> You mean the problem is in 1.5.3 but not in 1.6 ?

Yes, sorry for the confusion. The problem is in 1.5.3 and not 1.6.x.

> What version of
> libgpg-error is used.  I need the exact versions and whether it has been
> patched by Debian or you are using upstream versions.

I'm using the Debian package and the exact version of the package is:

	libgpg-error-dev 1.13-0.2

Debian does *not* apply patches on top, I checked.


> Can I look at the OTR code? 

Sure, the pastebin link in the previous email shows the call stack from
libotr which basically gives that:

  -> otrl_proto_accept_data
    -> gcry_md_read (_gcry_md_read)
      -> md_final
        -> md_digest_length
          assert mutext lock here

This happens when two threads at the same time do a
otrl_message_receiving() call and end up in that code path. Top of the
calling chain starts here:


Let me know if you need more info! :)


> Salam-Shalom,
>    Werner
> -- 
> Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 603 bytes
Desc: Digital signature
URL: </pipermail/attachments/20140804/08ecec59/attachment-0001.sig>

More information about the Gcrypt-devel mailing list