dgoulet at ev0ke.net
Mon Aug 4 15:00:28 CEST 2014
On 04 Aug (11:37:18), Werner Koch wrote:
> On Wed, 30 Jul 2014 18:01, dgoulet at ev0ke.net said:
> > I see that in libgcrypt 1.6, it has been removed so is there a way to
> > avoid the issue for < 1.6 without defining NDEBUG?
> You mean the problem is in 1.5.3 but not in 1.6 ?
Yes, sorry for the confusion. The problem is in 1.5.3 and not 1.6.x.
> What version of
> libgpg-error is used. I need the exact versions and whether it has been
> patched by Debian or you are using upstream versions.
I'm using the Debian package and the exact version of the package is:
Debian does *not* apply patches on top, I checked.
> Can I look at the OTR code?
Sure, the pastebin link in the previous email shows the call stack from
libotr which basically gives that:
-> gcry_md_read (_gcry_md_read)
assert mutext lock here
This happens when two threads at the same time do a
otrl_message_receiving() call and end up in that code path. Top of the
calling chain starts here:
Let me know if you need more info! :)
> Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 603 bytes
Desc: Digital signature
More information about the Gcrypt-devel